New Southern Maryland Business Offer - Discounted Pricing until June 30, 2025.

Security By Design Consulting LLC

240-718-4824

  • Home
  • Services
  • Why Choose Us
  • About
  • FAQs
  • Contact
  • News & Events
  • More
    • Home
    • Services
    • Why Choose Us
    • About
    • FAQs
    • Contact
    • News & Events

240-718-4824

Security By Design Consulting LLC
  • Home
  • Services
  • Why Choose Us
  • About
  • FAQs
  • Contact
  • News & Events

Frequently Asked Questions

FAQ picture with multiple colored icons that include question marks.

What is a security assessment?

A security assessment is a thorough evaluation of your property (home or business) to identify vulnerabilities, threats, consequences and overall, assess risks.  Any existing security measures in place, e.g. security cameras, alarm systems, and any security concerns you may have, are then incorporated into the evaluation and recommendations and solutions are made to mitigate and/or improve overall security.    

Why are security assessments important?

They help reduce the likelihood of theft, damage, harm, or other undesirable events by proactively identifying issues and providing recommendations or solutions to address areas that can often be overlooked.

What are the benefits to having a security assessment completed?

Having a security assessment conducted for your home offers numerous benefits, starting with the identification of vulnerabilities, such as outdated locks or unsecured entry points, that could be exploited by criminals or rising crime trends in the area. 


It provides peace of mind by ensuring your home is protected and offering customized security solutions tailored to your specific needs. An experienced security professional can help you work with what you already have, optimizing existing systems and recommending cost-effective improvements.  Additionally, a security assessment helps improve emergency response planning, empowering you with information to make sure you are prepared for situations like fires or break-ins.


The assessment may also lead to insurance benefits, as some providers offer discounts for homes with comprehensive security systems. Michelle is currently working on this with Southern Maryland insurance agencies.  By identifying and addressing risks before an incident occurs, it may save you money by preventing costly damages or losses. Furthermore, a well-secured home can increase property value and act as a deterrent to criminals. Finally, a security assessment gives you access to expert advice on the best security practices, helping you make informed decisions to protect your home and family.

Who can request security assessments?

To schedule and authorize a security assessment, you must be the legal owner of the property or have your name listed on the lease as a tenant. For resident homeowners or property owners, your name must be listed on the property deed.


If you are a tenant, whether residential or business, you must confirm that your landlord’s approval is not required prior to the assessment and provide a copy of the lease listing your name. A government-issued photo ID will be requested for verification.

What kinds of security assessments do you provide?

We currently offer residential and business assessments and different tiers of service.   While we have general areas we include in our assessments as noted below, each one is tailored to the unique needs of our clients, ensuring that we address their specific security concerns and objectives. We customize our approach to provide the most effective solutions, recognizing that every home or business is different and requires a personalized security strategy. We understand that both time and money are valuable, which is why we focus on delivering efficient, cost-effective recommendations that provide the highest level of security without unnecessary expenditures.


Residential Assessments: Generally, these assessments focus on existing home security measures, including perimeter, access points, locks, lighting, alarm systems, and cameras, and recommendations for solutions.   The higher the tier of service, the more in depth and comprehensive the information provided will be, e.g. evacuation or escape route, night assessment, landscaping, routines and habits, etc.


Business Assessments: Similar to residential assessments, a review of access control systems, employee security, perimeter protection, surveillance, and emergency protocols.  The higher the tier of service, the more in depth and comprehensive the information provided will be, e.g. evacuation or escape route, night assessment, landscaping, inventory control, deliveries, employee vetting process, etc.

I would like a security assessment, what is the overall process?

  1. Consultation: Schedule an initial free consultation using the button below. During this session, you’ll answer some basic questions about the service you are requesting and provide any relevant information. The consultation, available via telephone or virtual meeting, will take approximately 15-30 minutes. This time will allow us to discuss the details for your service and tentatively schedule a  service date.
  2. Estimate and Deposit: After the consultation, an estimate outlining the services to be performed will be sent for approval. Once approved, an invoice with a non-refundable deposit is required to secure the service and schedule it.  A contract and NDA will be included.
  3. Service: Depending on the service(s) selected, the work will be performed and completed.
  4. Report Creation: A detailed report outlining the findings and recommendations will be provided.  The level of detail and depth of the final report is based on the type and tier of service purchased.
  5. Balance Payment: The remaining balance of the invoice is due before the final deliverable is provided.
  6. Final Deliverable: The final deliverable, which may include an electronic and/or hardcopy version of the report, will be provided either in person or via tracked shipping.
  7. Final Client Check-In: A follow-up email will be sent 1-2 weeks after the client receives the final deliverable. In this email, we will check in to see if you have any questions or need clarification on any of the information provided to you.  We will also include a customer feedback request, which will help us improve our offerings while we strive to enhance customer experiences.

