11.10.2017 Views

RiskUKOctober2017

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

October 2017<br />

www.risk-uk.com<br />

Security and Fire Management<br />

Visual Hacking<br />

Protection Regimes for Confidential Information<br />

Data Centres: Security and Fire Safety Risk Management<br />

Access Control: Developments in the Biometrics Arena<br />

Counter-Terrorism: HVM, Physical Security and Screening<br />

Healthcare Sector: System Solutions for Risk Managers


“<br />

MY PASSION IS<br />

ALWAYS GOING THAT<br />

EXTRA MILE -<br />

WHATEVER THE JOB<br />

”<br />

Steve Lang, CNC Programmer/Operator, 3 years with Jacksons<br />

OUR PASSION<br />

IS YOUR SECURITY<br />

We combine the highest quality<br />

perimeter security fencing and<br />

gates with seventy years of expertise<br />

to provide you with the right solution<br />

for your project, large or small.<br />

www.jacksons-fencing.co.uk<br />

0800 953 3730<br />

Jacksons<br />

Fencing


October 2017<br />

Contents<br />

33 In Search of Recognition<br />

The benefits of biometrics described in detail by Shaun Oakes<br />

Security in the Built Environment (pp22-23)<br />

5 Editorial Comment<br />

6 News Update<br />

Industry reports from SRI. BSI resilience benchmarking study.<br />

Biometrics Commissioner’s 2016 Annual Report. Cyber skills gap<br />

8 News Analysis: UK-EU Security Partnership<br />

Brian Sims observes the latest political developments at<br />

Westminster relating to UK-EU security co-operation post-Brexit<br />

11 News Special: Cortech Open Innovation Events<br />

Brian Sims reviews last month’s successful COIE in Glasgow<br />

12 News Special: BCI World Conference 2017<br />

The BCI’s 2017 Conference and Exhibition previewed by Risk UK<br />

13 News Special: NAHS Conference and Exhibition<br />

Brian Sims on the programme for the 2017 NAHS Conference<br />

14 Opinion: Crowded Places Risk Management<br />

Andrew Mortimer outlines why he believes the way in which<br />

large crowds are protected from harm merits reconsideration<br />

16 Opinion: Mind Your Own Business<br />

Dan Hardy offers timely advice about what companies can do to<br />

protect themselves from the threat of commercial burglary<br />

19 BSIA Briefing<br />

James Kelly discusses Health and Safety issues for businesses<br />

and various initiatives operational in the private security sector<br />

36 Risk Management for Counter-Terrorism<br />

Hostile Vehicle Mitigation (p36), physical security solutions<br />

(p38) and screening techniques (p40) under the microscope<br />

42 A Touch of Retail Security Therapy<br />

Cardinal Security working in partnership with Dixons Carphone<br />

44 Security Solutions in the Healthcare Sector<br />

Body-worn cameras (p44), the benefits of access control (p46)<br />

and an overview of next month’s UHEI Conference (p48)<br />

53 Signed, Sealed, Delivered<br />

Jason Wakefield addresses risks posed to today’s Mail Rooms<br />

56 Meet The Security Company<br />

Risk UK shines the spotlight on Securi-Guard Fire and Security<br />

59 The Security Institute’s View<br />

62 In The Spotlight: ASIS International UK Chapter<br />

64 FIA Technical Briefing<br />

66 Security Services: Best Practice Casebook<br />

68 Cyber Security: Visual Hacking in Focus<br />

70 Training and Career Development<br />

72 Risk in Action<br />

74 Technology in Focus<br />

77 Appointments<br />

80 The Risk UK Directory<br />

22 SBD and CPTED: Built Environment Security<br />

Philip Strand argues why security professionals must be<br />

included in the construction process at the very earliest stages<br />

24 Left To Their Own Devices<br />

BYOD provides a new challenge for security professionals and<br />

one that’s not entirely avoidable. Adam Jaques has the detail<br />

27 Coping With ‘Information Overload’<br />

Chris Edwards evaluates protection measures designed to<br />

ensure Data Centres are safe, secure, resilient and sustainable<br />

ISSN 1740-3480<br />

Risk UK is published monthly by Pro-Activ Publications<br />

Ltd and specifically aimed at security and risk<br />

management, loss prevention, business continuity and<br />

fire safety professionals operating within the UK’s largest<br />

commercial organisations<br />

© Pro-Activ Publications Ltd 2017<br />

All rights reserved. No part of this publication may be<br />

reproduced or transmitted in any form or by any means<br />

electronic or mechanical (including photocopying, recording<br />

or any information storage and retrieval system) without the<br />

prior written permission of the publisher<br />

The views expressed in Risk UK are not necessarily those of<br />

the publisher<br />

Risk UK is currently available for an annual subscription rate of<br />

£78.00 (UK only)<br />

www.risk-uk.com<br />

Risk UK<br />

PO Box 332<br />

Dartford DA1 9FF<br />

Editor Brian Sims BA (Hons) Hon FSyI<br />

Tel: 0208 295 8304 Mob: 07500 606013<br />

e-mail: brian.sims@risk-uk.com<br />

Design and Production Matt Jarvis<br />

Tel: 0208 295 8310 Fax: 0870 429 2015<br />

e-mail: matt.jarvis@proactivpubs.co.uk<br />

Advertisement Director Paul Amura<br />

Tel: 0208 295 8307 Fax: 01322 292295<br />

e-mail: paul.amura@proactivpubs.co.uk<br />

Administration Tracey Beale<br />

Tel: 0208 295 8306 Fax: 01322 292295<br />

e-mail: tracey.beale@proactivpubs.co.uk<br />

Managing Director Mark Quittenton<br />

Chairman Larry O’Leary<br />

Editorial: 0208 295 8304<br />

Advertising: 0208 295 8307<br />

3<br />

www.risk-uk.com


Connect your life to your<br />

home and your security<br />

Interact, control and integrate your Texecom security system like never before<br />

The Texecom Connect App allows you to control your security directly from your compatible<br />

