Security
1.2.2024
3
 min read

Plan your own security concept: ready for use in just 24 hours with NSTR

The security of a company requires thorough analysis and careful implementation. However, the first question for every user should be:

What is my protection goal? Do I want to avoid theft, sabotage, vandalism, or espionage? Nowadays, burglaries take place without leaving any traces. Do I want to protect myself from such undetected cyber attacks using USB sticks on my network?

Have you chosen your protection goal? Then follow these steps for your video security planning:

1. Risks Determine the location of your monitoring object

Even before you deal with the monitoring object yourself, you should first base your security requirements on the characteristics of the location itself, where the protection goal is:

  • Take historical security incidents into account
    What incidents have already occurred in the past? Have perpetrator patterns been identified here that provide evidence of weak points in the monitoring object? Are there any other weak points that you or your employees are already aware of from everyday life
  • Analyze your terrain accesses
    and determine which area of the monitoring object has the highest value. How easy is access here? How many cameras do you need to cover all accesses? Are there hidden entrances to simple obstacles such as low fences?
  • Question existing security systems
    Which monitoring measures have already been implemented? Do you have a barrier fence, security personnel or documentary cameras? And much more importantly: What measures are taken when your existing system works. Do you still have to intervene yourself, or do you have assistance with the intervention? Can and do you even want to intervene yourself?
  • Consider your employees' access rights
    Who has access to the surveillance object area and when? Please note access by internal and external persons during and outside operating hours. Are there any unplanned deliveries after closing time? Does highly fluctuating, foreign personnel pose a threat, for example?
  • Learn about security in your environment
    Is there a high crime rate in your area? Is your monitoring area located centrally and between other companies, e.g. in a commercial area, or alone in the countryside?

2. Possible weak points in the risk area

Once you've identified the risk area of your risk object that you want to monitor, you should identify potential weaknesses. This should be the focus of your video surveillance:

  • access points
    access points to the surveillance object along the perimeter. In addition to access roads and entrance gates, this also includes low fences and unfenced natural borders such as rivers and streams.
  • Areas that are difficult to see
    Blind spots and dark corners on the site, which are covered by walls, trees, equipment or trash cans, for example.
  • Badly lit value objects:
    Infrastructure or other areas of value, such as technical facilities, storage areas, and employee zones.

3. Identify legal and data protection risks

Make sure that monitoring is proportionate and that the consent of all relevant parties has been obtained. Observe data protection regulations and the rights of the supervised parties, particularly in the context of the General Data Protection Regulation (GDPR). Above all, the following three points should be considered in the first step of planning:

  • Visible information about video surveillance
    They are necessary for every monitoring. A clearly visible sign with a banner or poster is often sufficient here. (included in the NSTR package)
  • Identify person responsible for data protection
    A data protection officer must be signposted so that monitored persons have a contact person regarding their data and GDPR rights. Appoint this person or designate someone responsible externally.
  • Avoid monitoring public areas
    Companies in industrial areas in particular, or those whose surveillance object is adjacent to neighbors, must ensure that their systems are installed in such a way that everything beyond their perimeters is made unrecognizable. These areas must be pixelated or otherwise obscured. For example, it is advisable to set cameras to the parameter limits when planning, with the monitoring angle aimed at your own monitoring object. The NESTOR app helps to set up risk zones and automatically pixelate external areas. The built-in AI can also automatically blur faces and only identify suspicious people in the event of an intervention for clarification.

Create your own security plan now on app.nestorsecurity.com

app.nestorsecurity.com

Anyone who follows this short list is well equipped to carry out their own safety planning. By the way, this is very easy with the NSTR app — plan for free and right now on app.nestorsecurity.com.

PDF erhalten
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
PDF downloaden