In 2022, physical security incidents increased 28%, with theft accounting for 48% of these breaches. Almost 40% of research participants blame the increase on the economy, while others point to security guard shortages, insider problems, and reduced business hours. In fact, these factors are all employee theft risks, representing motivation (financial pressures), means (physical access), and opportunity (lack of supervision). Implementing key management systems is a critical step in reducing theft risks by controlling who can use keys and assets. But how do you know if employees are abusing their access?
To detect potential security incidents, watch for unusual key activity. Let’s look at some of the most common suspicious access patterns.
If an employee is frequently checking out keys outside their normal working hours, that could indicate they’re using assets for reasons unrelated to their jobs. To prevent these situations, set up time-based limitations on your key control system so employees can’t check out keys after hours.
Example Scenarios
If an employee doesn’t return keys on time, it could mean they simply forgot, but it could also point to lost keys or a breach in security protocols. Be sure to set up alerts on your key control system to notify you of overdue keys so you can promptly follow up with the employee who has the key checked out.
Example Scenarios
Look for system activity that indicates unauthorized key use, such as leaving the system unattended after opening a drawer or panel or someone taking more keys than they requested. An electronic key control system flags and records such instances so you can address attempted breaches.
When checking for unauthorized access, an important thing to note is how your system logs key removal. If it requires employees to scan key tags, for example, it’ll be more difficult to detect when someone removes more than one key. On the other hand, if your system automatically logs a key’s removal the moment it’s pulled, you’ll be able to quickly detect when someone removes an unauthorized key.
TIP: If you have a KeyTrak system, run the Alarm Activity, Drawer Activity, Tag Activity, and Idle Activity reports. If you’re a KeyTrak Guardian user, check the Security Camera report as well. |
Example Scenarios
If someone frequently alters system data (e.g., changing key tag names, adding users, or editing checkout reasons), that could be a sign of someone trying to conceal their behavior. However, it’s important to consider the context to determine if the changes are legitimate. To reduce this risk, limit the number of users who have administrative rights.
TIP: If you have a KeyTrak Edge system, run the Audit Trail report to see a log of all system changes, who made them, and when. |
Example Scenarios
Someone repeatedly checking out high-security keys can raise concerns if an employee doesn’t have a legitimate need to enter certain areas or if their key activity doesn’t align with their job responsibilities.
To prevent unauthorized removal of sensitive keys, set up alerts on your key control system to notify you when an unauthorized user has taken a high-security key or hasn’t returned it on time. In addition, set up user profiles that ensure employees only have permission to check out keys critical to their job roles.
Example Scenarios
Allowing an employee to retain access to keys after an employment change, such as a termination or an internal transfer, increases your risk of insider threats. To prevent unauthorized key use, update a user's system privileges if they change roles within your business. When employees leave your organization, immediately collect all the keys they have and revoke their user privileges in your electronic key control, access control, and software systems.
To ensure no one slips through the cracks, review the users listed on your key control reports to ensure they’re all current employees and have key access appropriate for their job responsibilities.
Example Scenarios
By recognizing unusual key access patterns, you’re taking a proactive approach to protecting your business against insider threats and theft. Electronic key control systems give you the means to not only monitor irregularities but respond quickly to physical security incidents. You might not be able to control the economy and other risk factors that give employees a motive to steal, but planning your response can limit the means and opportunity.