<br />

system events and monitor cameras or activity from anywhere in the world.<br />

www.texe.com<br />

Sales: +44 (0)1706 220460<br />

Watch the Texecom<br />

Connect App video


Texecom Connect App<br />

New smartphone application for<br />

iOS operating systems<br />

Texecom Connect SmartCom<br />

Texecom Connect ethernet<br />

communicator<br />

Texecom Connect SmartPlug<br />

Ricochet ® enabled<br />

wireless plug<br />

Falling Fraud<br />

Editorial Comment<br />

Figures just released by UK Finance reveal financial fraud<br />

losses of £366.4 million in the first half of 2017 to be 8%<br />

lower year-on-year (the comparable figure for 2016 being<br />

£400.4 million). The data, which covers payment card, remote<br />

banking and cheque fraud, also highlights that the finance<br />

industry prevented over £750 million of fraud during the same<br />

period (or 67% of attempted fraud). This compares with £678.7<br />

million of prevented fraud in the first six months of last year.<br />

Drilling down into the fine detail, the industry helped to<br />

prevent over £500 million in attempted card fraud. Actual fraud<br />

losses on cards are down 11% on the same period the year<br />

before to £287.3 million.<br />

Card spending increased by 8.4% year-on-year across the sixmonth<br />

period, meaning that card fraud as a proportion of<br />

spending equates to 7.5 pence for every £100 spent. That’s down<br />

from 8.7 pence in the first half of 2016. This figure peaked in<br />

February 2002 when it was 18.9 pence per £100.<br />

In addition, no less than £160.2 million of remote banking<br />

fraud was prevented. This covers criminals gaining access to an<br />

Internet, phone or mobile banking account to make an<br />

unauthorised transaction. Episodes of such fraud totalled £73.8<br />

million, representing a 3% rise from £71.5 million in 2016.<br />

£88.8 million of cheque fraud was prevented, with fraud<br />

losses in this category falling to £5.3 million. That totals a 28%<br />

drop on the same period in 2016 and, indeed, is the lowest halfyear<br />

total on record. Progress is clearly being made here.<br />

Overall, there were 937,518 cases of financial fraud. This is a<br />

figure that has remained flat compared with the year before.<br />

The data emerges as the banking industry and Government<br />

join forces to launch the next phase of ‘Take Five to Stop Fraud’ –<br />

the national campaign that offers advice aimed at helping<br />

customers to protect themselves from fraud. Launched on<br />

Monday 2 October, the next phase of the campaign is focused on<br />

educating the general public to recognise scams and confidently<br />

challenge any requests for their personal or financial details by<br />

remembering the phrase ‘My money? My info? I don’t think so’.<br />

Katy Worobec (head of fraud and financial crime prevention,<br />

cyber and data sharing at UK Finance) observed: “Tackling fraud<br />

is a top priority for the entire industry, but we must remember<br />

that financial fraud isn’t just an issue for the banking sector. Its<br />

harmful effects stretch far and wide. This is why, when it comes<br />

to prevention, protection or deterrents, the industry is committed<br />

to taking a collaborative approach to curb such crimes and is<br />

now launching the latest strand of the ‘Take Five’ consumer<br />

campaign. Whether it’s banks refining their own security systems<br />

or a retailer holding customer data securely, it must be stressed<br />

that everyone has a part to play.”<br />

UK Finance’s figures serve to illustrate the positive impact that<br />

partnerships between industry and policing can exert in fighting<br />

fraud. There’s still much work to be done, of course, and<br />

particularly so in relation to identify theft and the criminality it<br />

enables. It’s beholden upon us all to be extremely careful about<br />

the degree of personal detail we share in the public domain.<br />

Brian Sims BA (Hons) Hon FSyI<br />

Editor<br />

December 2012<br />

5<br />

www.risk-uk.com


Security Research Initiative focuses on key<br />

considerations for security business sector<br />

The Security Research Initiative (SRI) has just<br />

published two excellent reports addressing key<br />

considerations for the security industry.<br />

Together, these comprehensive documents seek<br />

to understand and highlight the ways in which<br />

private security can help protect the public – in<br />

both private and public space – and how<br />

security’s vital role may be enhanced. They call<br />

upon various stakeholders to consider how, as<br />

an underused and largely capable resource,<br />

private security can best be used, not least in<br />

times of austerity.<br />

The 42-page report entitled Towards ‘A<br />

Strategy for Change’ for the Security Sector<br />

aims to provide a foundation for thinking about<br />

and developing a ‘Strategy for Change’ for the<br />

security business sector. It seeks to provide a<br />

rationale for why private security is important<br />

and suggests ideas (for wider debate) about<br />

how its potential might be realised.<br />

The document is based on three overarching<br />

aims: Government must be encouraged to<br />

develop a strategy for harnessing the enormous<br />

contribution of the private security sector when<br />

it comes to preventing crime, the private<br />

security sector must commit to developing an<br />

ability to talk with a more united and coordinated<br />

voice and the private security sector<br />

must commit to highlighting the enormous<br />

benefits it generates – including those for the<br />

public good – and also commit to ways of<br />

enhancing them. Much of what it currently does<br />

is unheralded and underacknowledged.<br />

The second SRI report, entitled Police Views<br />

on Private Security, runs to 66 pages and<br />

discusses findings from responses provided by<br />

1,361 serving police officers to an online survey<br />

focused on attitudes towards the private<br />

security sector (ie private security suppliers and<br />

corporate security departments). This is<br />

designed to inform the strategy for better<br />

engaging private security.<br />

“Overall, it’s evident that the police officers<br />

surveyed view the private security sector as<br />

useful in some of the aspects of the work that<br />

the police service conducts, and even necessary<br />

in some cases,” stated PRCI’s director Professor<br />

Martin Gill CSyP FSyI (pictured).<br />

Professor Gill continued: “That said, there<br />

appears to be a lack of appetite in the private<br />

security sector for taking a greater role in<br />

supporting or otherwise working in partnership<br />

with the police, and especially so where this<br />

would amount to private security undertaking<br />

‘policing’ tasks in public space.”<br />

Close to six-in-ten respondents believe<br />

private security plays a minor role in protecting<br />

members of the public, while corporate security<br />

departments are seen as being important in<br />

helping the police in their work by 62% of<br />

respondents, but security officers much less so<br />

(with a result of 36%).<br />

Reputation tops list of business priorities in Organisational Resilience study<br />

Protecting reputation tops business leaders’ lists of priorities ahead of financial achievements and<br />

business leadership. That’s according to the world’s first benchmarking study of Organisational<br />

