Forgot password? :

Log in

Food Defense: from paper to practice!

Are your Food Defense measures enough to keep out unwanted visitors?

A journalist recently walked into the biggest arms depot in Belgium unhindered. Despite being an unauthorised intruder, no one questioned who he was or what he was doing there. In short, it wasn't only the physical security that left much to be desired, but also the vigilance of the staff.

Gat in omheining small

Whether it's journalists on the hunt for a news item or a student prank, although these things may ultimately only damage the reputation of your company, they should come as a serious wake-up call. If such unauthorised visitors can get in, then those with worse intentions can just as easily gain access to your company. And then you'll have more than an embarrassing YouTube video on your hands. Which is why a Food Defense programme is vital for the safety of both your employees and consumers. What preventative measures can you as a food company put in place?

3 tips!

Tip 1 rol

Involve everyone

Ensure that the receptionist, security, suppliers and production staff are all aware of their crucial role. Explain the correct procedures in the context of the importance of Food Defense.

Tip 2 detective


Roll out the Food Defense programme by training your employees. What kind of suspicious activity should they be on the lookout for? What is the correct response? Which procedures should be followed? To whom should they report?

Tip 3 domino


Thank employees for reporting suspicious activity. Let them know that you take their report seriously and will investigate the matter. Provide the employee who reported the incident with feedback throughout the course of the investigation.

Food Security helps my company by:

  • Performing a Quick Security Scan. We will look at how to impede unwanted visitors from gaining access to the site. Procedures, training and infrastructure will be scrutinised.

  • Conducting an intrusion test. Based on a predetermined scenario, someone will attempt to make their way into your company. This will reveal any weak points in your interior perimeter and serve to test the vigilance of your staff.

  • Holding a Cyber Security session. External parties may also attempt to gain access to your company remotely. This session focuses on the identification of possible cyber risks (smishing, fishing and phishing), how to deal with these emails, and the risks associated with social media and password protection. We will use this session to improve vigilance surrounding the potential hacking of the system and the production facility.