Skip to main content

Protect your workplace

As an employer, you should take steps to ensure that your business set-up is resilient and continue to operate even after a terror attack.

With proper management of safety and security risks, a sound business continuity plan and a well-protected IT system, your business can then bounce back as soon as possible and have productivity restored.

Manage your safety and security risks

To better protect your workers and business resources, you can build capabilities through the 5-level bizSAFE recognition to create a safer, healthier and secure workplace for businesses.

You can start by registering for bizSAFE levels 1 to 3 to help you better assess and manage safety and security risks at your workplace.

Find out more bizSAFE.

Plan for business continuity

How a business reacts after a terror attack will greatly determine its survival. Business Continuity Management (BCM) is a holistic process which helps to assess, plan and strenghen the resilience of our value chan.

You can use the BCM Gap Analysis tool to identify your business’s current risk gaps and suggest areas for improvement.

The ISO 22301 Business Continuity Management System certification helps you to customise a comprehensive set of mitigation measures against risks, and develop response plans to crisis.

Learn more about government grants for business continuity at www.bcm.org.sg and www.businessgrants.gov.sg.

Protect your IT systems and data

As the internet is very much integrated into day-to-day business, cybersecurity is an important part of company operations. Cyber threats such as phishing and malware can greatly disrupt your business operations if you do not have the proper measures against these threats.

Ensure good cybersecurity practices such as frequent password changes, update your operating systems and anti-virus software. Encourage your staff to take the Employee Cyber Readiness Quiz, use the results to assess your company’s state of cybersecurity readiness and take the recommended steps using the cybersecurity kit provided.

Last Updated: 20 September 2017