Wednesday, September 4, 2019

The Fine and Time Honored Art of Piggy Backing

After years of fighting what he had assumed as bad practice, a Facility Security Officer (FSO) confidently confided that he now welcomes “piggy backing” as acceptable. Entering a protected facility while using the credentials of another employee also known as “piggy backing” is now being proven an efficient means of enterprise ingress.

“With each employing needlessly scanning their badges, when someone else had already triggered the authorization at first seemed redundant.” said the FSO. “Now we know that there is so much more benefit. Now we see a realized cost savings involved as they now only trigger the device once, saving destructive wear and tear on locking and opening hardware. Also, holding the door open for multiple employees to enter simultaneously reduces the number of times the door is opened and closed, thus also creating cost savings for heating and air conditioning expenses”, he continued.

The progressive cleared defense contractor began a month long pilot program to test the theory of cost reduction and improved employee morale. He collected data from the enterprise information management system monitoring the installed security system. He also provided high fives to employees as they arrive in mass each morning.

At the end of the month the cost savings to heating and air conditioning system demonstrated that piggy backing does indeed reduce costs. Additionally, he describes how he gleefully counted smiles as happy employees passed through the main entrance. Based on the smiles and enthusiastic hand smacks he logically deducted that this change had indeed improved morale.

“We are now looking to additionally savings as we remove badge readers and door magnets as well as terminate the lease on the information management system. One person can now physically unlock the door and then hold it open to allow others to enter.”

He is hoping his revolutionary leap in logic will catch on and is planning to speak at security conferences such as ASIS International and NCMS in hopes of educating other risk and security managers.

“First, my organization, and then the rest. Who knows what global impact this simple act of allowing employees to piggy back might cause? I look forward to getting my message out.”

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".

No comments: