contact us today

security consulting

McCann Protective Services doesn’t cut corners. We start by conducting a security consultation which involves a meticulous, multi-step process to ensure that every potential risk is identified and addressed.

Confirming identity through passports, driver’s licenses, or social security numbers.

Searching for any criminal history, including arrests, convictions, and incarcerations.

Verifying past employment details, job titles, and reasons for leaving previous positions.

Gathering insights into the individual’s character and work ethic through personal and professional contact, as well as their financial responsibility.

Client Interview: Understanding your needs, concerns, and any specific threats you may be facing.

Site Visit: Physically inspecting the property or site to assess current security measures and identify vulnerabilities.

Threat Analysis: Evaluating potential threats based on your specific profile, location, industry, and recent incidents.

Vulnerability Assessment: Identifying weaknesses in existing security measures, such as physical barriers, access controls, surveillance systems, and personnel procedures.

Impact Analysis: Determining the potential impact of identified risks on your safety, assets, and operations.

Recommendations: Providing tailored recommendations to mitigate identified risks. This may include physical security enhancements (e.g., improved locks, alarm systems), procedural changes, and technological upgrades (e.g., advanced surveillance cameras).

Implementation Strategy: Outlining a step-by-step plan for implementing the recommended measures, including timelines and cost estimates.

Training & Drills: Suggesting or providing training sessions for client personnel on security protocols and emergency response procedures.

Detailed Report: Creating a comprehensive report that outlines findings, recommendations, and the proposed implementation strategy. This report should be clear, concise, and professionally formatted.

Follow-Up: Scheduling follow-up consultations to review the implementation progress and adjust the security plan as needed.

Regular Reviews: Conducting periodic reviews to ensure that security measures remain effective and up to date with evolving threats.

Continuous Improvement: Recommending continuous improvements based on the latest security technologies and best practices.