Robust Visitor Entry Processes

During both their online and physical reconnaissance of a site, hostiles may look for a means to physically enter in your organisation.

They may look for information available online, such as employees talking about lax security practices or previous process failures; or, if they are confident enough to try and gain access to your organisation, try and bypass security or use fraudulent ID.

Employees tasked with document verification, whether during pre-employment screening and/or during visitor entry, will be vigilant to the threat of fraudulent documentation.

Motivated, attentive and observant security personnel will also form a highly-effective deterrent presence and final line of defence where other interventions may have failed.

Guidance on this page can help organisations both increase awareness relating to fraudulent documentation and also improve the vigilance of your security personnel.