Resilience published by the British Standards Institution.<br />

The study finds that reputation is seen as the most important element in relation to the longterm<br />

success of a business, even more so than financial aspects, leadership and vision and<br />

purpose. Despite this, 43% of those professionals interviewed as part of the global study believe<br />

their organisation is strongly susceptible to reputational risk.<br />

No fewer than 1,250 senior leaders of organisations across the globe participated in the study,<br />

which covers ten sectors across three regions: the UK and Ireland, the USA and the Asia Pacific<br />

region. The magnitude of reputational risk was found to vary by geography. Globally, 62% rate their<br />

organisation’s current reputation as ‘Excellent’ or ‘Very good’, but this figure rises to 75% in the US<br />

and falls to 55% and 56% in the UK and Ireland and Asia Pacific respectively.<br />

Out of the 16 elements that make up Organisational Resilience, the study found that the most<br />

and least important are as follows: Most important Reputational Risk, Financial Aspects,<br />

Leadership, Vision and Purpose and Information and Knowledge Management Least important<br />

Horizon Scanning, Alignment, Community Engagement, Culture and Adaptive Capacity.<br />

The study also investigated how these elements ranked in terms of perceived performance. It<br />

found the following: Highest performing Financial Aspects, Alignment, Leadership, Vision and<br />

Purpose and Governance and Accountability Worst performing Supply Chain, Innovation, Horizon<br />

Scanning, Information and Knowledge Management and Awareness, Training and Testing.<br />

