What can we help you with?
Click below:
- Investigation into corporate crime
- Hidden cameras
- Absenteeism
- Pre-employment screening/background screening
- Surveillance
- Investigation into compliance with non-competition clause/relationship fraud/confidentiality fraud
- Tracing listening devices
- Security Auditing
- Preparation of Risk Assessment and Evaluation
- Forensic IT investigation
- Preparation of emergency plans
- Security Consulting
- Interim Security Management
- Investigation into industrial espionage and leaks
- Test purchase and quality control services
- Facility support
- 24 hour helpdesk
Security Auditing
Bedrijfsrecherche Nederland has developed a Security Audit to map the security risks within your organization and prepare matching recommendations.
Our Security Consultants are all RSE registered, which implies that they are skilled and trained in conducting surveys on existing security measures within your organization according to DHM security management guidelines . Our consultants are also CPO (Certified Protection Officer) and RO (Registered Investigator).
DHM is centered on the idea of a structured approach (from policy up to implementation, including quality assurance) in order to control inappropriate influencing of company activities. This is an elaborate and time-consuming process. However it will ensure you of a thorough analysis of existing security measures within your company.
In addition to DHM you can opt for a Security Scan. This Security Scan is composed of elements from DHM’s Internal Security Audits. During the Security Scan, security risks will be identified and checked against existing OBE measures (Organizational, Building/Constructional, and Electronic security measures).
Afterwards, all findings will be analyzed and recommendations on how to control inappropriate influencing of company activities will be prepared. There is a base Security Scan that can be used for a variety of business surroundings. A scan can be tailored to specific requirements also.
The Security Scan may include:
- Intruder alarms
- Key holding
- Open and Close procedures
- Fire prevention
- Assault prevention
- Cash money procedures
- Procedures money control
- Money control, safe, money transport
- Theft prevention, internal and external
- Goods receipt and processing
- Working conditions
Request information on security auditing
REPORT ANONYMOUSLY?
Anonymous reporting was established in collaboration with (your) employer(s) and Bedrijfsrecherche Nederland B.V.