RiskUKOctober2017
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
October 2017<br />
www.risk-uk.com<br />
Security and Fire Management<br />
Visual Hacking<br />
Protection Regimes for Confidential Information<br />
Data Centres: Security and Fire Safety Risk Management<br />
Access Control: Developments in the Biometrics Arena<br />
Counter-Terrorism: HVM, Physical Security and Screening<br />
Healthcare Sector: System Solutions for Risk Managers
“<br />
MY PASSION IS<br />
ALWAYS GOING THAT<br />
EXTRA MILE -<br />
WHATEVER THE JOB<br />
”<br />
Steve Lang, CNC Programmer/Operator, 3 years with Jacksons<br />
OUR PASSION<br />
IS YOUR SECURITY<br />
We combine the highest quality<br />
perimeter security fencing and<br />
gates with seventy years of expertise<br />
to provide you with the right solution<br />
for your project, large or small.<br />
www.jacksons-fencing.co.uk<br />
0800 953 3730<br />
Jacksons<br />
Fencing
October 2017<br />
Contents<br />
33 In Search of Recognition<br />
The benefits of biometrics described in detail by Shaun Oakes<br />
Security in the Built Environment (pp22-23)<br />
5 Editorial Comment<br />
6 News Update<br />
Industry reports from SRI. BSI resilience benchmarking study.<br />
Biometrics Commissioner’s 2016 Annual Report. Cyber skills gap<br />
8 News Analysis: UK-EU Security Partnership<br />
Brian Sims observes the latest political developments at<br />
Westminster relating to UK-EU security co-operation post-Brexit<br />
11 News Special: Cortech Open Innovation Events<br />
Brian Sims reviews last month’s successful COIE in Glasgow<br />
12 News Special: BCI World Conference 2017<br />
The BCI’s 2017 Conference and Exhibition previewed by Risk UK<br />
13 News Special: NAHS Conference and Exhibition<br />
Brian Sims on the programme for the 2017 NAHS Conference<br />
14 Opinion: Crowded Places Risk Management<br />
Andrew Mortimer outlines why he believes the way in which<br />
large crowds are protected from harm merits reconsideration<br />
16 Opinion: Mind Your Own Business<br />
Dan Hardy offers timely advice about what companies can do to<br />
protect themselves from the threat of commercial burglary<br />
19 BSIA Briefing<br />
James Kelly discusses Health and Safety issues for businesses<br />
and various initiatives operational in the private security sector<br />
36 Risk Management for Counter-Terrorism<br />
Hostile Vehicle Mitigation (p36), physical security solutions<br />
(p38) and screening techniques (p40) under the microscope<br />
42 A Touch of Retail Security Therapy<br />
Cardinal Security working in partnership with Dixons Carphone<br />
44 Security Solutions in the Healthcare Sector<br />
Body-worn cameras (p44), the benefits of access control (p46)<br />
and an overview of next month’s UHEI Conference (p48)<br />
53 Signed, Sealed, Delivered<br />
Jason Wakefield addresses risks posed to today’s Mail Rooms<br />
56 Meet The Security Company<br />
Risk UK shines the spotlight on Securi-Guard Fire and Security<br />
59 The Security Institute’s View<br />
62 In The Spotlight: ASIS International UK Chapter<br />
64 FIA Technical Briefing<br />
66 Security Services: Best Practice Casebook<br />
68 Cyber Security: Visual Hacking in Focus<br />
70 Training and Career Development<br />
72 Risk in Action<br />
74 Technology in Focus<br />
77 Appointments<br />
80 The Risk UK Directory<br />
22 SBD and CPTED: Built Environment Security<br />
Philip Strand argues why security professionals must be<br />
included in the construction process at the very earliest stages<br />
24 Left To Their Own Devices<br />
BYOD provides a new challenge for security professionals and<br />
one that’s not entirely avoidable. Adam Jaques has the detail<br />
27 Coping With ‘Information Overload’<br />
Chris Edwards evaluates protection measures designed to<br />
ensure Data Centres are safe, secure, resilient and sustainable<br />
ISSN 1740-3480<br />
Risk UK is published monthly by Pro-Activ Publications<br />
Ltd and specifically aimed at security and risk<br />
management, loss prevention, business continuity and<br />
fire safety professionals operating within the UK’s largest<br />
commercial organisations<br />
© Pro-Activ Publications Ltd 2017<br />
All rights reserved. No part of this publication may be<br />
reproduced or transmitted in any form or by any means<br />
electronic or mechanical (including photocopying, recording<br />
or any information storage and retrieval system) without the<br />
prior written permission of the publisher<br />
The views expressed in Risk UK are not necessarily those of<br />
the publisher<br />
Risk UK is currently available for an annual subscription rate of<br />
£78.00 (UK only)<br />
www.risk-uk.com<br />
Risk UK<br />
PO Box 332<br />
Dartford DA1 9FF<br />
Editor Brian Sims BA (Hons) Hon FSyI<br />
Tel: 0208 295 8304 Mob: 07500 606013<br />
e-mail: brian.sims@risk-uk.com<br />
Design and Production Matt Jarvis<br />
Tel: 0208 295 8310 Fax: 0870 429 2015<br />
e-mail: matt.jarvis@proactivpubs.co.uk<br />
Advertisement Director Paul Amura<br />
Tel: 0208 295 8307 Fax: 01322 292295<br />
e-mail: paul.amura@proactivpubs.co.uk<br />
Administration Tracey Beale<br />
Tel: 0208 295 8306 Fax: 01322 292295<br />
e-mail: tracey.beale@proactivpubs.co.uk<br />
Managing Director Mark Quittenton<br />
Chairman Larry O’Leary<br />
Editorial: 0208 295 8304<br />
Advertising: 0208 295 8307<br />
3<br />
www.risk-uk.com
Connect your life to your<br />
home and your security<br />
Interact, control and integrate your Texecom security system like never before<br />
The Texecom Connect App allows you to control your security directly from your compatible<br />
<br />
system events and monitor cameras or activity from anywhere in the world.<br />
www.texe.com<br />
Sales: +44 (0)1706 220460<br />
Watch the Texecom<br />
Connect App video
Texecom Connect App<br />
New smartphone application for<br />
iOS operating systems<br />
Texecom Connect SmartCom<br />
Texecom Connect ethernet<br />
communicator<br />
Texecom Connect SmartPlug<br />
Ricochet ® enabled<br />
wireless plug<br />
Falling Fraud<br />
Editorial Comment<br />
Figures just released by UK Finance reveal financial fraud<br />
losses of £366.4 million in the first half of 2017 to be 8%<br />
lower year-on-year (the comparable figure for 2016 being<br />
£400.4 million). The data, which covers payment card, remote<br />
banking and cheque fraud, also highlights that the finance<br />
industry prevented over £750 million of fraud during the same<br />
period (or 67% of attempted fraud). This compares with £678.7<br />
million of prevented fraud in the first six months of last year.<br />
Drilling down into the fine detail, the industry helped to<br />
prevent over £500 million in attempted card fraud. Actual fraud<br />
losses on cards are down 11% on the same period the year<br />
before to £287.3 million.<br />
Card spending increased by 8.4% year-on-year across the sixmonth<br />
period, meaning that card fraud as a proportion of<br />
spending equates to 7.5 pence for every £100 spent. That’s down<br />
from 8.7 pence in the first half of 2016. This figure peaked in<br />
February 2002 when it was 18.9 pence per £100.<br />
In addition, no less than £160.2 million of remote banking<br />
fraud was prevented. This covers criminals gaining access to an<br />
Internet, phone or mobile banking account to make an<br />
unauthorised transaction. Episodes of such fraud totalled £73.8<br />
million, representing a 3% rise from £71.5 million in 2016.<br />
£88.8 million of cheque fraud was prevented, with fraud<br />
losses in this category falling to £5.3 million. That totals a 28%<br />
drop on the same period in 2016 and, indeed, is the lowest halfyear<br />
total on record. Progress is clearly being made here.<br />
Overall, there were 937,518 cases of financial fraud. This is a<br />
figure that has remained flat compared with the year before.<br />
The data emerges as the banking industry and Government<br />
join forces to launch the next phase of ‘Take Five to Stop Fraud’ –<br />
the national campaign that offers advice aimed at helping<br />
customers to protect themselves from fraud. Launched on<br />
Monday 2 October, the next phase of the campaign is focused on<br />
educating the general public to recognise scams and confidently<br />
challenge any requests for their personal or financial details by<br />
remembering the phrase ‘My money? My info? I don’t think so’.<br />
Katy Worobec (head of fraud and financial crime prevention,<br />
cyber and data sharing at UK Finance) observed: “Tackling fraud<br />
is a top priority for the entire industry, but we must remember<br />
that financial fraud isn’t just an issue for the banking sector. Its<br />
harmful effects stretch far and wide. This is why, when it comes<br />
to prevention, protection or deterrents, the industry is committed<br />
to taking a collaborative approach to curb such crimes and is<br />
now launching the latest strand of the ‘Take Five’ consumer<br />
campaign. Whether it’s banks refining their own security systems<br />
or a retailer holding customer data securely, it must be stressed<br />
that everyone has a part to play.”<br />
UK Finance’s figures serve to illustrate the positive impact that<br />
partnerships between industry and policing can exert in fighting<br />
fraud. There’s still much work to be done, of course, and<br />
particularly so in relation to identify theft and the criminality it<br />
enables. It’s beholden upon us all to be extremely careful about<br />
the degree of personal detail we share in the public domain.<br />
Brian Sims BA (Hons) Hon FSyI<br />
Editor<br />
December 2012<br />
5<br />
www.risk-uk.com
Security Research Initiative focuses on key<br />
considerations for security business sector<br />
The Security Research Initiative (SRI) has just<br />
published two excellent reports addressing key<br />
considerations for the security industry.<br />
Together, these comprehensive documents seek<br />
to understand and highlight the ways in which<br />
private security can help protect the public – in<br />
both private and public space – and how<br />
security’s vital role may be enhanced. They call<br />
upon various stakeholders to consider how, as<br />
an underused and largely capable resource,<br />
private security can best be used, not least in<br />
times of austerity.<br />
The 42-page report entitled Towards ‘A<br />
Strategy for Change’ for the Security Sector<br />
aims to provide a foundation for thinking about<br />
and developing a ‘Strategy for Change’ for the<br />
security business sector. It seeks to provide a<br />
rationale for why private security is important<br />
and suggests ideas (for wider debate) about<br />
how its potential might be realised.<br />
The document is based on three overarching<br />
aims: Government must be encouraged to<br />
develop a strategy for harnessing the enormous<br />
contribution of the private security sector when<br />
it comes to preventing crime, the private<br />
security sector must commit to developing an<br />
ability to talk with a more united and coordinated<br />
voice and the private security sector<br />
must commit to highlighting the enormous<br />
benefits it generates – including those for the<br />
public good – and also commit to ways of<br />
enhancing them. Much of what it currently does<br />
is unheralded and underacknowledged.<br />
The second SRI report, entitled Police Views<br />
on Private Security, runs to 66 pages and<br />
discusses findings from responses provided by<br />
1,361 serving police officers to an online survey<br />
focused on attitudes towards the private<br />
security sector (ie private security suppliers and<br />
corporate security departments). This is<br />
designed to inform the strategy for better<br />
engaging private security.<br />
“Overall, it’s evident that the police officers<br />
surveyed view the private security sector as<br />
useful in some of the aspects of the work that<br />
the police service conducts, and even necessary<br />
in some cases,” stated PRCI’s director Professor<br />
Martin Gill CSyP FSyI (pictured).<br />
Professor Gill continued: “That said, there<br />
appears to be a lack of appetite in the private<br />
security sector for taking a greater role in<br />
supporting or otherwise working in partnership<br />
with the police, and especially so where this<br />
would amount to private security undertaking<br />
‘policing’ tasks in public space.”<br />
Close to six-in-ten respondents believe<br />
private security plays a minor role in protecting<br />
members of the public, while corporate security<br />
departments are seen as being important in<br />
helping the police in their work by 62% of<br />
respondents, but security officers much less so<br />
(with a result of 36%).<br />
Reputation tops list of business priorities in Organisational Resilience study<br />
Protecting reputation tops business leaders’ lists of priorities ahead of financial achievements and<br />
business leadership. That’s according to the world’s first benchmarking study of Organisational<br />
Resilience published by the British Standards Institution.<br />
The study finds that reputation is seen as the most important element in relation to the longterm<br />
success of a business, even more so than financial aspects, leadership and vision and<br />
purpose. Despite this, 43% of those professionals interviewed as part of the global study believe<br />
their organisation is strongly susceptible to reputational risk.<br />
No fewer than 1,250 senior leaders of organisations across the globe participated in the study,<br />
which covers ten sectors across three regions: the UK and Ireland, the USA and the Asia Pacific<br />
region. The magnitude of reputational risk was found to vary by geography. Globally, 62% rate their<br />
organisation’s current reputation as ‘Excellent’ or ‘Very good’, but this figure rises to 75% in the US<br />
and falls to 55% and 56% in the UK and Ireland and Asia Pacific respectively.<br />
Out of the 16 elements that make up Organisational Resilience, the study found that the most<br />
and least important are as follows: Most important Reputational Risk, Financial Aspects,<br />
Leadership, Vision and Purpose and Information and Knowledge Management Least important<br />
Horizon Scanning, Alignment, Community Engagement, Culture and Adaptive Capacity.<br />
The study also investigated how these elements ranked in terms of perceived performance. It<br />
found the following: Highest performing Financial Aspects, Alignment, Leadership, Vision and<br />
Purpose and Governance and Accountability Worst performing Supply Chain, Innovation, Horizon<br />
Scanning, Information and Knowledge Management and Awareness, Training and Testing.<br />
6<br />
www.risk-uk.com
News Update<br />
Biometrics Commissioner’s third<br />
Annual Report scrutinised by Big<br />
Brother Watch<br />
The 2016 report of the Commissioner for the<br />
Retention and Use of Biometric Material was<br />
submitted to Home Secretary Amber Rudd on<br />
14 March this year and has now been<br />
published for public consumption.<br />
The role of the Biometrics Commissioner<br />
was established by the Protection of Freedoms<br />
Act (PoFA) 2012, with Paul Wiles appointed as<br />
the second Commissioner on 1 June 2016.<br />
Wiles’ role is to provide independent oversight<br />
of the regime which was established by the<br />
PoFA – and which came into force on 31<br />
October 2013 – to govern the retention and<br />
use by the police in England and Wales of DNA<br />
samples, DNA profiles and fingerprints.<br />
In addition to casework responsibilities in<br />
relation to DNA and fingerprints, Wiles also<br />
has a UK-wide oversight function as regards<br />
their retention and use by the police service<br />
on national security grounds.<br />
Stretching to no fewer than 125 pages, the<br />
detailed 2016 report deals primarily with<br />
developments since the publication of the<br />
Commissioner’s 2015 report. In essence, it<br />
covers Wiles’ casework activities, the general<br />
operation of the PoFA regime and a variety of<br />
issues that have arisen in connection with its<br />
operation in both the normal policing and<br />
national security spheres.<br />
In response to the report, Renate Samson<br />
(CEO of Big Brother Watch) said: “We welcome<br />
the Biometric Commissioner’s warnings and<br />
concerns about the ongoing creation and<br />
retention of facial biometrics and facial<br />
recognition technology by police forces across<br />
the country. It’s of very serious concern that<br />
the Home Office appears to be so<br />
unwaveringly set on embedding facial<br />
biometric recognition technology into policing<br />
without debate, regulation, legislation or<br />
independent scrutiny.”<br />
Samson continued: “Rather than throwing<br />
millions of pounds at the building of such<br />
intrusive capabilities, the Home Office should<br />
be investing in updating police IT systems to<br />
ensure that the hundreds of thousands of<br />
innocent people’s custody images and facial<br />
biometrics are deleted automatically as soon<br />
as they’re released without charge, bringing<br />
them into line with DNA and fingerprints.”<br />
Professor Paul Wiles has spent much of his<br />
career as an academic criminologist at a<br />
number of UK universities and is currently a<br />
governor at Sheffield Hallam University as well<br />
as a trustee of the National Centre for Social<br />
Research. Until 2015, Wiles served as an<br />
advisor to the Sentencing Council and has also<br />
worked as a local Government commissioner.<br />
“Untrained and neglected IT staff<br />
increasing cyber security skills<br />
gap” warns (ISC)²<br />
A survey of 3,300 IT professionals conducted<br />
by (ISC)² has revealed that widespread<br />
underfunding in training in-house IT talent is<br />
contributing towards the critical cyber security<br />
skills gap. The report shows that businesses<br />
are exposing themselves to cyber threats by<br />
ignoring and neglecting IT professionals, with<br />
65% of IT workers reporting that their security<br />
advice isn’t followed.<br />
Almost half of IT workers state that their<br />
firms don’t invest sufficiently in ensuring that<br />
their IT staff are security-trained, despite a<br />
shortage of cyber security workers across 63%<br />
of businesses. This indicates that the cyber<br />
skills deficit is rooted in businesses failing to<br />
listen to advice from IT staff and upskill inhouse<br />
talent.<br />
The report suggests that this is a leadership<br />
issue, with 49% of respondents accusing<br />
business leaders of a failure to understand<br />
cyber security requirements. According to the<br />
report, the end result is that the majority of<br />
companies are even less able to cope with a<br />
cyber attack than they were last year.<br />
In February this year, (ISC)² suggested that<br />
the cyber security skills gap will grow to 1.8<br />
million by 2022 if current hiring and training<br />
trends continue.<br />
The latest research is based on responses<br />
given by practising IT professionals from<br />
around the world who participated in the 2017<br />
Global Information Security Workforce Study.<br />
Key findings from surveyed IT professionals<br />
include the following: 43% said their<br />
organisation doesn’t provide adequate<br />
resources for security training, only 35%<br />
agreed that their security suggestions are<br />
acted upon, 55% stated their organisation<br />
doesn’t require IT staff to earn a security<br />
certification and 63% said their organisation<br />
has too few security-focused workers.<br />
“Our findings suggest that too many<br />
organisations are so fixated on their inability<br />
to attract top cyber security expertise that<br />
they often overlook a tremendous pool of<br />
talent already on staff and intimately familiar<br />
with their infrastructure and processes,” said<br />
(ISC)² CEO David Shearer CISSP. “The quickest<br />
way for many organisations to protect<br />
themselves against cyber threats is through<br />
continuous education and empowerment of<br />
their IT team’s constituent members.”<br />
7<br />
www.risk-uk.com
Britain seeks “comprehensive” post-Brexit<br />
security partnership with European Union<br />
through agencies such as Europol to bring<br />
criminals to justice and prevent crime from<br />
taking place.<br />
Britain will remain committed to the security<br />
of the European continent after Brexit. The<br />
Government states that: “Our determination to<br />
protect the safety and security of EU citizens as<br />
well as UK citizens will not diminish.”<br />
Britain will look to<br />
agree on a<br />
comprehensive new<br />
security, law<br />
enforcement and<br />
criminal justice<br />
partnership with the<br />
European Union (EU)<br />
after Brexit to fight<br />
what the Government<br />
calls “our shared<br />
threats from terrorism<br />
and organised crime”.<br />
Brian Sims reports on<br />
the latest political<br />
developments at<br />
Westminster<br />
The Government’s most recent future<br />
partnership paper, which lays out the UK’s<br />
vision for a “deep and special partnership”<br />
with the EU, stresses the need to build upon<br />
and enhance the internal security co-operation<br />
that already exists. Leaving the EU will change<br />
the nature of that co-operation, but it will do<br />
little to change the threats we all face or reduce<br />
the value of the UK as a security partner.<br />
According to the Government, that’s precisely<br />
why it’s in the interests of Britain and the EU to<br />
continue to work together and develop a new<br />
framework for preventing, detecting,<br />
investigating and prosecuting criminal and<br />
terrorist activity across our borders.<br />
The paper calls for a comprehensive model<br />
for co-operation between the UK and the EU on<br />
security, law enforcement and criminal justice,<br />
reflecting the fact that Britain’s operational<br />
processes and data sharing systems are<br />
already uniquely aligned with the EU.<br />
The Government’s three core objectives for<br />
these new arrangements are protecting the<br />
safety and security of citizens and upholding<br />
justice in the UK and across the EU,<br />
maintaining the closest and most co-operative<br />
partnerships between Britain and the 27 EU<br />
Member States and continuing to co-operate on<br />
the basis of shared democratic values and<br />
respect for the rule of law.<br />
The UK has been one of the leading<br />
contributors to the development of effective<br />
information sharing and law enforcement cooperation<br />
at an EU level, all the while working<br />
Ongoing co-operation<br />
The EU also recognises the importance of cooperation<br />
in this area and has stated that it’s<br />
firmly committed to the fight against terrorism<br />
and international crime.<br />
The paper says there should be a new<br />
security treaty between the UK and the EU<br />
post-Brexit to provide a legal basis for<br />
continued working. In moving towards any new<br />
agreement, it’s important to ensure there are<br />
no operational gaps created by the transition<br />
from one set of arrangements to another.<br />
David Davis, Secretary of State for Exiting the<br />
European Union, said: “With the shared threats<br />
facing us evolving faster than ever before, it’s<br />
vital that the UK and the EU maintain and<br />
strengthen the close security collaboration<br />
that’s in place. Together with the EU, we’ve<br />
developed some of the world’s most<br />
sophisticated systems in the fight against crime<br />
because cross-border co-operation is<br />
absolutely crucial if we’re to keep our citizens<br />
safe and bring criminals to justice. We want to<br />
build a new partnership with the EU that goes<br />
beyond any existing relationship it has with<br />
non-Member States such that we can continue<br />
countering cross-border threats together.”<br />
Home Secretary Amber Rudd added: “The<br />
recent terror attacks in London and Manchester<br />
and, indeed, across other parts of Europe have<br />
served as stark reminders of the shared and<br />
evolving threat the UK and our EU partners face<br />
in this day and age. That’s why it’s crucial for<br />
the security of the UK and the continent that we<br />
continue to enhance our co-operation after we<br />
leave the EU. This position paper is the first<br />
step towards reaching an agreement designed<br />
to ensure that we continue to protect millions<br />
of people across Europe.”<br />
Speaking on behalf of the National Police<br />
Chiefs’ Council, Commander Richard Martin<br />
stated: “Law enforcement co-operation<br />
between the UK and other EU countries keeps<br />
citizens on both sides of the Channel much<br />
8<br />
www.risk-uk.com
News Analysis: UK-European Union Security Partnership<br />
safer. Any degradation in our ability to work<br />
together and share information as we leave the<br />
European Union gives advantage to criminals<br />
and terrorists. We’ve worked with Government<br />
to explain our operational requirements, the<br />
benefits they bring and the risks of losing them.<br />
We’re assured that this paper reflects those<br />
requirements. It’s now for the negotiators to<br />
work through the fine details. We’re on hand to<br />
support the process by sharing our operational<br />
advice and experience. In the meantime, we<br />
continue to work closely with our EU partners.”<br />
Boost for CT policing<br />
Amber Rudd has also announced that an extra<br />
£24 million is to be pumped into counterterrorism<br />
policing in the wake of this year’s<br />
terror attacks. The entirely new funding, which<br />
is in addition to £707 million already<br />
announced to support counter-terrorism<br />
policing in 2017-2018, will be used to bolster<br />
protective security measures in crowded places.<br />
This will include helping to protect the public<br />
from the specific threat of vehicles being used<br />
as weapons.<br />
The extra funding will go to counter-terrorism<br />
police including the Metropolitan Police Service<br />
and the Greater Manchester Police to assist<br />
with their response to the threat of terrorism<br />
and help in meeting costs relating to the recent<br />
terrorist attacks.<br />
“We’ve seen several devastating terrorist<br />
attacks in quick succession this year, most<br />
recently in Parsons Green, and the police have<br />
responded to this challenge outstandingly,”<br />
explained the Home Secretary. “The threat we<br />
face from terrorism is becoming more complex<br />
and diverse. That’s why we’re reviewing our<br />
counter-terrorism strategy to ensure the<br />
authorities have the powers they need to halt<br />
terrorist activity. I’m grateful to the police<br />
service and the Security Services for all that<br />
they’re doing to keep us safe.”<br />
The new funding comes in addition to the<br />
Government’s commitment to increase<br />
spending on counter-terrorism by 30% (from<br />
£11.7 billion to £15.1 billion). The Government<br />
has also provided £144 million over the<br />
Spending Review period for a national uplift in<br />
armed policing capability as well as funding for<br />
an additional 1,900 officers at the Security and<br />
Intelligence Services.<br />
Arrests made by counter-terrorism officers in<br />
the UK have risen by more than 50% in the year<br />
to the end of June 2017 as the police and the<br />
Security and Intelligence Services have<br />
continued their efforts to make the UK a hostile<br />
place for terrorists. The arrest figures released<br />
by the Home Office reflect the increasing pace<br />
“With the shared threats facing us evolving faster than<br />
ever before, it’s vital that the UK and the EU maintain and<br />
strengthen the close security collaboration that’s in place”<br />
of activity by police right across the UK’s<br />
counter-terrorism network as they tackle the<br />
current threat.<br />
A total of 379 arrests were made in the year<br />
to June 2017, compared to 226 in the preceding<br />
year. This represents a 68% increase.<br />
Metropolitan Police Service Deputy Assistant<br />
Commissioner Neil Basu, the Senior National<br />
Co-ordinator for Counter-Terrorism Policing,<br />
stated: “There’s no doubt that, since March,<br />
and following on from the attacks in London<br />
and Manchester, we’ve witnessed a sea change<br />
in momentum. While the terrorist threat has<br />
increased in recent months, so too has our own<br />
activity, as is reflected by this significant<br />
increase in arrests.”<br />
Basu continued: “We’re taking every possible<br />
opportunity to disrupt terrorist activity, be it by<br />
making arrests for terrorism offences,<br />
intervening where there are signs of<br />
radicalisation or working with communities to<br />
prevent terrorists from operating in their area.<br />
The police service, together with the Security<br />
and Intelligence Services, is determined to<br />
make the UK as hostile an environment for<br />
terrorists as possible.”<br />
Since the Westminster attack back in March,<br />
there have been six terrorist plots foiled on the<br />
mainland by the police and the UK’s<br />
intelligence community, bringing the number of<br />
foiled plots to 19 since June 2013.<br />
Extremism Commissioner<br />
The Home Office has just launched a<br />
recruitment campaign to appoint a Lead<br />
Commissioner for Countering Extremism.<br />
Confirmed in the Queen’s Speech, the<br />
Commission for Countering Extremism will have<br />
a clear remit to identify extremism and advise<br />
the Government on new policies, laws and<br />
other actions that may be required to tackle it.<br />
It will also support communities and the public<br />
sector to confront extremism wherever it exists<br />
and promote British values.<br />
The successful candidate for Lead<br />
Commissioner will advise the Home Secretary<br />
on the Commission’s future role and agree its<br />
priorities in unison with the Home Office.<br />
Given that there’s a strong correlation<br />
between extremism and the poor treatment of<br />
women and girls, the Commission will also have<br />
a specific responsibility to ensure that the<br />
rights of females are upheld.<br />
David Davis: Secretary of State<br />
for Exiting the European Union<br />
Home Secretary Amber Rudd<br />
9<br />
www.risk-uk.com
ENCRYPTED HIGH SECURITY<br />
CLASS 5<br />
Encrypted High Security<br />
End of Line Modules Are Only the Beginning<br />
Inner Range’s Infiniti Integriti Class 5<br />
is High a complete Security Hardware/Software<br />
System<br />
solution is a complete designed Hardware/Software<br />
specifically for<br />
Class solution 5/Zone designed 3 installations. specifically for<br />
High Security installations.<br />
Our range includes:<br />
Our All range Software includes:<br />
Hardware All Software Controllers<br />
End Hardware of Line Controllers Modules<br />
Power End of Supplies Line Modules<br />
Keypads Power Supplies<br />
Enclosures Keypads<br />
Communications Enclosures Devices<br />
Access Communications Control Readers Devices<br />
Credentials<br />
Access Control Readers<br />
Why Credentials take chances?<br />
Full<br />
Why<br />
End<br />
take<br />
to End<br />
chances?<br />
Encryption<br />
compliant Full End to with End AS/NZS Data Encryption 2201.1:2007<br />
Class Externally 5 Externally Certified Certified<br />
BEST NEW PRODUCT<br />
OF THE YEAR<br />
MEMBER<br />
AUSTRALIAN SECURITY INDUSTRY<br />
ASSOCIATION LIMITED<br />
T: +44 +61 3 (0)845 9780 4300 470 5000<br />
E: integriti@innerrange.com<br />
IREnquiries@innerrange.com<br />
W: innerrange.com<br />
T: 1300 319 499 W: csd.com.au
News Special: Cortech Open Innovation Events 2017<br />
COIE: Spotlight on Industry Challenges<br />
Cortech Developments (the specialist in risk<br />
mitigation and dedicated provider of<br />
integrated software solutions for Critical<br />
National Infrastructure and high security<br />
environments) was joined at the Glasgow COIE<br />
by leading manufacturers Avigilon, Commend,<br />
Harper Chalice and Paxton. Delegates<br />
comprised an even split between end users and<br />
consultants, while sector representation was<br />
made up of professionals from local authorities,<br />
custodial operations and the banking,<br />
education, healthcare and utilities sectors.<br />
Reflecting on the value of the event for<br />
visitors, Jason Blundell (head of sales at<br />
Cortech Developments) stated: “A key objective<br />
of the COIE series is to provide a platform for<br />
engagement around industry challenges faced<br />
in the management and operation of<br />
technology. We then take this a step further by<br />
addressing many of these challenges through<br />
the live smarter interoperability demonstration<br />
and one-to-one discussions with technology<br />
experts during the course of the day.”<br />
Some of the challenges put forward by<br />
delegates included combining legacy and new<br />
technology, the remote monitoring and control<br />
of technology, closed protocols, futureproofing,<br />
lockdown capability and<br />
understanding the differences between a<br />
Security Management System (SMS) and a<br />
Video Management System (VMS).<br />
Blundell explained that the SMS versus VMS<br />
comparison is largely about education and the<br />
specific strategic objectives and operational<br />
requirements of an organisation. “There seems<br />
to be some confusion among many end users<br />
on the differences between an SMS and a<br />
VMS,” said Blundell. “A VMS platform relies on<br />
ONVIF for third party CCTV integration and is<br />
primarily designed as a video management<br />
solution that markets itself as ‘open’. This<br />
openness is partly due to the reliance on ONVIF<br />
and third party interfaces which are sometimes<br />
not everything that they might seem.”<br />
Blundell continued: “They’re generally lowlevel<br />
integration and suitable for many<br />
applications, but not necessarily suitable for<br />
high-end, mission-critical remote monitoring<br />
and control where the management of the site,<br />
its systems, events and alarms are a<br />
prerequisite. It’s also worth noting that ONVIF<br />
isn’t currently viable for the replay of video.<br />
Therefore, replay would always be via the VMS<br />
manufacturers’ recorders, which could incur an<br />
additional expense. That’s different to the<br />
The Cortech Open Innovation Event (COIE) series returned to<br />
Glasgow on 26 September, bringing into sharp focus industry<br />
challenges, smarter interoperability, innovative technology,<br />
the EU’s General Data Protection Regulation (GDPR) and<br />
cyber security resilience measures. Brian Sims reports<br />
scenario realised when integrating via an SMS<br />
using the manufacturer’s SDK.”<br />
Monitoring and control<br />
An SMS is designed to be the overall Graphical<br />
User Interface (GUI) for all security, fire and<br />
building systems. Operators use 3D maps of<br />
local and remote buildings showing devices<br />
and alarm locations.<br />
Blundell observed: “SMS integration offers<br />
monitoring and control of these security, fire<br />
and building systems, alarm or event<br />
management, measurable response that can<br />
change depending on the time of day or day of<br />
the week, for instance, full audit trail and<br />
management reporting, cause and effect and<br />
situational awareness of all the other systems.”<br />
Blundell added: “Therefore, rather than<br />
being part of one control system interfacing<br />
with others, it’s a separate ‘layer’ that sits over<br />
any manufacturer’s system. The client is free to<br />
choose the ‘Best of Breed’ systems with which<br />
to interface and operate a control platform<br />
that’s truly manufacturer agnostic.”<br />
As with previous COIE events, there was also<br />
a focus on the future and what’s topical and<br />