Schedule Free Consultation

How long do security assessments take?

While we cannot provide an exact timeframe, the overall process typically takes a week to a few weeks. Factors such as weather conditions, property size, and the tier of service selected can impact the completion time.


However, during the time of the initial consultation a general time estimate will be provided to you.

Where are you located?

We are based in St. Mary’s County and proudly serve the Southern Maryland area, including St. Mary’s, Calvert, and Charles counties. In-person service requests outside our current service area will be considered based on availability.


Appointments are scheduled at a mutually convenient public location, allowing us to privately discuss your personalized security concerns and solutions.   Please note that we do not currently operate a brick-and-mortar office.

What are some key terms to know for security assessments?

Consequence:

  • Definition: Effect of an event, incident, or occurrence.
    • Example: The consequence of a break-in might include stolen property, property damage, loss of sensitive information, or personal harm. Consequence is commonly measured in four ways: human, economic, mission, and psychological, but may also include other factors such as impact on the environment.


Countermeasure:

  • Definition: Action, measure, or device intended to reduce an identified risk, threat, or danger.
    • Example: Adding a door lock and a conspicuously posted 'DO NOT ENTER' sign to the front of a door to prevent unauthorized access. 


Risk:

  • Definition: A measure of potential harm from an undesirable event that encompasses threat, vulnerability, and consequence. 
    • Example: If your home is in an area with high burglary rates (high threat), and your doors and windows have weak locks (vulnerabilities), the risk is the chance that a break-in could occur and what the impact would be if it did.


Risk Mitigation:

  • Definition: The application of strategies and countermeasures to reduce the threat of vulnerability to, and/or consequences from an undesirable event. 
  • Extended definition: Application of measure or measures to reduce the likelihood of an unwanted occurrence and/or its consequences. 
    • Example: Risk mitigation greatly reduced the potential impact of the tsunami on the local population.


Security:

  • Definition: Security is the process of maintaining the confidentiality, integrity, and availability of information, systems, and assets against threats and vulnerabilities
  • Physical security (PhySEC), is concerned with active and passive physical measures designed to safeguard personnel; to prevent unauthorized access to equipment, facilities, material, and documents; and to safeguard them against undesirable events.  
  • Personnel security (PerSEC), to include Investigation and Adjudication, assesses and determines the reliability and trustworthiness  of applicants, employees, and others who work with, will work with, or have access to sensitive information and material. 
  • Operations Security (OPSEC) is the process by which we protect critical information whether it is classified or unclassified that can be used against us. It focuses on preventing our adversaries' access to information and actions that may compromise an operation. 
  • Information Security (INFOSEC) establishes policies, procedures, and requirements to protect classified and controlled unclassified information (CUI) that, if disclosed, could cause damage to national security. 
  • Industrial Security is a multi-disciplinary security program focused on the protection of classified information developed by or entrusted to U.S. industry (contractors and sub-contractors) operating under the National Industrial Security Program (NISP).
  • Cybersecurity  is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.

Threat:

  • Definition: A threat is any potential danger or harmful event that could exploit a vulnerability. It’s something that could cause damage, harm, or disruption to assets or people.
    • Example: A burglar, a natural disaster (like a flood), or even an employee’s malicious actions could all be considered threats.


Vulnerability:

  • Definition: A weakness in the design or operation of a facility that an adversary can exploit. 
    • Example: Installation of vehicle barriers may remove a vulnerability related to attacks using vehicle-borne improvised explosive devices.


Undesirable Event (UE): 

  • Definition: An incident to disrupt operations or cause harm so it has an adverse impact on the facility occupants or visitors, operation of the facility, or mission of the agency. 
    • Example: Arson,  Assault, Theft, Workplace Violence, etc.


Sources: CISA, NIST, OPM


Copyright © 2025 Security By Design Consulting LLC - All Rights Reserved.

Security by Design Consulting is an LLC created in Maryland, insured and in good standing.  

Powered by

  • Terms of Use
  • Privacy
  • Accessibility
  • Affiliated Businesses

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept