Starting a new legal cannabis business is no easy thing – you need to get the right permits and licenses, find a suitable space that’s properly zoned, buy your materials, get insured, hire workers, and so much more. Security is likely at the bottom of your list of priorities, and it may even present an unwelcome imposition on your time, attention, and business plan.
Unfortunately, with the legal cannabis status quo being “consistent low-level chaos”, security is guaranteed to be a pressing concern. A badly managed security event can lead to property damage, injuries, and even deaths, none of which you want on your conscience or causing a lawsuit.
This means that settling for a security system that simply meets the bare minimum for permitting is not going to cut it. You need a system that goes beyond basic video surveillance, guards, and heavy doors. These are some of the most commonly overlooked security system elements that can make a major difference in preventing major security events.
Perimeter Access Points
A business’s perimeter refers to the specific area or portion of a property that is subject to a lease or other agreement. Legally, a business can be held liable for anything that happens on its premises, whether that be in the retail storefront, the alleyway that borders it, or the grounds of the growing facility.
This means that a business needs to monitor and control every access point that leads onto the property, even those rarely used doors and gates on the outside perimeter. Proper locking procedures, logged key or keycard distribution, and incorporating access procedures into the training process will help ensure that unauthorized persons won’t intrude on the property to threaten your business.
The video surveillance system should cover every access point to the property. If that isn’t possible, then access points should be checked regularly and thoroughly for tampering or evidence of unauthorized access by guards during patrols.

Cyber Security
Communications technology is simultaneously one of the most powerful tools at a business’s disposal and one of its greatest security threats. Scammers and other malicious online actors use a combination of advanced technological tools and tried-and-true social manipulation tactics to gain access to a company’s accounts, proprietary information, or other valuable information.
Regardless of how much you believe your business’s activities take place online, dedicating some resources to cybersecurity is paramount in operating in a modern environment. Training on how to spot and avoid common online scams and threats, workstation access controls, and password key generators are all basic security measures that can make a large difference.
Inconsistent Employee Security Training & Incident Response Preparedness
During an emergency, most people will revert to their basic survival instincts and enter a “fight, flight, or freeze” mode, depending on the circumstances. Unfortunately, these instincts can make a bad situation worse when dealing with malicious actors who are impatient and accustomed to violence.
The only way to overcome these instincts is with proper training and practice. A major mistake many LCOs make is assuming that the few hours of training during onboarding an employee is sufficient to cover their bases. Inconsistent training leads to lapses in following security procedures, which can, in turn, draw the unwanted attention of the previously mentioned malicious actors.
Employees must be regularly trained and drilled on both everyday security procedures, such as door access and inventory management, as well as incident response procedures for emergencies. The former acts as a deterrent for the latter, but if an emergency does arise, you want to be sure that your employees won’t panic and make irrational decisions.
Over-reliance On Outdated Security Measures
Another significant weak point for many LCO security systems is an over-reliance on security personnel, including guards. While guarding may have been the most surefire way to protect a property in the past, increasing legal scrutiny of guards and advancements in security technology have dramatically reduced their importance as a security element.
Remote guarding solutions, such as drone patrols, AI-assisted monitoring systems, and independent security trailers, provide a much more comprehensive observation and recording system than their human counterparts. A tech-powered security system doesn’t just give you an edge in reporting; it also eliminates much of the liability risk associated with questionably trained security personnel.
Transport Security
What makes LCOs such an attractive target is their reliance on cash transactions and their dealing in a product that remains profitable as a black market good. This combination provides many opportunities for the criminal element, with transportation being one of the most vulnerable points in the logistical process.
LCOs depend on transport for both their product and for money transfers. The product must be moved from the grower to the retailer, and then potentially be hand-delivered to customers by the retailer’s employees. Money must be transported from the LCO to the bank in order to make a deposit.
This provides malicious actors three opportunities to strike: loading, transit, and offloading. Loading and offloading typically take place outside of the strongest security measures, which reduces the effort needed to perform a robbery. Transit provides opportunities to isolate the transport vehicle in an area more conducive to criminal activity.
These vulnerabilities need to be considered when creating a logistical plan. These plans should stipulate predetermined routes through safe zones in your city, with loading and offloading activities conducted in well-monitored areas during daylight hours. They should also provide training for employees to be aware of their surroundings during logistical activities and know how to respond in the event of a security situation.
It’s also worth considering contracting with an armored or secure transportation service. While costly, these services significantly de-risk transport activities, meaning you’ll likely never need to worry about a missed shipment or cash robbery again.
How A Comprehensive And Holistic Security Plan Can Help
These nitty-gritty details can quickly become overwhelming, especially since the typical LCO already has their hands full putting out other fires for their business. The best way to reduce the headspace necessary for effective security is to automate it, which requires a comprehensive plan.
A holistic cannabis security plan that covers all of your business’s bases – regulatory compliance, insurance policy requirements, and efficacy – can be a major endeavor that you simply don’t have the time or expertise to overcome. That’s where specialized security firms like Cannabis Compliant Security Solutions (CCSS) come in.
Our seasoned experts will assess your business, identify its biggest vulnerabilities and potential opportunities, and craft an airtight security plan that is tailor-made to your needs. These plans utilize the cutting edge of security technology and procedures to provide increased effectiveness while minimizing risk.
Security may seem like an imposition on your time and resources, but it doesn’t need to be. CCSS will help you craft an effective and compliant security system that can run itself. Call today!
Recent Comments