relevant for the industry moving forward.<br />
Guest speaker Scott Simpson, CEO of The<br />
Security Circle, addressed attendees on GDPR<br />
compliance and the cyber security implications.<br />
“The GDPR provides organisations with an<br />
opportunity to enhance their information<br />
security practice from technical, governance<br />
and legal perspectives,” explained Simpson.<br />
COIE Knutsford<br />
The final COIE of 2017 – for which Risk UK is the<br />
Official Media Partner – will be hosted at<br />
Cortech Developments’ headquarters in<br />
Knutsford, Cheshire on Tuesday 7 November.<br />
Attending manufacturers on this occasion<br />
include Commend, Geutebruck, Grosvenor<br />
Technology and Intech Solutions.<br />
Steve Pilkington (technical director of IT<br />
consultancy Italik) will deliver a Keynote<br />
presentation to delegates offering an insight<br />
into the current cyber crime landscape and the<br />
ten steps towards cyber risk management.<br />
Jason Blundell: Head of Sales<br />
at Cortech Developments<br />
*Join Cortech Developments<br />
and its partners at COIE<br />
Knutsford. Visit<br />
www.coie.uk.com for details<br />
11<br />
www.risk-uk.com
News Special: BCI World Conference and Exhibition 2017<br />
Working Together on Common Objectives<br />
The Business<br />
Continuity Institute’s<br />
annual BCI World<br />
Conference and<br />
Exhibition 2017 takes<br />
place at the Novotel<br />
London West Hotel in<br />
November. Risk UK is<br />
an Official Media<br />
Partner for the event,<br />
previewed here by<br />
Brian Sims<br />
*The online Registration Form<br />
for BCI World 2017 is<br />
available at<br />
www.bciworld2017.com<br />
**Exhibitors at the 2017 event<br />
include Daisy Group, Sungard<br />
Availability Services,<br />
Everbridge, Regus, Fusion<br />
Risk Management, Anvil<br />
Group, Buckinghamshire New<br />
University, Intertek and The<br />
Emergency Planning College<br />
Sir Bernard Hogan-Howe QPM:<br />
Former Commissioner of the<br />
Metropolitan Police Service<br />
BCI World is the largest business continuityfocused<br />
conference and exhibition in the<br />
UK and, indeed, one of the biggest on the<br />
global scale. This year, the event – which runs<br />
across Tuesday 7 and Wednesday 8 November<br />
at the Novotel London West Hotel in<br />
Hammersmith – features a packed conference<br />
programme, an exhibition hall promoting the<br />
latest business continuity-centric products and<br />
services, a themed Gala Dinner and the BCI<br />
Global Awards Ceremony designed to showcase<br />
the best in the industry.<br />
The conference programme includes thought<br />
leadership discussion and debates, detail on<br />
new research, practical demonstrations and<br />
Case Studies centred on the real-world<br />
application of business continuity activities.<br />
The programme is suitable for all levels of<br />
practitioners (be they new to the discipline or<br />
harbouring experience) from a wide range of<br />
sectors. In years gone by, this event has been<br />
attended by heads of emergency management,<br />
business continuity managers, company<br />
directors, senior executives, business<br />
continuity and risk consultants, operational<br />
specialists and risk managers representing –<br />
but not exclusive to – the oil and gas,<br />
Government, financial, manufacturing, retail, IT,<br />
utilities, transport and telecoms sectors.<br />
Those with responsibility for business<br />
continuity, risk management, emergency<br />
management, crisis or incident management,<br />
disaster recovery, security, information security,<br />
Health and Safety, change management,<br />
procurement or facilities management will find<br />
much of interest at this event.<br />
Attendees will be able to share good practice<br />
in business continuity and resilience with<br />
experts and improve both their knowledge and<br />
understanding with a view towards enhancing<br />
professional development.<br />
It’s a golden opportunity for practitioners to<br />
place themselves at the heart of global thought<br />
leadership, gain practical insights and then<br />
apply them to their organisation. They can<br />
benefit from excellent networking opportunities<br />
and view, compare and experience first-hand<br />
the very latest business continuity-related<br />
products, solutions and services.<br />
Keynote Speakers in 2017<br />
One of this year’s Keynote Speakers is Sir<br />
Bernard Hogan-Howe QPM, former<br />
Commissioner of the Metropolitan Police<br />
Service. In this role, which he left in February<br />
this year, Sir Bernard presided over an<br />
organisation of 50,000 people with a budget of<br />
£3.2 billion providing a service for the 8.6<br />
million inhabitants of London. He also held<br />
national responsibilities, including leading<br />
counter-terrorism policing throughout the UK<br />
and protecting the heart of Government.<br />
In the Keynote Plenary at conference, Sir<br />
Bernard will focus on three major themes: the<br />
importance of business continuity planning and<br />
training in order to realise enhanced resilience,<br />
the overriding importance of working in<br />
partnership and also building enough capacity<br />
into the system to make sure that, when a<br />
continuity plan doesn’t quite survive initial<br />
contact with a disruptive event, there’s enough<br />
leadership and resources on hand to ensure an<br />
effective and efficient response.<br />
There’s also going to be a Keynote Speech<br />
from a senior figure at the all-new National<br />
Cyber Security Centre.<br />
‘Bio-Hacking’ and data security<br />
On Day Two, the Keynote Speaker is Kevin<br />
Warwick, Emeritus Professor at Coventry<br />
University and the University of Reading.<br />
Warwick is a world-renowned scientist and<br />
engineer, with his key areas of research being<br />
Artificial Intelligence, control, robotics and<br />
biomedical engineering.<br />
Warwick became the world’s first ‘Cyborg’ in<br />
a set of scientific experiments involving the<br />
surgical implanting of a device into his arm to<br />
link his nervous system directly to a computer.<br />
At BCI World 2017, Warwick will consider the<br />
implications of the potential for microchipping<br />
employees, the advantages of linking a human<br />
brain to a computer, the types of implants that<br />
are being used today (known as ‘bio-hacking’)<br />
and the questions this raises for the security of<br />
data and people.<br />
Readers of Risk UK should note that the first<br />
morning of conference features a particularly<br />
interesting session on designing credible<br />
terrorism threat scenarios to inform business<br />
continuity exercises. An informative<br />
presentation from Richard Bond (senior<br />
consultant at Arup) will address techniques<br />
delegates could apply to monitor changes in<br />
the terrorism threat to their organisations.<br />
Further, delegates will learn how the outputs<br />
from such targeted activity can be used to<br />
inform the design of credible threat scenarios<br />
that underpin exercises intended to validate<br />
business’ ongoing continuity plans.<br />
12<br />
www.risk-uk.com
News Special: NAHS Annual Conference and Awards 2017<br />
Making Sure Security’s in Good Health<br />
The NAHS was formed back in 1994 as a notfor-profit<br />
professional organisation in the<br />
UK. In essence, it exists to support and<br />
enable healthcare provision through the<br />
delivery of professional security, ultimately<br />
enhancing the healthcare environment.<br />
As a stakeholder in healthcare security, the<br />
NAHS supports NHS Protect as the latter<br />
continually develops the strategic direction and<br />
development of NHS healthcare security. This is<br />
duly reflected in NAHS membership of NHSP<br />
Working Groups as a key stakeholder.<br />
One of the NAHS’ key roles is to promote<br />
education and the professional development of<br />
healthcare security practitioners. Nowhere is<br />
this better illustrated than by the organisation’s<br />
Annual Conference. Organised by All Security<br />
Events, this year’s conference and exhibition<br />
runs on Thursday 9 November at The Studio, 7<br />
Cannon Street, Birmingham B2 5EP, with Risk<br />
UK serving as Official Media Partner.<br />
Platinum Sponsor for the day is B-Cam, with<br />
sponsors Carlisle Support Services and Paxton<br />
also in attendance. Also exhibiting at the<br />
conference are Gunnebo, Deister, Skyguard,<br />
Corps Security, Volunteering Values and Lesar.<br />
The event will feature the NAHS’ 2017 Annual<br />
General Meeting and a networking drinks<br />
reception (sponsored by Paxton).<br />
Wealth of knowledge<br />
Jayne King – chairman of the NAHS and head of<br />
security and site services at Guy’s and St<br />
Thomas’ NHS Foundation Trust – is set to chair<br />
the conference proceedings which feature a<br />
Keynote presentation from Tony Porter QPM<br />
LLB, the Surveillance Camera Commissioner.<br />
Porter was appointed Surveillance Camera<br />
Commissioner in March 2014. He harbours a<br />
combination of business and law enforcement<br />
expertise and is an intelligence specialist (most<br />
recently within the financial sector). Porter’s<br />
experience spans community and business<br />
engagement, international counter-terrorism<br />
and serious and organised crime.<br />
As an experienced specialist consultant on<br />
soft restraint and the use of force, Doug Melia<br />
speaks regularly at a multitude of events. In<br />
times past he has written for The Guardian and<br />
The Times’ Education Supplement as well as<br />
Safety Management magazine.<br />
A Security Industry Authority (SIA)-approved<br />
trainer, Melia sits on an Advisory Panel for the<br />
use of mechanical restraints, holds an SIA close<br />
protection licence and, operationally, spent<br />
The National Association for Healthcare Security (NAHS)<br />
works to continually improve security in healthcare facilities<br />
through training and the exchange of information and<br />
experiences, all the while aiming to promote co-operation<br />
and development among its members. Brian Sims previews<br />
the organisation’s Annual Conference and Awards 2017<br />
many years in his teens and early 20s as a door<br />
supervisor working in the North West region.<br />
At the NAHS Conference, Melia will be<br />
delivering a thought-provoking discourse on<br />
‘Reasonable Force – The Taboos’.<br />
Making her presentation under the heading<br />
‘Freedom to Speak Up’ is Georgina Charlton,<br />
deputy Freedom to Speak Up guardian at Guy’s<br />
and St Thomas’ NHS Foundation Trust. Charlton<br />
is responsible for running the ‘Showing We<br />
Care By Speaking Up’ campaign at Guy’s and St<br />
Thomas’. Her role involves ensuring that staff<br />
have a number of safe mechanisms to raise<br />
concerns and working with the Board to create<br />
an open and honest culture for speaking up.<br />
Charlton provides leadership for the London<br />
region of Freedom to Speak Up guardians as<br />
their dedicated chairperson.<br />
Charlton has a clinical background as a<br />
senior diagnostic radiographer and has worked<br />
at Guy’s and St Thomas’ for just shy of a<br />
decade. Her areas of clinical expertise are<br />
dementia awareness and delivering<br />
compassionate care in radiology.<br />
Prior to being seconded to the guardian role<br />
in January, Charlton was responsible for<br />
delivering the largest imaging accreditation<br />
project in the UK collaboratively with Guy’s and<br />
St Thomas’ and King’s College, London.<br />
In addition, a representative from<br />
Crimestoppers will be talking on the unique<br />
public/private sector partnership that has been<br />
forged between that organisation, Carlisle<br />
Support Services and the NAHS.<br />
Other speakers on the day are scheduled to<br />
include sponsors B-Cam and Paxton.<br />
NAHS 2017 Awards<br />
This year’s NAHS Awards are sponsored by B-<br />
Cam, with the categories as follows: Best<br />
Healthcare Security Officer, Best Healthcare<br />
Security Team, Best Contribution to Healthcare<br />
Security and Best Security Supplier.<br />
The special Chairman’s Award is reserved for<br />
nominations of significant merit not covered<br />
within the standard categories.<br />
*For further information and<br />
to register your place at<br />
conference access<br />
www.allsecurityevents.com/<br />
event-pro/nahs/<br />
13<br />
www.risk-uk.com
Safety in Numbers: Risk Management<br />
Regimes for Large-Scale Events<br />
Terrorist attacks<br />
against the public in<br />
Western Europe and<br />
North America have<br />
been on the rise since<br />
2011. According to the<br />
Global Terrorism<br />
Database, we’re<br />
currently experiencing<br />
the highest rate of<br />
incidents since 1994.<br />
Within that scenario,<br />
both the methods and<br />
motives of the<br />
terrorists are evolving.<br />
In the aftermath of<br />
several devastating<br />
events, Andrew<br />
Mortimer observes<br />
why he believes the<br />
way in which large<br />
crowds are protected<br />
and managed merits<br />
reconsideration<br />
This year alone, terrorist attacks have<br />
included the use of firearms, explosives,<br />
bladed weapons and, increasingly, acids,<br />
other chemicals and vehicles. Of late, we’ve<br />
seen vehicles used as weapons against crowds<br />
in London (Westminster, London Bridge and<br />
Finsbury Park), Stockholm, Barcelona and<br />
Charlottesville, Virginia. During the August<br />
Bank Holiday, while a number of attendees at<br />
the Notting Hill Carnival in London were treated<br />
for injuries after being doused in an<br />
unidentified liquid by an assailant.<br />
Attacks at concerts and nightclubs have also<br />
been on the rise in recent years. Gunmen and<br />
suicide bombers have infiltrated venues in Paris<br />
(The Bataclan, 2015), Orlando (the Pulse<br />
nightclub, 2016) and Manchester (MEN Arena,<br />
2017), tragically resulting in the deaths and<br />
serious injury of hundreds of people.<br />
While police forces and counter-terrorist<br />
units have necessarily spearheaded changes to<br />
their approach around such episodes, event<br />
and venue managers, security teams and<br />
facilities management leaders have also had to<br />
address their own methods of operation.<br />
Essentially, anyone with a professional<br />
responsibility for keeping the public safe at<br />
large events has been motivated to ensure their<br />
events/premises are as secure as they can be.<br />
Across the globe, fundamental reviews of<br />
security, training and crowd safety have been<br />
undertaken and put into effect. Overhauling<br />
policies and procedures, however, will put<br />
pressure on venues and their security partners<br />
in terms of increased manpower and<br />
equipment. Yet with strategic contingency<br />
planning, clear communication and frequent<br />
policy reviews, this pressure can be anticipated<br />
and alleviated, at least to some extent.<br />
For its part, the Metropolitan Police Service<br />
holds regular Project Griffin briefings (ie events<br />
for business owners to better equip themselves<br />
when detecting and deterring terrorism). Other<br />
bodies also issue regular advice and guidance.<br />
Indeed, the Project Griffin programme has been<br />
extended so that training can now be delivered<br />
by in-house teams to the wider company<br />
security network. Also, the National Counter-<br />
Terrorism Security Office has widely publicised<br />
its ‘Run, Hide, Tell’ campaign.<br />
In addition to keeping abreast of the latest<br />
advice from industry bodies and the<br />
authorities, and conducting ongoing risk<br />
assessments, security solution providers must<br />
also proactively plan for emerging threats.<br />
Sometimes, this can be as a result of specific<br />
incidents, such as the above mentioned<br />
vehicular attacks, which have led local councils<br />
to review the vulnerability of public spaces and<br />
install protective bollards and barriers.<br />
In the case of sports and music venues,<br />
where visitor experience can be more overtly<br />
influenced by site design, more subtle solutions<br />
can be adopted. For example, the famous<br />
cannon statue at Arsenal FC’s Emirates Stadium<br />
in north London essentially serves the same<br />
purpose as a barrier.<br />
In other instances, risk assessments may be<br />
in response to emerging technologies and<br />
trends, such as the development of ceramic,<br />
plastic, fibreglass or carbon fibre weapons<br />
which are undetectable by traditional metal<br />
sensors, or drone technology (which now poses<br />
a clear threat to open-air events).<br />
Technology and human intelligence<br />
To tackle these challenges, it’s crucial to have a<br />
robust supply chain and trusted partners in<br />
place who can supply rigorous solutions. For<br />
example, anti-drone technology including<br />
radars and GPS disablers is now being invested<br />
in by security providers. For the detection of<br />
weapons, more advanced, high frequency<br />
scanners and x-ray machines are being<br />
deployed in tandem with specially-trained staff.<br />
This combination of technology and human<br />
intelligence is of the utmost importance. While<br />
technology develops at a relentless pace, the<br />
experience and intuition of human beings<br />
cannot be rivalled. Deterring reconnaissance by<br />
would-be attackers is hugely important. Even<br />
the mere presence of well-trained officers with<br />
the ability to detect and identify ‘hostiles’ can<br />
potentially disrupt reconnaissance activity.<br />
Allied to this, new smart CCTV equipment can<br />
recognise the silhouettes of individuals and<br />
identify when their outlines change. This helps<br />
to alert security if someone has left a bag<br />
unattended, but human insight is needed to<br />
assess the true threat – is it a genuinely<br />
suspicious occurrence or an honest mistake?<br />
Only a person can decipher that detail. For staff<br />
to be able to work with these advanced<br />
technologies, though, investment is required.<br />
14<br />
www.risk-uk.com
Opinion: Crowded Places Security and Counter-Terrorism<br />
Focusing on people<br />
When recruiting for security teams, strict<br />
background checks are, of course, vital. When<br />
the right people have been recruited,<br />
investment in ongoing training, including<br />
industry-recommended Security Industry<br />
Authority accreditation and equipment-focused<br />
courses, is needed to ensure they can perform<br />
to their highest ability. Furthermore, this<br />
empowers them to be that much more<br />
confident in making strategic decisions about<br />
responding to specific threats.<br />
Security officers put themselves in harm’s<br />
way so it’s critical that businesses equip them<br />
with the right knowledge and skills to respond<br />
safely to threats. Looking out for the well-being<br />
of its teams should be a key priority of any<br />
security business, and especially so at points of<br />
heightened concern.<br />
Business leaders – including executives and<br />
those based at head office – should be seen<br />
standing shoulder to shoulder with their teams<br />
on the front line on a regular basis, and never<br />
more so than in the wake of an incident.<br />
In the immediate aftermath of the<br />
Manchester Arena attack, many executives and<br />
security leaders across the industry worked<br />
alongside event staff and security teams. The<br />
senior team at OCS was on hand and worked<br />
together with venue executives from the<br />
Liverpool Arena and AEG’s O2 to reassure<br />
colleagues on duty at subsequent Iron Maiden<br />
and Take That concerts. Management working<br />
alongside staff is so important for morale. Not<br />
only does it show solidarity, but also<br />
demonstrates how much we value our security<br />
teams as well as helping those in charge to<br />
better understand the challenges faced by<br />
colleagues on the front line.<br />
Concern for others is a key fundamental in<br />
this industry. People visiting an arena for an<br />
event or a concert are there to enjoy<br />
themselves and, while the goal of the security<br />
team is to be diligent and mitigate risk, the<br />
public’s experience must also be a top priority.<br />
An immediate response<br />
When incidents do happen, we must respond<br />
immediately. This is true not just for<br />
organisations directly affected, but for those in<br />
the wider area and industry. Intelligence comes<br />
at incredible speed from the authorities and<br />
industry bodies. In practice, this means MI5<br />
may raise the terrorism threat level from<br />
‘Substantial’ to ‘Severe’ or even ‘Critical’.<br />
Security companies must be ready to adapt<br />
accordingly in very short order.<br />
At this point, meetings are held by those<br />
responsible for event security to agree what<br />
additional resources are needed and how these<br />
will be deployed. Those resources may include<br />
personal search equipment (metal detectors,<br />
wands and arches, etc), additional surveillance,<br />
physical pat-downs and bag searches and the<br />
introduction of sniffer or general purpose<br />
security dogs or extra staff.<br />
As threat levels rise, so too does the<br />
complexity of the response needed and,<br />
indeed, the cost of implementing it. This is why<br />
initial planning is so important. Changes to<br />
procedures and policies also need to be<br />
reassuringly communicated to the public.<br />
Public opinion and perception is incredibly<br />
important when it comes to events. If people<br />
don’t feel safe when attending events, then the<br />
whole industry – and even the economy – will<br />
suffer. Security must create a feeling of safety<br />
and reassurance around a venue, but not to the<br />
extent that a given premises becomes an<br />
impenetrable fortress. There’s a delicate<br />
balance to be struck between public safety and<br />
rigorous control allied to the need for creating a<br />
hospitable and welcoming environment.<br />
Customer service must be a key priority<br />
following incidents. This needs to be<br />
emphasised to front line security teams. The<br />
importance of reassuring individuals at these<br />
times cannot be understated, and those<br />
messages must be backed up in reality.<br />
The primary goal is to afford customers<br />
positive experiences such that they’re happy to<br />
queue, be scanned and searched and follow<br />
tighter restrictions for safer events.<br />
Andrew Mortimer:<br />
Managing Director of<br />
Destinations and Venues at<br />
OCS Group<br />
“Even the mere presence of well-trained security officers<br />
with the ability to detect and identify ‘hostiles’ can<br />
potentially disrupt reconnaissance activity”<br />
15<br />
www.risk-uk.com
Leave No Stone Unturned<br />
Autumn’s now upon<br />
us. With the nights<br />
already drawing in<br />
and the festive season<br />
only just around the<br />
corner, incidents<br />
involving commercial<br />
burglaries are already<br />
on the rise. Dan Hardy<br />
seeks to identify the<br />
scale of the problem<br />
and, indeed, the<br />
underlying reasons for<br />
commercial burglary<br />
before offering some<br />
timely advice about<br />
what businesses<br />
across all vertical<br />
sectors can do to<br />
prevent themselves<br />
from becoming the<br />
unfortunate victims<br />
Commercial burglary is a year-round<br />
problem, but one that peaks from October<br />
onwards with the darker evenings. It’s a<br />
time of the year when retailers have more<br />
stock, there’s a higher density of people on the<br />
High Street and commercial premises are busier<br />
(as a result of which members of staff might not<br />
be as vigilant as at other times). All of the<br />
above serves to increase the overall risk profile.<br />
Feedback from members of the National<br />
Business Crime Solution (NBCS) suggests that,<br />
so far in 2017, commercial burglary has<br />
increased from between 22% and 55% across<br />
the NBCS’ membership when compared to the<br />
same period last year. Even though this is by no<br />
means a definitive figure, it does suggest that<br />
this type of nefarious activity is a growing trend<br />
and that those with malicious intent in mind<br />
view commercial premises as being vulnerable.<br />
When considering the impact of a commercial<br />
burglary, it’s tempting to focus solely on the<br />
items stolen. However, the true cost of this type<br />
of crime is more far-reaching and can<br />
encompass property damage and repair, loss of<br />
trade, customer dissatisfaction, management<br />
time in dealing with the issue and colleague<br />
time in terms of labour. Then there are the nonfiscal<br />
issues to consider such as reputational<br />
damage and the fact that employees might feel<br />
less safe when carrying out their duties.<br />
Opportunist or planned<br />
Commercial burglaries tend to fall into one of<br />
two types: opportunist or planned. In the<br />
former, an individual will often enter through an<br />
unlocked or non-secured door or window,<br />
tempted by the sight of unprotected stock or<br />
perhaps a laptop or smart phone that’s easily<br />
accessible. In the latter, a level of planning and<br />
hostile reconnaissance will take place. Burglars<br />
will often have a co-ordinated strategy (a recent<br />
high-profile example being the burglary<br />
perpetrated on the Hatton Garden Safe Deposit<br />
Company in London).<br />
With so many variables involved,<br />
organisations must carry out a risk and threat<br />
assessment to ensure that they’re in the best<br />
position possible to deal with any real or<br />
perceived danger, which can then help in<br />
developing a corporate security policy and<br />
strategy document. Undertaking an in-depth<br />
analysis of an organisation’s activities,<br />
premises and facilities means that the risks can<br />
be fully understood and acted upon. Just as<br />
importantly, regular reviews of existing security<br />
programmes and measures are necessary to<br />
maintain adequate safeguards.<br />
The sharing of data/intelligence through<br />
collaboration should never be underestimated.<br />
A centralised intelligence hub for both the<br />
police and the business community is starting<br />
to connect crimes which would have<br />
traditionally been seen as being independent.<br />
Know your onions<br />
Businesses must do all they can to protect<br />
themselves, yet all-too-often they’re failing to<br />
secure their premises. Rather than trying to<br />
cover all elements at once, the best way in<br />
which to approach any security strategy is to<br />
treat it like an onion with different layers. It’s<br />
also worth pointing out that, while much of<br />
what should be considered appears to be<br />
obvious, it’s surprising just how often ignoring<br />
one of these seemingly innocuous factors can<br />
offer burglars an opportunity.<br />
The first layer of the process is to look at a<br />
building’s exterior and identify any vulnerable<br />
areas. It’s also worth reaching out to<br />
neighbouring companies to share Best Practice<br />
and help each other spot any weaknesses or<br />
suspicious behaviour. Talking can often act as a<br />
prompt to address an issue.<br />
A building’s exterior should also be clean, so<br />
graffiti must be cleaned off, rubbish removed<br />
and overgrown vegetation trimmed so as not to<br />
obscure CCTV and reduce the effectiveness of<br />
lighting. Bins must be kept out of sight as they<br />
could serve as a climbing aid, and particularly<br />
so for access to low-level windows.<br />
16<br />
www.risk-uk.com
Opinion: Mind Your Own Business<br />
Access control is vital, so service and fire<br />
doors should be locked when not in use and,<br />
preferably, not used as an out of hours access<br />
point or a way for personnel to exit the building<br />
to have a cigarette break. It’s advisable to use<br />
high quality door frames and doors, steel<br />
reinforcing and anti-thrust bolts on doors and<br />
bars on windows, while dropbars and magnetic<br />
door locks should be regularly inspected for<br />
damage or technical faults, as indeed should<br />
any installed security fogging systems.<br />
Grilles and shutters are an excellent way of<br />
deterring burglars, while fixing bollards into the<br />
ground surrounding a given premises will<br />
protect against ram-raiders. Planning<br />
permission could be required for such a move,<br />
though, so do make a point of checking on this<br />
before embarking on any work.<br />
Window glass is also available in a number of<br />
different formats. Laminated glass in particular<br />
is very difficult to break through because it’s<br />
manufactured by bonding a layer of tough<br />
plastic between sheets of glass. If this option<br />
isn’t feasible, then an alternative cheaper<br />
option is plastic film, which will increase the<br />
strength of the glass and, when a ‘mirrored’<br />
option is used, restrict a burglar’s view into rear<br />
storage areas.<br />
Cause for alarm<br />
Burglars will often try to overcome an intruder<br />
alarm system by cutting the signal and filling<br />
exterior alarm bells with substances such as<br />
foam to prevent then from sounding. A common<br />
ploy is to set the alarm off repeatedly and wait<br />
until the point at which the police service and<br />
key holders stop responding to it, thus giving<br />
burglars more time to act.<br />
It’s also worth remembering that, although<br />
traditional alarms may alert staff or passers-by,<br />
they offer limited police protection. Due to an<br />
increase in false alarms, police services will not<br />
respond to a ringing bell or siren unless there’s<br />
evidence of an offence in progress.<br />
A monitored alarm can provide a confirmed<br />
signal to pass to the Emergency Services (often<br />
a requirement of insurers).<br />
Likewise, a CCTV system must be maintained<br />
and fit for purpose at all times, covering both<br />
internal and external areas. Recorded images<br />
should be set to record for a minimum of 30<br />
days, while stringent Codes of Practice need to<br />
be followed. Stipulations here will include<br />
ensuring that the date and time are<br />
incorporated into the recording before video<br />
evidence can be successfully used in a<br />
prosecution case within a Court of Law.<br />
If for any reason an alarmed zone is switched<br />
off, ensure that it’s switched on again and<br />
make certain secondary alarm equipment is<br />
moved if building layouts change or seasonal<br />
displays are put in place for retail outlets.<br />
It makes sense not to leave tills with money<br />
in them and to hide expensive stock from view.<br />
Safes and secure cages are now available that<br />
are fitted with sensors. Similarly, key security is<br />
vital. Only authorised staff should have access<br />
to certain keys or combination locks. Those<br />
individuals must thoroughly understand their<br />
responsibilities for locking and securing<br />
fastenings on windows and doors, offices,<br />
safes, rooflights and other exits.<br />
Although cyber security should be on the<br />
radars of all organisations, it’s worth<br />
remembering that access to servers and other<br />
IT equipment must also be restricted in order to<br />
secure vital data. Just as importantly, any<br />
Internet Protocol-based devices including CCTV,<br />
access control and intruder alarm systems<br />
should be secured in order to thwart hackers.<br />
Train to gain<br />
A security strategy can only be successful if<br />
everyone within an organisation is given the<br />
correct level of training, such that they can then<br />
keep a watchful eye out for suspicious<br />
behaviour. The old and established saying that<br />
‘a chain is only as strong as its weakest link’ is<br />
relevant here as it’s often those who are Front<br />
of House – such as receptionists – that are in a<br />
prime position to monitor and identify any<br />
questionable behaviour.<br />
Retail environments should adopt an<br />
‘intelligent guarding’ approach that combines<br />
technology – and the data realised by it – with<br />
individuals who can deal with the outputs of<br />
these systems. Knowledge of counter-terrorism,<br />
loss prevention, report writing, behavioural<br />
analysis and profiling, Health and Safety and<br />
data and intelligence gathering – in unison with<br />
First Aid and excellent customer service<br />
abilities – are now vital for the modern day<br />
security officer, as is the ability to work as part<br />
of a team with non-security based personnel.<br />
In the unfortunate event that an organisation<br />
experiences a commercial burglary, the most<br />
positive thing it can do is learn from it and<br />
ensure that measures are put in place to<br />
prevent any reoccurrence. Preventative security<br />
using a common sense approach is the only<br />
way in which to maintain a deterrent effect that<br />
will reduce the likelihood of criminal activity.<br />
Dan Hardy:<br />
Managing Director of the<br />
National Business Crime<br />
Solution (NBCS)<br />
*Mind Your Own Business is the<br />
space where the NBCS examines<br />
current and often key-critical<br />
business crime issues directly<br />
affecting today’s companies. The<br />
thoughts and opinions expressed<br />
here are intended to generate<br />
debate and discussion among<br />
practitioners within the<br />
professional security and risk<br />
management sectors. If you would<br />
like to make comment on the<br />
views outlined, please send an<br />
e-mail to: brian.sims@risk-uk.com<br />
**The NBCS is a ‘Not-for-Profit’<br />
initiative that enables the effective<br />
sharing of appropriate data<br />
between the police service, crime<br />
reduction agencies and the<br />
business community to reduce<br />
crime and risks posed to all. By<br />
providing a central repository<br />
where business crime data is<br />
submitted, shared and analysed,<br />
the NBCS is able to gather the<br />
necessary intelligence and support<br />
to more effectively detect, prevent<br />
and, subsequently, respond to<br />
crimes affecting the UK’s business<br />
community. For further information<br />
access the website at:<br />
www.nationalbusinesscrime<br />
solution.com<br />
“A centralised intelligence hub for the police service and the<br />
business community is starting to connect crimes which<br />
would have traditionally been viewed as being independent”<br />
17<br />
www.risk-uk.com
October 11, 2017<br />
Tatton Park, Knutsford,<br />
Nr Manchester, UK<br />
Axis partners showcased<br />
2N, Aimetis, Agent Vi, Araani, Assa Abloy AB,<br />
Cathexis Europe Ltd, Citilog, ComNet Europe<br />
Ltd, Customer Clever Ltd, Dantech Electronic<br />
Engineering, Digital Barriers, Digital Forge Ltd,<br />
Dot Origin Ltd, EIZO Limited, Entelec Control<br />
Systems Ltd, Falt Communications AB, Genetec<br />
Europe, Herta Security, IPS, Milestone Systems,<br />
Mirasys, Morphean, NVT Phybridge, Observit AB,<br />
Optex (Europe) Ltd, P3R Lab, Prysm, Secure Logiq<br />
Ltd, Seetec GmbH, Siklu Communication, Sound<br />
Intelligence, Telcred AB, Vaxtor, Veracity UK Ltd,<br />
Xtralis UK Ltd, Wavestore Global Ltd<br />
Axis Partner Showcase 2017<br />
Meet the<br />
leading experts<br />
in network video.<br />
Join Axis Communications and 35 of the most innovative companies in<br />
the network video industry and find out what solutions, technologies and<br />
products are available today to help you grow your business!<br />
Register now!<br />
www.axis-communications.com/<br />
Axis_Communications_UK_Partner_Showcase<br />
Video management software, security applications, business management applications,<br />
hardware/technology, physical access control, transmission and storage, and more!
