Product
Case Studies
Pricing
Contact
Login
Start Trial
START YOUR
FREE 30 DAY TRIAL
TODAY
Start Trial
Business Security Checklist
Regular reviews of your business infrastructure helps secure your business. Use this framework to review many aspect of Security related concerns for your business.
How often should this be used?
Reassess you security situation at least quarterly.
View Checklist
Library
Business-Commercial
Security
Business Security
Categories
Accounting and Finance
Procurement
Administration and Office Support
Business / Commercial
Change Management
Security
Design
General
HR / OHS
Information and Communication Technology
Development and Programming
Programme and Project Management
Security
Systems Administration
Web Development and Production
Management
Maritime
Marketing and Communications
Digital and Search
Event Management
Management
Product Management and Development
Public Relations and Corporate Affairs
Traditional Media
Personal
Quality Assurance
Sales
Business Security
Physical
All door locks are operational.
All windows have functional locks on them.
Any badge or keyless entry system is working properly at all times.
All internal locks and protective devices are operational.
All fire extinguishers are inspected and charged.
Fire and smoke detection systems are tested at least once a month.
All exit signs are properly lit.
Prevent emergency exits from being blocked.
The fire evacuation route is posted at various points throughout the building.
There is adequate lighting at all entrances.
There is adequate lighting throughout the facility grounds.
Monitoring
Check all surveillance cameras to make sure they are operating properly.
Surveillance data is being recorded and stored properly.
Surveillance footage is archived at least once a month.
Archived surveillance footage is stored offsite.
The reception desk is requiring all guests to sign in to the building.
All guests and visitors coming into the building are visible from the inside.
Computer
All firewall and computer security software is updated.
Active data archives are kept online.
Offline archives are kept off-site.
Important computer passwords are changed at least once a month.
Keep track of who is given access to the passwords.
Assign an information security officer to be responsible for the proper implementation of computer security policies.
We help you and your business
Make Checklists
Itemize your repeatable tasks once - perform them many times.
Document Processes
Provide detailed documentation alongside tasks.
Implement Forms & Records
Collect evidence of completion from you and your team (big little data).
Customize this template to suit your needs and get access to many more with
Clever Checklist.
Start Trial