Robust Visitor Entry Processes

During both their online and physical reconnaissance of a site, hostiles may look for a means to physically enter in your organisation.

They may look for information available online, such as employees talking about lax security practices or previous process failures; or, if they are confident enough to try and gain access to your organisation, try and bypass security or use fraudulent ID.

Employees tasked with document verification, whether during pre-employment screening and/or during visitor entry, will be vigilant to the threat of fraudulent documentation.

Motivated, attentive and observant security personnel will also form a highly-effective deterrent presence and final line of defence where other interventions may have failed.

Guidance on this page can help organisations both increase awareness relating to fraudulent documentation and also improve the vigilance of your security personnel.

Did you find this page useful? YesNo
Thank you for your feedback. If you have any further suggestions on how this information can be made even more useful to improve your experience, feel free to share details below.
Thank you for your feedback. Sorry to hear that you haven't found this information useful. Please help us improve your experience and share how we can make this information more useful for you.