BSIA Briefing<br />
Preventing injury in the workplace should<br />
be a key concern for any employer, of<br />
course, but it ought to be of particular<br />
relevance for employers in our business sector<br />
due to the potentially dangerous environments<br />
and situations in which security personnel can<br />
and do find themselves.<br />
For their part, employers have a legal Duty of<br />
Care towards their employees and any<br />
demonstrable failure to fulfil this obligation can<br />
impact severely on the host business. Those<br />
negative impacts can range from low staff<br />
morale and high staff turnover through to<br />
financial penalties, reputational damage and<br />
even prosecutions in a Court of Law.<br />
In February last year, new guidelines were<br />
issued by the Sentencing Council for Health and<br />
Safety, food and corporate manslaughterrelated<br />
sentencing, enabling the courts to issue<br />
significantly larger fines to those employers<br />
who breach their Duty of Care towards their<br />
employees. Prior to the new guidance being<br />
issued, fines for serious breaches would<br />
typically run to several hundred thousand<br />
pounds, but under the new guidelines, fines<br />
can start at several million pounds for a large<br />
organisation that’s found to be highly culpable<br />
in what’s defined as a Harm Category 1 incident.<br />
Courts are given guidance on how to<br />
determine the offence category using<br />
culpability and harm factors, which are then<br />
used to determine an offending organisation’s<br />
fine from a matrix of suggested ranges.<br />
Culpability is determined to be ‘High’ if an<br />
organisation is proven to have fallen far short<br />
of the appropriate standard, for instance by<br />
failing to put in place measures that are<br />
recognised standards in the industry, ignoring<br />
concerns raised by employees or others, failing<br />
to make appropriate changes following prior<br />
incident(s) exposing risks to Health and Safety<br />
and allowing breaches to subsist over time.<br />
‘Aggravating factors’<br />
The harm category is determined by the<br />
likelihood of the risk of harm created by the<br />
offending organisation’s breach alongside the<br />
seriousness of the harm at risk of being<br />
realised. For example, a Harm Category 2<br />
means that the offending organisation’s breach<br />
risked a high likelihood of harm that could<br />
amount to physical or mental impairment which<br />
has a substantial and long-term effect on the<br />
sufferer’s ability to carry out normal day-to-day<br />
activities, an effect on their ability to return to<br />
work or, alternatively, a progressive, permanent<br />
or irreversible condition.<br />
For a large organisation – ie one in which the<br />
turnover or equivalent is £50 million and over<br />
Health and Safety Issues in<br />
the Security Business Sector<br />
Managing Health and Safety is essential for any business<br />
operating in the UK. Failing to adequately do so can leave an<br />
organisation vulnerable to a number of considerable<br />
business risks. Here, James Kelly discusses Health and Safety<br />
and how various initiatives are helping to address issues<br />
prevalent in the security sector<br />
per annum – that’s found to have high<br />
culpability and a Harm Category 2, the starting<br />
point for an imposed fine would be £1,100,000<br />
within a category range of between £500,000<br />
and £2,900,000.<br />
In addition, there are a number of<br />
‘aggravating factors’ which can result in an<br />
upward adjustment from the starting point. In<br />
some cases, it may be deemed appropriate to<br />
move outside of the identified category range.<br />
With this in mind, it’s vitally important for<br />
employers within the security business sector<br />
to be aware of their Health and Safety<br />
obligations and ensure that they take all of the<br />
necessary steps to prevent Health and Safety<br />
incidents from occurring. The Health and Safety<br />
Executive’s (HSE) website can assist firms in<br />
identifying what they must do to comply with<br />
Health and Safety legislation, while there are a<br />
number of additional resources available to<br />
help in managing this critical facet of business.<br />
Some of the simple things companies can do<br />
to manage this discipline include writing a<br />
Health and Safety policy, providing employees<br />
with training and information, providing the<br />
James Kelly: CEO of the British<br />
Security Industry Association<br />
19<br />
www.risk-uk.com
BSIA Briefing<br />
right workplace facilities and reporting<br />
incidents when they occur such that lessons<br />
can be learned for the future.<br />
‘Near miss’ reporting<br />
An important area that’s often overlooked is<br />
that of ‘near miss’ reporting. Near miss<br />
reporting is a vital part of accident prevention<br />
and helps to create a safer working<br />
environment for everyone.<br />
Many near misses occur and remain<br />
unreported because people often forget the<br />
crucial role that near misses play in accident<br />
and incident prevention. A near miss is an<br />
unplanned event that didn’t result in an injury,<br />
illness or damage, but most certainly had the<br />
potential to do so. For example, when a<br />
member of the security team is carrying out a<br />
vehicle search, a stored item may fall out, but<br />
the officer doesn’t sustain an injury and the<br />
item itself isn’t damaged.<br />
Near miss reporting is not to be confused<br />
with hazard reporting. Hazard reporting is when<br />
a potential hazard – such as a wet floor, for<br />
example – is identified, but a near miss is when<br />
someone actually slips on that wet floor<br />
without sustaining any injury. It’s equally<br />
important to report both.<br />
Reporting near misses enables businesses to<br />
learn essential lessons, take corrective actions<br />
and, most importantly, prevent similar or more<br />
serious occurrences from materialising in the<br />
future. It has been shown that a serious injury<br />
is often preceded by a number of near misses<br />
or warnings, meaning that an unreported near<br />
miss could be the next accident.<br />
As well as the Health and Safety risks present<br />
in most workplaces – such as slips and trips,<br />
working at heights, electrical hazards and<br />
ergonomic hazards (to name a few) – there are<br />
additional risks to consider for security<br />
personnel due to the environments and<br />
situations in which they might find themselves.<br />
Violence reduction<br />
Research commissioned by the Security<br />
Industry Authority (SIA) back in April 2015<br />
identifies that security personnel believe the<br />
potential for violence to be perpetrated on<br />
them is an ongoing problem. They expect to<br />
have to deal with a certain degree of violence<br />
as part of their work.<br />
“Reporting near misses enables businesses to learn<br />
essential lessons, take corrective actions and, most<br />
importantly, prevent similar or more serious occurrences<br />
from materialising in the future”<br />
In fact, the research reveals that, during the<br />
year covered by the study, 37.67% of<br />
respondents had experienced a physical<br />
assault requiring First Aid, with 2.75% of these<br />
interviewees reporting that physical assaults<br />
needing First Aid treatment had occurred ten<br />
times or more. 19.91% of respondents to the<br />
SIA’s research also claimed to have experienced<br />
a physical assault requiring hospital treatment.<br />
It therefore comes as no surprise to learn<br />
that reducing acts of violence against security<br />
personnel is a key concern for our industry<br />
bodies, many of which are represented through<br />
a multi-agency Violence Reduction Advisory<br />
Group established by the SIA.<br />
The group includes representatives from a<br />
wide range of stakeholders, including the<br />
British Security Industry Association, the<br />
Government, the police service, local<br />
authorities, the HSE and both buyers and<br />
providers of private security solutions as well<br />
as a wide range of other organisations. It has<br />
already made significant progress in a number<br />
of areas that contribute towards the SIA’s<br />
violence reduction strategy.<br />
Indeed, the group has provided a healthy and<br />
informed challenge of the SIA’s progress in<br />
delivering on its strategy and action plan and<br />
has championed cross-cutting initiatives which<br />
require support from multiple organisations. An<br />
example of one of these initiatives is training –<br />
either training requirements and standards<br />
mandated by the Regulator or further<br />
voluntarily adopted training. Conflict resolution<br />
training features highly in the SIA’s research<br />
results as a method for reducing violence.<br />
Health and Safety Forum<br />
Another group that aims to improve Health and<br />
Safety within the security industry is the BSIA’s<br />
Health and Safety Forum. The Health and Safety<br />
Forum meets regularly as a vehicle for<br />
employers in the security sector to share<br />
knowledge and Best Practice and remain up-todate<br />
with the latest changes to Health and<br />
Safety legislation and standards.<br />
This group of employers is currently collating<br />
statistics relating to workplace incidents such<br />
that trends specific to the security business<br />
sector may be identified and mitigated.<br />
Members are also planning to develop industryspecific<br />
guidance with a view to helping<br />
employers manage Health and Safety, taking<br />
into account the risks that security personnel<br />
are most likely to encounter in their duties.<br />
Ultimately, by striving to achieve Best<br />
Practice in the management of Health and<br />
Safety, the risks to employees can be<br />
significantly reduced by the host organisation.<br />
20<br />
www.risk-uk.com
They see a well secured airport.<br />
You see smart data to<br />
optimize traveler flow.<br />
Bosch empowers you to build a safer and more secure<br />
world. And with built-in video analytics as of the IP 4000<br />
cameras, we allow you to use video data for more than<br />
security alone. Like identifying interruptions and<br />
patterns in airport traffic.<br />
Find out more at boschsecurity.com<br />
+1<br />
People counting<br />
Queuing alarm<br />
Enforcing safety<br />
regulations
SBD and CPTED: Security’s Pivotal<br />
Role in the Construction Sector<br />
For each building<br />
planned, designed<br />
and built to become a<br />
new part of our city<br />
landscapes, architects<br />
and design firms are<br />
very often the first<br />
links in the chain. The<br />
ingenuity and skill<br />
that they bring to<br />
construction design<br />
processes is<br />
undoubted, but even<br />
these central<br />
individuals need<br />
helping hands. Philip<br />
Strand argues why<br />
security professionals<br />
must be brought into<br />
the process at the<br />
earliest stages<br />
Dr Philip Strand PhD MBA:<br />
Senior Risk Consultant at<br />
CornerStone GRG<br />
22<br />
www.risk-uk.com<br />
Cities continue to grow across the UK. Even<br />
the most conservative construction<br />
industry forecasts predict at least 1.2%<br />
growth through 2018 and beyond. Although<br />
that number may seem small, this equates to a<br />
commitment of more than £500 billion worth of<br />
projects focused on infrastructure, private<br />
housing and commercial properties within the<br />
next few years.<br />
Construction project teams include not only<br />
architects and designers, but also structural<br />
engineers, investors, city planners and a<br />
multitude of other stakeholders who are all<br />
well-qualified to make contributions to the<br />
design process. All too often, however, security<br />
professionals with bespoke education, training<br />
and experience in building operations are<br />
brought into teams far too late to have any<br />
appreciable influence on security-related<br />
aspects of building designs.<br />
While there may be reasons for late<br />
invitations going out to security professionals,<br />
this oversight can come at a significant cost to<br />
both building owners and, more likely than not,<br />
a building’s future users.<br />
Quite sensibly, most designers begin their<br />
projects with the building’s ‘user requirements’<br />
in mind. Early in the design process, workshops<br />
are held to determine the activities that will go<br />
on within the building and how the building’s<br />
users should benefit from its existence.<br />
By way of documents that are logically<br />
similar to the Operational Requirements<br />
Reports of the Centre for the Protection of<br />
National Infrastructure, designers, architects<br />
and engineers conceptualise their buildings<br />
inside and out to meet people’s stated needs.<br />
User groups and their spatial needs, aesthetic<br />
requirements and emotive goals, as well as<br />
practical concerns about Health and Safety, are<br />
all captured in ‘user requirements’ at the early<br />
stages of projects.<br />
Principles of security<br />
Practical requirements related to security,<br />
however, are very often either left out or<br />
woefully underestimated at the early stages of<br />
projects. This occurs not as a function of<br />
designers or other stakeholders being oblivious<br />
to security as a requirement, but rather as a<br />
result of project team leaders mistakenly<br />
viewing ‘security’ as a collection of cameras,<br />
turnstiles and card readers that can all be<br />
simply bolted into the walls and floors after the<br />
majority of the building has been planned (and<br />
sometimes even constructed).<br />
Excluding principles of security from<br />
influential ‘user requirements’ documents and<br />
excluding security professionals from project<br />
teams during the early phases of design<br />
reduces the chances that the building will be<br />
inherently securable which, in turn, increases<br />
the likelihood that awkward, excessive and,<br />
ultimately, more expensive security solutions<br />
will be required after the building is phased<br />
into everyday use.<br />
The idea that early engagement can enable<br />
security professionals to have positive impacts<br />
on construction projects isn’t new. Further,<br />
Secured By Design (SBD) and Crime Prevention<br />
Through Environmental Design (CPTED) are two<br />
well-respected programmes that seek to make<br />
buildings and spaces inherently more secure<br />
before they’re even built.<br />
SBD provides guidance for ‘designing-out<br />
crime’ by ensuring that buildings’ perimeters,<br />
walls and other features are configured in ways<br />
that make it difficult for criminals to operate.<br />
Roads and footpaths leading up to buildings<br />
are also considered from a security perspective.<br />
For its part, CPTED operates on a deeper,<br />
more psychological level. CPTED promotes the<br />
use of basic design principles that make<br />
criminals feel uncomfortable and ‘observed’ to<br />
the point that they’re deterred from causing<br />
trouble in an area. The principles of CPTED<br />
encourage people to come into spaces and use<br />
them for legitimate purposes such that others<br />
cannot use those spaces for illegal reasons.<br />
By incorporating CPTED principles into<br />
building designs, crime can be measurably<br />
reduced, thus cutting back on the need for<br />
expensive technological solutions and<br />
increasing the efficiency of those technological<br />
systems that remain necessary.<br />
Not only are SBD and CPTED’s design<br />
recommendations normally ‘cost neutral’ (from<br />
a design perspective), but they can also reduce<br />
security guarding costs, lessen CCTV camera<br />
requirements and cut back on material losses.<br />
When these reductions are factored into<br />
operating expenditure estimates over the<br />
lifetime of the building, early engagement with<br />
security professionals can then readily be seen
Security in the Built Environment<br />
as an extremely important cost-saving decision<br />
that can be taken.<br />
Dynamic Vehicle Assessments<br />
Beyond crime, if there are risks related to<br />
terrorism present, then there can also be a<br />
great deal of value in engaging early with<br />
explosive blast experts and security<br />
professionals capable of conducting Dynamic<br />
Vehicle Assessments (DVAs).<br />
Since stand-off range is a tremendously<br />
important variable in blast mitigation<br />
strategies, and because tight corners and<br />
spaces are extremely important factors in DVAs,<br />
the input of security experts at the very<br />
beginning of a project is much more valuable<br />
than that which can be provided at some point<br />
after a building’s foundations have been dug.<br />
Sometimes, it can be the case that simply<br />
moving a road or a building just five metres in a<br />
given direction could save stakeholders<br />
hundreds of thousands of pounds in blast<br />
mitigation measures. In more extreme cases,<br />
five metres of extra stand-off can be the<br />
difference between a feasible blast mitigation<br />
strategy and having no feasible options at all.<br />
Fortunately, the problem of late engagement<br />
with security professionals in construction<br />
projects is being addressed by an increasing<br />
number of accreditation schemes that require<br />
projects to incorporate recommendations from<br />
Risk, Threat and Vulnerability (RTV)<br />
Assessments in their designs. Specifically, RTV<br />
Assessments calculate the business impacts<br />
that security incidents might have on the<br />
assets, people and strategic objectives of<br />
organisations using buildings.<br />
Focusing attention on BREEAM<br />
The Building Research Establishment<br />
Environmental Assessment Method (BREEAM)<br />
is the world’s longest-standing method for<br />
ensuring the sustainability of buildings and<br />
calls for new building projects to include a<br />
‘Security Needs Assessment’. This makes sense<br />
given research commissioned by SBD that<br />
estimates six million tonnes of CO 2 is<br />
generated annually by resources spent on<br />
preventing and investigating crime.<br />
The BRE’s new Security Assessment scheme,<br />
entitled SABRE, goes a step further by<br />
encouraging construction projects to fully<br />
integrate security factors throughout the entire<br />
construction process.<br />
BREEAM’s acknowledgement of the<br />
importance of security is a step in the right<br />
direction, but other schemes and methods will<br />
need to adopt similar views before real traction<br />
can be achieved. The Royal Institute of British<br />
Architects’ (RIBA) well-known, five-stage<br />
project management model is understood by all<br />
construction companies within the UK. In<br />
theory, an RTV Assessment should inform the<br />
concept designs generated by construction<br />
project teams in RIBA Stage 2. BREEAM audits<br />
encourage companies to conduct these<br />
assessments by giving additional points for<br />
their completion. More points are awarded if<br />
the companies pass a SABRE accreditation.<br />
In reality, though, RTV Assessments are often<br />
commissioned too late to have any real impact<br />
on a building’s design.<br />
Consider the fact that it can easily take a<br />
procurement team a month or more to go<br />
through a tender process and select a security<br />
company to undertake the RTV Assessment. In<br />
short, if the project team didn’t consider the<br />
RTV Assessment well before beginning Stage 2,<br />
then it’s highly unlikely that a ‘suitablyqualified’<br />
security professional will be<br />
commissioned in time for an assessment to be<br />
completed and its results to have a discernible<br />
impact on the concept design.<br />
The project team will score the extra BREEAM<br />
and SABRE points for having the assessment,<br />
but the practical value of the work is unlikely to<br />
be capitalised upon. The project team will find<br />
out too late that an explosive blast expert or<br />
some other specialist security expert should<br />
have been included within the team.<br />
“Sometimes, it can be the case that simply moving a road<br />
or a building just five metres in a given direction could save<br />
stakeholders much money in blast mitigation measures”<br />
23<br />
www.risk-uk.com
‘The Perimeter’, as it<br />
was once known, is<br />
quickly going the way<br />
of the Dodo. Between<br />
Bring Your Own Device<br />
schemes and the mass<br />
migration to the cloud,<br />
IT security<br />
professionals can no<br />
longer rely on the<br />
boundaries of their<br />
network to be the true<br />
borders in their area of<br />
responsibility. That<br />
being the case, where<br />
do they go from here?<br />
Adam Jaques offers his<br />
take on the matter<br />
Left To Their Own Devices<br />
Quite predictably, Bring Your Own Device<br />
(BYOD) refers to a policy of allowing<br />
employees to literally bring their own<br />
devices into work and use their employer’s<br />
network in order to do their job. It might prove<br />
to be a headache for IT professionals inside the<br />
host company, but has clearly been quite<br />
attractive to management, who often see an<br />
opportunity to save money, increase<br />
productivity and, ultimately, streamline the<br />
working lives of their employees.<br />
This poses tough questions for security<br />
professionals. They’ve every right to be<br />
worried, too. A panoply of studies show that,<br />
time and time again, human error is so often<br />
the prime cause of a breach. Further, recent<br />
reports have indicated that personal devices on<br />
corporate networks are behind many insider<br />
threats. In short, BYOD serves up a whole new<br />
salad of security variables for IT security<br />
professionals, many constituent elements of<br />
which may seem tough to digest.<br />
The moving parts that a BYOD policy<br />
introduces confront IT Departments with a<br />
variety of devices, brands and users and a<br />
veritable kaleidoscope of data that can be<br />
difficult to manage. You’re not only adopting<br />
your employees’ devices, but often the services<br />
and Apps that they regularly use as well.<br />
Let’s be clear that BYOD isn’t going away<br />
anytime soon. The corporate perimeter is<br />
already heading out of sight. Workforces are<br />
increasingly mobile and dispersed with the rise<br />
of networked technology and the proliferation<br />
of ‘Work at Home’ policies. It’s a trend that will<br />
be hard to fight. A study by analyst Gartner<br />
shows that, by the end of this year, 50% of<br />
companies will require employees to use their<br />
own devices for work-related tasks.<br />
BYOD: the central considerations<br />
So what do organisations need to think about<br />
on the path towards BYOD? Compliance<br />
considerations must come before the first draft<br />
of any BYOD policy. Industry regulations and<br />
standards must be understood along with the<br />
issues that concern your specific sector when it<br />
comes to IT.<br />
In the healthcare sector, for example, BYOD<br />
policy needs to take into account the great<br />
wealth of intimately personal data that will flow<br />
through users’ devices. For engineering, the<br />
policy must recognise the value of the<br />
Intellectual Property with which members of<br />
staff are engaged on a daily basis.<br />
All of this becomes especially important for<br />
European organisations, who will soon face the<br />
daunting compliance challenge of the EU’s<br />
General Data Protection Regulation (GDPR),<br />
which comes into effect in May 2018. The raft of<br />
requirements it will introduce are all backed up<br />
by a hefty 4% penalty on global revenue for<br />
particularly delinquent proven offenders.<br />
Survey results published by Strategy<br />
Analytics have shown increasing fears around<br />
BYOD on the part of European businesses, with<br />
10% of those professionals quizzed suggesting<br />
they expect the use of BYOD-enabled tablets to<br />
decrease with the advent of the GDPR.<br />
The GDPR need not become a hindrance to<br />
BYOD adoption, but it does mean organisations<br />
that want to allow mobile IT will have to be all<br />
the more diligent when it comes to<br />
implementation. Even if drafting a policy proves<br />
cumbersome, not having one in place will not<br />
stop employees from using enterprise IT on<br />
their own devices. It will merely leave the<br />
business without a structure to accommodate<br />
this and risks compliance problems at some<br />
juncture further down the line.<br />
Opening up to risk<br />
“There are always going to be some businesses<br />
for whom BYOD is inappropriate,” explained<br />
Vince Warrington, founder of Protective<br />
Intelligence, a consultancy that advises<br />
companies on security. “There are always going<br />
to be people who struggle with not being able<br />
to take their work laptop home, especially if<br />
they need to work late or across a weekend to<br />
meet deadlines. What they’re more likely to do<br />
is e-mail their work to themselves, thus<br />
opening up the enterprise to security risks.”<br />
24<br />
www.risk-uk.com
Mobile Technology: Risk Management for BYOD and The Cloud<br />
Warrington continued: “It’s that balance of<br />
making sure you have the security right. If you<br />
don’t put some kind of policy in place then<br />
people will work around the situation in any<br />
event. They’ll find a way. Your workforce is like<br />
water in that it will always gravitate towards<br />
the path of least resistance. If you turn around<br />
and give people in your working environment<br />
the kind of workloads where they’re having to<br />
operate from home at weekends or while on the<br />
move then you must accept the fact that, unless<br />
you put proper rules in place, they’re going to<br />
do whatever works best for them.”<br />
Core to the introduction of a BYOD policy will<br />
be to give users access to the processes they<br />
need to do their jobs. This involves more than<br />
just securing endpoints in the right way. Steve<br />
Armstrong, a SANS Institute instructor, advises<br />
against relying purely on endpoint solutions,<br />
and instead to “think about controlling your<br />
data before it’s sent to the endpoint.”<br />
You need to think about what data you’re<br />
replicating. Is it reliable? Is it secure? Does this<br />
person actually need access to that data? “It’s<br />
good to have endpoint security,” stated<br />
Armstrong, “but don’t think you’ve just<br />
outsourced the problem.”<br />
EMM comes into play<br />
That access needs to be managed and enforced<br />
with what’s known as Enterprise Mobility<br />
Management (EMM). EMM helps to prevent<br />
unauthorised access and establish acceptable<br />
behaviour for mobile IT, partition accountability<br />
and address the problems of lost and stolen<br />
devices as well as what to do when an<br />
employee and an employer finally part ways.<br />
The simplest EMM solution for the widest<br />
range of devices will be the one that works<br />
best. To be sure, any solution that’s too<br />
complex or restrictive is doomed to failure.<br />
Back in 2014, another study by Gartner<br />
predicted that 20% of all BYOD policies would<br />
fail due to overcomplexity.<br />
Access management must be disciplined.<br />
People (including guests) and devices that<br />
don’t require access to areas of your business<br />
should not have access. It’s as simple as that.<br />
The proliferation of admin rights for regular<br />
users across global organisations is a regular<br />
cause of security breaches. Some EMM<br />
solutions make good use of container security<br />
which effectively separates the data of<br />
employees and enterprises, even when working<br />
on devices that are brought in from home.<br />
Network access control solutions and strong<br />
SSL VPNs will be critical to the adoption of<br />
BYOD, affording users access to what they need<br />
while protecting the business from security<br />
“Survey results published by Strategy Analytics have<br />
shown increasing fears around BYOD, with 10% of those<br />
professionals quizzed suggesting they expect the use of<br />
BYOD-enabled tablets to decrease due to the EU’s GDPR”<br />
risks. Bear in mind that technological solutions<br />
are necessary, but not quite sufficient enough<br />
for an effective BYOD policy.<br />
Humans may be your weakest point, but<br />
they’re also your most critical aspect. They’ll<br />
need to be educated about security cleanliness,<br />
what they can and cannot do on a company<br />
network and how they might work not only<br />
efficiently, but also safely.<br />
Employee perspectives<br />
When looking at the issue from the point of<br />
view of the business itself, it’s easy to forget<br />
about the perspective of the employee. The<br />
benefits of a BYOD policy cannot be taken as a<br />
‘given’ when it comes to employees. They need<br />
to be assured that their privacy will be<br />
respected, just as employers would expect their<br />
security policies to be observed.<br />
Moreover, finding out what employees want<br />
and, just as importantly, what they actually<br />
need from such a policy will only serve to<br />
create a more agile and workable document<br />
which is easier to stomach.<br />
Much of this comes down to education, itself<br />
a fundamental aspect of implementing BYOD.<br />
Education is absolutely critical to the future<br />
safe working of BYOD within your organisation.<br />
In essence, BYOD has to orbit around the<br />
very subject of a BYOD policy: the user. Here,<br />
simplicity is king. Complex policies will mean<br />
inefficient working, blocks to productivity and<br />
hard-to-follow instructions. They’ll merely<br />
increase the likelihood of the user finding some<br />
way of circumventing a cumbersome security<br />
policy and possibly opening up your<br />
organisation to compromise.<br />
What about the future?<br />
Looking ahead, new developments are being<br />
made in BYOD that will allow the introduction<br />
of Artificial Intelligence in workplaces, thus<br />
removing much of the scope for human error<br />
that BYOD sometimes risks. Bring Your Own Bot<br />
(or BYOB) has been touted as the future<br />
iteration of BYOD, with the arrival of intelligent<br />
personal assistants like Amazon Alexa.<br />
BYOD provides a new challenge to security<br />
professionals and one that’s not entirely<br />
avoidable. However, a forward-thinking BYOD<br />
policy will plug security holes far more<br />
effectively than if you choose to ignore them.<br />
Adam Jaques:<br />
Technologist at Pulse Secure<br />
25<br />
www.risk-uk.com
Data Centres: Security and Fire Safety<br />
The Data Centre sector is one of the world’s<br />
fastest-growing industries, with the huge<br />
increase in Internet usage being one of the<br />
key drivers. In the past decade, the number of<br />
users worldwide has increased from 300 million<br />
to over two billion. That represents a<br />
phenomenal growth rate of more than 400%.<br />
Data Centre downtime can mean losing<br />
thousands of pounds per minute. Even an<br />
interruption of one hundredth of a second can<br />
disrupt the entire IT operation of a Data Centre.<br />
Any temporary stoppage of data flow or a<br />
failure in a single element of the facility’s<br />
infrastructure can realise downtime, resulting in<br />
potentially serious consequences for an<br />
organisation’s daily operations and reputation.<br />
Advanced protection systems will encompass<br />
Command and Control solutions, secure<br />
process management, wide-area surveillance,<br />
perimeter and site intrusion protection, access<br />
control for staff, contractors and vehicles, alarm<br />
management, fire detection and extinguishing<br />
solutions, phased evacuation systems, lone<br />
worker monitoring and asset tracking.<br />
By automating routine security and fire safety<br />
tasks, organisations can concentrate on their<br />
core business activities while at the same time<br />
protecting facilities with high performance risk<br />
management systems based on the very latest<br />
safety and security technologies.<br />
High-level security<br />
Threats to Data Centres come in many forms,<br />
from the intruder trying to gain physical access<br />
to the facility and, ultimately, the servers<br />
through to cyber attacks and hackers trying to<br />
access the network as well as stored data.<br />
A whole lifecycle approach to system design<br />
should be at the heart of a proposed<br />
technological solution to deliver maximum<br />
safety, resilience, longevity and reliability. To<br />
facilitate this, single points of system failure<br />
should be designed-out wherever feasible and<br />
worse case parameters used in engineering<br />
calculations to minimise the risk of either<br />
system degradation or failure.<br />
Furthermore, the solution should be<br />
configured to ensure the delivery of efficiencies<br />
in maintenance and running costs.<br />
Due to the sensitive and 24/7 nature of Data<br />
Centres, rigorous identity and access control for<br />
the various zones within is of primary<br />
importance. Ensuring that only the right people<br />
gain access at all times can be achieved by<br />
employing badge or smart card access control<br />
or biometric access using iris, vein or facial<br />
recognition. Optimal security may be ensured<br />
with an intrusion detection system to secure<br />
fences, walls, windows and doors and even<br />
Data Centres: Coping with<br />
‘Information Overload’<br />
The continued growth of social networking, electronic<br />
banking and paperless storage, together with modern IT<br />
services such as virtualisation and cloud computing, have<br />
made businesses heavily dependent on Data Centres. Using a<br />
real world example, Chris Edwards evaluates protection<br />
measures designed to ensure Data Centres are safe, secure,<br />
resilient and sustainable<br />
detect flooding. All areas may be secured using<br />
HD IP cameras to provide the highest image<br />
quality of both live and recorded incidents.<br />
Command and Control platforms that<br />
integrate protection devices across Data<br />
Centres, including multiple sites, will manage<br />
critical situations and enhance procedures by<br />
delivering improved intelligence, information,<br />
advanced reporting and greater operator<br />
effectiveness. Furthermore, these new<br />
generation software solutions incorporate<br />
legacy equipment and adapt to specific<br />
corporate security and safety policies.<br />
Command and Control enables the<br />
synchronisation of inputs from multiple security<br />
and safety devices such that operators can<br />
quickly master each situation. Decision-making<br />
is more systematic, while the need to follow a<br />
logical workflow is vital.<br />
Full integration<br />
Adopting a proactive and preventative security<br />
approach using fully-integrated security<br />
management solutions will protect all<br />
Chris Edwards: Account<br />
Development Manager at<br />
Siemens Building Technologies<br />
27<br />
www.risk-uk.com
Data Centres: Security and Fire Safety<br />
operational processes and ensure the integrity<br />
of the data, building and assets as well as<br />
maximum uptime and business continuity.<br />
The central management of all integrated<br />
security will improve operational performance,<br />
increase visibility, boost response agility for<br />
deployment, enforcement and speed of<br />
response and, ultimately, reduce costs.<br />
Time is critical for many operations, so<br />
operators need to have information at their<br />
fingertips. A decision management workflow<br />
will assign priorities and determine activities<br />
and allow the appropriate actions and<br />
resources. A high level of transparency,<br />
complete with detailed reporting and audit<br />
trails, provides vital information for senior<br />
management to enable a better understanding<br />
of their Data Centre operations, leading to<br />
future improvements and cost efficiencies.<br />
The delivery of high-level intelligence will<br />
enable the detection of a critical event and the<br />
management of the situation through to a<br />
successful conclusion.<br />
Frankfurt Data Centre<br />
Let’s look at a real world example. Frankfurt has<br />
the highest density of Data Centres of any city<br />
in Europe. The German branch of Citigroup has<br />
built its Frankfurt Data Centre (FDC) as a high<br />
performance, energy-efficient facility with highlevel<br />
protection and availability. Processed data<br />
is stored in duplicate within the Data Centre<br />
and mirrored to other Citigroup Data Centres.<br />
The FDC meets the Tier IV Standard awarded by<br />
the Uptime Institute for maximum redundancy<br />
and maintains 99.995% availability.<br />
Redundancy, high system availability,<br />
security and energy efficiency are key elements<br />
for Citigroup. We’ve delivered intelligent safety<br />
and security technology for this client<br />
alongside reliable building automation that<br />
cools and conditions the air based on demand,<br />
keeping the servers from overheating, and an<br />
uninterruptible and redundant power supply.<br />
To guarantee the safety and security of the<br />
building, assets and processed data, all of the<br />
installed security and safety systems are<br />
aligned with Citigroup’s global safety and<br />
security requirements, so too the facility for<br />
regular emergency evacuation and safety drills.<br />
Any operational Data Centre should harbour<br />
the highest level of fire safety due to the<br />
presence of a constant ignition source of<br />
electricity as well as a plentiful supply of<br />
combustible materials.<br />
Fire detection in Data Centres can be<br />
challenging for traditional smoke detection<br />
systems. Fires typically start slowly before<br />
erupting into flame, so the early detection of<br />
smoke is essential. However, the high level of<br />
ventilation necessary to prevent equipment<br />
from overheating also disperses smoke, making<br />
it more difficult to detect and enhancing the<br />
risk of fast fire distribution within the space.<br />
To mitigate the risk of fire, Data Centres<br />
require advanced detection, offering the<br />
earliest possible warning. Intelligent detectors<br />
will evaluate each situation minute by minute<br />
and take decisions on complex criteria,<br />
eliminating the potential for unwanted alarms<br />
due to environmental influences. Detectors<br />
must only alarm when there’s a real risk of fire<br />
and offer 100% reliability. They should adapt to<br />
reflect environmental changes in room usage.<br />
Aspirating Smoke Detectors (ASDs) are<br />
designed to operate in extremely demanding<br />
situations, even before any smoke is visible.<br />
Innovative, dual wavelength technology can<br />
detect minute smoke particles, determine false<br />
fire phenomena and provide an instant fire<br />
alert. ASDs actively draw smoke to the detector<br />
through boreholes within a piping system that<br />
runs throughout the protected area. This offers<br />
a significantly higher level of protection, as<br />
standard systems can only respond if smoke<br />
can actually reach the detection element, which<br />
may often be too late in critical environments.<br />
For high risk environments where water<br />
damage to assets and materials can outweigh<br />
that of an uncontrolled fire, inert gas and<br />
chemical extinguishing systems deliver reliable<br />
protection. Clean extinguishing technologies<br />
safeguard valuable equipment in<br />
data/computing, electrical and<br />
telecommunications rooms. Inert gases<br />
displace air during the discharge.<br />
A further consideration is the adoption of<br />
specialist ‘silent’ extinguishing to ensure the<br />
protection of vulnerable hard disk drives<br />
(HDDs). This reduces ‘noise’ during<br />
extinguishing to about 1/100th that of<br />
conventional systems and shifts the sound<br />
frequency away from the crucial spectrum to<br />
which HDD devices are sensitive, all without<br />
affecting the efficient distribution of the<br />
extinguishing agent.<br />
“Adopting a proactive and preventative security approach using fullyintegrated<br />
security management solutions will protect all operational<br />
processes and ensure the integrity of the data, building and assets”<br />
28<br />
www.risk-uk.com
Advertisement Feature<br />
ISM: Pioneering Integrated Security<br />
Management Systems<br />
Physical Security Information Management<br />
(PSIM) systems have come a long way in<br />
an incredibly short space of time, with<br />
solution manufacturers in this particular space<br />
having made big and bold claims about how<br />
their systems are being developed and what<br />
they can do for procuring end user customers.<br />
At ISM, however, we don’t talk. Rather, we<br />
act. We don’t ‘do’ PSIM systems any longer, at<br />
least not in the way that PSIM is currently<br />
understood. We’ve gone beyond PSIM into a<br />
new generation of Integrated Security<br />
Management Systems (ISMS). Indeed, they’re<br />
already installed and protecting Critical<br />
National Infrastructure projects worldwide.<br />
ISM recognised that ‘true’ PSIM systems<br />
were being undervalued, with glorified Video<br />
Management Systems oversold as something<br />
rather more capable and special.<br />
We also recognised that there’s a world of<br />
difference between a manufacturer’s system<br />
that’s capable of controlling and managing<br />
cameras and network video recorders of a<br />
similar make and a ‘true’ ISMS that controls<br />
multiple technologies from multiple<br />
manufacturers. The former delivers an<br />
integrated solution up to a point, but ‘true’<br />
integration is only achieved by those systems<br />
that can accommodate any technology of any<br />
make and, what’s more, do so across multiple<br />
sites and even multiple countries.<br />
Genesys Enterprise<br />
It’s with this in mind that we’ve launched our<br />
latest generation of Genesys Enterprise<br />
technology, offering end user customers<br />
unparalleled scale, redundancy and ease of<br />
use. Put simply, Genesys Enterprise is leading<br />
the market as a proven solution.<br />
As an enhancement of the existing Genesys2,<br />
the Enterprise version has been developed with<br />
the largest organisations in mind. Genesys is<br />
fully-scalable to manage and control multiple<br />
sites from a single Control Room (or even a<br />
single workstation) across a country or even<br />
across continents. It features the most<br />
advanced levels of encryption configured to<br />
ensure network security, and is accredited to<br />
the highest standards of Government national<br />
infrastructure security.<br />
Stephen Smith, managing director of ISM,<br />
explained to Risk UK that the extension of the<br />
Genesys range affords end user customers<br />
greater choice. “Genesys Enterprise resolves<br />
those issues associated with the increasing<br />
geographical scope of clients, corporations,<br />
Governments and institutions, while also<br />
adhering to a multi-tiered hierarchy (or<br />
‘federated’ system) where total control is<br />
centralised, but allows individual sites to<br />
maintain local control,” stated Smith.<br />
“The new addition is ideally suited to those<br />
large organisations with multiple sites across<br />
multiple regions who might also want to ‘flex’<br />
to accommodate further sites and geographies<br />
as their needs evolve. As this solution<br />
emanates from the Genesys stable, current end<br />
users only have to upgrade from their existing<br />
version to Enterprise without the expense of a<br />
complete technology ‘refresh’.”<br />
Integration of multiple systems<br />
Crucially, the new development allows the<br />
integration of multiple systems from multiple<br />
manufacturers – all from one holistic and<br />
integrated security system.<br />
Every electronic security or fire safety device<br />
from CCTV and intruder alarms through to<br />
electronic locking and Public Address can be<br />
monitored and controlled from a single<br />
platform, regardless of who made them.<br />
Most importantly, Genesys Enterprise<br />
includes the existing Migrating 3+ technology, a<br />
patented automatic failover technology that<br />
adds higher levels of automatic configurable<br />
redundancy and power. Control is effectively<br />
distributed across multiple workstations.<br />
Operating from an<br />
extensive<br />
manufacturing and<br />
design facility located<br />
close to Gatwick<br />
Airport, ISM has been<br />
a world pioneer in<br />
integrated security<br />
systems and<br />
integrated security<br />
solutions since 1989.<br />
Here, the UK’s leading<br />
developer of<br />
integrated security<br />
management,<br />
intercom and cell call<br />
systems focuses on<br />
the development of<br />
Integrated Security<br />
Management Systems
Advertisement Feature<br />
“We take power to your PC and multiply it by<br />
the number of PCs on your network,” continued<br />
Smith. “What this means is that, if one PC fails,<br />
control is seamlessly migrated to another PC,<br />
with no interruption or downtime. Therefore,<br />
our system isn’t restricted in its performance by<br />
the size or capability of a server, nor does it<br />
require the expense of moving to server farms<br />
or using clustering software. We deliver the<br />
most extreme redundancy characteristics for<br />
the threats you’ve thought of, as well as those<br />
that you haven’t.”<br />
Tested and proven<br />
Genesys is a ‘true’ ISMS system built around<br />
intuitive software that combines a range of<br />
industry-leading features and benefits<br />
including an enhanced Graphical User Interface<br />
experience, 3D modelling and a comprehensive<br />
event management database. Events and<br />
alarms are presented to the operator clearly as<br />
and when they happen.<br />
“The Enterprise development within the<br />
Existing Genesys isn’t a development waiting<br />
for a trial site,” outlined Smith, “but rather one<br />
that has already been installed within a highsecurity<br />
Critical National Infrastructure project.<br />
It’s tested and proven at the highest level under<br />
the most demanding of conditions and has<br />
been very successful.”<br />
Operators can be quickly trained to gain<br />
maximum advantage. “The system also enables<br />
end users to make better use of their staff and<br />
resources, since you don’t have to have all of<br />
your Control Rooms working 24 hours,”<br />
observed Smith. “Genesys is a truly unique<br />
solution offering advanced system architecture,<br />
unparalleled ease of use for the operators and<br />
very low lifecycle costs for the end customer.”<br />
Protection for Haringey residents<br />
A new concierge and ISMS solution developed<br />
by ISM is now protecting two tower blocks in<br />
the London Borough of Haringey, enabling<br />
authorised employees to control door access<br />
and manage fire and security systems from<br />
anywhere within Haringey Council’s estate.<br />
Newbury House, Finsbury House, John Keats<br />
House and Thomas Hardy House in London’s<br />
Wood Green already feature four of ISM’s stateof-the-art<br />
Ultimate door entry systems as well<br />
as another duo of third party technology<br />
systems from Entrotec, using its Apex dual path<br />
speech technology.<br />
Thanks to the Genesys ISMS, multiple<br />
technologies can be controlled regardless of<br />
the manufacturer of those technologies, in turn<br />
providing enhanced security for residents in<br />
over 500 flats across a total of six tower blocks.<br />
This delivers greater flexibility and control,<br />
eliminates the potential disruption caused by<br />
installing new equipment and protects Haringey<br />
Council’s legacy investment. It also means that<br />
further buildings with existing ISM or Entrotec<br />
systems can be added as and when required<br />
with only minimal additional investment.<br />
Genesys allows the integration not just of<br />
door entry systems, but also multiple systems<br />
from multiple manufacturers – all from one<br />
holistic integrated security system. As<br />
mentioned previously, every electronic security<br />
or fire safety device from CCTV and intruder<br />
detection alarms to electronic locking and<br />
Public Address systems can be monitored and<br />
controlled from a single platform.<br />
The solution for Haringey Council features<br />
the aforementioned Migrating 3+ technology.<br />
Len Fevrier, senior electrical engineer at<br />
Homes for Haringey, has been extremely<br />
impressed with the system and how it has<br />
performed so far.<br />
“We’ve used the ISM Ultimate door entry<br />
products and the company’s Genesys Control<br />
Room software platform extensively in the<br />
Borough over many years now and have<br />
enjoyed excellent product reliability and<br />
technical support. To improve our efficiency and<br />
give faster responses to our residents we<br />
needed to provide concierge services for all of<br />
our estates. The development of the Entrotec<br />
integration into the Genesys platform allowed<br />
Haringey to combine technology, including<br />
CCTV and fire safety systems, without going to<br />
the expense of replacing legacy door entry<br />
equipment unnecessarily. This delivers a much-
Advertisement Feature<br />
needed saving during what are challenging<br />
economic times for local councils. We now plan<br />
to roll out this system across the rest of the<br />
Broadwater Farm Estate and, potentially, other<br />
sites in the Borough as well.”<br />
Built around intuitive software<br />
ISM’s Stephen Smith firmly believes that this<br />
project is indeed a perfect example of the<br />
flexibility of Genesys and the company’s door<br />
entry system range.<br />
The PSIM software operates as a standalone<br />
platform over LAN or WAN networks for remote<br />
and local sites with workstations that can be<br />
transferred to any operating Security Control<br />
Room on the network. This offers the end user<br />
flexibility when closing down sites or buildings<br />
for off-peak or ‘out of normal hours’ working or<br />
in the unlikely event of any system failures.<br />
Ultimate is a fully-addressable digital<br />
telephone entry system that’s robust in design<br />
and easy to install. Unlike other door entry<br />
systems on the market, it boasts multi-speech<br />
paths that allow numerous conversations to be<br />
had at one time.<br />
Such was the complexity of the project that<br />
from initial design of the system to completing<br />
the installation took around two years.<br />
Importantly for the client, fire alarms, access<br />
control and CCTV systems can all now be<br />
controlled from one computer on Haringey<br />
Council’s network.<br />
Intergrated Security Manufacturing (ISM) in Focus<br />
Intergrated Security Manufacturing (ISM) is the UK’s leading developer of Integrated Security<br />
Management Systems (ISMS), a new generation of solutions that has moved beyond Physical<br />
Security Information Management (PSIM) as the industry knows it.<br />
Established in 1989 and now operating from the company’s extensive manufacturing and design<br />
facility in Sussex, ISM is once again leading the way in how security management technologies<br />
are defined. It’s not just taking PSIM to another level. The company is already there with its ISMS<br />
installed, working and proven on the world stage.<br />
The business’ global client base encompasses many of the world’s most prominent institutions<br />
and includes central and local Government, Critical National Infrastructure concerns, healthcare<br />
establishments, education campuses, shopping centres, financial institutions and law<br />
enforcement agencies.<br />
ISM’s established Genesys platform enables the integration of many types and makes of<br />
equipment including CCTV, DVRs, access control systems, fire alarms, intruder detection alarms,<br />
audio matrix, intercoms, Public Address and paging systems – all from one holistic security<br />
management system.<br />
For further information access the ISM website at www.ism-uk.com<br />
Stephen Smith:<br />
Managing Director of ISM
Access Control: Developments in Biometric Security<br />
Thanks – in no small part – to the magic<br />
conjured up by film producers, directors<br />
and computer graphics specialists resident<br />
in the Hollywood hills, biometrics have become<br />
something of a go-to metaphor for what might<br />
best be described as ‘bleeding edge, bulletproof<br />
security’. It’s easy to see why, too, as<br />
high-tech equipment like iris scanners, for<br />
example, makes for a gripping spectacle within<br />
cinema theatres and on our television screens.<br />
Of late, biometrics based on brain<br />
(electroencephalogram) and heart<br />
(electrocardiogram) signals have emerged. A<br />
research group at the University of Kent led by<br />
Ramaswamy Palaniappan has shown that<br />
people have certain distinct brain and heart<br />
patterns specific to each individual.<br />
This new generation of biometric systems is<br />
called the ‘biometrics of intent’ and aims to<br />
scan intent. The technology will analyse<br />
physiological features such as eye movement,<br />
body temperature and breathing, etc and then<br />
predict dangerous behaviour or hostile intent<br />
before it materialises into physical action.<br />
A recent and detailed report produced by<br />
MarketsandMarkets.com predicts a 17% annual<br />
growth in the gross biometric recognition<br />
systems global market between 2105 and 2022,<br />
from a figure of $10.74 billion to $32.73 billion.<br />
Of this marked increase, fingerprint recognition<br />
technology holds the largest single factor<br />
authentication segment and is predicted to<br />
continue to occupy that pole position for the<br />
foreseeable future.<br />
In light of recent appalling terrorist attacks<br />
across the world, the need for security has<br />
never been greater and, while travel and<br />
immigration will no doubt continue to hold the<br />
largest share of the biometric systems market<br />
(with the USA still the largest customer), the<br />
somewhat less dramatic use of fingerprint<br />
readers across a wide range of sectors is<br />
actually the main driver of growth.<br />
The primary reason for this is that fingerprint<br />
recognition systems are proving to be far more<br />
secure and cost-effective than the traditional<br />
alternatives of numeric key pads or magnetic<br />
swipe cards, rapidly paying for themselves with<br />
a far lower lifetime cost as they require no<br />
additional consumables (such as additional<br />
cards). Nor do they have to be reprogrammed –<br />
as is the case for numeric keypads – should<br />
security be breached at some point.<br />
Probably of more importance to practising<br />
end users is the fact that biometric recognition<br />
systems can help to provide an infallible access<br />
control system that may be used for a variety of<br />
additional purposes once successfully<br />
integrated with suitable software.<br />
In Search of Recognition<br />
The last five years have seen biometrics extricated from the<br />
‘Mission Impossible’ scenario espoused by Hollywood and<br />
dropped squarely into the lives of everyday consumers,<br />
whereupon they’re now fast assuming a central role in the<br />
sphere of digital identity management. Here, Shaun Oakes<br />
explains how biometric recognition devices can offer very real<br />
benefits for today’s practising security and risk managers<br />
A typical example may be a UK Government<br />
Data Centre where various levels of access are<br />
required. To even be considered for such a<br />
contract, of course, the access control system<br />
would have to be Centre for the Protection of<br />
National Infrastructure-approved, while the<br />
readers themselves would have to integrate<br />
seamlessly and provide data for access systems<br />
controlling access points such as turnstiles,<br />
barriers, doors or even computer terminals.<br />
The resultant data can be used not only for<br />
access control and reporting, but also for<br />
personnel records such as payroll. Indeed, this<br />
is particularly useful in the construction and<br />
industrial sectors when a large site will have a<br />
number of sub-contractors in situ in addition to<br />
directly employed personnel. Here, the access<br />
system becomes an effective and vital front end<br />
resource for workforce management.<br />
Accurate and reliable<br />
A biometric lead system will serve to provide<br />
highly accurate and reliable information which<br />
can, with the right software, administer not<br />
only access control, but also time and<br />
Shaun Oakes:<br />
Managing Director of ievo<br />
33<br />
www.risk-uk.com
Access Control: Developments in Biometric Security<br />
attendance, fire roll-call, Health and Safely and<br />
payroll records.<br />
For construction and other industrial sectors,<br />
biometrics can also be used to control access to<br />
plant and other forms of potentially dangerous<br />
equipment whereby only authorised users are<br />
permitted access to keys. By combining key<br />
access systems or secure lockers with<br />
biometric recognition, a potential ultra-secure<br />
system is thereby created that duly safeguards<br />
and tracks the release of specific keys to<br />
specific individuals.<br />
Within other sectors, biometric recognition<br />
systems are gaining market share for other<br />
reasons. Across the education sector, for<br />
example, in addition to access control they’re<br />
being used for controlling free school meals<br />
and even fool-proof library control. Within the<br />
leisure sector, gym operating clients prefer<br />
them to traditional means as they prevent any<br />
fraudulent entry, and thereby potential loss of<br />
income, and rapidly pay for themselves<br />
because a member of staff is no longer required<br />
to verify identities and permit access.<br />
Given the trend for 24/7 access to gyms and<br />
a growing appetite for customer convenience, a<br />
robust access system with biometric control at<br />
its heart can provide plenty of benefits for<br />
members, staff and gym owners alike.<br />
Other sectors have their own access and<br />
security challenges for which reliable biometric<br />
recognition devices are providing solutions. Our<br />
ageing population and increased requirements<br />
for care and support, for example, has led to a<br />
booming care home sector where access<br />
control becomes of paramount importance for<br />
the protection of vulnerable residents,<br />
increasing numbers of whom may well suffer<br />
from dementia or other complex conditions.<br />
Fingerprint readers not only prevent entry to<br />
unauthorised visitors, but can also control exits<br />
for vulnerable residents who may well not be<br />
safe outside unsupervised areas. Other benefits<br />
are restriction of access to expensive medical<br />
supplies as well as dispensary areas. Today,<br />
there are secure cabinets and storage units that<br />
offer integrated biometric security for<br />
controlled and monitored access.<br />
In addition, time and attendance software<br />
integration provides data that supplies realtime<br />
reliable information for payroll, flexi-time,<br />
absenteeism control and holiday planning. The<br />
“Biometric recognition systems can help to provide an<br />
infallible access control system that may be used for a<br />
variety of additional purposes once successfully integrated<br />
with suitable software”<br />
information starts to flow in as soon as the<br />
fingerprint readers are activated and continues<br />
to track staff attendance for whatever purpose<br />
the organisation requires – managing flexi-time<br />
schemes, holiday planning, conformance with<br />
the European Working Time Regulations,<br />
production of payroll information and forecasts,<br />
etc – resulting in both reduced costs and<br />
increased efficiencies.<br />
Biometrics in retail<br />
The retail sector is also benefiting from the<br />
increased levels of security biometric readers<br />
provide for securing stock storage areas and<br />
tracking and managing staff movements.<br />
Given that storing high value or large<br />
quantities of stock is now a routine requirement<br />
for the majority of retail outlets, the security of<br />
such areas is of prime importance. Biometric<br />
readers limit access to purely authorised<br />
personnel, thereby controlling stock and<br />
preventing unwanted pilfering.<br />
When the data’s integrated with time and<br />
attendance software, vital Health and Safety<br />
information is provided should a building<br />
evacuation become necessary. Wholly accurate<br />
payroll data can also be generated.<br />
Integration with alarm equipment is another<br />
development which is becoming increasingly<br />
relevant for both the SME and domestic<br />
markets by providing a single comprehensive<br />
system architecture and peripheral range of<br />
devices, such as CCTV and audible alarms,<br />
managed by biometric control. Intruder alarm<br />
systems can be activated and disarmed by<br />
reading a registered fingerprint. Those systems<br />
may also be extended to relay information used<br />
for a single door access control entry point to<br />
further functionality.<br />
The key here is a blend of convenience and<br />
enhanced security for end users. Numeric code<br />
PINs and fobs can be forgotten, lost or stolen,<br />
but a biometric reading – whether facial or<br />
fingerprint recognition in form – is unique to<br />
that user. Once enrolled, only that end user<br />
may then set or disable the alarm.<br />
Going forward, biometric recognition devices<br />
will continue to replace traditional numeric<br />
keypads and card/fob entry devices primarily<br />
due to the higher levels of security they<br />
provide. Keypads may be accessed by anyone<br />
with the correct data, but biometric recognition<br />
provides a higher level of security which offers<br />
enhanced reliability and greater convenience.<br />
Leading an access control system with<br />
biometric data allows a security infrastructure<br />
to be built that realises the benefits of real-time<br />
data for management specifically catered to an<br />
individual organisation’s needs.<br />
34<br />
www.risk-uk.com
The New Camera Line Mx6 Creates More Possibilities.<br />
More Images, in All Light Conditions, in Every Standard<br />
More Intelligence Is on the Way<br />
The new Mx6 6MP camera system from MOBOTIX offers increased performance.<br />
A frame rate that is up to twice as fast than that of other cameras allows it to capture<br />
quick movements even better and simultaneously deliver sharp images in MxPEG,<br />
MJPEG and, for the first time in H.264, the industry standard. The innovative Mx6<br />
camera line is faster, more flexible and higher-performing, opening up new application<br />
and integration opportunities for to you to meet all requirements.<br />
MOBOTIX AG • Langmeil, Germany • www.mobotix.com
Counter-Terrorism: Hostile Vehicle Mitigation<br />
With the threat level<br />
posed by terrorism in<br />
the UK currently set at<br />
‘Severe’, Alice<br />
Higginson outlines<br />
what can be done by<br />
security professionals<br />
in their bid to protect<br />
crowded places<br />
Alice Higginson:<br />
Marketing and Sales Coordinator<br />
at Bristorm<br />
Protection for the Masses<br />
The nature of recent terrorist attacks – some<br />
of which have involved vehicles being used<br />
as weapons – has resulted in a clear focus<br />
for practising security professionals. When it<br />
comes to general street scenes, crowded and<br />
commercial locations, temporary high-profile<br />
events and Critical National Infrastructure<br />
protection, the attention is necessarily focused<br />
on making thorough site and operational<br />
assessments to identify vulnerable areas and<br />
access points that require solutions appropriate<br />
for mitigating a perceived threat.<br />
The need to protect and secure locations<br />
where the general public are present is<br />
increasing. This puts more pressure on security,<br />
risk and facility managers, architects and<br />
project engineers alike. Considering the<br />
integration of Hostile Vehicle Mitigation (HVM)<br />
systems prior to the development of any new or<br />
existing site is crucial if appropriate defence<br />
measures are to be implemented.<br />
The standards associated with HVM systems<br />
are still not immediately recognised by the<br />
wider industry, often making it difficult for the<br />
necessary solutions to be specified and<br />
implemented. Alongside this, it’s important to<br />
recognise the external factors that may prevent<br />
appropriate HVM from being procured, such as<br />
cost, aesthetics, operational processes,<br />
controlling pedestrian flow and enabling access<br />
routes for maintenance and Emergency<br />
Services vehicles and personnel.<br />
Specific HVM solution manufacturers are now<br />
delivering technical presentations to<br />
architectural practises around the UK. This is a<br />
concept soon to be supported by the Perimeter<br />
Security Suppliers Association. There’s a<br />
limited understanding of the standards<br />
associated with HVM, but these presentations<br />
have allowed manufacturers to grasp the<br />
aesthetic requirements architects and project<br />
engineers have in mind when working on<br />
particular schemes. As a result, subtle,<br />
sophisticated and unique designs have been<br />
developed that will not compromise the overall<br />
performance rating of the HVM system.<br />
Mitigating the threat<br />
Limited understanding may result in the<br />
installation of unsuitable HVM systems,<br />
meaning that a perceived threat will not be<br />
mitigated. Other factors may include cutting<br />
costs on the system required, incorrect<br />
installation that’s non-compliant with BSI PAS<br />
69 or IWA 14-2, a limited or lack of knowledge<br />
on the system required or that an insufficient<br />
site assessment was performed.<br />
Integrating aesthetics and HVM products will<br />
hopefully build a crucial bridge between<br />
manufacturers, architects, end clients, project<br />
engineers and the local Counter-Terrorism<br />
Security Advisors working on one particular<br />
project, therefore reducing the need to cut<br />
corners by installing inappropriate or untested<br />
HVM solutions.<br />
The Centre for the Protection of National<br />
Infrastructure has sponsored the development<br />
of BSI PAS 170, a Publicly Available<br />
Specification that describes an efficient way of<br />
testing the performance of a single bollard<br />
when hit by a 2,500 kg vehicle at low speed.<br />
BSI PAS 170 provides a quick, inexpensive<br />
and proportionate way of evaluating bollards<br />
that will be installed in a car park or retail<br />
outlet and typically be hit accidentally by a low<br />
speed passenger vehicle or a vehicle criminal at<br />
approximately 10 or 20 mph. BSI PAS 170-<br />
tested Stopper Bollards are currently the only<br />
systems commercially available in the UK, but<br />
they provide end clients, architects and project<br />
engineers with a cost-effective and reliable<br />
alternative when higher security solutions<br />
tested to BSI PAS 68 or its equivalent are not<br />
deemed to be essential.<br />
Most technical presentations focus on the<br />
HVM systems commercially available in the UK<br />
and the standards associated with these<br />
products, including the aforementioned BSI<br />
PAS 68, BSI PAS 170, IWA 14-1 and ASTM<br />
F2656-7/15. Testing procedures, compliancy<br />
and installation guidelines (BSI PAS 69 and IWA<br />
14-2) are also discussed throughout to ensure<br />
that any HVM product may be accurately<br />
incorporated within all drawings and plans<br />
prior to beginning the procurement process.<br />
36<br />
www.risk-uk.com
Manufacturing X-ray Machines<br />
in the UK since 1950<br />
Call or Email to claim your<br />
FREE THREAT ASSESSMENT<br />
and advice on your direct and associated risks by the UK’s<br />
leading manufacturer of high end security x-ray machines<br />
01480 832202<br />
www.toddresearch.co.uk<br />
xray@toddresearch.co.uk
Counter-Terrorism: Physical Security Solutions<br />
Further reinforced by a<br />
lack of Government<br />
investment in safety<br />
measures such as the<br />
police service itself, it<br />
has now become<br />
increasingly important<br />
for organisations to<br />
invest in their own<br />
security solutions.<br />
That investment is<br />
absolutely vital. Here,<br />
Anton Pieterse<br />
outlines precisely why<br />
Anton Pieterse:<br />
Managing Director of Safetell<br />
The Steadfast Approach<br />
Look around you. The world is changing...<br />
and fast. We once dreamed about the year<br />
‘2017’ and a far-flung future with flying<br />
cars, self-tying shoes and pill-sized dinners. In<br />
reality, 2017 has become something much<br />
bleaker. With rising levels of crime and terror,<br />
especially in densely populated locations such<br />
as shopping malls and stadiums, and austerity<br />
continuing to create divides, the protection of<br />
citizens is now as important as it has ever been.<br />
A cost-effective security plan can be<br />
produced by analysing the benefits of a<br />
security solution and confirming if the cost is at<br />
least equal to that of the protected assets,<br />
while also considering the additional costs that<br />
might be incurred due to an incident. The<br />
potential risks and costs can range from loss of<br />
business during the investigation to<br />
replacement costs, loss of reputation, potential<br />
injury/stress and overall downtime.<br />
Last year, the British Retail Consortium<br />
reported a staggering 40% increase in violence<br />
and abuse against staff working in retail<br />
positions, highlighting an obvious rise in those<br />
who believe they can conduct crime and exhibit<br />
aggression as they do so. This increase in<br />
violence has occurred even though the number<br />
of CCTV systems increases year-on-year. That<br />
begs the question as to how effective CCTV<br />
really is in reducing incidents of violent crime.<br />
One of the common misconceptions when<br />
first developing a security solution alongside a<br />
security audit is to focus on electronic security,<br />
such as CCTV, that provides greater surveillance<br />
and networked benefits. However, as noted in a<br />
study by the UK’s College of Policing when<br />
reviewing 41 studies about the effectiveness of<br />
CCTV, successful usage is only found through<br />
significant investment in constant, well-staffed<br />
live monitoring stations with the efficient<br />
deployment of security personnel to locate,<br />
identify and capture aggressors.<br />
The study found that, overall, CCTV can<br />
reduce crime in a certain area by dint of<br />
displacement to neighbouring areas.<br />
The most significant finding in the study is<br />
that there was no evidence of an effect on<br />
violent crime. CCTV is considered a type of<br />
‘formal surveillance’ that can benefit a security<br />
team in terms of visibility, but can only actively<br />
prevent crime when working with an effective<br />
and often costly deployment team.<br />
CCTV is seen to be significantly more<br />
successful when combined with other deterrent<br />
and intervention methods in the form of<br />
physical security.<br />
Deter and defend<br />
Physical security has the ability to deter and<br />
defend through a series of target-hardening<br />
solutions, such as installing attack-resistant<br />
screens on counters, doors, walls and windows<br />
within a premises. Physical security solutions<br />
can deter attackers and protect staff in the<br />
absence of a reaction team that could deal with<br />
the matter, while also still providing hardened<br />
resistance to the assets protected within.<br />
The ability exists to design and construct<br />
physical security products to exact<br />
requirements, allowing for protection against<br />
high intensities of fire, manual attack, bullet<br />
attacks and even blast explosion, providing<br />
protection for secure environments – such as<br />
retail counters, Data Centres and banks – from<br />
some of the most violent physical attacks.<br />
Counter-terrorism solutions come in all forms<br />
and for all environments. They often require<br />
bespoke elements to be designed and installed<br />
for seamless integration. As a general rule in<br />
security, no standard is fit for all applications.<br />
Plenty of great physical security and electronic<br />
solutions can exist and work successfully, but<br />
an ideal strategy for one environment doesn’t<br />
necessarily translate exactly to another.<br />
Indeed, bespoke installations and physical<br />
security systems have risen in prominence,<br />
allowing for organisations to gain a full counterterrorism<br />
solution for their exact working<br />
practices at specification stage.<br />
In today’s world, there’s one statement that<br />
rings very true indeed: no business security<br />
means your business is at risk.<br />
38<br />
www.risk-uk.com
Counter-Terrorism: Security Screening Best Practice<br />
Security screening<br />
checks are<br />
commonplace when<br />
members of the public<br />
attend events and are<br />
now increasingly<br />
being conducted at<br />
high-profile buildings.<br />
Once upon a time<br />
those checks were<br />
considered a<br />
nuisance, or at best a<br />
necessary<br />
inconvenience, but<br />
people now<br />
understand the<br />
important role they<br />
play as a deterrent<br />
and as part of a wider<br />
security solution.<br />
Jason Wakefield<br />
examines Best<br />
Practice procedures<br />
Jason Wakefield: Sales<br />
Director at Todd Research<br />
Be Seen to Screen<br />
Screening people and their belongings at<br />
entry points can help reduce the likelihood<br />
of explosive devices, weapons and other<br />
prohibited items being brought into buildings<br />
or on to sites. Similarly, searching personnel as<br />
they exit can assist in reducing the risk of the<br />
unauthorised removal of items and/or sensitive<br />
company information.<br />
When designing a security checkpoint, the<br />
first port of call should be the PAS 127<br />
guidelines. PAS 127:2014 is the first publication<br />
of its kind to present guidance on good practice<br />
for checkpoint security screening of people and<br />
their belongings. Commissioned by the Home<br />
Office’s Centre for Applied Science and<br />
Technology, its development was facilitated by<br />
the British Standards Institution with input<br />
from a panel of industry experts.<br />
The level of risk is an important factor to<br />
consider before any implementation of<br />
screening. Measures must be appropriate to<br />
minimise any potential risk, but excessive<br />
measures will result in unnecessary expense<br />
and use of staff and space and are likely to<br />
interfere with normal functioning of the site.<br />
Consideration should be given to the<br />
different groups of individuals entering the<br />
premises. Given differing risk profiles, it may be<br />
appropriate for some individuals to undergo<br />
different screening regimes.<br />
Once an assessment of risk has been made,<br />
it’s then time to decide what equipment is<br />
needed. Sometimes the risk can be so low that<br />
only random bag searches are required.<br />
However, if screening machines are demanded,<br />
it’s important to calculate the anticipated level<br />
of screening (eg the number of people expected<br />
to be screened per day and the amount of time<br />
available to clear each person).<br />
The screening process should exert the<br />
minimal impact possible on daily business<br />
activities. External security consultants can be<br />
useful in helping to calculate requirements at<br />
this planning stage and then determine the<br />
type of equipment required on site.<br />
Checkpoint location<br />
The location for the screening checkpoint is<br />
extremely important. It should be on the<br />
perimeter of the establishment and in an area<br />
free from any interference that might be due to<br />
metallic objects. An ‘Area of Declaration’ will<br />
need to be established where pockets can be<br />
emptied, shoes and belts taken off and<br />
prohibited items removed.<br />
A well-laid out, ‘obvious flow’-style queueing<br />
system should be put into place. Once bags<br />
and contents are placed on the x-ray conveyor,<br />
visitors should then proceed to a search area<br />
where the potential presence of metals or<br />
explosives can be checked by dint of security<br />
staff using either walk-through or specialist<br />
trace detection equipment.<br />
When selecting a walk-through metal<br />
detector, a multi-zone technology detector will<br />
increase screening efficiency and cut operating<br />
costs. Multi-zones of detection allow the exact<br />
location of any concealed item to be<br />
pinpointed. As a direct result, security<br />
personnel can immediately target the object<br />
that served to create the alarm.<br />
Hand-held metal detection wands should<br />
also be used as a secondary confirmation tool<br />
for pinpointing any positive alarms.<br />
It’s important that x-ray and metal detection<br />
system operators are fully-trained in the use of<br />
the units and how to look for prohibited items.<br />
Importantly, this training should be regularly<br />
updated to ensure members of staff are always<br />
aware of all new and emerging threats and<br />
detection methods.<br />
Finally, all procedures should be captured,<br />
reviewed and regularly updated.<br />
Due to increased security threats, screening<br />
looks set to become an ever-more present<br />
process in our everyday lives. It’s important to<br />
keep those being screened onside and<br />
understanding of the need. To achieve this,<br />
screening operations must be effective and<br />
efficient in order to minimise the impact on<br />
people as far as possible. Initiatives such as the<br />
PAS 127 guidelines, the continuously improving<br />
technology that underpins screening and<br />
detection equipment and well-trained security<br />
personnel will be the keys to success.<br />
40<br />
www.risk-uk.com
Counter<br />
Terror<br />
specifications<br />
30 Years of Security Excellence<br />
bespoke<br />
to your<br />
requirement<br />
Find a bespoke and personalised solution to fit your<br />
organisational requirements, specified with help from our<br />
security experts.<br />
Our physical security solutions can provide protection for<br />
buildings, staff and assets across a variety of manual, bullet and<br />
blast resistant specifications in the form of counters, security<br />
doors, security screens/windows and walls.<br />
Building Security + Staff Protection<br />
Asset Protection<br />
Find your solution at...<br />
Safetell.co.uk<br />
Specification to Installation<br />
We are fully accredited...<br />
+44 (0)1322 223<br />
www.safetell.co.uk<br />
sales@safetell.co.uk
A Touch of Retail Security Therapy<br />
As part of an ongoing<br />
commitment aimed at<br />
redefining the role of<br />
the retail security<br />
operative, Cardinal<br />
Security and<br />
Amberstone (part of<br />
The Cardinal Group)<br />
are working in<br />
partnership with<br />
Dixons Carphone on a<br />
strategy that<br />
combines skilled<br />
personnel with<br />
electronic surveillance<br />
and reporting<br />
systems. Risk UK<br />
examines the<br />
outcomes already<br />
achieved to date<br />
42<br />
www.risk-uk.com<br />
When Dixons and Carphone Warehouse<br />
completed a £3.9 billion merger back in<br />
2014, the deal integrated two wellknown<br />
High Street names to create what is now<br />
one of Europe’s largest electrical and<br />
telecommunications retailers. Renamed Dixons<br />
Carphone, the company has interests across<br />
the continent and is one of the UK’s last<br />
remaining large-scale businesses of its kind<br />
with a bricks and mortar presence.<br />
Online shopping, home delivery and ‘Click<br />
and Collect’ have now become commonplace.<br />
According to the Office for National Statistics,<br />
the value of online sales increased by 8.9% in<br />
March 2016 compared with March 2015. The<br />
‘omnichannel’ is now firmly established and<br />
means that traditional High Street stores need<br />
to adapt their approach to attract customers.<br />
Dixons Carphone is at the forefront of this<br />
process and, early on this year, the company’s<br />
CEO Seb James announced his aspiration to<br />
“reinvent retail as we know it”. In order to<br />
revolutionise the shopping experience, Dixons<br />
Carphone has now brought its Currys, PC World<br />
and Carphone Warehouse brands together<br />
under one roof at its 3-in-1 stores.<br />
The company’s 3-in-1 megastore at Hedge<br />
End in Southampton, which opened in<br />
September 2015, is truly the shape of things to<br />
come. It boasts a number of innovative<br />
features, with smaller, interactive exhibits that<br />
are designed to draw people in. For example,<br />
the vacuum cleaner section has three types of<br />
flooring such that customers can try out which<br />
device would work best for their home. In the<br />
audio section, shoppers can switch the music<br />
between different speakers, while headphones<br />
are displayed in such a way that allows<br />
consumers to be hands-on and compare and<br />
contrast what’s on offer.<br />
Every element of the store’s design and<br />
layout has been analysed, scrutinised and<br />
reconfigured to offer customers the best<br />
possible experience and increase sales.<br />
A key part of this new retail process is the<br />
way in which security and loss prevention are<br />
being approached. In point of fact, it’s<br />
something that has proven to be just as radical<br />
as the store concept itself.<br />
Moving the mindset<br />
Cardinal Security had worked closely with<br />
Carphone Warehouse for a number of years and<br />
now operates with Dixons Carphone across all<br />
of its outlets. For Simon Chapman, Cardinal<br />
Security’s CEO, the Hedge End store is an<br />
exemplar of how retail security needs to be<br />
approached in the modern age.<br />
“There has been a distinct reluctance, or an<br />
inability, to move on from the ‘cops and<br />
robbers’ mindset that has prevailed for<br />
decades,” stated Chapman. “However, we’re<br />
now beginning to witness a massive change in<br />
the way that retailers operate. We’ve worked<br />
closely with Dixons Carphone’s loss prevention<br />
team in order to introduce a new intelligent<br />
guarding model that does away with the<br />
customer denial approach and, instead, actively<br />
integrates the duties of a security officer with<br />
technology, electronic systems and the allimportant<br />
data they produce.”<br />
The store employs a covert security specialist<br />
in the form of Dan McKee (pictured, left). Asked<br />
to explain how his role differs from that of a<br />
typical security officer, McKee responded: “I<br />
adopt a customer service-based method to<br />
deter theft. For example, I’ll approach store<br />
visitors and ask them whether they need any<br />
help in a polite and friendly manner. Genuine<br />
customers love this approach but, for obvious<br />
reasons, potential thieves hate it. Furthermore,<br />
the store encourages a culture whereby all staff<br />
are part of the security and loss prevention<br />
team. I work closely with all staff members and<br />
offer specific guidance in this area.”<br />
CCTV in the retail space<br />
CCTV has been used in retail outlets for<br />
decades, of course. However, far from being<br />
considered a proactive tool, it has been used<br />
retrospectively, often when it’s too late and
Retail Security and Loss Prevention: Dixons Carphone Case Study<br />
stock has been stolen or the barriers at the<br />
front of the store have been activated and the<br />
offender is long gone.<br />
To help him do his job, McKee has real-time<br />