6<br />

www.risk-uk.com


News Update<br />

Biometrics Commissioner’s third<br />

Annual Report scrutinised by Big<br />

Brother Watch<br />

The 2016 report of the Commissioner for the<br />

Retention and Use of Biometric Material was<br />

submitted to Home Secretary Amber Rudd on<br />

14 March this year and has now been<br />

published for public consumption.<br />

The role of the Biometrics Commissioner<br />

was established by the Protection of Freedoms<br />

Act (PoFA) 2012, with Paul Wiles appointed as<br />

the second Commissioner on 1 June 2016.<br />

Wiles’ role is to provide independent oversight<br />

of the regime which was established by the<br />

PoFA – and which came into force on 31<br />

October 2013 – to govern the retention and<br />

use by the police in England and Wales of DNA<br />

samples, DNA profiles and fingerprints.<br />

In addition to casework responsibilities in<br />

relation to DNA and fingerprints, Wiles also<br />

has a UK-wide oversight function as regards<br />

their retention and use by the police service<br />

on national security grounds.<br />

Stretching to no fewer than 125 pages, the<br />

detailed 2016 report deals primarily with<br />

developments since the publication of the<br />

Commissioner’s 2015 report. In essence, it<br />

covers Wiles’ casework activities, the general<br />

operation of the PoFA regime and a variety of<br />

issues that have arisen in connection with its<br />

operation in both the normal policing and<br />

national security spheres.<br />

In response to the report, Renate Samson<br />

(CEO of Big Brother Watch) said: “We welcome<br />

the Biometric Commissioner’s warnings and<br />

concerns about the ongoing creation and<br />

retention of facial biometrics and facial<br />

recognition technology by police forces across<br />

the country. It’s of very serious concern that<br />

the Home Office appears to be so<br />

unwaveringly set on embedding facial<br />

biometric recognition technology into policing<br />

without debate, regulation, legislation or<br />

independent scrutiny.”<br />

Samson continued: “Rather than throwing<br />

millions of pounds at the building of such<br />

intrusive capabilities, the Home Office should<br />

be investing in updating police IT systems to<br />

ensure that the hundreds of thousands of<br />

innocent people’s custody images and facial<br />

biometrics are deleted automatically as soon<br />

as they’re released without charge, bringing<br />

them into line with DNA and fingerprints.”<br />

Professor Paul Wiles has spent much of his<br />

career as an academic criminologist at a<br />

number of UK universities and is currently a<br />

governor at Sheffield Hallam University as well<br />

as a trustee of the National Centre for Social<br />

Research. Until 2015, Wiles served as an<br />

advisor to the Sentencing Council and has also<br />

worked as a local Government commissioner.<br />

“Untrained and neglected IT staff<br />

increasing cyber security skills<br />

gap” warns (ISC)²<br />

A survey of 3,300 IT professionals conducted<br />

by (ISC)² has revealed that widespread<br />

underfunding in training in-house IT talent is<br />

contributing towards the critical cyber security<br />

skills gap. The report shows that businesses<br />

are exposing themselves to cyber threats by<br />

ignoring and neglecting IT professionals, with<br />

65% of IT workers reporting that their security<br />

advice isn’t followed.<br />

Almost half of IT workers state that their<br />

firms don’t invest sufficiently in ensuring that<br />

their IT staff are security-trained, despite a<br />

shortage of cyber security workers across 63%<br />

of businesses. This indicates that the cyber<br />

skills deficit is rooted in businesses failing to<br />

listen to advice from IT staff and upskill inhouse<br />

talent.<br />

The report suggests that this is a leadership<br />

issue, with 49% of respondents accusing<br />

business leaders of a failure to understand<br />

cyber security requirements. According to the<br />

report, the end result is that the majority of<br />

companies are even less able to cope with a<br />

cyber attack than they were last year.<br />

In February this year, (ISC)² suggested that<br />

the cyber security skills gap will grow to 1.8<br />

million by 2022 if current hiring and training<br />

trends continue.<br />

