Comprehensive Risk Assessment

(Most Recommended)

Risk Assessment which includes all four assessments:

  • Vulnerability Assessment
  • Threat Assessment
  • Operational readiness assessment
  • Consequence Assessment
  • Cyber-Security Assessment
  • Hard and Digital Copy of the Risk Assessment

Vulnerability Assessment

A physical security assessment of each building that is used by employees. Each facility survey will consist of a walk through and inspection of all areas of the building, totaling 86 different points of inspection. This will include emergency management document review, security procedures overview, and the evaluation of existing levels of protection of all areas, to include stairwells and elevators, common areas, internal office entrance and exits (office suite), external entrances and exits (building), all restrooms, and parking areas. The survey will be summarized in a report that will outline the areas inspected, any concerns or deficiencies noted, and any recommendations for corrections or enhancements. Points of inspection covered will include, but are not limited to:


  • - Restricted Area Review
  • - Signage
  • - Barriers
  • - Pedestrian Access
  • - Receptacle and Container Placement
  • - Visitor Access
  • - Queuing
  • - Access Control
  • - Water Supply
  • - HVAC Controls
  • - Filtration Systems
  • - Entry Points
  • - Intrusion Detection
  • - Fences
  • - Gates
  • - Critical Area Review
  • - Infrastructure Analysis
  • - Closed Circuit Video

A vulnerability assessment will include the following:
  • Assessment of every building/facility on the property through a comprehensive evaluation of all measures of security, as well as security administration.
  • Hard and Digital Copy of the Assessment
  • Countermeasure Recommendation Form, which will deliver a breakdown in how the countermeasures should be implemented.
  • Security Consulting Retainer for one month following the NTP.

Threat Assessment


Through GXC’s liaison network of Law Enforcement Professionals, GXC can offer a threat assessment which will provide a review of local crime statistics, interviews with local community members, interviews with local law enforcement and evaluation of national crime trends in relation to the competition with your industry. This will determine a threat level and will help you make more informed of what specific threats are impacting businesses just like yours.

The Threat Assessment will include the following:
  • Interviews from no less than three businesses/members of the community in relation to their knowledge of any threats to your specific facility/property.
  • Interview of local law enforcement to uncover any known entities which could do harm to your operation.
  • Review of Local Crime Statistics and the FBI Uniformed Crime Report to uncover potential threats to your business.
  • Review of critical infrastructure within a half-mile radius which could impact the operations of your facility.
  • Hard and Digital Copy of the Threat Assessment Report
Consequence Assessment

Through an evaluation of your of business operation and the preparedness of your facility, GXC can develop a Consequence Assessment which would give you a better understanding of the consequences of a successful attack, or loss at your facility. Knowing the consequences of not mitigating a threat by addressing a vulnerability will let your company know exactly what its level of Risk is, whether High, Medium, or Low.

Consequence Assessment Report and will include the following:
  • Evaluation of your operating revenue and the impact of a cease of operations.
  • A rating of consequence on your business operations in the event of an attack or loss
  • Hard and Digital Copy of the Threat Assessment Report
Cyber-Security Assessment

Evaluating your cyber-protection is paramount. GXC can develop a Cyber-Security Assessment which would give you a better understanding of the level of protection you have from cyber-attacks. The evaluation would ensure that your IT systems are up to par with industry standards and will make recommendations on how you can harden your IT infrastructure.

Cyber-Security Assessment Report and will include the following:
  • Evaluation of your current operating systems and review transactional detail information in regard to financial threat management and PII customer information storage.
  • Review and mitigation of relevant threat data.
  • Hard and Digital Copy of the Cyber-Security Assessment Report

Call or email GXC today to start the process of getting secure!