remote access to the in-store CCTV system via a<br />
tablet, which he can use to study customer<br />
behaviour, while analytics platforms provide<br />
direct alerts about any suspicious behaviour,<br />
such as someone being in a particular area<br />
longer than is considered usual.<br />
Suzanne Borg (project manager in the Group<br />
Loss Prevention Department at Dixons<br />
Carphone) observed: “Having products on open<br />
display brings with it certain security concerns<br />
that we’re addressing through the use of<br />
sophisticated technology. Customers want to<br />
touch and experience products. They no longer<br />
wish to see them locked down or behind<br />
cabinets, so we have to accommodate their<br />
desires. However, this brings with it increased<br />
risk, so early warning technology is absolutely<br />
central to mitigating any risk and thwarting<br />
those with criminal intent in mind.”<br />
As a result, Amberstone’s smart shelves have<br />
been installed. When product is picked up,<br />
McKee receives an alert via a headset, directing<br />
him to the area and product concerned, while<br />
specific items – such as vacuum cleaners – have<br />
tags attached that also relay information. As<br />
well as significantly reducing losses, this allows<br />
McKee to play a key role in the customer<br />
experience, in turn helping the host retailer to<br />
sell more and lose less.<br />
Organised shoplifting<br />
Organised shoplifting gangs are a major<br />
concern for retailers. Groups of professional<br />
thieves now travel the length and breadth of<br />
the country to steal products which they can<br />
then sell on. To combat this problem, Dixons<br />
Carphone employs electronic technologies such<br />
as ANPR and facial recognition that identify<br />
known vehicles or offenders.<br />
“The profiling of individuals and their<br />
behaviour is crucial in order to recognise the<br />
difference between good and bad customers,”<br />
explained McKee. “With the use of data sharing<br />
and analytical tools, we can share information<br />
and allow ad hoc tasks to be added centrally<br />
from regional field or head office teams, while<br />
also ascertaining exactly which products are<br />
being targeted. We use the analysis of online<br />
auction sites and recent store thefts to profile<br />
the risk against the year, month or day to gain a<br />
better understanding of when thieves are most<br />
likely to strike.”<br />
Given that he’s a vital part of the senior<br />
management team at the store, Cardinal<br />
Security has provided McKee with<br />
investigaton, evidence gathering and statement<br />
writing training (the latter used within morning<br />
briefings). Dixons Carphone staff are made<br />
aware of any current risks and work very much<br />
as part of a team. This holistic approach to<br />
security is highly effective and deters both<br />
organised and opportunist offenders.<br />
Return on investment<br />
Like all other aspects of modern retailing, the<br />
security function at Dixons Carphone has to<br />
deliver a return on investment. Suzanne Borg<br />
commented: “Part of Dan’s job is to use the<br />
technology-based tools at his disposal to<br />
constantly assess risk and report back. Data<br />
provides a clear picture of the cost of his<br />
employment and what he returns. This is<br />
measured through shrink reduction, assistance<br />
in increased sales, greater staff safety and a<br />
focus on stock loss reduction. This dynamic<br />
approach builds a comprehensive risk model<br />
and creates decision-making and business<br />
rules out of the back of it.”<br />
The new store concept, combined with such<br />
an innovative approach to security and loss<br />
prevention, has already enjoyed some notable<br />
successes. The sale of high risk products,<br />
including headphones, increased in the first<br />
year of opening, while McKee was directly<br />
involved with the arrest of an organised gang<br />
leader who was subsequently sentenced to two<br />
years in prison.<br />
Onwards and upwards<br />
These are good times for Dixons Carphone,<br />
which saw its trading over Christmas 2016 beat<br />
all forecasts as the business reported its fifth<br />
consecutive year of growth. As the company<br />
continues to redefine its retailing strategy, it’s<br />
plainly obvious the key role that cutting-edge<br />
security techniques will play in its ongoing<br />
success are very much to the fore.<br />
“Dan McKee is the embodiment of the<br />
modern security officer and absolutely integral<br />
to what our company is doing at the Hedge End<br />
store,” concluded Suzanne Borg. “As a<br />
dedicated security solutions provider, Cardinal<br />
Security is clearly able to develop security<br />
operatives who are confident, articulate and<br />
technologically savvy in their work. It’s<br />
precisely this type of approach that the modern<br />
retailer must look to embrace as part of a<br />
successful loss prevention strategy.”<br />
“We use the analysis of online auction sites and recent store<br />
thefts to profile the risk against the year, month or day to<br />
gain a better understanding of when thieves might strike”<br />
43<br />
www.risk-uk.com
Healthcare Sector Security: Body-Worn Cameras<br />
With NHS Protect<br />
reporting that assaults<br />
on NHS staff in<br />
England are up by<br />
around 5% year-onyear<br />
(67,864 assaults<br />
in 2014-2015 versus<br />
70,555 in 2015-2016),<br />
NHS Trusts are doing<br />
what they can to<br />
improve the safety of<br />
employees and<br />
patients alike. Herman<br />
Vermaak explains how<br />
body-worn cameras<br />
are now ably assisting<br />
security personnel<br />
Herman Vermaak:<br />
Managing Director of B-Cam<br />
Security’s Watching Brief<br />
It seems almost beyond belief that someone<br />
could launch an attack on a healthcare<br />
professional trying to help people in need,<br />
but that’s one very grim reality of Britain in the<br />
21st Century. During 2015-2016, NHS staff in<br />
England reported more than 70,000 assaults,<br />
equating to 53 instances per 1,000 workers.<br />
Staggeringly, criminal sanctions were brought<br />
on only 1,740 occasions. Many of our NHS<br />
Trusts have simply had enough, and are now<br />
turning towards technology to lend them a<br />
helping hand with prevention measures.<br />
The use of body-worn cameras is on the rise.<br />
Security officers at Guy’s and St Thomas’ in<br />
London wear such devices in an effort to halt<br />
abuse and violent behaviour from patients.<br />
These ‘bodycams’ act as a visible deterrent to<br />
those who may be intent on causing harm, and<br />
also serve as a trusted source of evidence<br />
should any incident occur.<br />
At Guy’s and St Thomas’, staff had seen a<br />
surge in violent behaviour, particularly towards<br />
nurses and other front line employees. Between<br />
April and September last year, a total of 850<br />
incidents were recorded (up 27% on the same<br />
period in 2015, when 620 were recorded).<br />
Dame Eileen Sills, chief nurse at Guy’s and St<br />
Thomas’, said: “At times, our staff and patients<br />
have felt threatened and intimidated by a small<br />
number of fellow patients and visitors. We want<br />
to send a clear message to people that our staff<br />
are here for them. Please let them do their jobs<br />
safely. Any unprovoked violence and aggression<br />
towards staff is unacceptable. If people do<br />
abuse our staff we will take robust action and<br />
pursue them through the courts.”<br />
The cameras being used by security<br />
personnel only operate when activated, and are<br />
therefore not inappropriately recording<br />
personal and protected data. Once activated, a<br />
light on the camera ensures those being filmed<br />
are also aware that recording is taking place.<br />
Jayne King, head of security and site services<br />
at Guy’s and St Thomas’, said: “We’ve taken<br />
this step to assure our staff of their safety and<br />
send a message to people who are violent or<br />
abusive on Trust premises that these recordings<br />
will be used to bring them to justice.”<br />
The devices employed at Guy’s and St<br />
Thomas’ have a tamperproof design, meaning<br />
that data cannot be removed from them. The<br />
devices cannot be easily destroyed, thereby<br />
protecting the chain of evidence.<br />
Any patient or service user information that’s<br />
recorded is secure and inaccessible without the<br />
relevant software to download the video and<br />
audio recordings.<br />
Support from the police<br />
Body-worn cameras are supported by the<br />
police. Superintendent Roy Smith of the<br />
Metropolitan Police Service explained: “We<br />
respond to any assaults on NHS staff very<br />
seriously indeed. Body-worn cameras act as an<br />
excellent deterrent and provide really good<br />
evidence for us to bring offenders to justice.<br />
They capture evidence really early on, so the<br />
likelihood of us securing a guilty plea at an<br />
early stage in proceedings is increasing.”<br />
Smith went on to comment: “If there’s any<br />
sort of violence perpetrated, people can see<br />
instantly that they’re being recorded on bodyworn<br />
video. Our experience and evidence<br />
suggests this immediately de-escalates a<br />
number of situations.”<br />
Body-worn camera technology is also being<br />
used at Princess Royal University Hospital in<br />
Orpington, Kent. Security manager Len Jeffrey<br />
told Risk UK: “My security staff were called to<br />
an urgent and violent incident on a ward as a<br />
visitor was being abusive towards staff and<br />
patients. On seeing security with a body-worn<br />
camera, the male immediately calmed down<br />
and co-operated, thereby preventing the<br />
escalation of his anti-social behaviour”.<br />
The challenges facing 21st Century<br />
healthcare professionals are substantial<br />
enough in extent without them having to be<br />
constantly concerned about their physical wellbeing.<br />
The number of attacks on staff is rising,<br />
but the number of those convicted remains low.<br />
The application of secure body-worn camera<br />
technology can provide vital reassurances and<br />
enhance the safety of all those who work in this<br />
critically important sector.<br />
44<br />
www.risk-uk.com
Smart, Integrated,<br />
Security Solutions<br />
Easy access control<br />
from Paxton<br />
Leading<br />
• Market leaders, over 30 years experience<br />
Integrated<br />
• IP ready solutions integrating with<br />
CCTV, door entry, intruder & fire alarms<br />
Support<br />
• Free design & specification help and advice<br />
Scalable<br />
• Access control and door entry systems for<br />
a variety of sites<br />
Want to know more?<br />
Visit: paxton.info/2973<br />
Easy to specify Easy to fit Easy to deal with
Healthcare Sector Security: Access Control Solutions<br />
Healthcare facilities<br />
have numerous assets<br />
that need to be<br />
protected from theft or<br />
damage, while staff,<br />
patients and visitors<br />
must be kept safe at<br />
all times. Gareth<br />
O’Hara explains why<br />
networked access<br />
control is an ideal<br />
security solution<br />
Gareth O’Hara:<br />
Chief Sales Officer at Paxton<br />
Living Life On The Network<br />
Healthcare security is one of the most<br />
complex of security functions. The<br />
National Health Service takes security<br />
very seriously indeed. Patients need to be kept<br />
safe while in hospital, so at all times access<br />
must be limited to those people with a genuine<br />
reason to be on hospital premises.<br />
Electronic access control can provide an<br />
efficient and convenient way of offering secure,<br />
flexible and cost-effective building access<br />
management. It allows people to move freely<br />
around a facility while also permitting specific<br />
areas (for example, an operating theatre or the<br />
pharmacy) to be managed with higher security<br />
where required.<br />
Using IP technology, access control systems<br />
can connect directly to the building’s network.<br />
The beauty is that you don’t need to be an IT<br />
expert to make the most of ‘IP ready’ access<br />
control. It’s simple and straightforward to<br />
manage and, if you’re looking to extend<br />
building security beyond access control, it’s<br />
also possible to integrate it with a range of<br />
third party systems including CCTV, biometrics,<br />
fire systems and intruder alarms.<br />
There are a range of solutions available. On<br />
that basis, it’s important to ask the right<br />
questions when discussing security<br />
requirements with your installer and/or<br />
consultant in order to ensure the solution<br />
matches defined needs. Systems can vary in<br />
type, from a secure barrier in the car park<br />
through to a video entry system at a visitor<br />
entrance or an external door with hands-free<br />
access and on to an integrated solution with<br />
CCTV and intruder alarm systems.<br />
Total convenience<br />
If you’re thinking about improving the security<br />
of a healthcare facility with an electronic access<br />
control system, there are several ‘essentials’ to<br />
bear in mind.<br />
Networked access control has several<br />
benefits over using traditional locks and keys,<br />
with an important factor being that numerous<br />
security functions can be centrally and<br />
conveniently managed via a PC. This can control<br />
the flow of people around a building and<br />
restrict who has access to its various zones.<br />
Unlike keys, electronic access control tokens<br />
can easily be barred from the system if they’re<br />
lost, stolen or not returned by staff or visitors.<br />
High security options are available via<br />
specific applications to add an extra layer of<br />
protection if needed for certain designated<br />
areas of a building.<br />
Biometric integration includes fingerprint,<br />
facial recognition and retinal scanners which<br />
use the unique biological characteristics of an<br />
individual to confirm access. Multi-factor<br />
authentication means that a given end user<br />
would have to present an access token in<br />
addition to entering a PIN to gain entry.<br />
Access control software can be used as an<br />
effective HR and administration tool, providing<br />
easy time and attendance reporting. By<br />
allocating specific token readers for clocking in<br />
and out, the software can be used to log the<br />
working hours of employees. It can also note<br />
periods of time that staff or contractors are<br />
absent for reasons such as holidays and unpaid<br />
leave. Reports can then be exported for use<br />
with a variety of HR applications.<br />
Cost-effective solutions<br />
There are multiple opportunities where an<br />
access control system can be used to help save<br />
money. For example, switching utilities on or off<br />
automatically when a user presents their<br />
electronic token/card provides a convenient<br />
service that businesses can use effectively.<br />
With some access control software solutions,<br />
system administrators can easily create rules to<br />
grant varying permissions to different users. For<br />
example, this might be used to assist in<br />
meeting Health and Safety requirements,<br />
prevent untrained staff from operating certain<br />
machinery or stop people from accessing<br />
restricted areas, in turn reducing the potential<br />
risk of accidents involving staff and/or visitors.<br />
46<br />
www.risk-uk.com
Healthcare Sector Security: UHEI 2017 Event Preview<br />
Where Education Meets Healthcare<br />
Following on from the<br />
huge success of the<br />
inaugural University<br />
and Healthcare<br />
Estates and<br />
Innovation Conference<br />
and Exhibition last<br />
year, organiser Ascent<br />
Events has mapped<br />
out an even bigger<br />
and bolder<br />
programme for 2017<br />
that runs over two<br />
days at the University<br />
of Birmingham on 14<br />
and 15 November.<br />
Brian Sims previews<br />
the content on offer<br />
for delegates<br />
*To learn more about UHEI<br />
2017 and register your<br />
attendance, access the<br />
event’s dedicated website at<br />
www.ascentevents.co.uk/<br />
uhei-birmingham-2017.php<br />
48<br />
www.risk-uk.com<br />
The similarities and distinct parallels<br />
between the higher education and<br />
healthcare sectors are striking. Both<br />
manage large, complex and demanding sites.<br />
Both manage compliance, deliver projects and<br />
control diverse property portfolios. The two<br />
worlds tackle many of the same issues, use<br />
many of the same suppliers and procure,<br />
construct and maintain at scale.<br />
Bearing this in mind, the University and<br />
Healthcare Estates and Innovation (UHEI) event<br />
– for which Risk UK is an Official Media Partner<br />
– offers a unique opportunity for security and<br />
risk management practitioners to meet and<br />
hear from sector experts, network and share<br />
solutions and experiences.<br />
Designed to build upon 2016’s highly<br />
successful inaugural gathering, the fervent<br />
hope is that this year’s event will lead to even<br />
closer future collaboration between the sectors<br />
by stimulating opportunities for shared<br />
thinking and mutual benefits.<br />
Last year, upwards of 50 separate NHS Trusts<br />
and more than 30 universities visited the event,<br />
while over 250 visitors attended on the day<br />
itself. The quality of the attendees was very<br />
high, with large numbers visiting from the NHS<br />
and education sectors including security,<br />
facilities and operations-based professionals.<br />
Run in partnership with AUDE, UHEI 2017 is<br />
supported by ASIS International’s UK Chapter,<br />
the British Institute of Facilities Management,<br />
BESA, BIM4 Health, Brighton and Sussex<br />
University Hospitals NHS Trust, The Carbon &<br />
Energy Fund, Carbon Trust, CIC, Digital 2 All, the<br />
University of Birmingham, the University<br />
Hospitals of North Midlands NHS Trust and the<br />
University of Liverpool.<br />
This year’s exhibitors are Built Off-Site,<br />
Clarke Energy, Clearview Intelligence, Cortech<br />
Developments, Ecophon, Estate Strategy Group,<br />
Extraspace Solutions, Fusion, Healthcare<br />
Estates and Facilities, HJA Recruitment, Hydrop,<br />
IHEEM, Jewson, Integrated Environmental<br />
Solutions, Langley Design, Micad, MWA<br />
Technology, Paxton, PPL Training, SFG20, Shire<br />
Controls, Smart Environmental Products,<br />
Synapsis and Search Higher.<br />
Conference programme<br />
Day One of conference on Tuesday 14 November<br />
is kick-started by a welcoming address from<br />
Trevor Payne (director of estates at the<br />
University of Birmingham), who informed Risk<br />
UK: “We’ve put together a timely, relevant and<br />
comprehensive educational programme.”<br />
From 9.30 am until 10.00 am, the focus is on<br />
collaboration and innovation, with Simon<br />
Corben (director and head of profession at NHS<br />
Estates and Facilities) at the lectern. This<br />
presentation is followed by perspectives from<br />
AUDE and IHEEM (for whom the latter’s<br />
chairman Pete Sellars is the speaker).<br />
In the wake of coffee and networking, IHEEM<br />
CEO Julian Amey chairs a session running from<br />
11.35 am until noon, during which Andrew<br />
Burgess (deputy chief operating officer at<br />
Loughborough University) offers his thoughts<br />
on the potential impacts of Brexit upon the<br />
Higher Education estate.<br />
Prior to luncheon, there’ll be detailed<br />
presentations from Kevin Oxley (director of<br />
estates, procurement and ICT at South Tees<br />
NHS Foundation Trust) and Steve Banister<br />
(managing director of Northumbria Healthcare<br />
Facilities Management) on – respectively –<br />
property management and an alternative<br />
delivery model for E&F services within the NHS.<br />
The afternoon session from 2.40 pm through<br />
until 3.20 pm concentrates on campus<br />
masterplanning in the education sector, with<br />
one of the presentations being made by Karen<br />
Johnson (operations director at University<br />
Hospital in Birmingham).<br />
Emergency preparedness<br />
On Day Two of conference, the pre-luncheon<br />
sessions should be of particular interest for<br />
practising risk and security management<br />
professionals. Between 12.45 and 1.00 pm,<br />
Ashley Kirby (policy and planning advisor at the<br />
University of Aberdeen) looks at this topic from<br />
the Higher Education perspective, with Anthony<br />
Searle (commercial manager at access control<br />
solutions specialist Paxton) delivering his<br />
thoughts on the matter from the point of view<br />
of NHS Trusts and hospitals.<br />
From 3.35 pm until 3.50 pm, ‘Sharing<br />
Processes and Resources: How a Common<br />
Process Can Work for Disparate Organisations’<br />
is the subject of John Scarry’s presentation.<br />
Scarry is business excellence manager at<br />
Medirest (part of Compass Group).<br />
Conference closes at 4.20 pm with a<br />
summary of the two days delivered by Robert<br />
McNamara MBIFM (director at Capitec).
Advertisement Feature<br />
Inner Range’s Integriti: Encrypted High Security<br />
Inner Range’s Integriti Encrypted High<br />
Security system witnesses the company add<br />
a new level of security to the current product<br />
range. This latest offering is certain to attract<br />
serious consideration from Government<br />
departments and Critical National Infrastructure<br />
projects as well as those commercial end users<br />
who are serious about hardening their<br />
dedicated security system communications.<br />
From a technical standpoint, Inner Range’s<br />
Integriti Encrypted High Security system offers<br />
end-to-end encryption of access control and<br />
alarm points, in turn providing many features<br />
previously required by installations in the high<br />
security sector at an affordable cost.<br />
Fundamentally, the Encrypted High Security<br />
system includes encrypted communications<br />
from sensor to controller and on to keypad and<br />
reader. Up until now, organisations requiring<br />
encryption of all parts of an integrated access<br />
and security system had very limited choices.<br />
The way in which Inner Range’s Encrypted<br />
High Security system works is that the<br />
company’s End of Line Modules (ELM) are<br />
embedded into third party PIRs, reed switches<br />
or other security-related input devices. The ELM<br />
is wired into such an input device, handles<br />
tamper and alarm conditions and connects via<br />
an encrypted RS-485 serial connection to a<br />
special Encrypted High Security expander. Bus<br />
data and the expander to the control module<br />
are encrypted to AES-128, as are comms from<br />
control module to keypad.<br />
SIFER readers provided by Inner Range for<br />
access control also offer encryption at this level<br />
from credential to reader and on to controller.<br />
Suite of products<br />
The Integriti Encrypted High Security system<br />
consists of a suite of products which, taken<br />
together, provide all the elements necessary to<br />
build a fully-integrated high security system<br />
that provides complete end-to-end data<br />
encryption. The Integriti range of products<br />
includes controllers, input expansion modules,<br />
the aforementioned End of Line Modules,<br />
keypads, card readers, power supplies and<br />
equipment enclosures.<br />
The system’s modular design provides scope<br />
for expansion, while also boasting a hybrid<br />
architecture. The hybrid architecture supports<br />
both high security (ELMs) and standard<br />
commercial grade (resistor network) areas at<br />
the same facility at the same time. By ensuring<br />
that budget allocations are made for the high<br />
security zones only where necessary, the end<br />
result is a single, holistic and affordable<br />
security solution for the entire organisation.<br />
Expansion of the Integriti system is achieved<br />
by installing additional encrypted modules to<br />
the high security controller’s RS-485 LAN, or by<br />
adding additional controllers to the system. The<br />
entire platform, including multiple controllers,<br />
can be managed from the specialist Integriti<br />
Enterprise software.<br />
Integriti is perfect for small sites through to<br />
large multi-campus institutions. Only pay for<br />
what you want when you need it: Integriti’s<br />
flexible modular design means that it grows<br />
with you. As it’s an IP-based networked<br />
solution, you can use new or existing IT<br />
infrastructure for boundless connectivity.<br />
Everyday use of the Integriti system is<br />
simple. Unlock doors and turn security areas<br />
on or off all by simply presenting a card at a<br />
reader or by using the colour graphic keypad.<br />
End users can manage their entire system via<br />
intuitive Windows-based software.<br />
Integriti in use<br />
Monitor and control the movement of all<br />
personnel and vehicles in your facility. Protect<br />
critical assets and manage the safety of your<br />
staff and visitors. Easily assign access<br />
permissions, mandating who can go where and<br />
when (including visitor access). Manage the<br />
reporting of security alarms and audit their<br />
responses. Ensure compliance with business<br />
systems and Government regulations. Respond<br />
to emergency situations, lockdowns and alerts.<br />
Integriti is an<br />
integrated access<br />
control, security alarm<br />
and automation<br />
system designed by<br />
Inner Range. It’s the<br />
result of more than 20<br />
years of continuous<br />
industry participation<br />
and product<br />
development. Integriti<br />
Encrypted High<br />
Security is an addition<br />
to the Integriti range<br />
and sets new industry<br />
standards
Advertisement Feature<br />
Manage your occupational Health and Safety<br />
liability by dint of using competency-based<br />
access control. Remotely monitor and control<br />
your Integriti system with iOS and Android<br />
Apps. Manage your entire security operation<br />
from a single user interface.<br />
With Integriti acting as the complete security<br />
management system, end users are able to<br />
integrate a variety of security and operational<br />
sub-systems, among them CCTV, biometrics,<br />
mobile duress, lighting, air conditioning,<br />
intercoms and fire safety solutions.<br />
Why choose Integriti?<br />
Integriti boasts powerful, yet intuitive<br />
cardholder permission programming. The use of<br />
‘Allow’ and ‘Deny’ functions greatly simplifies<br />
system administration. Operator training, as<br />
well as associated costs, are minimal.<br />
Integriti also includes a feature-rich suite of<br />
tools such as graphical maps, powerful<br />
reporting, card printing, alarm management,<br />
compliance-based access control and e-<br />
mail/SMS/pager communications. As stated,<br />
Mobile Apps for Apple and Android are<br />
available for remote monitoring and control.<br />
The Integriti system enables cardholder<br />
location and activity information to be shared<br />
with Building Management Systems, thereby<br />
helping to reduce energy costs.<br />
In addition, the Integriti system can share<br />
cardholder data with your company’s employee<br />
database, payroll system or booking system to<br />
reduce the labour costs associated with data<br />
entry and cardholder record management.<br />
Integriti supports a wide range of nonproprietary<br />
cards, readers, locks, detectors and<br />
other peripheral devices. You’re not locked into<br />
buying the manufacturer’s specific<br />
consumables or peripheral components. A<br />
choice of vendors gives you, the end user<br />
buyer, the competitive advantage.<br />
Integriti is a non-proprietary system. You<br />
have a wide choice of competent security<br />
companies from which to choose. Refer to the<br />
Inner Range website (www.innerrange.com) for<br />
details of recommended companies.<br />
Encrypted High Security Controller<br />
• Encrypted RS-485 LAN module limit: 32<br />
• Encrypted inputs: 256*<br />
• Standard inputs: 1,024*<br />
• Security areas: 250<br />
• Doors: 264*<br />
• SIFER card readers: 528*<br />
• Users: 10,000 (expandable to 100,000)<br />
• Event database: 30,000 (expandable to<br />
100,000)<br />
*Maximum quantity shown is per controller and<br />
assumes all 32 LAN modules will be of the<br />
same type. Multiple controllers can be used to<br />
greatly increase system capacity<br />
Encrypted LAN modules<br />
• Integriti 8-zone encrypted expander<br />
• Integriti encrypted Elite keypad/terminal<br />
• Integriti encrypted Prisma keypad/terminal<br />
• Integriti encrypted Prisma keypad/terminal<br />
with built-in SIFER reader<br />
• Integriti/Integriti Standard 8-zone expander<br />
(expandable to 32 zones)<br />
• Integriti/Integriti Standard LAN access<br />
module (SLAM: 2 doors)<br />
• Integriti/Integriti Intelligent LAN access<br />
module (ILAM: 2 doors, expandable to 8)<br />
• SIFER card readers<br />
LAN communications<br />
Integriti has been designed as a modular<br />
system that’s able to effortlessly scale with the<br />
addition of RS-485 LAN modules.<br />
Communications between the controller,<br />
expanders, keypads and SIFER card reader<br />
(including fob/card credentials) are all<br />
encrypted to AES 128-bit with MAC<br />
authentication as standard.<br />
Data encryption ensures secure LAN<br />
communications at all times, while the<br />
programmable supervisory polling system<br />
continuously monitors the LAN to detect cable<br />
tamper, cable fault conditions, module off-line<br />
and module substitution.<br />
The efficient data format has been developed<br />
to ensure fast, secure and reliable comms<br />
regardless of the size of the system.<br />
Integrated access control<br />
In addition to a high security alarm system, the<br />
Integriti platform boasts an integrated access<br />
control platform. At the heart of Integriti lies<br />
the Integriti Access Controller (IAC). The IAC is<br />
an IP-based enterprise access controller which<br />
supports two doors and up to four readers onboard<br />
(a further 262 doors and additional<br />
readers may be added via UniBus and LAN<br />
expansion modules).<br />
Inner Range SIFER card readers can be used<br />
with the IAC. These are multi-drop, RS-485-<br />
based readers that employ AES 128-bit<br />
encryption from the card through to the door<br />
module. A far superior level of security is<br />
provided than that offered by traditional<br />
Wiegand-based card readers. SIFER readers use<br />
the Mifare DESfire EV1 card format.<br />
The aforementioned ELMs are designed to be<br />
installed within (or adjacent to) a detection<br />
device such as a PIR or Reed sensor switch. In<br />
conjunction with the Integriti encrypted
Advertisement Feature<br />
expander, ELMs provide an encrypted data<br />
communications link between the detector and<br />
the control equipment.<br />
During times of normal operation, Integriti’s<br />
dedicated supervisory polling system<br />
continuously monitors ELMs to detect any<br />
communication failure, device substitution or<br />
tamper conditions.<br />
Intruder detection<br />
Integriti offers powerful and flexible security<br />
and intruder detection capabilities in a very<br />
affordable package. Integriti delivers full<br />
coverage and reporting of security detection<br />
points, offering advanced single site or multitenancy<br />
monitoring for up to 250 areas.<br />
Support for special duress, panic and holdup<br />
functions is provided, while connection with<br />
a vast range of wireless or wired detection<br />
devices is possible.<br />
Integriti is the industry leader in security<br />
communications providing the flexibility you<br />
need in any environment. A single panel can<br />
support up to four simultaneous<br />
communication interfaces. Reporting is<br />
available in a variety of formats including:<br />
Contact ID, SIA, IRFast, IP (GPRS, Ethernet),<br />
GSM or SMS. Advanced back-up reporting<br />
options allow reporting to multiple central<br />
stations and multiple client codes.<br />
Furthermore, Integriti’s mobile application<br />
allows you to arm or disarm your security<br />
system and review events from it wherever you<br />
may be, in turn giving you convenient control<br />
of your system.<br />
Integriti controllers are equipped with<br />
powerful scripted logic capabilities allowing<br />
the system to be configured to automate many<br />
applications. Functions such as auto-closing a<br />
roller door at a certain time, or automatically<br />
switching lights on or off based on time or<br />
movement within a building are typical<br />
examples of Integriti’s automation capabilities.<br />
Indeed, there are many other applications<br />
where Integriti’s automation features may be<br />
employed to manage the day-to-day<br />
requirements of your facility.<br />
Inner Range: Intelligent Security Solutions for Security Professionals<br />
Inner Range is a world leader in the design and manufacture of state-of-the-art access control and<br />
security solutions. Since the company’s formation in 1988, upwards of 100,000 Inner Range<br />
systems have been installed in over 30 different countries. Consultants who specify the company’s<br />
products, technicians who install them and people who use them benefit on a daily basis from the<br />
remarkable versatility of Inner Range’s systems.<br />
A privately-owned company, Inner Range is built around a team with a lifelong passion for the<br />
electronic security industry. The business is wholly focused on developing the world’s very best<br />
hardware and software solutions for practising security and risk management professionals’<br />
security and access control needs. A large proportion of the company’s product development<br />
resources is committed to building reliable products capable of enduring harsh environments, in<br />
turn affording end users piece of mind about their security and access control investments.<br />
Around the globe, Inner Range is backed by a strong technical support infrastructure. The<br />
business’ quality-driven technical support team and factory-certified training ensure that your<br />
system can be specified, quoted, installed and maintained on a reliable basis without delay.<br />
For further information on Inner Range’s solutions access the website at www.innerrange.com<br />
Tim Northwood:<br />
General Manager at Inner<br />
Range Europe
ENCRYPTED HIGH SECURITY<br />
CLASS 5<br />
Encrypted High Security<br />
End of Line Modules Are Only the Beginning<br />
Inner Range’s Infiniti Integriti Class 5<br />
is High a complete Security Hardware/Software<br />
System<br />
solution is a complete designed Hardware/Software<br />
specifically for<br />
Class solution 5/Zone designed 3 installations. specifically for<br />
High Security installations.<br />
Our range includes:<br />
Our All range Software includes:<br />
Hardware All Software Controllers<br />
End Hardware of Line Controllers Modules<br />
Power End of Supplies Line Modules<br />
Keypads Power Supplies<br />
Enclosures Keypads<br />
Communications Enclosures Devices<br />
Access Communications Control Readers Devices<br />
Credentials<br />
Access Control Readers<br />
Why Credentials take chances?<br />
Full<br />
Why<br />
End<br />
take<br />
to End<br />
chances?<br />
Encryption<br />
compliant Full End to with End AS/NZS Data Encryption 2201.1:2007<br />
Class Externally 5 Externally Certified Certified<br />
BEST NEW PRODUCT<br />
OF THE YEAR<br />
MEMBER<br />
AUSTRALIAN SECURITY INDUSTRY<br />
ASSOCIATION LIMITED<br />
T: +44 +61 3 (0)845 9780 4300 470 5000<br />
E: integriti@innerrange.com<br />
IREnquiries@innerrange.com<br />
W: innerrange.com<br />
T: 1300 319 499 W: csd.com.au
Mail Room Security Management: Systems and Procedures<br />
Following on from the recent powder and<br />
Improvised Explosive Device (IED) attacks<br />
on Government and religious<br />
establishments, mail room security has now<br />
become one of the biggest challenges facing<br />
heads of risk and security. Indeed, any of the<br />
regular readers of Risk UK may be surprised to<br />
learn that suspected IEDs and other suspect<br />
packages are regularly discovered in the UK.<br />
As the methods by which suspect packages<br />
might be delivered are changing every day, it’s<br />
also very easy for organisations to become<br />
complacent in relation to their daily mail room<br />
operations. With effective training and the use<br />
of scanning devices, mail room operatives are<br />
the first line of defence against postal threats.<br />
Regularly reviewing and updating mail room<br />
security and personnel training should become<br />
a normal part of security planning for any large<br />
organisation, but what steps need to be taken?<br />
The first step for any business looking to<br />
secure its mail room is to undertake a threat<br />
assessment. That detailed assessment should<br />
begin by examining all current processes and<br />
equipment and identifying specifically how the<br />
organisation will combat any potential postal<br />
threats. Conducted on a regular basis, this<br />
process will ensure the business remains on<br />
the front foot and prepared for any evolving<br />
security threats.<br />
The threat assessment should examine risk<br />
at entry to the building and how visitors are<br />
screened and bags searched at this juncture.<br />
How post is delivered, the physical location of<br />
the mail room and pinpointing any potential<br />
surrounding threats that may be business<br />
critical are further considerations.<br />
Rather than a single point of entry, we often<br />
find that there are multiple points of entry for<br />
post in a building (for example, Royal Mail and<br />
courier deliveries into a loading bay and handdelivered<br />
items through reception). These<br />
access points – and the security level required<br />
at each of them – must be considered as part of<br />
the overall threat assessment.<br />
Organisations should then look at how they<br />
identify and handle each type of specific<br />
security threat. Current known threats include<br />
chemical or biological agents in powder or<br />
liquid form, as well as explosives and items<br />
deliberately designed to inflict physical and<br />
psychological harm.<br />
In addition, the location of the mail room and<br />
any critical services, such as computer servers<br />
or utilities, as well as any neighbouring<br />
personnel should be considered. If they’re<br />
within any potential blast area, changes may be<br />
required to ensure that any attack or<br />
detonation would have the minimum possible<br />
Signed, Sealed, Delivered<br />
Would your members of staff know precisely what to do if a<br />
situation should arise whereby a suspect package is found in<br />
the company’s building? Jason Wakefield shares his insights<br />
on this hugely important topic, explains the risks faced by<br />
today’s Mail Room operations and evaluates in detail how to<br />
effectively address them<br />
effect on the business and that the area<br />
affected can be closed off safely with ease.<br />
Containment issues<br />
Following the threat assessment,<br />
recommendations and an action plan should be<br />
produced detailing all required security<br />
measures, including what to do if a suspect<br />
package, weapons, powders or explosives<br />
should be found. This affords a thorough<br />
understanding of the threats and how to<br />
protect the building and the people within it.<br />
Full procedures with actions on finding<br />
suspect devices should be written, practised<br />
and updated on a regular basis such that<br />
operators and security staff know exactly what<br />
to do if a suspect device should be found.<br />
Following a threat assessment, many<br />
organisations will decide to invest in or<br />
upgrade the mail room scanning technology<br />
they have at their disposal. If an organisation<br />
currently owns an x-ray scanning machine that’s<br />
over eight years old, the chances are this<br />
machine will be inadequate for dealing with the<br />
advancing capabilities of today’s terror threats.<br />
There are various types of machine available<br />
to consider from a variety of manufacturers, but<br />
Jason Wakefield: Sales<br />
Director at Todd Research<br />
53<br />
www.risk-uk.com
Mail Room Security Management: Systems and Procedures<br />
essentially there are two types, specifically<br />
conveyors and cabinets.<br />
A conveyor machine is similar to those seen<br />
at any airport used to scan hand luggage. It’s<br />
an effective scanner for when the flow of mail is<br />
constant and there are many large packages<br />
entering the business.<br />
Many of today’s conveyors have useful<br />
additional optional software options that<br />
should be considered, such as Advanced<br />
Detection Software (ADS) and Threat Image<br />
Projection (TIP). The former is advanced<br />
algorithm software that works by identifying<br />
the atomic number in explosive substances and<br />
contraband. Explosives are highlighted to the<br />
operator within a red box and contraband<br />
within a yellow box, making it easier for the x-<br />
ray machine user to identify potentially<br />
dangerous or banned substances.<br />
TIP technology is useful for quality control,<br />
risk analysis and the assessment of individual<br />
screener performance. It can show screeners<br />
artificial, but realistic x-ray images of threats<br />
during a routine baggage x-ray screening<br />
operation in order to aid and also test their<br />
security threat identification skills.<br />
Cabinet scanners<br />
Cabinet scanners are now also proving popular<br />
with many end user organisations because they<br />
create a lower carbon footprint and cost 50%<br />
less than a conveyor machine. As if to<br />
emphasise their popularity, every British<br />
Embassy across the world currently uses a<br />
cabinet scanner for security purposes.<br />
These scanners are operated by opening the<br />
chamber door and placing inside the items to<br />
be scanned. A single push-button operation<br />
then generates an image. Once the image has<br />
been generated, the advanced feature<br />