The latest research is based on responses<br />

given by practising IT professionals from<br />

around the world who participated in the 2017<br />

Global Information Security Workforce Study.<br />

Key findings from surveyed IT professionals<br />

include the following: 43% said their<br />

organisation doesn’t provide adequate<br />

resources for security training, only 35%<br />

agreed that their security suggestions are<br />

acted upon, 55% stated their organisation<br />

doesn’t require IT staff to earn a security<br />

certification and 63% said their organisation<br />

has too few security-focused workers.<br />

“Our findings suggest that too many<br />

organisations are so fixated on their inability<br />

to attract top cyber security expertise that<br />

they often overlook a tremendous pool of<br />

talent already on staff and intimately familiar<br />

with their infrastructure and processes,” said<br />

(ISC)² CEO David Shearer CISSP. “The quickest<br />

way for many organisations to protect<br />

themselves against cyber threats is through<br />

continuous education and empowerment of<br />

their IT team’s constituent members.”<br />

7<br />

www.risk-uk.com


Britain seeks “comprehensive” post-Brexit<br />

security partnership with European Union<br />

through agencies such as Europol to bring<br />

criminals to justice and prevent crime from<br />

taking place.<br />

Britain will remain committed to the security<br />

of the European continent after Brexit. The<br />

Government states that: “Our determination to<br />

protect the safety and security of EU citizens as<br />

well as UK citizens will not diminish.”<br />

Britain will look to<br />

agree on a<br />

comprehensive new<br />

security, law<br />

enforcement and<br />

criminal justice<br />

partnership with the<br />

European Union (EU)<br />

after Brexit to fight<br />

what the Government<br />

calls “our shared<br />

threats from terrorism<br />

and organised crime”.<br />

Brian Sims reports on<br />

the latest political<br />

developments at<br />

Westminster<br />

The Government’s most recent future<br />

partnership paper, which lays out the UK’s<br />

vision for a “deep and special partnership”<br />

with the EU, stresses the need to build upon<br />

and enhance the internal security co-operation<br />

that already exists. Leaving the EU will change<br />

the nature of that co-operation, but it will do<br />

little to change the threats we all face or reduce<br />

the value of the UK as a security partner.<br />

According to the Government, that’s precisely<br />

why it’s in the interests of Britain and the EU to<br />

continue to work together and develop a new<br />

framework for preventing, detecting,<br />

investigating and prosecuting criminal and<br />

terrorist activity across our borders.<br />

The paper calls for a comprehensive model<br />

for co-operation between the UK and the EU on<br />

security, law enforcement and criminal justice,<br />

reflecting the fact that Britain’s operational<br />

processes and data sharing systems are<br />

already uniquely aligned with the EU.<br />

The Government’s three core objectives for<br />

these new arrangements are protecting the<br />

safety and security of citizens and upholding<br />

justice in the UK and across the EU,<br />

maintaining the closest and most co-operative<br />

partnerships between Britain and the 27 EU<br />

Member States and continuing to co-operate on<br />

the basis of shared democratic values and<br />

respect for the rule of law.<br />

The UK has been one of the leading<br />

contributors to the development of effective<br />

information sharing and law enforcement cooperation<br />

at an EU level, all the while working<br />

Ongoing co-operation<br />

The EU also recognises the importance of cooperation<br />

in this area and has stated that it’s<br />

firmly committed to the fight against terrorism<br />

and international crime.<br />

The paper says there should be a new<br />

security treaty between the UK and the EU<br />

post-Brexit to provide a legal basis for<br />

continued working. In moving towards any new<br />

agreement, it’s important to ensure there are<br />

no operational gaps created by the transition<br />

from one set of arrangements to another.<br />

David Davis, Secretary of State for Exiting the<br />

European Union, said: “With the shared threats<br />

