Security Vulnerability Assessment - Pendulum Risk
16105
page-template,page-template-full_width,page-template-full_width-php,page,page-id-16105,bridge-core-1.0.5,mega-menu-top-navigation,ajax_fade,page_not_loaded,,qode-title-hidden,qode-theme-ver-18.1,qode-theme-bridge,qode_header_in_grid,wpb-js-composer js-comp-ver-7.0,vc_responsive,elementor-default,elementor-kit-15885

Your Trusted Security Risk Assessment Partner.

Pendulum has partnered with Sorensen, Wilder & Associates (SWA), a nationally recognized leader in safety and security, to help facilities identify areas of vulnerability and provide specific guidance on improving weaknesses. The security vulnerability assessment process, which includes an on-location visit by a qualified professional and a comprehensive written report, is customized to fit the needs of a facility and its staff and is designed to help close gaps in critical security and safety systems.

 

SWA specializes in providing comprehensive, thorough security vulnerability assessments to hospitals, CCRCs, assisted living facilities, skilled nursing facilities, clinics, physician offices, ambulatory surgery centers, and more.

SWA Uses Its P2T2® System To Evaluate The Security Program In Four Areas: People, Programs, Training, & Technology.

Security Risk Assessment: 

Identifying Needs & Risks

Needs and risks are identified through surveys, interviews, and discussions with management, employees, and residents/patients and visitors when requested. In addition, individual interviews are conducted with management, security managers, risk management, human resources/employee training, and a random
sampling of professional and non-professional employees.

 

On-Site Service Day:

Following a kick-off meeting with all key stakeholders, SWA begins the on-site portion of the assessment. SWA performs a detailed assessment from two comparative viewpoints—the written program perspective and the security and operations perspective. During the on-site, SWA evaluates the facility’s buildings and grounds, as well as existing security procedures, practices, and
technical systems in order to prepare recommendations for enhancements

After The On-Site

Upon completion of the assessment, an exit interview/summation conference is held with senior management, outlining any immediate concerns identified during the assessment and any major findings of the engagement. The SWA team then returns to the office and sits down to review the data collected during the site visit and begin developing the written report. Within 21 days of the SWA on-site visit, an electronically submitted Report of Findings and Recommendations is delivered.

 

Recommendations: 

The recommendations provided in SWA’s written report are based solely on the consultant’s independent experience and observations and are formulated based on a combination of industry best practices, regulatory requirements, and security industry standards.

In making recommendations, SWA will categorize these recommendations into four categories:

  • High risk of loss/High cost of correction
  • High risk of loss/Low cost of correction
  • Low risk of loss/High cost of correction
  • Low risk of loss/Low cost of correction

These recommendations may be used to proactively develop a strategic plan for improvements for the security management program.

What Our Clients Say

I give Pendulum my highest regard and have no hesitation in recommending them for your risk management program.

Managing Director at Insurance Company

Extremely thorough and they ask all the right questions. The loss control expert who reviewed this facility is to be commended for a superb job. It’s clear that Pendulum really understands these types of risks, as there are so few in the industry who truly do. Great job. Thank you.

Agency Owner

This was absolutely the best, most thorough risk management visit we’ve ever had.

Facility Administrator

Have questions? We’ve got answers.

What Is The Standard Risk Assessment Process?

Depending on the services requested, the assessment process is customized to fit the need of the organization. The assessment may be risk- or compliance-oriented.

Some examples of the areas reviewed during the assessment process include:

  • Policies and procedures
  • Protocols and practices
  • Physical environment

What Types Of Assessments Are Available?

Pendulum offers several varieties of assessments:

  • Professional liability risk
  • Infection prevention and control
  • Customer service
  • OIG compliance
  • HIPAA/HITECH compliance
  • Emergency operations
  • Security vulnerability
  • Life safety
  • OSHA
  • Cybersecurity

An organization can also choose a focused assessment that includes customized services to meet their needs in areas such as documentation, fall, skin integrity, elopement management, risk and quality programming, etc

What Can You Expect From Pendulum Risk?

Pendulum offers more than 22 years of risk management consulting experience to assist organizations in minimizing liability risk and strengthening defensibility. We provide a wide range of risk management services and take pride in our ability to provide customized services to meet our client’s needs.

 

Our skilled risk control consultants have consulting expertise in a wide variety of clinical and non-clinical settings, allowing them to identify potential areas of risk and provide recommendations based on risk management strategies that have been identified through national claims and litigation activities