operating software makes the identification of<br />
suspect items easier.<br />
These advanced features can include<br />
Enhanced Powder Detection for the ease of<br />
identifying powders such as anthrax or ricin, as<br />
well as an e-mail facility to send the picture of a<br />
suspect package to a third party for<br />
assessment. Other useful advanced features<br />
can include zoom control, density alerts and<br />
three-point colour, all of which have been<br />
designed to help the user easily identify what’s<br />
inside the package they’re scanning.<br />
“The threat assessment should examine risk at entry to the<br />
building and how visitors are screened and bags searched<br />
at this juncture. How post is delivered and the physical<br />
location of the mail room are further considerations”<br />
Once any new scanning equipment is in<br />
place, it should be regularly reviewed as part of<br />
an ongoing threat assessment process to<br />
ensure that it’s maintained and upgraded to<br />
counter any new threats as required. Scanning<br />
operators should also be tested and training<br />
invested in to ensure that they’re up-to-date<br />
with all the latest security Best Practice. Often,<br />
the leading scanning machine providers will<br />
include introductory training for operators as<br />
part of the package when equipment is bought.<br />
Business continuity<br />
Once the assessment and action plan has been<br />
put into place, organisations should then look<br />
to consider the safety, information and<br />
business continuity implications.<br />
For example, it’s important that organisations<br />
achieve and maintain full Ionising Radiations<br />
Regulations 1999 (IRR99) compliance for staff<br />
using x-ray scanning security equipment. This<br />
document is aimed at the protection of the<br />
public and the health of those staff who work<br />
with ionising radiations and points directly at<br />
those employers with duties under IRR99.<br />
Organisations using x-ray security scanning<br />
machinery fall under these regulations.<br />
The organisation should also put in place<br />
mechanisms to ensure that all security staff are<br />
kept up-to-date with all current terror threats<br />
by following the countrywide alert status set by<br />
MI5. They should be aware of the location and<br />
contact details for the regional Counter-<br />
Terrorism Security Advisor should that person’s<br />
assistance be required. An overview of groups<br />
that may wish to target the organisation can be<br />
identified. In addition, it’s important to consider<br />
the lone activist, the disgruntled employee or<br />
customers with a grudge.<br />
A reporting schedule will need to be put into<br />
place, recording any mail attacks and tracking<br />
current trends and methods used by individuals<br />
or groups which can also be used as a staff<br />
training tool.<br />
Finally, the host organisation should make an<br />
assessment and ensure that it could still<br />
operate effectively if the mail room area had to<br />
be evacuated because of a security threat. This<br />
can be achieved by identifying and/or<br />
establishing a co-location either on another site<br />
or in a different part of the building.<br />
Implementing and continually checking on<br />
security measures for an organisation’s mail<br />
room can be a challenging task. As a result,<br />
many choose to work with professional security<br />
organisations to carry out some or all the tasks<br />
identified. There’s no simple answer as to which<br />
course your organisation should take, but help<br />
is at hand should assistance be required.<br />
54<br />
www.risk-uk.com
Meet The<br />
Security Company<br />
This is the fourth<br />
instalment in a new<br />
series of articles for<br />
the readers of Risk UK<br />
where we shine the<br />
spotlight on NSIapproved<br />
businesses<br />
for the benefit of risk<br />
and security managers<br />
who purchase security<br />
guarding as well as<br />
systems-focused<br />
solutions. Answering<br />
our questions this<br />
time around is Scott<br />
Boyd, managing<br />
director of Securi-<br />
Guard Fire and<br />
Security<br />
About the National Security Inspectorate<br />
Risk UK: Can you briefly describe your<br />
business’ activities and what you consider to<br />
be your USP as an organisation?<br />
Scott Boyd: Established back in 1982, Securi-<br />
Guard is a family-owned NSI Gold, BAFE and<br />
Security Industry Authority (SIA) Approved<br />
Contractor Scheme (ACS) accredited fire and<br />
security solutions specialist with offices in<br />
Plymouth and Wellington in Somerset.<br />
Celebrating its 35th Anniversary in April next<br />
year, the business is now recognised as the<br />
largest independent ‘one-stop shop’ fire and<br />
security solutions provider in the South West.<br />
On that note, end user organisations are now<br />
increasingly seeing the cost benefits of<br />
combining services from one trusted specialist.<br />
Many clients prefer to use our wide scope of<br />
services rather than four or five different<br />
suppliers, which can have a significantly<br />
positive impact on the buyer’s bottom line.<br />
Risk UK: What do your clients value most<br />
about the services you deliver?<br />
Scott Boyd: We believe there’s a positive<br />
perception of an independent, family-owned<br />
business like ours which is locally based and<br />
boasts a solid heritage and proven track record.<br />
The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />
company limited by guarantee and operates as a UKAS-accredited certification<br />
body specialising in the security and fire safety sectors.<br />
For over 40 years, the NSI has served to protect businesses, homeowners<br />
and the general public alike, raising standards by providing robust and high<br />
quality audits of both security and fire safety service providers.<br />
The highest levels of customer service are at<br />
the very heart of our company ethos and we’ve<br />
built a solid foundation of trust and integrity<br />
among our client base.<br />
Equally important is our wide range of quality<br />
assured and industry accredited services<br />
delivered by a dynamic and highly-skilled<br />
cohort of engineers and security personnel, all<br />
of whom are supported by a strong<br />
management team. We’re dedicated to not just<br />
meeting, but exceeding clients’ expectations.<br />
That’s probably what our customers value the<br />
most alongside the NSI, BAFE and SIA<br />
accreditations mentioned previously.<br />
Risk UK: How do you feel accreditations have<br />
assisted your company?<br />
Scott Boyd: Industry accreditations are hugely<br />
important to us as a business as they set a<br />
benchmark for quality and professionalism in<br />
which clients can place their trust.<br />
We’ve been committed to meeting the high<br />
standards set by the respective accreditation<br />
organisations. It’s a company policy that has<br />
paid dividends, too. We’re now multiple NSI<br />
Gold, BAFE and SIA ACS accredited for security<br />
guarding, fire and security systems and 24/7<br />
monitoring services.<br />
We do find that, while local authorities and<br />
larger businesses recognise the benefits of an<br />
accredited company, there’s still a lack of<br />
knowledge in the general marketplace about<br />
accreditation and a perception that it adds to<br />
the cost for the buyer rather than adding value.<br />
All of us work hard to change such perceptions<br />
by helping to educate clients such that they can<br />
see the benefits.<br />
Risk UK: Specifically, what value does ACS<br />
registration and NSI Guarding Gold approval<br />
bring to your business and its clients?<br />
Scott Boyd: Our NSI Gold and SIA ACS<br />
accreditations are a major benefit when it<br />
comes to carrying out third party work for<br />
‘other’ security guarding companies. Being a<br />
part of our industry themselves, clearly they<br />
have much better knowledge of what these<br />
accreditations mean so what matters to them is<br />
that our team members always deliver the<br />
correct processes and procedures.<br />
56<br />
www.risk-uk.com
Meet The Security Company: Securi-Guard Fire and Security<br />
In association with the<br />
Having the accreditations is obviously very<br />
important, but being consistently able to meet<br />
the requirements of those accreditations is<br />
absolutely vital.<br />
Risk UK: In practice, what are the main<br />
differences between ACS registration and NSI<br />
Guarding Gold approval?<br />
Scott Boyd: There’s probably very little<br />
difference in as much as both schemes<br />
recognise that, as a company, we’re<br />
consistently meeting the highest standards of<br />
service delivery which should afford our clients<br />
and potential customers alike reassurances.<br />
As the NSI has been providing certification<br />
for more than four decades now, the<br />
organisation’s ‘seal of approval’ does carry a<br />
good deal of clout in our industry.<br />
In its commitment to opening up new<br />
business opportunities for the private security<br />
sector, the SIA’s ACS has also been beneficial. It<br />
helps in making sure that we don’t let our<br />
professional standards slip.<br />
Risk UK: How do you think technology has<br />
changed the industry over the last couple of<br />
years and what do you feel will be the<br />
direction of travel in the future?<br />
Scott Boyd: We could see how fast technology<br />
was likely to develop and recognised its growth<br />
potential, and so formed separate divisions for<br />
the business, each with its own management<br />
team and associated accreditations.<br />
Those divisions cover security services (ie<br />
guarding, key holding and mobile patrols), fire<br />
and security systems (CCTV, access control and<br />
alarms, etc), fire safety services (such as fire<br />
extinguishers and fire door holders) and 24/7<br />
monitoring services (security and fire alarm as<br />
well as CCTV monitoring).<br />
Technological innovation is now at the<br />
forefront of our industry. A large number of our<br />
clients have moved away from the traditional<br />
24/7 manned security service. Increasingly,<br />
they’re making good use of cutting-edge<br />
electronic systems combined with ‘office hours’<br />
security officers, 24/7 monitored fire and<br />
security systems and ‘out of hours’ mobile<br />
security officer response/patrol services.<br />
Risk UK: When it comes to negotiating<br />
contracts and responding to tender requests,<br />
what aspects are of most value to customers<br />
and how are these changing?<br />
Scott Boyd: Customer satisfaction is the best<br />
advert for any company’s services. We’re<br />
extremely fortunate that the majority of<br />
requests come to us through recommendations<br />
and/or knowledge of the company’s reputation.<br />
Ease of communication is also vital, which is<br />
why our key team members are always<br />
available on a 24/7 basis.<br />
Increasingly, clients are asking for ‘shared’<br />
services (ie reducing/removing their manned<br />
security cover and introducing mobile patrols to<br />
open/close sites, carry out random patrols and<br />
respond to any security system activations that<br />
occur during ‘the silent hours’).<br />
Risk UK: How has Government legislation (eg<br />
the National Minimum Wage, the National<br />
Living Wage and holiday pay) affected your<br />
business? Do you believe such legislation is<br />
a good thing?<br />
Scott Boyd: We agree with the introduction of<br />
the legislation you’ve mentioned, but as<br />
referenced earlier, over the last few years we’ve<br />
witnessed an increase in clients requesting a<br />
review of their existing ‘manned’ security cover<br />
with the specific intention of reducing their<br />
annual spend and replacing this service with<br />
24/7 monitored fire and security systems in<br />
tandem with police/security response services.<br />
Risk UK: What are the most important<br />
attributes you look for in your security<br />
officers and staff members in general?<br />
Scott Boyd: We seek candidates who wish to<br />
be a part of our security and fire family. We<br />
want committed and dedicated team players<br />
who have the skills and knowledge to deliver<br />
the best possible service for all of our clients.<br />
When we invest in our staff, we’re investing in<br />
the future strength of the business and, to date,<br />
that effort has most certainly paid dividends. Of<br />
the 154 members of staff employed by the<br />
company at present, 58 of them have over ten<br />
years of service with us.<br />
Risk UK: How can the SIA, the NSI and<br />
industry standards best serve the sector in<br />
addition to the needs of your company’s<br />
clients and the wider public interest? Will<br />
the introduction of business licensing be a<br />
positive step?<br />
Scott Boyd: It’s imperative that we continue to<br />
have a robust accreditations system in place<br />
that’s always raising the bar and challenging<br />
companies across our sector to not only prove<br />
their professionalism and worth, but<br />
consistently maintain – and, ideally, improve<br />
upon – those high standards.<br />
What would the introduction of a business<br />
licensing regime from the Regulator ensure?<br />
Greater accountability and better practises. It<br />
would afford customers the added assurance<br />
that they’re dealing with a reputable business<br />
working within the strict confines of the law.<br />
Name<br />
Scott Boyd<br />
Job title<br />
Managing Director<br />
Time in the security sector<br />
I’ve served in the security<br />
sector since 1985, having<br />
joined Securi-Guard Fire and<br />
Security that very year<br />
Location of the business<br />
Securi-Guard Fire and<br />
Security operates from offices<br />
in Plymouth, Devon and<br />
Wellington in Somerset. Main<br />
areas covered by Securi-<br />
Guard Fire and Security<br />
across Devon and Cornwall<br />
include Bideford, Dartmouth,<br />
Exeter, St Ives and Truro<br />
Areas of expertise<br />
Security guarding, alarm<br />
response, mobile patrol and<br />
key holding services, security,<br />
fire alarm and CCTV systems,<br />
fire safety services and 24/7<br />
monitoring solutions<br />
(security and fire alarm<br />
monitoring, CCTV monitoring,<br />
lone worker alarm monitoring<br />
and vehicle tracking)<br />
Accreditations<br />
NSI Guarding Gold, NACOSS<br />
Gold, NSI Fire Gold (BAFE<br />
SP201 and BAFE SP2013-1),<br />
NSI ARC Gold, SIA ACS<br />
(Security Guarding, Key<br />
Holding, CCTV)<br />
Scott Boyd:<br />
Managing Director of Securi-<br />
Guard Fire and Security<br />
57<br />
www.risk-uk.com
www.coie.uk.com<br />
Cortech Open<br />
Innovation Event<br />
Cortech Developments Headquarters, Withers Lane, Knutsford,<br />
Cheshire, WA16 0SG, 7 November 2017<br />
The Mitigation of Risk for Workplace Safety, High Security<br />
and Building Efficiency<br />
An event with a difference for end users, consultants and main contractors:<br />
Be educated, informed and better equipped to manage evolving building needs<br />
Keep abreast of the latest advances in security, fire and building control technology<br />
See technology in action as part of the live demonstration<br />
Discover the latest smart integration techniques<br />
Discuss industry challenges with fellow security professionals and technology experts<br />
Learn about the 10 steps to cyber risk management<br />
Attending Partners<br />
Cortech<br />
Developments<br />
Media Partner
The Security Institute’s View<br />
We’ve all heard the debates surrounding<br />
the so-called ‘race to the bottom’ where<br />
pay and charge rates are concerned,<br />
read the stories on ‘full employment’ across the<br />
UK as reported in the mainstream media or<br />
been privy to statements about how security is<br />
a “grudge purchase”. Putting all of that ‘noise’<br />
to one side for a moment, there’s a very real<br />
need to look at the basic evidence and try to<br />
understand where some of the challenges lie.<br />
At the time of writing, I can surf the Internet<br />
and see security vacancies in London,<br />
Manchester, Leeds, Edinburgh, Cardiff and<br />
Belfast paying from £7.50 per hour (£7.20 in<br />
Belfast) through to £9.15 (Edinburgh), £9.50<br />
(Manchester), £10.00 (Cardiff), £10.45 (Leeds),<br />
£11.05 (Belfast) and £15.00 (London). Now,<br />
contrast this scenario in the security business<br />
sector with retailer Aldi. For the role of a shop<br />
assistant, that company pays between £9.75<br />
and £10.61 per hour in London and £8.53 and<br />
£10.15 seemingly everywhere else, with no<br />
requirement to undertake licence-linked<br />
training, buy a licence (which is renewable<br />
every three years) or externally patrol buildings<br />
or respond to alarms at two o’clock in the<br />
morning in the pouring rain or freezing cold.<br />
Let’s not forget, either, that working in retail<br />
also means you’re likely to be afforded<br />
employee discounts which can be very<br />
appealing, and especially so if you happen to<br />
be working in a store which is connected to<br />
your leisure time hobbies or interests.<br />
UK’s unemployment rate<br />
In a recent report published by the United<br />
Kingdom Crowd Management Association,<br />
entitled ‘Benchmarking Security and<br />
Stewarding Resourcing’, a figure of a 40%<br />
reduction in renewals of SIA licences was<br />
quoted. Although the Security Industry<br />
Authority (SIA) has since responded to the<br />
report and provided a degree of clarification<br />
and context, the Regulator’s own figures – as<br />
quoted in its latest Approved Contractor<br />
Scheme Update – show that, from the high<br />
point of just after the London 2012 Olympic<br />
Games when there were 224,619 licensed door<br />
supervisors in operation, we’re now down to<br />
201,821 annual renewals. This represents a<br />
drop of just over 10%. Figures for the other<br />
licensable sectors are not quoted.<br />
Standing at just 4.3%, the UK’s<br />
unemployment rate remains at its lowest level<br />
since 1975. Indeed, a senior Office for National<br />
Statistics statistician was recently quoted on<br />
the BBC saying that: “The number of people<br />
aged 16 to 64 not in the labour force because<br />
they’re looking after their family or home is the<br />
An Assessment of Staff<br />
Recruitment and Retention in<br />
the Security Business Sector<br />
One of the biggest challenges currently facing the private<br />
security sector is the initial recruitment and subsequent<br />
retention of high quality individuals. It doesn’t appear to<br />
matter whether the prospective employer is in the Top Ten in<br />
the industry or an SME, or whether it’s guarding or technical<br />
recruitment: there seems to be a worrying dearth of<br />
individuals looking to join the sector. Mike White addresses a<br />
significant problem that must be solved<br />
lowest since records began at less than 2.1<br />
million.” While this may be positive for the<br />
economy as a whole, it presents something of a<br />
challenge for those trying to recruit – and,<br />
thereafter, retain – new security officers.<br />
There’s also the not inconsequential matter<br />
of Brexit uncertainties to be considered, and<br />
how this might affect recruitment or, indeed,<br />
how it might affect our European colleagues<br />
from the other 27 EU Member States currently<br />
working in the sphere of private security<br />
solutions provision.<br />
If we’re going to professionalise the private<br />
security industry and make it a career of first<br />
choice – an objective regularly reiterated by<br />
every Trade Association, representative body or<br />
institute you may care to mention – then we<br />
need to do so across a range of areas.<br />
Training in the sector<br />
As regards training, there’s a significantly better<br />
range of training courses available today than<br />
ever before to allow people to progress through<br />
Mike White MSyI:<br />
Director of The Security<br />
Institute and Head of Risk,<br />
Compliance and Assurance (UK<br />
and Ireland) at G4S<br />
59<br />
www.risk-uk.com
The Security Institute’s View<br />
a career in the private security industry, from<br />
Levels Two and Three when they join right up to<br />
a professional doctorate. Courses exist across<br />
multiple disciplines within the sector.<br />
Yes, there has been suspected and proven<br />
training malpractice and we do see<br />
enforcement action being taken against the<br />
minority who seek to break the rules, but in<br />
truth training is just one part of a complex,<br />
three-dimensional recruitment and retention<br />
jigsaw puzzle that still challenges even the<br />
brightest of minds. Pay and conditions will<br />
undoubtedly be part of this jigsaw, as indeed<br />
will working practices.<br />
Of course, the private security industry<br />
continues to suffer an ongoing negative image<br />
within the mainstream media. Such an image is<br />
grossly unfair given the immense contribution<br />
made by the industry to the safety and security<br />
of this country and its citizens on a day-to-day<br />
basis. Indeed, there are not many jobs outside<br />
of the military, the medical profession or law<br />
enforcement that have such a profound impact<br />
on people’s lives.<br />
Whether it’s the security officer who helped<br />
apprehend a criminal, one who prevented<br />
unauthorised access to a building, another who<br />
heroically responded to a terrorist attack or one<br />
who reunited a lost child with their parents in a<br />
shopping centre, what security officers do<br />
really matters in the here and now.<br />
For all of the negative publicity that the<br />
industry sadly attracts, there are plenty of<br />
outstanding individuals and companies<br />
operating in our world that make substantial<br />
contributions. Despite it being asked to do<br />
more across a range of sectors in the light of<br />
public sector cuts and a heightened terrorist<br />
threat, including significant involvement in<br />
securing elements of the UK’s Critical National<br />
Infrastructure, the private security industry has<br />
yet to come close to reaching its full potential.<br />
Recruitment and retention<br />
How, then, do we go about attracting more<br />
individuals into the sector when it seems that<br />
the available pool of candidates is shrinking,<br />
and when it appears that evidence suggests<br />
once those individuals are part of the mix we<br />
then struggle to retain them?<br />
What isn’t going to work is anything being<br />
undertaken by one organisation on its own or<br />
one employer in isolation. This is an industrywide<br />
issue that demands a co-ordinated and<br />
industry-wide response. That response needs<br />
to set aside self-interest and, instead, examine<br />
all the factors involved, consider all the<br />
possible solutions – however radical some of<br />
them may be – prioritise what needs to be done<br />
and then draft a series of recommendations<br />
that the private security industry as a whole<br />
can comment on and, hopefully and more<br />
importantly, implement in the real world.<br />
Crucially, the response needs to encompass<br />
everything from training and working<br />
conditions through to regulation and business<br />
profit margins as well as everything in-between.<br />
‘Bonfire of the Quangos’<br />
The fact remains that this industry isn’t good at<br />
coming together as a whole and responding in<br />
a concerted manner to achieve a positive,<br />
lasting outcome but, I would argue, it can be<br />
done. Back in the autumn of 2010, you may well<br />
recall the news being leaked to the BBC that<br />
there would be a number of Government<br />
‘quangos’ abolished as part of a wider plan to<br />
reduce the number and cost of public bodies: a<br />
plan referred to by the mainstream media as<br />
the ‘Bonfire of the Quangos’. The SIA was<br />
selected to be one of them.<br />
In response, the private security industry<br />
joined forces as never before and, in a coordinated<br />
manner, lobbied the Government –<br />
and lobbied hard – with the message that this<br />
would be a retrograde step that would severely<br />
damage the sector by putting the already light<br />
touch regulatory framework at risk. The<br />
outcome was that, late in the evening on 23<br />
March 2011, the House of Lords passed an<br />
amendment to the Public Bodies Bill removing<br />
the SIA from the list of those bodies to be<br />
abolished. The industry as a whole thought that<br />
this was an issue well worth challenging, and<br />
that hunch was proven to be justified.<br />
Recruitment and retention challenges are<br />
now bordering on being a crisis for the industry.<br />
As a matter that appears to be affecting<br />
employers both large and small, local and<br />
national, it’s crying out for a unified response.<br />
Put simply, we need to draw on the<br />
significant lessons learned from our coordinated<br />
response to the ‘Bonfire of the<br />
Quangos’, set aside any differences between<br />
individuals, businesses and associations and<br />
come together in devising a common strategy.<br />
“How do we attract more individuals into the sector when it seems that<br />
the available pool of candidates is shrinking and evidence suggests<br />
once those individuals are part of the mix we struggle to retain them?”<br />
60<br />
www.risk-uk.com
7<br />
CONFERENCE, EXHIBITION & GALA DINNER<br />
University & Healthcare<br />
Estates and Innovation<br />
14th -15th NOVEMBER 2017 / UNIVERSITY OF BIRMINGHAM<br />
Universities & Healthcare Estates and Innovation is a unique conference and exhibition<br />
that addresses some of the key issues facing the University and Healthcare sectors.<br />
The conference addresses each issue from a University perspective, and then from a<br />
Healthcare perspective - allowing delegates to gain insight into both areas and share<br />
best-practice.<br />
The event will feature a wide range of high profile industry speakers that will focus on<br />
identifying the synergies and opportunities between these two sectors, and how<br />
best-practice can be shared effectively.<br />
If you would like to find out more, please contact:<br />
Ascent Events<br />
T: 01892 530027 E: info@ascentevents.co.uk<br />
or register at http://www.ascentevents.co.uk/uhei-birmingham-registration.php<br />
@UHEI_UHEI<br />
Event Partner<br />
Hosted By<br />
Supported By
A 21st Century Crisis: What Does It<br />
Look Like in the Real World?<br />
The threats and<br />
dangers we’re facing<br />
are developing and<br />
mutating at an almost<br />
inconceivable pace.<br />
It’s a paradox that, at<br />
a time when the world<br />
has never been safer,<br />
it has also never been<br />
in as great a danger.<br />
David Rubens focuses<br />
on six key areas of<br />
interest – among them<br />
pandemics and<br />
terrorism – before<br />
examining the<br />
implications for<br />
today’s practising risk<br />
and security<br />
management<br />
professionals<br />
Dr David Rubens DSyRM CSyP<br />
FSyI MSc: Managing Director of<br />
Deltar Training Solutions<br />
62<br />
www.risk-uk.com<br />
Every morning seems to bring to light a new<br />
crisis that’s bigger, more destructive and<br />
more expensive to fix than anything that<br />
came before it. Whether it’s hurricanes, cyber<br />
failures, pandemic scares or infrastructural<br />
breakdown, the impact those events have on<br />
both the local communities involved and global<br />
awareness is of a different level of intensity to<br />
that ascribed to what could be considered<br />
‘traditional’ crisis events.<br />
The question is whether this is just some<br />
anomaly, or whether the world is actually<br />
changing in terms of the threats we’re facing<br />
and the challenges they’re posing.<br />
Here at Deltar, we use the phrase ‘21st<br />
Century Crisis Management’ quite a lot,<br />
because in our minds there has been a<br />
significant change in the last 20 years between<br />
20th Century crisis events, which were<br />
relatively isolated, manageable and limited,<br />
and 21st Century crisis events. The latter are of<br />
a different order of magnitude in terms of their<br />
complexity and consequences and encompass<br />
much larger ‘footprints of destruction’.<br />
We’ve identified six areas of significant<br />
interest where there has been an important<br />
evolution in the nature of threats associated<br />
with those sectors, and the implications arising<br />
for strategic planners as well as emergency and<br />
crisis response managers. These are natural<br />
disasters, Critical National Infrastructure (CNI),<br />
pandemics, political and/or social unrest, cyber<br />
failures and terrorism. Let’s look at each in turn.<br />
Natural disasters<br />
Whether or not one accepts the reality of<br />
climate change, it’s clear that not only are high<br />
impact natural disasters – ie typhoons,<br />
tornadoes, floods, earthquakes and landslides<br />
– becoming more frequent and of a larger scale,<br />
but they’re also having a much larger impact on<br />
significantly large sections of the population.<br />
This is only going to increase as the developing<br />
‘mega cities’ are concentrated either on the<br />
coast or in coastal regions, which means that<br />
increasingly dramatic adverse weather events<br />
are going to have an effect on those areas and<br />
the populations living in them.<br />
By their very nature, natural disasters are<br />
‘long-tailed’ events, which have high levels of<br />
often catastrophic impacts not just on the<br />
communities they strike, but also on the<br />
surrounding infrastructure (eg roads, railways,<br />
power, communications and water purification).<br />
In the UK, CNI is officially listed as including<br />
chemicals, civil nuclear communications,<br />
defence, emergency services, energy, finance,<br />
food, Government, health, space, transport and<br />
water. However, from a strategic risk<br />
management perspective, these different<br />
sectors are increasingly becoming<br />
interdependent, with serious disruptions to one<br />
sector likely to have cascading impacts across<br />
the other sectors as well.<br />
An example of failure in CNI can be seen in<br />
the increasingly regular occurrence of power<br />
disruption across large areas, often<br />
transcending national boundaries and<br />
jurisdictions. The highly complex<br />
interconnectedness in power systems means<br />
that a relatively minor disruption in one part of<br />
the system can create almost instantaneous<br />
cascading failures across other systems which<br />
had no knowledge of – or control over – the<br />
original triggering event.<br />
The major power failure across Europe back<br />
in 2006 is a typical example. Following what<br />
was seen as a minor outage due to an<br />
unusually high power flow in a sub-station in<br />
Germany, 28 seconds later an electrical<br />
blackout had cascaded across Europe<br />
extending from Poland in the North East to the<br />
Benelux countries and France in the West,<br />
through to Portugal, Spain and Morocco in the<br />
South West and across to Greece and the<br />
Balkans in the South East.<br />
What about pandemics?<br />
It could be said that the last true pandemic was<br />
the influenza outbreak between 1918 and 1920<br />
that infected 500 million people across the<br />
world, including those in remote Pacific Islands<br />
and in the Arctic, and caused the death of<br />
between 50 million and 100 million people (up<br />
to 5% of the global population at the time).<br />
However, the growth of international travel<br />
combined with the return of previously<br />
declining diseases, not to mention the rapid<br />
expansion of urbanisation, means that many<br />
observers consider it only a matter of time until<br />
another global pandemic hits us.<br />
There have been increasing warnings of the<br />
impact a significant outbreak could have, with<br />
AIDS, SARS, Ebola, Swine Flu, Bird Flu and Zica
In the Spotlight: ASIS International UK Chapter<br />
all transcending local areas of infection to<br />
become potentially global pandemics.<br />
The question that needs to be asked is: ‘Have<br />
the global, regional and national authorities<br />
used these experiences to increase global<br />
resilience to pandemics and prepare for the<br />
impacts that would happen if another major<br />
pandemic was to occur?’<br />
Unfortunately, and perhaps predictably, the<br />
generally accepted answer is that these ‘near<br />
misses’ haven’t been used to both practice and<br />
improve upon global response capabilities.<br />
Political and social unrest<br />
When Francis Fukuyama scripted his bestselling<br />
book ‘The End of History’, the claim was<br />
made that, with the victory of social democracy<br />
and market-led capitalism, the great divides<br />
that had characterised human history were<br />
over, and we now had the opportunity to gain<br />
from the benefits that world peace and<br />
prosperity would bring.<br />
The last decade has seen the upheavals<br />
caused by the Arab Spring, the rise of Islamic<br />
terrorism and the impacts on Western Europe of<br />
the influx of refugees and economic migrants.<br />
However, we’ve also witnessed a modern,<br />
globally-connected country like Qatar being cut<br />
off from the world due to the pressure of its<br />
surrounding neighbours, the aggressive<br />
expansionism of China across what it sees as<br />
its own natural sphere of influence and the<br />
resurgence of Russian military and political<br />
influence, both in its own back yard – Georgia,<br />
Crimea and the areas around the Baltic States –<br />
and regions where the US would once have<br />
considered itself the main player (eg Syria).<br />
This has all been combined with a growing<br />
alienation and polarisation between the<br />
political elites and the mass of people who feel<br />
the world has left them behind, and who look<br />
to the traditional ‘enemies’ – the stranger, the<br />
outsider and the weak and vulnerable – which,<br />
in turn, is having impacts on both the rhetoric<br />
and reality of local and national politics.<br />
For those with a political memory, parallels<br />
with the period of the 1930s, involving both a<br />
global recession and increasingly violent<br />
political rhetoric, are not exaggerated. From a<br />
risk management perspective, any city in the<br />
world can be considered potentially high risk in<br />
terms of a rapid destabilisation, with the<br />
emergence of a street environment that’s both<br />
volatile and perhaps highly challenging.<br />
Cyber failures<br />
Although we often talk about cyber terrorism,<br />
it’s the wider aspect of cyber failures that’s<br />
equally worrying. Although there’s no denying<br />
the fact that targeted cyber attacks – whether<br />
from state actors, international terrorists, cyber<br />
criminals or the bored hacker – are<br />
undoubtedly serious, the potential for<br />
catastrophic cyber failures on a global scale is<br />
becoming increasingly more likely.<br />
Low-level, home-grown terrorism has become<br />
the ‘new normal’. It was interesting to see that<br />
the recent ‘bucket bomb’ attack in London on<br />
Friday 15 September, which injured 30 people<br />
and created a ‘wall of fire’ inside a crowded<br />
London Underground train, served as headlines<br />
for 24 hours before being relegated to<br />
‘updates’ on the progress of the operation to<br />
identify and find the perpetrators.<br />
If home-grown and low-level attacks are the<br />
‘new normal’, then it’s perhaps only a matter of<br />
time before the ‘new new normal’ emerges –<br />
which would be some form of home-grown dirty<br />
bomb. Whether chemical, biological or<br />
radiological in nature, the impact this would<br />
have on a major city – and the consequences in<br />
terms of ‘reactive security’ in other cities across<br />
the world – is almost incalculable.<br />
Crises can no longer be deemed to be mere<br />
one-off isolated events. Rather, they must<br />
increasingly be viewed in terms of system-wide<br />
failures impacting on the global network of<br />
interconnected dependencies, with both<br />
instantaneous impacts and catastrophic effects<br />
being realised.<br />
“Although there’s no denying the fact that targeted cyber<br />
attacks are undoubtedly serious, the potential for<br />
catastrophic cyber failures on a global scale is becoming<br />
increasingly more likely”<br />
63<br />
www.risk-uk.com
Qualifications: The Future of Fire<br />
Detection and Alarm Practitioners<br />
What’s the future for<br />
those working in the<br />
fire detection and<br />
alarms sector? Given<br />
that staring into a<br />
crystal ball will likely<br />
not help in finding the<br />
answer, Martin<br />
Duggan analyses the<br />
facts and looks at the<br />
reasons why there’s a<br />
growing trend towards<br />
both the need for<br />
professional<br />
qualifications in this<br />
sector and also a<br />
requirement to upskill<br />
and grow the market<br />
through the provision<br />
of quality services<br />
Martin Duggan:<br />
General Manager at the Fire<br />
Industry Association<br />
64<br />
www.risk-uk.com<br />
Here in the UK, the problem at present is<br />
that there’s no ‘upfront’ legal requirement<br />
for a formal qualification in the fire<br />
detection profession. Technically speaking,<br />
there’s nothing to stop anyone, however<br />
unqualified they may be, from commissioning a<br />
fire alarm system.<br />
To make matters worse, that applies whether<br />
the unqualified individual is installing or<br />
designing a system for a small office, a nuclear<br />
power station or even a large hospital, where<br />
the risks could be exponential if matters are not<br />
handled properly. It’s likely that only after a<br />
disaster has played out would poor<br />
workmanship be discovered, which means that<br />
many ‘problems’ remain undetected.<br />
Currently, the only necessity is written into<br />
the Regulatory Reform (Fire Safety) Order 2005,<br />
which states that the individual must be<br />
“competent” – but the definition is vague. The<br />
best we have is in the guidance documents<br />
which state the following: “A person with<br />
sufficient training and experience or knowledge<br />
and other qualities to enable him/her to<br />
properly assist in undertaking the preventative<br />
and protective measures.”<br />
The fire detection and alarm industry has a<br />
‘company’ competency benchmark, specifically<br />
the third party certification schemes: BAFE<br />
SP203-1 or LPS 1014. These are supported –<br />
again somewhat vaguely, it must be said –<br />
within the guidance documents by the<br />
statement that: “Third party certification<br />
schemes for fire protection products and<br />
related services are an effective means to<br />
providing the fullest possible assurances,<br />
offering a level of quality, reliability and safety<br />
that non-certificated products may lack.”<br />
Each scheme is different, but essentially each<br />
one provides an independent audit of a<br />
company to help prove quality and competency.<br />
Part of the inspection process is to look at staff<br />
and how they’re trained and selected.<br />
These schemes are generally very good and<br />
the audits strong, which is precisely why the<br />
Fire Industry Association (FIA) has always<br />
supported them and made them the criteria for<br />
membership acceptance.<br />
A qualification should raise the competence<br />
bar to a new level and provide an extra layer of<br />
knowledge and expertise. Not only will it help<br />
to bolster an individual technician’s credentials,<br />
but will also afford companies a competitive<br />
advantage, and especially so if they can<br />
demonstrate that all of their technicians are<br />
qualified. This would provide for a much easier<br />
check within the company scheme inspections.<br />
Purchasing decisions<br />
Consumers and purchasers in today’s world are<br />
more and more savvy, often placing more effort<br />
into finding out what sort of service they’ll<br />
receive and at what price. They’re also starting<br />
to fully understand their responsibilities and<br />
are looking at how they can mitigate risk.<br />
While price alone might lead the way on<br />
some purchasing decisions, that isn’t always<br />
the case. Many discerning purchasers will look<br />
to discover if they’re receiving a good level of<br />
service for their money.<br />
This is where EN 16763: 2017 Services for Fire<br />
Safety Systems and Security Systems is useful.<br />
Although not mandatory, it helps to set out<br />
minimum education requirements for staff in<br />
the industry. EN 16763 clearly defines the level<br />
of education those working in the fire and<br />
security services industries should have at their<br />
disposal. According to EN 16763, those working<br />
within fire detection and alarm services should<br />
hold a Level 3 qualification on the European<br />
Qualifications Framework.<br />
To assist those companies in preparation for<br />
adopting this standard, and to further improve<br />
the level of training available for service<br />
technicians, the FIA has worked to develop four<br />
new qualifications in the field of fire detection<br />
and alarms aimed at the four main job roles<br />
within the fire detection and alarm services<br />
sector. These four roles are the designer,<br />
installer, maintainer and commissioner.<br />
The new qualifications are one stage higher<br />
than those mentioned in the European<br />
Qualifications Framework (as a UK Level 3 is the<br />
equivalent of a European Level 4, and the<br />
European Standard calls for Level 3) and<br />
equivalent to an A-Level within the UK.<br />
Method of differentiation<br />
Why did the FIA become involved? We provide a<br />
service to our members and they want to<br />
increase the knowledge and understanding of<br />
their workforce and new recruits. They wish to<br />
differentiate themselves from the ‘cowboys’.<br />
Also, the FIA is a not-for-profit organisation<br />
so any money made either goes back into<br />
training and development or research.