facing us evolving faster than ever before, it’s<br />

vital that the UK and the EU maintain and<br />

strengthen the close security collaboration<br />

that’s in place. Together with the EU, we’ve<br />

developed some of the world’s most<br />

sophisticated systems in the fight against crime<br />

because cross-border co-operation is<br />

absolutely crucial if we’re to keep our citizens<br />

safe and bring criminals to justice. We want to<br />

build a new partnership with the EU that goes<br />

beyond any existing relationship it has with<br />

non-Member States such that we can continue<br />

countering cross-border threats together.”<br />

Home Secretary Amber Rudd added: “The<br />

recent terror attacks in London and Manchester<br />

and, indeed, across other parts of Europe have<br />

served as stark reminders of the shared and<br />

evolving threat the UK and our EU partners face<br />

in this day and age. That’s why it’s crucial for<br />

the security of the UK and the continent that we<br />

continue to enhance our co-operation after we<br />

leave the EU. This position paper is the first<br />

step towards reaching an agreement designed<br />

to ensure that we continue to protect millions<br />

of people across Europe.”<br />

Speaking on behalf of the National Police<br />

Chiefs’ Council, Commander Richard Martin<br />

stated: “Law enforcement co-operation<br />

between the UK and other EU countries keeps<br />

citizens on both sides of the Channel much<br />

8<br />

www.risk-uk.com


News Analysis: UK-European Union Security Partnership<br />

safer. Any degradation in our ability to work<br />

together and share information as we leave the<br />

European Union gives advantage to criminals<br />

and terrorists. We’ve worked with Government<br />

to explain our operational requirements, the<br />

benefits they bring and the risks of losing them.<br />

We’re assured that this paper reflects those<br />

requirements. It’s now for the negotiators to<br />

work through the fine details. We’re on hand to<br />

support the process by sharing our operational<br />

advice and experience. In the meantime, we<br />

continue to work closely with our EU partners.”<br />

Boost for CT policing<br />

Amber Rudd has also announced that an extra<br />

£24 million is to be pumped into counterterrorism<br />

policing in the wake of this year’s<br />

terror attacks. The entirely new funding, which<br />

is in addition to £707 million already<br />

announced to support counter-terrorism<br />

policing in 2017-2018, will be used to bolster<br />

protective security measures in crowded places.<br />

This will include helping to protect the public<br />

from the specific threat of vehicles being used<br />

as weapons.<br />

The extra funding will go to counter-terrorism<br />

police including the Metropolitan Police Service<br />

and the Greater Manchester Police to assist<br />

with their response to the threat of terrorism<br />

and help in meeting costs relating to the recent<br />

terrorist attacks.<br />

“We’ve seen several devastating terrorist<br />

attacks in quick succession this year, most<br />

recently in Parsons Green, and the police have<br />

responded to this challenge outstandingly,”<br />

explained the Home Secretary. “The threat we<br />

face from terrorism is becoming more complex<br />

and diverse. That’s why we’re reviewing our<br />

counter-terrorism strategy to ensure the<br />

authorities have the powers they need to halt<br />

terrorist activity. I’m grateful to the police<br />

service and the Security Services for all that<br />

they’re doing to keep us safe.”<br />

The new funding comes in addition to the<br />

Government’s commitment to increase<br />

spending on counter-terrorism by 30% (from<br />

£11.7 billion to £15.1 billion). The Government<br />

has also provided £144 million over the<br />

Spending Review period for a national uplift in<br />

armed policing capability as well as funding for<br />

an additional 1,900 officers at the Security and<br />

Intelligence Services.<br />

Arrests made by counter-terrorism officers in<br />

the UK have risen by more than 50% in the year<br />

to the end of June 2017 as the police and the<br />

Security and Intelligence Services have<br />

continued their efforts to make the UK a hostile<br />

place for terrorists. The arrest figures released<br />

