Three questions you must ask yourself about your external security

External security is essential in transport and logistics. No matter the value of goods on your site, keeping your operations and processes flowing is vital. To prevent theft and burglary, typically insurers will draw up guidelines for the security of your site. In this blog, Jan van Putten, one of our Key Account Manager at Heras, explains how to best meet the requirements of your insurer.

Criminal activity is an issue that companies in the transport and logistics sector must constantly confront. In recent years, when security has failed, thieves and burglars have been able to seize goods from company premises. Valuables have been stolen from trucks, and even fully loaded containers have been stolen from company premises.

Measures from insurers

To cope with this worrying development – and to limit the damage and disruption to transport and logistics companies – preventive measures are desperately needed. In addition to the guidelines of Transport and Logistiek Nederland, the Dutch Association of Insurers developed a guide. Using these standards, most insurers draw up conditions that you as a company must meet.
The measures that you must take depend on the value of the goods on your site. In addition, the sensitivity to theft of your products is an important factor. In the event of theft, how easy to transport are your goods?

Four risk categories

Based on these criteria, goods are classified into four risk categories: low, medium, high and very high. Goods such as paper, cattle and furniture fall into the two lowest categories.The category in which your company operates determines what an insurer requires from your external security. The higher the category, the more stringent the measures you must take.

Three areas for consideration

These three areas for consideration will help you determine what measures you should take if you fall into the highest categories:

1. How do you secure your site externally?

2. Who has access to your perimeter?

3. How do you identify intruders?