FIA Technical Briefing: Qualifications in the Fire Sector<br />
The second objective listed in our<br />
Memorandum of Association is all about<br />
providing education and training for the sector.<br />
Consequently, the FIA is well placed to offer<br />
training that can help to prove competence. The<br />
organisation has been running fire detection<br />
and alarm training for over 20 years (since its<br />
formation in 2007 and in its previous guise as<br />
the BFPSA) having trained more than 30,000<br />
delegates across its 17 different courses.<br />
Current run rates are 300 courses across the<br />
year around the country, providing training for<br />
circa 4,000 delegates every year. FIA training<br />
has become a widespread requirement in fire<br />
detection and alarm technicians’ recruitment,<br />
and it’s fair to suggest that qualifications will<br />
only enhance this truism still further.<br />
This year, the FIA is proud to have become an<br />
approved Awarding Organisation which, in<br />
essence, means that we can now write<br />
qualifications which are then approved by the<br />
Office of Qualifications and Examinations<br />
Regulation (Ofqual) and other official<br />
Government bodies for examinations. The FIA<br />
spent years researching and creating the<br />
qualifications, talking to members and training<br />
customers to find out what they wanted from a<br />
qualification. We then tested what we learned<br />
from surveys. The results helped us to design<br />
and create our qualifications.<br />
The four new qualifications in fire detection<br />
and alarms are currently being developed to<br />
enhance the learner’s knowledge even further<br />
than before. The FIA’s present training provision<br />
will eventually be phased out for the new<br />
qualifications, since these will contain new<br />
areas and topics not previously seen within the<br />
provision currently given.<br />
Four units to study<br />
For each of the four qualifications there are four<br />
units to study. Three units are common to each<br />
of the qualifications. These are: Foundation,<br />
Health and Safety and Environment. Learners<br />
must pass each stage in order to progress to<br />
the next unit. Thereafter, they can then choose<br />
a specialist advanced unit in their chosen area,<br />
whether that be design, installation,<br />
maintenance or commissioning.<br />
In the Foundation Unit, the learner develops<br />
their knowledge and understanding of fire<br />
safety legislation (which is different depending<br />
on whether you’re in England and Wales,<br />
Scotland or Northern Ireland), as well as<br />
relevant standards, Best Practice and the<br />
theory that underpins all of the advanced<br />
principles in the later specialist advanced units.<br />
The standard for the qualifications is<br />
incredibly high. Experts from across the<br />
industry have collaborated to create the course<br />
content and write the examinations.<br />
There will not be an examination-only option<br />
for those who think that they already have<br />
enough knowledge to pass. This is because the<br />
qualification is comprehensive, and the<br />
questions will be complex, so we believe<br />
people need to complete the course to have<br />
learned enough to pass the exams at the end of<br />
each unit. These are likely to be demanding and<br />
extensive so learners will really need to put in<br />
the hours of education. We estimate that the<br />
average time for an examination will be twoand-a-half<br />
hours.<br />
This isn’t a simple exercise. It’s a test of a<br />
learner’s knowledge. We think it will be the vital<br />
step that raises the level of professionalism in<br />
fire detection and makes those working in the<br />
field expert professionals, which should<br />
improve the industry for everyone.<br />
Going back to the beginning, what will the<br />
future bring? We don’t know for certain, but it<br />
looks like there will be a trend of moving<br />
towards higher levels of professionalism in the<br />
industry. If we were to look deep into that<br />
crystal ball, it would say: “Qualifications are<br />
the new black”. Better quality service<br />
technicians mean a better quality of service.<br />
*To find out when the new<br />
booking system goes live,<br />
sign up to receive the Fire<br />
Industry Association’s e-mail<br />
Newsletter at www.fia.uk.com<br />
“While price alone might lead the way on some purchasing<br />
decisions, that isn’t always the case. Many discerning<br />
purchasers will look to discover if they’re receiving a good<br />
level of service for their money”<br />
65<br />
www.risk-uk.com
An Exercise in Logistics<br />
Company warehouses<br />
are often the target for<br />
both opportunistic<br />
and organised crime.<br />
While a robust and yet<br />
fairly static approach<br />
to security may hold<br />
off the opportunist,<br />
this kind of regime will<br />
not deter organised<br />
criminals. Catching the<br />
thieves can be akin to<br />
a game of ‘cat and<br />
mouse’. Brendan<br />
Musgrove outlines<br />
how and why an agile<br />
approach to security is<br />
the best way forward<br />
The 2017 Spring Budget Statement – the<br />
first to be delivered by Chancellor Philip<br />
Hammond – was met with mixed opinion in<br />
the logistics sector, with most industry<br />
commentators feeling pretty disappointed. As<br />
expected, the Chancellor showed little appetite<br />
for new spending ahead of the Brexit<br />
negotiations, while investment promises for<br />
transport were somewhat scarce.<br />
Announcements focused on freezes to<br />
Vehicle Excise Duty, the HGV Road User Levy<br />
and fuel duty were all welcomed in equal<br />
measure, but the Chancellor’s pledges of<br />
money to ease motorway congestion, improve<br />
road infrastructure and boost research in<br />
driverless vehicles were met with a lukewarm<br />
response. To put it bluntly, for many logistics<br />
industry observers, the Spring Budget was<br />
heavy on soundbites, but light on substance.<br />
There’s little doubt that the logistics industry<br />
faces the same high-level challenges as any<br />
other sector – the need to cut costs, increase<br />
efficiencies and attract the right talent to work<br />
within. Crucially, specialists in this field must<br />
make sure their security procurement is right<br />
and that they partner with the very best<br />
guarding solutions provider they can find.<br />
There are five key steps that should form the<br />
foundation of every security guarding solution<br />
in the logistics space. First of all, the security<br />
provider and client absolutely need to conduct<br />
regular reviews. These reviews must be both<br />
open and candid, wherein current aspects of<br />
loss are discussed and proposals for<br />
addressing them agreed upon.<br />
Through a full understanding of the profile of<br />
the losses being faced, this will enable both<br />
parties to change the shape of security<br />
provision and precisely target any altering<br />
patterns or threats. After all, what might have<br />
been fit for purpose six months ago simply may<br />
not be so appropriate now as the nature of the<br />
risks faced could well have changed.<br />
Degree of flexibility<br />
Second, the supplier then needs a level of<br />
flexibility to put these plans into play. This<br />
flexibility may take the shape of contract<br />
reviews, placed periodically through the<br />
lifecycle of the contract, wherein the provision<br />
is formally reviewed and the contract reengineered<br />
as appropriate. That said, the<br />
changing nature of loss doesn’t wait for these<br />
punctuation points in a contract’s development.<br />
At those junctures when acute issues are<br />
found, this flexibility may have to be achieved<br />
at very short notice, which may mean moving<br />
officers around the site, or indeed drafting in<br />
additional resource with immediate effect.<br />
Therefore, it’s also important that the solution<br />
supplier has a deep resource of well-trained<br />
and licensed officers to draw upon as needed.<br />
Here, the level of training is key. Logistics is a<br />
sector with particular requirements. Placing an<br />
officer not versed with the right skills in such an<br />
environment is simply unacceptable.<br />
Third, and as stated above, while all officers<br />
should be well-trained, there’s a time and a<br />
place for an ‘elite’ resource to be called upon.<br />
When actively pursuing a reduction in loss,<br />
there are moments when specialist skills – for<br />
instance, those demanded to undertake covert<br />
duties or enhanced security searches – will be<br />
needed as part of the approach that are not<br />
economically viable to be trained into all onsite<br />
security personnel.<br />
Fourth, all of the security guarding elements<br />
mentioned thus far need to be properly<br />
integrated with technology. This may involve<br />
the short-term tactical use of systems such as<br />
covert cameras or vehicle trackers, or it might<br />
focus on working together when the discussion<br />
turns to longer-term capital projects.<br />
Finally, the security provider needs to liaise<br />
with the client to make recommendations<br />
regarding working practices and operational<br />
procedures. By using the intelligence gained<br />
through security operations, some areas of risk<br />
can be managed or mitigated via appropriate<br />
process design and procedure.<br />
Specific problems<br />
Once these parameters have been agreed upon,<br />
it’s then time to address specific issues and<br />
problems. There’s an estimated 5% shrinkage<br />
rate in warehouses and depots caused by staff<br />
66<br />
www.risk-uk.com
Security Services: Best Practice Casebook<br />
thefts that can put a big dent in company<br />
profits, and especially so in the current<br />
economic climate wherein margins are tight.<br />
These thefts are a mixture of opportunistic and<br />
organised crime. Sadly, this problem shows no<br />
sign of abating, as in recent years the tactics<br />
being deployed by potential thieves have<br />
become more sophisticated.<br />
The challenge for companies is that,<br />
inevitably, all of their staff tend to become very<br />
familiar with the buildings in which they’re<br />
working and the security measures already in<br />
place. They have first-hand knowledge of how<br />
the guarding patrols operate, where the<br />
technology such as CCTV is located and where<br />
valuable items of stock are resident. All of this<br />
makes it relatively easy for a potential thief.<br />
Many seasonal staff tend to work across<br />
several warehouses in a region and are able to<br />
identify those which are the least secure.<br />
Individuals with criminal intentions will<br />
exchange information and tactics and<br />
sometimes work in collaboration to try and<br />
smuggle goods out of a warehouse.<br />
The drivers know that there are not the<br />
resources available to search every vehicle and<br />
just simply wait until another vehicle has been<br />
stopped before adding ‘stolen’ items or failing<br />
to scan certain parcels. They know that the<br />
static security provision in a warehouse will<br />
have no meaningful ability to catch them once<br />
they’re through the perimeter gates.<br />
Although vetting procedures such as<br />
checking employment history are employed<br />
when recruiting staff to try and avoid taking on<br />
‘risky’ individuals, such measures will not<br />
prevent all forms of theft. While the designs of<br />
warehouses have evolved to feature increased<br />
technology and multi-level access control<br />
including turnstiles, cages and locked-off areas<br />
for high value items, at the end of the day such<br />
precautions can only go so far.<br />
profiling. Within a traditional security set-up,<br />
searches may become rather predictable in<br />
terms of frequency and location. Therefore,<br />
‘high impact teams’ may be employed to<br />
augment this standard approach, arriving on<br />
site unannounced to check areas such as<br />
property and lockers, in addition to staff and<br />
contractors. They’re often acting on<br />
‘intelligence’ and tip-offs and use the latest<br />
technology, such as body-worn video, to record<br />
evidence vital for building a criminal case.<br />
As well as searching vehicles as they leave<br />
the depot, team members can deliver covert<br />
monitoring of drivers on their rounds, often<br />
alerted by the GPS that shows an employee has<br />
veered off route, possibly to offload stolen<br />
property somewhere. In short, the thieves have<br />
no way of knowing when or where the ‘high<br />
impact teams’ will appear. It’s this level of<br />
unpredictability that’s key to reducing loss.<br />
Over the past four years, the ‘high impact<br />
teams’ deployed by Cordant Security have been<br />
responsible for discovering over 3,000 thefts<br />
across a range of clients that have resulted in<br />
employees being dismissed and, in some cases,<br />
the police making arrests. For one client, we<br />
saved over £2 million per annum in static<br />
security guarding costs which they have<br />
partially reinvested in having much greater<br />
national coverage courtesy of our teams.<br />
It’s also a solution that will work for smallersized<br />
businesses that often struggle with the<br />
costs of a traditional security solution. At a<br />
fixed price, they can procure as many high<br />
impact searches as they need without any longterm<br />
commitment and easily ramp this up or<br />
down in line with changes in their business.<br />
Brendan Musgrove: Managing<br />
Director of Cordant Security<br />
High impact teams<br />
In response to this, security solutions have had<br />
to evolve. While technology remains key and<br />
the traditional model of having static security<br />
teams on site is still very effective for some<br />
organisations, we’re increasingly<br />
recommending the use of ‘high impact teams’<br />
to complement or even replace them.<br />
Fundamentally, these ‘high impact teams’ are<br />
designed to make security provision far more<br />
dynamic in meeting the changing profile of risk,<br />
while at the same time introducing a level of<br />
unpredictability for the potential thief.<br />
Such teams are trained to the highest<br />
standards in a range of techniques such as<br />
covert activity, search procedures and offender<br />
“While technology remains key and the traditional model<br />
of having static security teams on site is still very effective<br />
for some organisations, we’re increasingly recommending<br />
the use of ‘high impact teams’ to complement them”<br />
67<br />
www.risk-uk.com
Visual Hacking: Combating Mobile and<br />
Bring Your Own Device Security Risks<br />
appropriate security technologies suitable for<br />
the particular device or application’.<br />
Within the UK Government, the Security<br />
Policy Framework states that Government<br />
departments and agencies must adopt clear<br />
computer screen policies in those areas where<br />
sensitive assets are handled. The Department<br />
of Work and Pensions and the Foreign and<br />
Commonwealth Office have both specifically<br />
referenced the need for protecting screens and<br />
mention privacy filters in this context.<br />
Securing mobile<br />
communications is<br />
one of the biggest<br />
challenges<br />
organisations are<br />
facing today, with the<br />
inevitable<br />
complications of<br />
employees often using<br />
the same device for<br />
both work and home<br />
life, plus the sheer<br />
volume and diversity<br />
of mobile endpoints<br />
involved: different<br />
smart phones, tablets,<br />
laptops and operating<br />
systems, as well as a<br />
multitude of Apps that<br />
can be downloaded in<br />
seconds. As Peter<br />
Barker explains,<br />
there’s another factor<br />
that has potentially<br />
huge risk implications:<br />
visual hacking<br />
Visual hacking is the term given to the<br />
ability to view potentially sensitive or<br />
confidential content on someone’s screen<br />
– on a desktop monitor, laptop, tablet or smart<br />
phone – and then use that information for<br />
illegal or malicious purposes, such as financial<br />
gain, identity theft or sharing company<br />
information with a third party. Many of us will<br />
have inadvertently seen something on someone<br />
else’s screen that we know wasn’t for public<br />
consumption, so it’s not difficult to imagine<br />
how easily a ‘visual hack’ might take place.<br />
Unlike more sophisticated forms of security<br />
breaches, visual hacking doesn’t require any<br />
computer expertise. With mobile devices now<br />
incorporating increasingly clever cameras, it’s<br />
also becoming simpler to ‘snap’ sensitive<br />
details instead of having to rely on memory.<br />
This is why a growing number of<br />
organisations are adding visual hacking<br />
prevention to their overall security strategies<br />
and investments. Some private and public<br />
sector organisations are mandating visual<br />
hacking as part of their ISO 27001 processes. In<br />
the financial services market, for example,<br />
visual privacy is implicit within industry<br />
guidelines issued by the Financial Conduct<br />
Authority several years ago.<br />
In the legal profession, the Bar Council has<br />
issued Best Practice guidelines, stating that:<br />
‘Where possible, computers should not be<br />
placed so that their screens can be overlooked,<br />
especially in public places’ and ‘You should use<br />
Higher on the agenda<br />
At this point, you may well be wondering why<br />
visual hacking hasn’t been higher on the<br />
business security agenda before now. There are<br />
a couple of likely reasons for this.<br />
First, while there has been considerable talk<br />
about mobile security for several years now, in<br />
the case of many organisations, they’ve only<br />
recently focused the spotlight on this area,<br />
while research highlights the fact that plenty of<br />
companies are still lagging behind.<br />
Second, the lack of ‘hard numbers’ around<br />
the scale and type of security breaches is<br />
notoriously difficult. This includes visual<br />
hacking, which is also extremely hard to trace<br />
(there are no viruses, Trojan horses or other<br />
software-based threats to uncover). However, a<br />
couple of recent studies have demonstrated the<br />
speed and ease of a visual hack.<br />
The Public Spaces Survey, conducted earlier<br />
this year, also unearthed the fact that concern<br />
about visual hacking isn’t being matched by<br />
efforts to ensure its prevention. The study,<br />
which was conducted by The Ponemon Institute<br />
on behalf of 3M, involved interviewing business<br />
people working in open spaces such as cafes<br />
and hotel lobbies.<br />
Nine out of ten of those people questioned<br />
said they had caught someone looking at data<br />
on their laptops in public. 77% of them<br />
expressed the view that they were somewhat or<br />
very concerned about visual hacking, with 43%<br />
worried it could lose them their jobs, 23%<br />
concerned about identity theft and 63% having<br />
a gut feeling that visual hacking is a bigger<br />
issue than most of us realise.<br />
Despite this level of concern, more than 50%<br />
of respondents also said that they hadn’t taken<br />
any steps to protect sensitive company<br />
information while working in public spaces.<br />
68<br />
www.risk-uk.com
Cyber Security: Visual Hacking Risk Management<br />
Of course, laptops and other mobile devices<br />
are not just used in public spaces – many of us<br />
access them at the office as well. Indeed, with<br />
the advent of ‘mobile first’ this development is<br />
only going to increase, because that’s the<br />
concept of having one handset that transfers<br />
seamlessly from internal voice and data<br />
networks to cellular networks.<br />
Global Visual Hacking<br />
The potential risk of visual hacking in open plan<br />
offices was highlighted by the Global Visual<br />
Hacking Experiment conducted by The<br />
Ponemon Institute and sponsored by 3M.<br />
Covering eight countries, among them the<br />
UK, the Global Visual Hacking Experiment<br />
involved a total of 157 ‘trials’ encompasing the<br />
offices of a variety of organisations harbouring<br />
from 25 to 100 employees. In all cases,<br />
designated people at the participating<br />
companies were given two days’ notice before<br />
each trial, which involved a White Hat hacker<br />
(complete with a valid and visible security<br />
badge) impersonating a temporary office<br />
worker. The total estimated time for each trial<br />
was two hours.<br />
The trials involved trying to obtain sensitive<br />
or confidential information in several ways:<br />
walking through the office looking for<br />
information left in full view on desks,<br />
monitoring screens and other locations such as<br />
printers and copiers, taking a stack of business<br />
documents labelled ‘Confidential’ from a desk<br />
and putting them in a briefcase and using a<br />
smart phone to take images of confidential<br />
information displayed on computer screens. All<br />
tasks were carried out in full view of other<br />
office workers.<br />
Information obtained was varied and<br />
included personal identification information,<br />
customer and employee details, general<br />
business correspondence, access and log-in<br />
credentials, confidential or classified<br />
documents and attorney-client privileged<br />
documents in addition to financial, accounting<br />
and budgeting information.<br />
While the UK’s results were often better<br />
when compared to other countries, the<br />
numbers are still alarmingly high, with 87% of<br />
visual hacks successful, over half taking place<br />
in 15 minutes or less and 44% of sensitive<br />
information gained by viewing people’s<br />
screens. An average of 3.1 pieces of confidential<br />
or sensitive data were obtained per experiment,<br />
while the visual hacker was only confronted in<br />
39% of attempts.<br />
Globally, where visual security practices were<br />
in place – such as clean desk policies,<br />
workplace monitoring and surveillance,<br />
“Unlike more sophisticated forms of security breaches,<br />
visual hacking doesn’t require any computer expertise.<br />
With mobile devices now incorporating increasingly clever<br />
cameras, it’s becoming simpler to ‘snap’ sensitive details”<br />
bespoke training and awareness programmes<br />
and standardised document shredding<br />
processes – there was an average 26%<br />
reduction in successful visual hacks.<br />
Compared to some types of security<br />
management, visual hacking is relatively easy,<br />
cost-effective and quick to mitigate if the right<br />
processes are implemented, not just on<br />
screens, but also for paper-based information.<br />
To reduce the paper risk, encourage staff to<br />
clear their desks at the end of the day and lock<br />
away any document deemed sensitive or<br />
confidential. Check the Post Room and printer<br />
trays to make absolutely sure documents are<br />
not being left in full view. If not already in<br />
place, instigate the routine shredding of key<br />
documents and discourage any unnecessary<br />
printing and copying of them.<br />
Adopt the mantra of ‘Close It Down’.<br />
Screensavers and log-in prompts after a few<br />
minutes’ inactivity are effective and simple<br />
ways in which to reduce the time a screen is<br />
exposed to prying eyes.<br />
Cultural attitude is important, too. Visual<br />
privacy policies are more likely to be followed if<br />
they’re mandated at the management level and<br />
staff are educated about their personal<br />
responsibility to improve visual privacy.<br />
Employing privacy filters<br />
Make screens hard to view. A very simple step<br />
is to ensure that a given screen’s angled such<br />
that it cannot be viewed, for instance facing a<br />
café wall, rather than in full view of the coffee<br />
counter queue.<br />
Last, but not least, use privacy filters. These<br />
can be easily slipped on and off screens of all<br />
kinds and prevent on-screen data from being<br />
viewable except straight on and at close range.<br />
Someone taking a sideways glance or who may<br />
be several feet behind the screen will witness<br />
only a blank image.<br />
Given that these are all very achievable<br />
preventative steps to take, and that visual<br />
hacking is potentially a very real risk for UK<br />
organisations in this day and age, it makes<br />
perfect sense for companies to include them<br />
within overall security practices.<br />
While visual hacking might only be one of<br />
many tools in the hackers’ current armoury, it’s<br />
also one that can be practically locked down<br />
more easily than others. Worth bearing in mind.<br />
Peter Barker: EMEA Market<br />
Development Manager<br />
(Display Materials and<br />
Systems Division) at 3M<br />
69<br />
www.risk-uk.com
Raising Standards: A Commitment to<br />
Learning in the Security Business Sector<br />
future. Indeed, both are absolutely essential<br />
when it comes to raising standards and quality<br />
across the industry.<br />
As the management<br />
team resident at any<br />
leading business will<br />
readily tell you, a<br />
company’s people are<br />
the key to its success,<br />
both in the here and<br />
now and, indeed, the<br />
future. This is<br />
particularly true of the<br />
security guarding<br />
sector where<br />
harnessing the<br />
‘people factor’ has<br />
been something of a<br />
constant challenge.<br />
Duaine Taylor<br />
searches for a longterm<br />
solution<br />
Motivating and engaging security staff –<br />
and making them feel a valued part of<br />
the host organisation – is absolutely<br />
vital, but in a general environment where their<br />
role and importance is being steadily<br />
undermined by a host of factors, and margins<br />
remain under pressure, it’s beholden upon us<br />
to think more imaginatively about how we<br />
retain and invest in a quality workforce.<br />
There’s not one single reason that has<br />
brought about this situation, but rather a<br />
combination of factors. What’s important,<br />
however, is to instil security officers, clients and<br />
the public at large with greater confidence in<br />
what it is that we do. Part of the answer here<br />
focuses squarely on promoting security<br />
guarding not just as a temporary ‘make do’ job<br />
until something better comes along, but as<br />
more of a career and one with real prospects of<br />
personal and professional development.<br />
Thankfully, there are signs that this shift in<br />
mindset is already starting to take hold.<br />
Employee surveys suggest that there’s now a<br />
renewed enthusiasm for the role of ‘security<br />
officer’, with those working on the front line<br />
having career ambitions that deserve to be<br />
nurtured and developed. We want to retain<br />
these individuals, give them the skills to<br />
progress and, in doing so, shape a better longterm<br />
future for the business sector as a whole.<br />
Let’s be clear. Learning and development for<br />
security officers is – and will continue to be – a<br />
key driver for change both now and in the<br />
Taking back control<br />
Learning and development is an area that has<br />
generated considerable debate. Most<br />
commentators in our sphere are agreed that, to<br />
raise standards, it’s essential to better train the<br />
men and women resident in security teams.<br />
Licensing thanks to the Security Industry<br />
Authority was (and is) part of this quality drive,<br />
but progress has been hampered somewhat by<br />
a number of instances where external training<br />
providers have been shown not to be delivering<br />
the mandatory training required for a licence to<br />
be granted or renewed.<br />
At this point, I should stress that this isn’t<br />
our own experience. Indeed, we’ve worked hard<br />
with our training partners to ensure that all of<br />
our security officers are fully-equipped for the<br />
role for which they’re employed. However, such<br />
episodes have served to knock confidence in<br />
the licensing regime, arguably so to the point of<br />
de-valuing the licence itself.<br />
Perception is a big part of the problem. For<br />
security companies to be truly accountable,<br />
there’s a strong argument for training their<br />
officers in-house. Real quality, it could be said,<br />
is best delivered by maintaining thorough<br />
control of the ‘product’. It was with this very<br />
thought in mind that we set about creating our<br />
own dedicated learning and development<br />
business some 18 months ago.<br />
The culmination of our thinking and analysis<br />
of future needs has led to the opening of The<br />
Axis Academy – a new training business which<br />
sits within the Axis Group. By setting up our<br />
own regulated training operation, we believe<br />
that we’re reducing risk and re-claiming that<br />
‘confidence’ for our employees and customers.<br />
Bespoke learning<br />
The Axis Academy is the cornerstone of the Axis<br />
Group’s broader people strategy. Its<br />
fundamental purpose is to provide the right<br />
learning and development opportunities for<br />
employees of the businesses which form the<br />
Axis Group, including Axis Security (our security<br />
guarding business) and Acuity, which delivers<br />
bespoke and specialist Front of House services.<br />
The key benefit of having our own training<br />
business as part of the Axis Group is that we’re<br />
70<br />
www.risk-uk.com
Training and Career Development<br />
able to tailor our training courses to the specific<br />
needs of the learner, building the course<br />
content within the context of the environment<br />
in which they operate on a daily basis.<br />
Prior to joining the Axis Group, I was a<br />
commercial trainer delivering safety, security<br />
and medical training to individuals working<br />
within the security business sector. I saw firsthand<br />
how the content of these courses had to<br />
be necessarily ‘generic’, because the courses<br />
themselves had to cater for a diverse number of<br />
people employed in an equally diverse range of<br />
roles. While such training is useful up to a<br />
point, it cannot be said to be raising standards<br />
in the truest sense of the phrase.<br />
Our approach is different. We recognise that,<br />
by tailoring each course and including realistic<br />
scenarios and Case Studies that are appropriate<br />
to a specific role, we’re able to make the<br />
learning experience far more engaging.<br />
Delegates are being trained by people who<br />
truly understand what it is they do and the<br />
environments they’re confronted by each day<br />
when on duty. By making the content more<br />
‘relevant’, we will generate better learning<br />
outcomes and, in doing so, raise standards.<br />
Devising new training<br />
It isn’t just in security training that we can<br />
enhance the content. We’ve found that even in<br />
First Aid, fire and other areas of Health and<br />
Safety, we now have a better understanding of<br />
what delegates need to learn.<br />
We’ve also been able to create new training<br />
courses which were not previously available<br />
among the ‘traditional’ learning providers. We<br />
had a particular business need, for example, to<br />
provide special Bedwatch training.<br />
As a regulated provider, we’ve worked with<br />
the NHS and Andy McCormack, an expert and<br />
well-recognised trainer within this field, to<br />
devise our own four-day instruction course. This<br />
course doesn’t simply cover the ‘basics’, but<br />
goes into the detail of mental health awareness<br />
and conflict resolution training, which includes<br />
the common causes of conflict when dealing<br />
with the elderly, people with dementia, delirium<br />
or learning difficulties and the relevant physical<br />
intervention skills that may be required.<br />
We’ve used real historic data to create actual<br />
scenarios and profiles of people our security<br />
officers might encounter in a typical healthcare<br />
environment. This wasn’t about ticking a box.<br />
Rather, it’s about about taking training to a<br />
higher level.<br />
Ongoing training in security is now a key part<br />
of the job. Most security officers request<br />
opportunities to expand their skill sets. Our aim<br />
is to create a true learning culture across the<br />
“Ongoing training in security is now a key part of the job.<br />
Most security officers request opportunities to expand<br />
their skill sets. Our aim is to create a true learning culture”<br />
Axis Group. For Axis Security, this means giving<br />
our employees the right training at the right<br />
time and delivering it in such a way that it’s as<br />
convenient and accessible as possible.<br />
Identifying what learning and development is<br />
required is fundamental to raising standards<br />
and supporting employees. For every new<br />
employee we conduct a training needs analysis<br />
as standard, but it doesn’t stop there.<br />
We have ‘training champions’ who carry out<br />
this analysis and work with the line managers<br />
to identify areas of strength and weakness and<br />
devise a training pathway for each employee.<br />
They also work closely with the operational<br />
management teams to identify and reduce risk<br />
and focus on succession planning.<br />
We’re analysing statistics from accident<br />
reports. They may highlight spikes in assaults<br />
or verbal abuse, for example. If so, we can<br />
encourage our security officers on key sites to<br />
improve their understanding and skills in<br />
conflict management and resolution.<br />
We also take into account the current<br />
terrorism threat level, working with Project<br />
Griffin’s counter-terrorism teams and the<br />
Metropolitan Police Service to deliver further<br />
training where it’s needed (for example, we<br />
conduct dedicated training around vehicle<br />
searches). It’s important to gather insights from<br />
across the business, our customers and<br />
relevant law enforcement agencies in order to<br />
provide the very best learning solutions.<br />
Adopting a blended approach<br />
To make learning and development as<br />
accessible as possible we’re taking a blended<br />
approach, harnessing technology where<br />
appropriate. We ensure that all licence-linked<br />
training, and courses such as First Aid, are<br />
delivered face-to-face to maintain standards.<br />
This is complemented by further e-learning.<br />
We also encourage our security officers to<br />
embark on regular refresher training. Webinars<br />
will also be featuring as they offer a very<br />
convenient form of learning experience when<br />
used for appropriate topics.<br />
There’s a balancing act to be struck with all<br />
training. At one level, it must meet the<br />
contractual requirements of the customer and<br />
the Regulator. At another, training needs to go<br />
beyond the tick-box with a view to developing<br />
individuals and equipping them with the skills<br />
they need to further their careers.<br />
Duaine Taylor: Head of<br />
Learning and Development at<br />
the Axis Group<br />
71<br />
www.risk-uk.com
Risk in Action<br />
Business process<br />
enhanced at Coventry<br />
University courtesy of<br />
Traka’s key input<br />
Coventry University is using<br />
Traka’s state-of-the-art<br />
intelligent key management<br />
solution to add value and<br />
establish a sophisticated<br />
business process for staff<br />
and contractors working<br />
across its multi-site facilities<br />
on a 24/7 basis.<br />
Control over keys and access cards for technicians and contractors alike<br />
ensures that access for vehicles and to sensitive areas (including the<br />
communications server room) is only granted to authorised personnel, as is the<br />
case for roof access, associated PPE equipment and fire and security alarms.<br />
A highly-developed e-mail system created within Traka’s specialist software<br />
presents live reports and instant notifications along with a complete audit trail<br />
capability, including attendance and curfew notifications and even illegal<br />
handover notifications, all of which adds to the accountability of staff,<br />
technicians and contractors.<br />
Nigel Young, building services and contractors manager for the university,<br />
explained to Risk UK: “With over 1,400 different contractors working across our<br />
sites, we needed a system that could help keep track of keys and cards and<br />
enable us to know who’s on what site at any given time. Traka’s solution allows<br />
us to achieve these objectives and more. With the real-time e-mail system we<br />
can monitor usage and instantly keep control of keys and access. From a<br />
management perspective, it also improves our efficiencies and professional<br />
response times. We can use it as a KPI support tool where we have emergency<br />
response requirements within contracts.”<br />
Wayne Kynaston, education market development manager for Traka, added:<br />
“We’re delighted to see the system working so effectively for this university. As<br />
Coventry University’s campus sites grow, we look forward to expanding the<br />
operation and increasing our support still further.”<br />
Anvil announces partnership with<br />
Airbnb designed to safeguard<br />
corporate business travellers<br />
Anvil, the travel and operational risk company,<br />
has connected its Employee Travel Monitoring<br />
System (ETMS) with short-term rental giant<br />
Airbnb. This direct connection will significantly<br />
ease the booking burden and enable<br />
organisations to maintain their Duty of Care<br />
requirements for corporate travellers now<br />
wishing to use Airbnb as a business travel<br />
accommodation provider.<br />
The shared space rental economy is growing<br />
in popularity. Many individuals are now making<br />
use of these short-term rental options outside<br />
of work, but are then restricted to more<br />
traditional options when it comes to bespoke<br />
business travel. The benefits of using such<br />
services are clear: more relaxed and homely<br />
surroundings for the business traveller<br />
combined with reduced costs for the<br />
organisation. It’s therefore becoming a more<br />
appealing option for all concerned.<br />
As corporate travellers continue to search for<br />
a temporary ‘home-away-from-home’ while<br />
they’re on a business trip, their organisations<br />
still need to ensure that they’re able to track,<br />
locate and communicate with them in order to<br />
provide the appropriate levels of Duty of Care.<br />
This latest development at Anvil allows clients<br />
to do exactly that.<br />
Multitone solution chosen by<br />
Canary Wharf Group for effective<br />
communications management in<br />
retail zones<br />
Multitone Electronics plc’s Mall Call<br />
communications system has been chosen by<br />
Canary Wharf Group for its retail facilities. The<br />
flexibility, reliability and security of Mall Call is<br />
perfectly suited to the needs of a large retail<br />
management team.<br />
The scope of communications requirements<br />
at Canary Wharf is vast, from everyday<br />
planning messages (such as for opening times<br />
or maintenance) through to dealing with<br />
shoplifters or even an emergency and<br />
evacuation scenario. Mall Call enables the<br />
estate’s management team to instantly<br />
communicate with the security teams and<br />
retail tenants when required.<br />
Based on Multitone’s powerful i-Message<br />
platform, Mall Call is designed to provide high<br />
levels of communications availability to all<br />
relevant teams, with a tailored interface for<br />
the bespoke requirements of the specific<br />
applications and organisations using it.<br />
Mall Call employs a robust and seamless<br />
touchscreen interface which can be used on<br />
any suitable smart device (including a smart<br />
watch). The whole system is hosted on a<br />
secure fixed and wireless system at Canary<br />
Wharf for full control of communications.<br />
With Phase One of the project underway,<br />
Multitone is working closely with the team at<br />
Canary Wharf Group to investigate potential<br />
ways of expanding the project in the future.<br />
72<br />
www.risk-uk.com
Risk in Action<br />
Chubb secures major contract with<br />
Charnwood Borough Council in bid<br />
to protect the vulnerable<br />
Chubb Fire & Security’s Community Care<br />
business has won a major new service and<br />
maintenance contract to help protect more<br />
than 2,500 elderly and vulnerable residents<br />
on behalf of Charnwood Borough Council in<br />
northern Leicestershire.<br />
The contract requires the maintenance of<br />
third party telecare systems across the<br />
Borough’s assisted living and sheltered<br />
housing accommodation. Systems include<br />
assisted living and carephone solutions with<br />
devices such as pull cords and alarm<br />
