❖ Identify weaknesses in your physical and procedural security systems
❖ Review access controls and CCTV measures
❖ Examine accident prevention measures
❖ Trace flaws in your Information Technology network
❖ Look at the safety of staff, visitors and clients
❖ Assess and act to protect assets both tangible and intangible.