pendants. No less than 14 sheltered housing<br />
properties are included in the contract, as<br />
well as more than 1,000 carephones within<br />
the Council’s wider portfolio.<br />
Telecare is the term for offering remote<br />
care of elderly and physically less able<br />
people, providing the care and reassurance<br />
needed to allow them to remain resident in<br />
their own homes. The use of sensors may be<br />
part of a package which can provide support<br />
for people with illnesses such as dementia,<br />
or those at risk of falling.<br />
Most telecare mitigates harm by reacting<br />
to untoward events and raising a help<br />
response quickly. Some telecare solutions,<br />
such as safety confirmation and lifestyle<br />
monitoring, have a preventative function in<br />
that a deterioration in the telecare user’s<br />
well-being can be spotted at an early stage.<br />
In a competitive tender involving six<br />
companies, suppliers had to demonstrate<br />
their expertise and capacity to adhere to<br />
strict Key Performance Indicators regarding<br />
maintenance response times.<br />
Sally Ramalho, principal officer for<br />
supported housing at Charnwood Borough<br />
Council, said: “Chubb has successfully<br />
delivered on everything that was set out in<br />
the tender process. We have regular<br />
meetings where maintenance response<br />
times are openly discussed and any possible<br />
improvements are suggested.”<br />
ESG signs compliance consultancy<br />
agreement with Royal Albert Hall<br />
SOCOTEC company Environmental Services Group<br />
(ESG) – a leading provider of testing, inspection<br />
and compliance services offering comprehensive<br />
solutions for the infrastructure, built environment<br />
and energy and waste sectors – has been selected<br />
to work with the Royal Albert Hall. The new<br />
agreement represents an exciting opportunity for<br />
ESG to demonstrate its extensive capabilities<br />
within such a historic and iconic building.<br />
Since the Royal Albert Hall’s official opening by<br />
Queen Victoria in 1871, the world’s leading artists<br />
from many performance genres have appeared on<br />
its stage and it has become one of the UK’s most<br />
treasured and distinctive buildings. The location of<br />
some of the most notable events in British culture, each year the building hosts<br />
more than 390 shows in the main auditorium, including classical, rock and pop<br />
concerts, ballet, opera, film screenings with live orchestras, sports, award<br />
ceremonies, school and community events, charity performances and<br />
banquets. A further 400 events are held each year in the building’s nonauditorium<br />
spaces.<br />
The agreement with ESG was formed as a result of the company’s proven<br />
technical expertise encompassed by a wide-ranging resource pool of flexible<br />
working staff, as well as an internal IT team that’s able to develop the ESGi<br />
online client portal for convenient access to client reports.<br />
Indeed, ESG can guarantee that the Royal Albert Hall will receive a coordinated<br />
service that has the potential to extend beyond the length and<br />
breadth of the current contract agreement.<br />
Nick Harper, operations director for built environment services at ESG,<br />
informed Risk UK: “We’re very proud to support this prestigious building.”<br />
Advanced fire panels protect<br />
Liberty Stadium in Swansea<br />
The Liberty Stadium, home of Premier<br />
League football club Swansea City and<br />
Guinness Pro14 rugby union side<br />
Ospreys, is being protected by<br />
intelligent fire panels from Advanced.<br />
Opened in 2005, the 20,750-capacity<br />
stadium was the first venue in Wales to<br />
host Premier League football and is the<br />
country’s third largest. Having played<br />
host to international football matches, rugby and high-profile concerts – with<br />
Take That scheduled to appear at the venue on 22 October – it has become one<br />
of the most recognisable stadiums in the UK.<br />
The new Advanced MxPro 5 fire panels were supplied by Discount Fire<br />
Supplies and installed by Kelden Fire and Security, both long-time Advanced<br />
partners. Covering the entire stadium including all public and back of house<br />
areas, the installation is comprised of six MxPro 5 panels linked by faulttolerant<br />
network cards and supplemented by two touchpad display terminals.<br />
Lee Kellaway, director of Kelden Fire and Security, commented: “The system<br />
has been installed in all of the open concourse areas of the stadium which are<br />
regularly used by sports fans, so on that basis it’s hugely important the fire<br />
system is always kept up-to-date.”<br />
MxPro offers customers a choice of two panel ranges, four detector protocols<br />
and a completely open installer network that enjoys free training and support.<br />
Photograph: Alexander Ridler<br />
73<br />
www.risk-uk.com
Technology in Focus<br />
Gallagher Security teams with EyeLynx to add Full-HD VMS<br />
solution for Command Centre integrations<br />
Gallagher Security has extended the range of video management systems<br />
(VMS) which can integrate into its ubiquitous access and control solution.<br />
EyeLynx has now developed a plug-in to integrate its SharpView NVR with the<br />
Gallagher Command Centre.<br />
Specifically, this integration allows security managers operating a Gallagher<br />
Command Centre for site control to view the high-end recording capabilities of<br />
SharpView all in one place.<br />
Security operators can respond swiftly and appropriately to any security<br />
threats through the real-time display of outputs from complementary security<br />
and site management solutions<br />
defined uniquely for their site.<br />
SharpView offers full-resolution<br />
recording and remote monitoring<br />
from an unlimited number of HD<br />
CCTV cameras. It’s in use at highsecurity<br />
water, utilities and<br />
education sites and is praised by the<br />
Metropolitan Police Service.<br />
www.eyelynx.com<br />
OPTEX Europe issues upgraded<br />
version of VX Shield sensor<br />
OPTEX Europe has launched an enhanced<br />
version of its best-selling sensor across<br />
Europe, namely the VX Shield, with a new<br />
housing design and features that make it<br />
even easier to install.<br />
The outdoor intrusion detector, which<br />
provides 12 metre x 90 degree detection<br />
coverage, now includes a rotation lock to<br />
make it easier to open/close the cover.<br />
Sensor adjustment components are also<br />
identified in blue to make it obvious which<br />
parts allow manipulation of the sensor<br />
detection area. This renders the sensor<br />
easier to adjust. A spirit level has also been<br />
incorporated, while an automatic ‘walk test’<br />
mode kick-starts upon closing the cover.<br />
www.optex-europe.com<br />
B-Cam’s Compact camera range<br />
packs power into small frame<br />
B-Cam – a leading supplier of body-worn<br />
security cameras for the military, Government,<br />
police and security solutions providers around<br />
the world – has just unveiled its new Compact<br />
camera as the latest product in the company’s<br />
range of surveillance systems.<br />
The Compact model packs plenty of power<br />
into its 110 mm by 60 mm frame, with over<br />
eight hours of continuous recording and the<br />
ability for end users to record in 480p, 720p<br />
(HD), 1080p (FHD) or 2000p (2K resolution).<br />
Compact cameras are capable of both low-light and infrared recording, and<br />
are supplied with a rear 2” configurable display screen. The units are<br />
waterproof and boast a memory of up to 64 GB.<br />
Impressively, these new cameras weigh just 170g. That’s less than half a<br />
small loaf of bread.<br />
B-Cam is at the forefront of delivering body-worn camera solutions to police<br />
services, operatives in the National Health Service, shopping centres, football<br />
clubs and security-related events globally where high quality audio and video<br />
recordings are captured and used to facilitate evidence management<br />
procedures during criminal and/or anti-social incidents.<br />
Herman Vermaak, managing director of B-Cam, informed Risk UK: “B-Cam is<br />
all about trying to support the people who help to keep us safe and secure. The<br />
B-Cam Compact affords security professionals the surveillance capabilities they<br />
need in a package that will not weigh them down. The Compact camera is a<br />
highly visible visual deterrent to potential trouble-makers.”<br />
With a configurable display screen and different resolution options, the B-<br />
Cam Compact affords end users plenty of operational options.<br />
Vermaak concluded: “The B-Cam Compact may be small, but it’s capable of<br />
powerful things.”<br />
www.b-cam.net<br />
Invixium integrates with Paxton’s<br />
established Net2 Access Control<br />
Paxton has announced the integration of its<br />
networked access control system, Net2, with<br />
Invixium’s biometric software, designated IXM<br />
WEB. The integration allows for real-time<br />
synchronisation between the two applications,<br />
removing the need to enter user data in two<br />
places and dramatically reducing set-up time.<br />
The integration provides customers with the<br />
benefit of expanding their access control offer<br />
with a biometric solution. From installation to<br />
adding new users, the Net2 and IXM WEB<br />
integration has been carefully scripted.<br />
www.paxton.co.uk<br />
74<br />
www.risk-uk.com
Technology in Focus<br />
Ocucon’s surveillance technology<br />
set to “revolutionise” fight against<br />
criminals targeting UK businesses<br />
“Groundbreaking” surveillance technology is<br />
set to “revolutionise” the ability of UK<br />
businesses to defend against fraudulent cases<br />
of slips, trips and falls which are currently<br />
estimated to cost more than £800 million per<br />
annum. The “world’s first” Video Surveillance<br />
as a Service (VSaaS) system – designated<br />
Ocucon – will provide unlimited storage for<br />
unlimited cameras within the cloud.<br />
Launched in the UK in partnership with<br />
Google Cloud, the new technology will remove<br />
physical limitations on the amount of<br />
surveillance footage an organisation can save.<br />
Delivering a cloud-based storage and<br />
retrieval platform, Ocucon combines intelligent<br />
data analytics with the facility to store, analyse<br />
and retrieve video surveillance footage from<br />
within the Ocucon portal.<br />
Ocucon’s co-founder Gary Trotter (pictured)<br />
commented: “Providing organisations with the<br />
flexibility to store uncapped amounts of data<br />
for as long as required will revolutionise the<br />
way in which businesses defend themselves<br />
against wrongful allegations.”<br />
www.ocucon.com<br />
Induction-based mechatronic keys<br />
signal further technological<br />
innovation from LOCKEN<br />
LOCKEN’s permanent quest for innovation has<br />
been an important factor in the company<br />
leading the way for smart digital keys, with<br />
over 150,000 buildings equipped throughout<br />
Europe. Now, the business has taken a further<br />
significant step forwards with a new solution<br />
based on magnetic induction.<br />
Central to this new process, LOCKEN<br />
combines the advantages of a traditional<br />
mechanical lock with a state-of-the-art<br />
electronic solution to offer what it calls “an<br />
unprecedented standard” of reliability.<br />
In this new mechatronic solution, the<br />
information is exchanged between the key and<br />
the cylinder by magnetic induction rather than<br />
an electrical contact. This has two major<br />
benefits. First, it allows for much smoother<br />
Harnessing radar technology<br />
for security surveillance<br />
addressed by 360 Vision<br />
Technology and Navtech Radar<br />
Harbouring a strong emphasis on<br />
technical innovation and design, CCTV<br />
solutions manufacturer 360 Vision<br />
Technology has partnered with Navtech<br />
Radar to create effective surveillance<br />
camera solutions for wide area security<br />
monitoring and intruder detection.<br />
Perfect for many electronic<br />
surveillance applications, radar<br />
technology is often thought to be the<br />
preserve of only airports and ports, but<br />
the advantages of radar can be used<br />
across a wide variety of security<br />
surveillance applications.<br />
Radar operates using the same<br />
principles as echolocation – the same<br />
system that bats and dolphins use to<br />
navigate with – by emitting sounds that<br />
bounce off nearby objects. Based on the<br />
volume of the sounds that return and<br />
the time it takes, systems are able to<br />
produce a map of their environment.<br />
Radar can track multiple objects (up to 40<br />
in the case of 360 Vision Technology’s<br />
Predator Radar ‘all-in-one’ wide area PTZ<br />
camera). Its sophisticated on-board software<br />
will identity target objects and continue to<br />
track them until they leave the monitored<br />
area (or beyond if required). This alerts CCTV<br />
operators to a developing situation and<br />
identifies the location of given objects.<br />
www.360visiontechnology.com<br />
use by opening the lock almost<br />
instantaneously, because the<br />
information is exchanged<br />
between the key and the cylinder<br />
in fewer than 80 milliseconds (ie<br />
the time it takes a regular key to<br />
recognise a mechanical cylinder).<br />
Second, all communication<br />
between the key and the cylinder<br />
is contact-free, so it’s not<br />
disrupted by problems due to rust, wear or the<br />
presence of dust in the cylinder. Consequently,<br />
the reliability of the locks is “unmatched”.<br />
A Bluetooth module means the mechatronic<br />
key communicates with the end user’s smart<br />
phone using the MyLocken App. In this case,<br />
it’s capable of offering centralised control and<br />
case-by-case, real-time access control,<br />
reaching standards of security usually only<br />
available from online access control systems.<br />
www.locken.eu<br />
75<br />
www.risk-uk.com
National Association for<br />
Healthcare Security<br />
Annual Conference and Exhibition<br />
November 9th, Birmingham<br />
PLATINUM SPONSOR B-CAM<br />
Organisers AllSecurityEvents.com<br />
“Protecting the Million”<br />
This year, the National Association for Healthcare<br />
Security Annual Conference moves to Birmingham<br />
at a cool, contemporary venue, minutes from New<br />
Street Station.<br />
The Conference, supported by our Platinum<br />
Sponsor, body-worn camera specialists, B-CAM<br />
will include a leading security speakers and subject<br />
matter experts, including<br />
• Philip Ingram MBE – ex senior British<br />
Intelligence officer, media commentator and<br />
writer<br />
• Tony Porter – the Surveillance Camera<br />
Commissioner<br />
NAHS Awards<br />
#NAHS17 will also feature our new awards,<br />
recognising those who have made a significant<br />
contribution to healthcare security - for details on<br />
how to enter contact hello@allsecurityevents.com<br />
We thank our sponsors and exhibitors for their<br />
support, helping NAHS provide a safe and secure<br />
environment for staff and patients in the healthcare<br />
sector.<br />
Exhibitors include<br />
B-Cam<br />
Carlisle Support<br />
Services<br />
Corps Security<br />
Deister<br />
Gunnebo<br />
Paxton<br />
SkyGuard<br />
Volunteering Values<br />
Book for #NAHS17 here<br />
https://goo.gl/EH9SHM<br />
Media Partners
Appointments<br />
Tim Briggs-Mould<br />
NG Bailey’s IT Services<br />
division has appointed<br />
Ministry of Defence (MoD)<br />
veteran Tim Briggs-Mould<br />
to the position of defence<br />
operations director to<br />
oversee the firm’s existing<br />
defence contracts.<br />
Having served in the<br />
Royal Navy for 37 years, Briggs-Mould joins the<br />
business from the MoD where he has spent the<br />
last five years working as head of the British<br />
Forces’ Cyprus CIS branch and also as head of<br />
information systems and services in Cyprus.<br />
An experienced communications specialist in<br />
the maritime field, Briggs-Mould is well versed<br />
in the delivery and maintenance of IT services<br />
and infrastructure, having overseen the CIS<br />
transformation of Cyprus into what is now a<br />
modern, capable and versatile hub for<br />
operations in the Levant.<br />
“NG Bailey’s IT Services division harbours<br />
over a decade’s worth of specialist experience<br />
in delivering structured cabling contracts to the<br />
defence industry and continues to play a critical<br />
role in the sector’s digital transformation,”<br />
commented Briggs-Mould. “Few IT services<br />
firms can claim to have over 200 engineers<br />
actively supporting current defence contracts.<br />
I’m very excited to be joining a business that’s<br />
so engaged in my specialist sector.”<br />
Briggs-Mould will report directly to Kelly<br />
Tedesco, business development director for IT<br />
Services, who stated: “Digital transformation in<br />
the defence sector remains a key growth area<br />
for us. Providing effective IT services to this<br />
sector requires a depth of knowledge and<br />
awareness that only a defence specialist can<br />
deliver. Tim’s experience will help us to ensure<br />
that we remain at the forefront of this sector.”<br />
Graham Lowe<br />
Life safety solutions manufacturer Hochiki<br />
Europe (UK) has appointed Graham Lowe as<br />
its new managing director. Lowe – who<br />
previously held the position of sales director –<br />
has worked for the business for more than 20<br />
years and, in total, has built up four decades<br />
of experience within the life safety industry.<br />
Lowe’s appointment is announced in the<br />
wake of a successful financial year at Hochiki<br />
Europe, with the business celebrating a record<br />
annual turnover for 2016-2017.<br />
Lowe joined Hochiki Europe in 1996 as<br />
regional sales manager for the Northern<br />
region. Throughout his career, which has been<br />
spent in various roles within the company,<br />
Appointments<br />
Risk UK keeps you up-to-date with all the latest people<br />
moves in the security, fire, IT and Government sectors<br />
Liam Bateman<br />
Evidence Talks, the Milton Keynes-based digital<br />
forensic triage specialist, has made two new<br />
appointments to strengthen the company’s<br />
presence in the digital forensics sector. The<br />
move sees Liam Bateman appointed as principal<br />
forensic consultant and Laura Allen in the role<br />
of sales consultant.<br />
Combining a strong background in IT security<br />
with a specialism in forensic analysis, Bateman<br />
joins from risk management company Advanced<br />
Discovery (previously Millnet). After more than<br />
15 years of investigating computer crime and<br />
performing forensic investigations at the<br />
highest level, Bateman’s outstanding track<br />
record combines successes in the presentation<br />
of evidence in criminal and legal proceedings<br />
and in leading incident response projects, as<br />
well as in finance, sales and technology.<br />
As principal forensic consultant, Bateman will<br />
conduct all of the company’s forensic service<br />
work, drive growth into the eDiscovery market<br />
and lead Evidence Talks through the ISO 17025<br />
process. He’ll also be involved in R&D and help<br />
to create new product technical specifications.<br />
Joining the business as a recent graduate in<br />
Criminology from the University of Leicester,<br />
Laura Allen will assist with the planning and<br />
tactical implementation of sales and marketing<br />
initiatives. While taking a lead in managing the<br />
company’s digital content strategy, Allen will<br />
also be involved in business development and<br />
ongoing initiatives that add value for resellers.<br />
Lowe has developed expertise in all aspects of<br />
the life safety industry – from electrical<br />
engineering and the design of fire detection<br />
systems right through to specific sales and<br />
senior management tasks.<br />
Commenting on his appointment, Lowe<br />
informed Risk UK: “Over the last decade,<br />
Hochiki Europe has continued to lead the way<br />
in the design and manufacture of innovative<br />
life safety solutions. This last year has been an<br />
especially exciting one for the business. We<br />
were able to strengthen our position in the<br />
Italian market with the acquisition of Device<br />
and Electronic Systems (DES srl) and the<br />
creation of Hochiki Italia. We also increased<br />
our presence in Africa by investing in our sales<br />
team presence in the region.”<br />
77<br />
www.risk-uk.com
Appointments<br />
Tom Brookes<br />
Tom Brookes, a senior figure within the fire sector, has<br />
been appointed as the new chairman of the Fire &<br />
Security Association (FSA).<br />
Brookes harbours over 25 years’ experience within the<br />
fire industry, having started work as a fire engineer back<br />
in 1992. He bought Lindum Fire Services in 2002, and has<br />
turned the business into one of the major fire detection<br />
and alarm systems organisations in Lincolnshire.<br />
Brookes’ career has included involvement with a range<br />
of industry bodies. He has served as a Technical Committee member at the<br />
British Standards Institution and as chairman of the British Fire Consortium.<br />
Steve Martin, head of the FSA, commented: “With the fire industry currently<br />
in the spotlight, Tom is the ideal person to ensure the FSA becomes a key<br />
player in ensuring that standards and safety are placed at the forefront of<br />
building development and improvement.”<br />
Speaking about his new role at the FSA, Brookes informed Risk UK: “I’m<br />
delighted to be taking over as chairman of the FSA at what is a very crucial time<br />
for our industry. I aim to use my extensive experience in the fire sector to<br />
ensure that the industry drives through improvements in the safety of both<br />
residential and commercial buildings.”<br />
Gary Harmer<br />
Hikvision UK & Ireland has<br />
appointed security<br />
industry veteran Gary<br />
Harmer as sales director.<br />
Harmer brings with him a<br />
wealth of knowledge and<br />
expertise having held<br />
roles in manufacturing<br />
and engineering and<br />
boasting over 27 years’ experience in the<br />
sphere of security distribution.<br />
In this new role, Harmer is heading up<br />
Hikvision UK & Ireland’s business development<br />
team. Overseeing the day-to-day operations of<br />
the sales function, he’s also working closely<br />
with Hikvision’s authorised distribution<br />
channel, security installers and systems<br />
integrators in addition to key end users.<br />
Commenting on his appointment, Harmer<br />
informed Risk UK: “As the largest security<br />
manufacturer in the world with a vast array of<br />
technologies currently available and many soon<br />
to be released, I’m delighted to be joining<br />
Hikvision’s UK & Ireland team. I’m very excited<br />
at the prospect of working closely with our<br />
distribution and installation partners to deliver<br />
our Best in Class solutions.”<br />
Jason Yang, general manager for Hikvision UK<br />
& Ireland, added: “We’re delighted to welcome<br />
Gary to the Hikvision team and feel that his<br />
knowledge of the UK security industry as well<br />
as his leadership skills will prove invaluable.”<br />
In parallel, Louise Parsons has been<br />
appointed as senior business bevelopment<br />
manager for the South West of England region.<br />
Parsons will report directly to Gary Harmer.<br />
Morgan Vessier<br />
Morgan Vessier has been<br />
appointed as the new<br />
head of risk at BNP<br />
Paribas Leasing Solutions<br />
UK. Within the BNP<br />
Paribas Group, BNP<br />
Paribas Leasing Solutions<br />
specialises in leasing and<br />
rental solutions for<br />
professional equipment, offered either directly<br />
to businesses or through its partners.<br />
Vessier succeeds Mike Quinn, who recently<br />
took over as head of the company’s UK<br />
technology finance division.<br />
Joining the BNP Paribas Group back in 2005,<br />
Vessier has since worked across several key<br />
business units, including BNP Paribas Personal<br />
Finance, where he served as the head of centre<br />
for scoring and the Turkish Economic Bank,<br />
where he acted as director of retail and small<br />
business risk analytics.<br />
“Morgan’s a natural choice for this role,”<br />
stated Jean-Michel Boyer, CEO of BNP Paribas<br />
Leasing Solutions UK. “He brings with him a<br />
huge depth of market knowledge and<br />
experience and, undoubtedly, he will be a<br />
terrific asset to our UK business.”<br />
Rajiv Datta<br />
Colt Technology<br />
Services has appointed<br />
Rajiv Datta as chief<br />
operating officer of the<br />
company, reporting<br />
directly to CEO Carl<br />
Grivner. In this new<br />
expanded role, Datta –<br />
who previously served<br />
as Colt’s CTO – will now bring together Colt’s<br />
operational and technological capabilities,<br />
customer experience strategy and product<br />
and innovation teams under one<br />
organisational framework.<br />
In his 18 months as CTO at Colt, Datta was<br />
responsible for the development of the<br />
company’s network technology strategy and<br />
the creation of its next generation of<br />
products and services, including the<br />
evolution of an SDN-based network.<br />
Datta has also been a key driver of Colt’s<br />
high bandwidth strategy, enabling this<br />
through redesigning, simplifying and<br />
innovating the Colt IQ Network.<br />
Prior to his time with Colt, Datta held a<br />
number of senior positions in the telecoms<br />
and communications infrastructure industry,<br />
including that of chief operating officer at<br />
AboveNet Communications.<br />
78<br />
www.risk-uk.com
“<br />
You have to be here if you want<br />
to be regarded as a key player<br />
in the security market.<br />
“<br />
27,658<br />
visitors from<br />
116 countries<br />
79%<br />
of visitors come to<br />
source new products<br />
£20.7bn<br />
total budget of<br />
visitors to IFSEC 2017<br />
Enquire about exhibiting at IFSEC 2018: ifsec.events/international<br />
Proud to be supported by:
Best Value Security Products from Insight Security<br />
www.insight-security.com Tel: +44 (0)1273 475500<br />
...and<br />
lots<br />
more<br />
Computer<br />
Security<br />
Anti-Climb Paints<br />
& Barriers<br />
Metal Detectors<br />
(inc. Walkthru)<br />
Security, Search<br />
& Safety Mirrors<br />
Security Screws &<br />
Fastenings<br />
Padlocks, Hasps<br />
& Security Chains<br />
Key Safes & Key<br />
Control Products<br />
Traffic Flow &<br />
Management<br />
see our<br />
website<br />
ACCESS CONTROL<br />
KERI SYSTEMS UK LTD<br />
Tel: + 44 (0) 1763 273 243<br />
Fax: + 44 (0) 1763 274 106<br />
Email: sales@kerisystems.co.uk<br />
www.kerisystems.co.uk<br />
ACCESS CONTROL<br />
ACCESS CONTROL<br />
ACT<br />
ACT – Ireland, Unit C1, South City Business Park,<br />
Tallaght, Dublin, D24 PN28.Ireland. Tel: +353 1 960 1100<br />
ACT - United Kingdom, 601 Birchwood One, Dewhurst Road,<br />
Warrington, WA3 7GB. Tel: +44 161 236 9488<br />
sales@act.eu www.act.eu<br />
ACCESS CONTROL – BARRIERS, GATES, CCTV<br />
ABSOLUTE ACCESS<br />
Aberford Road, Leeds, LS15 4EF<br />
Tel: 01132 813511<br />
E: richard.samwell@absoluteaccess.co.uk<br />
www.absoluteaccess.co.uk<br />
Access Control, Automatic Gates, Barriers, Blockers, CCTV<br />
ACCESS CONTROL<br />
COVA SECURITY GATES LTD<br />
Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards<br />
Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68<br />
Tel: 01293 553888 Fax: 01293 611007<br />
Email: sales@covasecuritygates.com<br />
Web: www.covasecuritygates.com<br />
ACCESS CONTROL & DOOR HARDWARE<br />
ALPRO ARCHITECTURAL HARDWARE<br />
Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks,<br />
Waterproof Keypads, Door Closers, Deadlocks plus many more<br />
T: 01202 676262 Fax: 01202 680101<br />
E: info@alpro.co.uk<br />
Web: www.alpro.co.uk<br />
ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />
HTC PARKING AND SECURITY LIMITED<br />
St. James’ Bus. Centre, Wilderspool Causeway,<br />
Warrington Cheshire WA4 6PS<br />
Tel 01925 552740 M: 07969 650 394<br />
info@htcparkingandsecurity.co.uk<br />
www.htcparkingandsecurity.co.uk<br />
ACCESS CONTROL<br />
INTEGRATED DESIGN LIMITED<br />
Integrated Design Limited, Feltham Point,<br />
Air Park Way, Feltham, Middlesex. TW13 7EQ<br />
Tel: +44 (0) 208 890 5550<br />
sales@idl.co.uk<br />
www.fastlane-turnstiles.com<br />
ACCESS CONTROL<br />
SECURE ACCESS TECHNOLOGY LIMITED<br />
Authorised Dealer<br />
Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />
Email: info@secure-access.co.uk<br />
Website: www.secure-access.co.uk<br />
ACCESS CONTROL MANUFACTURER<br />
NORTECH CONTROL SYSTEMS LTD.<br />
Nortech House, William Brown Close<br />
Llantarnam Park, Cwmbran NP44 3AB<br />
Tel: 01633 485533<br />
Email: sales@nortechcontrol.com<br />
www.nortechcontrol.com<br />
Custom Designed Equipment<br />
• Indicator Panels<br />
• Complex Door Interlocking<br />
• Sequence Control<br />
• Door Status Systems<br />
• Panic Alarms<br />
<br />
• Bespoke Products<br />
www.hoyles.com<br />
sales@hoyles.com<br />
Tel: +44 (0)1744 886600<br />
ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES<br />
UKB INTERNATIONAL LTD<br />
Planet Place, Newcastle upon Tyne<br />
Tyne and Wear NE12 6RD<br />
Tel: 0845 643 2122<br />
Email: sales@ukbinternational.com<br />
Web: www.ukbinternational.com<br />
Hoyles are the UK’s leading supplier of<br />
custom designed equipment for the<br />
security and access control industry.<br />
From simple indicator panels to<br />
complex door interlock systems.<br />
BUSINESS CONTINUITY<br />
ACCESS CONTROL, INTRUSION DETECTION AND VIDEO MANAGEMENT<br />
VANDERBILT INTERNATIONAL (UK) LTD<br />
Suite 7, Castlegate Business Park<br />
Caldicot, South Wales NP26 5AD UK<br />
Main: +44 (0) 2036 300 670<br />
email: info.uk@vanderbiltindustries.com<br />
web: www.vanderbiltindustries.com<br />
BUSINESS CONTINUITY MANAGEMENT<br />
CONTINUITY FORUM<br />
Creating Continuity ....... Building Resilience<br />
A not-for-profit organisation providing help and support<br />
Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845<br />
Email: membership@continuityforum.org<br />
Web: www.continuityforum.org<br />
www.insight-security.com Tel: +44 (0)1273 475500
CCTV<br />
CCTV<br />
Rapid Deployment Digital IP High Resolution CCTV<br />
40 hour battery, Solar, Wind Turbine and Thermal Imaging<br />
Wired or wireless communication fixed IP<br />
CE Certified<br />
Modicam Europe, 5 Station Road, Shepreth,<br />
Cambridgeshire SG8 6PZ<br />
www.modicam.com sales@modicameurope.com<br />
CCTV SPECIALISTS<br />
PLETTAC SECURITY LTD<br />
Unit 39 Sir Frank Whittle Business Centre,<br />
Great Central Way, Rugby, Warwickshire CV21 3XH<br />
Tel: 01788 567811 Fax: 01788 544 549<br />
Email: jackie@plettac.co.uk<br />
www.plettac.co.uk<br />
CONTROL ROOM & MONITORING SERVICES<br />
CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS<br />
ALTRON COMMUNICATIONS EQUIPMENT LTD<br />
Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />
Tel: +44 (0) 1269 831431<br />
Email: cctvsales@altron.co.uk<br />
Web: www.altron.co.uk<br />
CCTV<br />
G-TEC<br />
Gtec House, 35-37 Whitton Dene<br />
Hounslow, Middlesex TW3 2JN<br />
Tel: 0208 898 9500<br />
www.gtecsecurity.co.uk<br />
sales@gtecsecurity.co.uk<br />
ADVANCED MONITORING SERVICES<br />
EUROTECH MONITORING SERVICES LTD.<br />
Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring<br />
• Vehicle Tracking • Message Handling<br />
• Help Desk Facilities • Keyholding/Alarm Response<br />
Tel: 0208 889 0475 Fax: 0208 889 6679<br />
E-MAIL eurotech@eurotechmonitoring.net<br />
Web: www.eurotechmonitoring.net<br />
DISTRIBUTORS<br />
CCTV/IP SOLUTIONS<br />
DALLMEIER UK LTD<br />
3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH<br />
Tel: +44 (0) 117 303 9 303<br />
Fax: +44 (0) 117 303 9 302<br />
Email: dallmeieruk@dallmeier.com<br />
SPECIALISTS IN HD CCTV<br />
MaxxOne<br />
Unit A10 Pear Mill, Lower Bredbury, Stockport. SK6 2BP<br />
Tel +44 (0)161 430 3849<br />
www.maxxone.com<br />
sales@onlinesecurityproducts.co.uk<br />
www.onlinesecurityproducts.co.uk<br />
CCTV & IP SECURITY SOLUTIONS<br />
PANASONIC SYSTEM COMMUNICATIONS COMPANY<br />
EUROPE<br />
Panasonic House, Willoughby Road<br />
Bracknell, Berkshire RG12 8FP UK<br />
Tel: 0207 0226530<br />
Email: info@business.panasonic.co.uk<br />
AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />
DISTRIBUTOR OF SECURITY AND LOW VOLTAGE PRODUCTS.<br />
ADI GLOBAL DISTRIBUTION<br />
Distributor of electronic security systems and solutions for over 250 leading manufacturers, the company<br />
also offers an internal technical support team, dedicated field support engineers along with a suite of<br />
training courses and services. ADI also offers a variety of fast, reliable delivery options, including specified<br />
time delivery, next day or collection from any one of 28 branches nationwide. Plus, with an ADI online<br />
account, installers can order up to 7pm for next day delivery.<br />
Tel: 0161 767 2990 Fax: 0161 767 2999 Email: sales.uk@adiglobal.com www.adiglobal.com/uk<br />
COMMUNICATIONS & TRANSMISSION EQUIPMENT<br />
KBC NETWORKS LTD.<br />
Barham Court, Teston, Maidstone, Kent ME18 5BZ<br />
www.kbcnetworks.com<br />
Phone: 01622 618787<br />
Fax: 020 7100 8147<br />
Email: emeasales@kbcnetworks.com<br />
WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS,<br />
PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.<br />
MAYFLEX<br />
Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ<br />
Tel: 0800 881 5199<br />
Email: securitysales@mayflex.com<br />
Web: www.mayflex.com<br />
DIGITAL IP CCTV<br />
SESYS LTD<br />
High resolution ATEX certified cameras, rapid deployment<br />
cameras and fixed IP CCTV surveillance solutions available with<br />
wired or wireless communications.<br />
1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG<br />
Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333<br />
Email: info@sesys.co.uk www.sesys.co.uk<br />
www.insight-security.com Tel: +44 (0)1273 475500
THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESS<br />
CONTROL AND INTRUDER DETECTION SOLUTIONS<br />
NORBAIN SD LTD<br />
210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP<br />
Tel: 0118 912 5000 Fax: 0118 912 5001<br />
www.norbain.com<br />
Email: info@norbain.com<br />
INTEGRATED SECURITY SOLUTIONS<br />
INNER RANGE EUROPE LTD<br />
Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead,<br />
Reading, Berkshire RG74GB, United Kingdom<br />
Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001<br />
Email: ireurope@innerrange.co.uk<br />
www.innerrange.com<br />
UK LEADERS IN BIG BRAND CCTV DISTRIBUTION<br />
SATSECURE<br />
Hikivision & MaxxOne (logos) Authorised Dealer<br />
Unit A10 Pear Mill, Lower Bredbury,<br />
Stockport. SK6 2BP<br />
Tel +44 (0)161 430 3849<br />
www.satsecure.uk<br />
PERIMETER PROTECTION<br />
IDENTIFICATION<br />
ADVANCED PRESENCE DETECTION AND SECURITY LIGHTING SYSTEMS<br />
GJD MANUFACTURING LTD<br />
Unit 2 Birch Business Park, Whittle Lane, Heywood, OL10 2SX<br />
Tel: + 44 (0) 1706 363998<br />
Fax: + 44 (0) 1706 363991<br />
Email: info@gjd.co.uk<br />
www.gjd.co.uk<br />
COMPLETE SOLUTIONS FOR IDENTIFICATION<br />
DATABAC GROUP LIMITED<br />
1 The Ashway Centre, Elm Crescent,<br />
Kingston upon Thames, Surrey KT2 6HH<br />
Tel: +44 (0)20 8546 9826<br />
Fax:+44 (0)20 8547 1026<br />
enquiries@databac.com<br />
INDUSTRY ORGANISATIONS<br />
PERIMETER PROTECTION<br />
GPS PERIMETER SYSTEMS LTD<br />
14 Low Farm Place, Moulton Park<br />
Northampton, NN3 6HY UK<br />
Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />
E-mail: info@gpsperimeter.co.uk<br />
Web site: www.gpsperimeter.co.uk<br />
POWER<br />
TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY<br />
BRITISH SECURITY INDUSTRY ASSOCIATION<br />
Tel: 0845 389 3889<br />
Email: info@bsia.co.uk<br />
Website: www.bsia.co.uk<br />
Twitter: @thebsia<br />
POWER SUPPLIES – DC SWITCH MODE AND AC<br />
DYCON LTD<br />
Unit A, Cwm Cynon Business Park, Mountain Ash, CF45 4ER<br />
Tel: 01443 471900 Fax: 01443 479 374<br />
Email: sales@dyconpower.com<br />
www.dyconpower.com<br />
THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY<br />
SSAIB<br />
7-11 Earsdon Road, West Monkseaton<br />
Whitley Bay, Tyne & Wear<br />
NE25 9SX<br />
Tel: 0191 2963242<br />
Web: www.ssaib.org<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
ADEPT POWER SOLUTIONS LTD<br />
Adept House, 65 South Way, Walworth Business Park<br />
Andover, Hants SP10 5AF<br />
Tel: 01264 351415 Fax: 01264 351217<br />
Web: www.adeptpower.co.uk<br />
E-mail: sales@adeptpower.co.uk<br />
INTEGRATED SECURITY SOLUTIONS<br />
SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />
HONEYWELL SECURITY AND FIRE<br />
Tel: +44 (0) 844 8000 235<br />
E-mail: securitysales@honeywell.com<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
UNINTERRUPTIBLE POWER SUPPLIES LTD<br />
Woodgate, Bartley Wood Business Park<br />
Hook, Hampshire RG27 9XA<br />
Tel: 01256 386700 5152 e-mail:<br />
sales@upspower.co.uk<br />
www.upspower.co.uk<br />
www.insight-security.com Tel: +44 (0)1273 475500
SECURITY<br />
ANTI-CLIMB SOLUTIONS & SECURITY PRODUCT SPECIALISTS<br />
INSIGHT SECURITY<br />
Units 1 & 2 Cliffe Industrial Estate<br />
Lewes, East Sussex BN8 6JL<br />
Tel: 01273 475500<br />
Email:info@insight-security.com<br />
www.insight-security.com<br />
CASH & VALUABLES IN TRANSIT<br />
CONTRACT SECURITY SERVICES LTD<br />
Challenger House, 125 Gunnersbury Lane, London W3 8LH<br />
Tel: 020 8752 0160 Fax: 020 8992 9536<br />
E: info@contractsecurity.co.uk<br />
E: sales@contractsecurity.co.uk<br />
Web: www.contractsecurity.co.uk<br />
QUALITY SECURITY AND SUPPORT SERVICES<br />
CONSTANT SECURITY SERVICES<br />
Cliff Street, Rotherham, South Yorkshire S64 9HU<br />
Tel: 0845 330 4400<br />
Email: contact@constant-services.com<br />
www.constant-services.com<br />
ONLINE SECURITY SUPERMARKET<br />
EBUYELECTRICAL.COM<br />
Lincoln House,<br />
Malcolm Street<br />
Derby DE23 8LT<br />
Tel: 0871 208 1187<br />
www.ebuyelectrical.com<br />
LIFE SAFETY EQUIPMENT<br />
C-TEC<br />
Challenge Way, Martland Park,<br />
Wigan WN5 OLD United Kingdom<br />
Tel: +44 (0) 1942 322744<br />
Fax: +44 (0) 1942 829867<br />
Website: www.c-tec.com<br />
PERIMETER SECURITY<br />
TAKEX EUROPE LTD<br />
Aviary Court, Wade Road, Basingstoke<br />
Hampshire RG24 8PE<br />
Tel: +44 (0) 1256 475555<br />
Fax: +44 (0) 1256 466268<br />
Email: sales@takex.com<br />
Web: www.takex.com<br />
FENCING SPECIALISTS<br />
J B CORRIE & CO LTD<br />
Frenchmans Road<br />
Petersfield, Hampshire GU32 3AP<br />
Tel: 01730 237100<br />
Fax: 01730 264915<br />
email: fencing@jbcorrie.co.uk<br />
INTRUSION DETECTION AND PERIMETER PROTECTION<br />
OPTEX (EUROPE) LTD<br />
Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre<br />
optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B<br />
Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ<br />
Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311<br />
Email: sales@optex-europe.com<br />
www.optex-europe.com<br />
SECURITY EQUIPMENT<br />
PYRONIX LIMITED<br />
Secure House, Braithwell Way, Hellaby,<br />
Rotherham, South Yorkshire, S66 8QY.<br />
Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042<br />
www.facebook.com/Pyronix<br />
www.linkedin.com/company/pyronix www.twitter.com/pyronix<br />
SECURITY SYSTEMS<br />
BOSCH SECURITY SYSTEMS LTD<br />
PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />
Tel: 0330 1239979<br />
E-mail: uk.securitysystems@bosch.com<br />
Web: uk.boschsecurity.com<br />
INTRUDER AND FIRE PRODUCTS<br />
CQR SECURITY<br />
125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />
Tel: 0151 606 1000<br />
Fax: 0151 606 1122<br />
Email: andyw@cqr.co.uk<br />
www.cqr.co.uk<br />
SECURITY EQUIPMENT<br />
CASTLE<br />
Secure House, Braithwell Way, Hellaby,<br />
Rotherham, South Yorkshire, S66 8QY<br />
TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042<br />
www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity<br />
www.twitter.com/castlesecurity<br />
SECURE CONNECTIVITY PROVIDERS<br />
CSL<br />
T: +44 (0)1895 474 474<br />
sales@csldual.com<br />
@CSLDualCom<br />
www.csldual.com<br />
SECURITY PRODUCTS<br />
EATON<br />
Eaton is one of the world’s leading manufacturers of security equipment<br />
its Scantronic and Menvier product lines are suitable for all types of<br />
commercial and residential installations.<br />
Tel: 01594 545 400 Email: securitysales@eaton.com<br />
Web: www.uk.eaton.com Twitter: @securityTP<br />
INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS<br />
RISCO GROUP<br />
Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton,<br />
Manchester, M24 2SS<br />
Tel: 0161 655 5500 Fax: 0161 655 5501<br />
Email: sales@riscogroup.co.uk<br />
Web: www.riscogroup.com/uk<br />
SECURITY SYSTEMS<br />
VICON INDUSTRIES LTD.<br />
Brunel Way, Fareham<br />
Hampshire, PO15 5TX<br />
United Kingdom<br />
www.vicon.com<br />
www.insight-security.com Tel: +44 (0)1273 475500