by the Home Office reflect the increasing pace<br />

“With the shared threats facing us evolving faster than<br />

ever before, it’s vital that the UK and the EU maintain and<br />

strengthen the close security collaboration that’s in place”<br />

of activity by police right across the UK’s<br />

counter-terrorism network as they tackle the<br />

current threat.<br />

A total of 379 arrests were made in the year<br />

to June 2017, compared to 226 in the preceding<br />

year. This represents a 68% increase.<br />

Metropolitan Police Service Deputy Assistant<br />

Commissioner Neil Basu, the Senior National<br />

Co-ordinator for Counter-Terrorism Policing,<br />

stated: “There’s no doubt that, since March,<br />

and following on from the attacks in London<br />

and Manchester, we’ve witnessed a sea change<br />

in momentum. While the terrorist threat has<br />

increased in recent months, so too has our own<br />

activity, as is reflected by this significant<br />

increase in arrests.”<br />

Basu continued: “We’re taking every possible<br />

opportunity to disrupt terrorist activity, be it by<br />

making arrests for terrorism offences,<br />

intervening where there are signs of<br />

radicalisation or working with communities to<br />

prevent terrorists from operating in their area.<br />

The police service, together with the Security<br />

and Intelligence Services, is determined to<br />

make the UK as hostile an environment for<br />

terrorists as possible.”<br />

Since the Westminster attack back in March,<br />

there have been six terrorist plots foiled on the<br />

mainland by the police and the UK’s<br />

intelligence community, bringing the number of<br />

foiled plots to 19 since June 2013.<br />

Extremism Commissioner<br />

The Home Office has just launched a<br />

recruitment campaign to appoint a Lead<br />

Commissioner for Countering Extremism.<br />

Confirmed in the Queen’s Speech, the<br />

Commission for Countering Extremism will have<br />

a clear remit to identify extremism and advise<br />

the Government on new policies, laws and<br />

other actions that may be required to tackle it.<br />

It will also support communities and the public<br />

sector to confront extremism wherever it exists<br />

and promote British values.<br />

The successful candidate for Lead<br />

Commissioner will advise the Home Secretary<br />

on the Commission’s future role and agree its<br />

priorities in unison with the Home Office.<br />

Given that there’s a strong correlation<br />

between extremism and the poor treatment of<br />

women and girls, the Commission will also have<br />

a specific responsibility to ensure that the<br />

rights of females are upheld.<br />

David Davis: Secretary of State<br />

for Exiting the European Union<br />

Home Secretary Amber Rudd<br />

9<br />

www.risk-uk.com


ENCRYPTED HIGH SECURITY<br />

CLASS 5<br />

Encrypted High Security<br />

End of Line Modules Are Only the Beginning<br />

Inner Range’s Infiniti Integriti Class 5<br />

is High a complete Security Hardware/Software<br />

System<br />

solution is a complete designed Hardware/Software<br />

specifically for<br />

Class solution 5/Zone designed 3 installations. specifically for<br />

High Security installations.<br />

Our range includes:<br />

Our All range Software includes:<br />

Hardware All Software Controllers<br />

End Hardware of Line Controllers Modules<br />

Power End of Supplies Line Modules<br />

Keypads Power Supplies<br />

Enclosures Keypads<br />

Communications Enclosures Devices<br />

Access Communications Control Readers Devices<br />

Credentials<br />

Access Control Readers<br />

Why Credentials take chances?<br />

Full<br />

Why<br />

End<br />

take<br />

to End<br />

chances?<br />

Encryption<br />

compliant Full End to with End AS/NZS Data Encryption 2201.1:2007<br />

Class Externally 5 Externally Certified Certified<br />

BEST NEW PRODUCT<br />

OF THE YEAR<br />

MEMBER<br />

AUSTRALIAN SECURITY INDUSTRY<br />

ASSOCIATION LIMITED<br />

T: +44 +61 3 (0)845 9780 4300 470 5000<br />

E: integriti@innerrange.com<br />

IREnquiries@innerrange.com<br />

W: innerrange.com<br />

T: 1300 319 499 W: csd.com.au


News Special: Cortech Open Innovation Events 2017<br />

COIE: Spotlight on Industry Challenges<br />

Cortech Developments (the specialist in risk<br />

mitigation and dedicated provider of<br />

integrated software solutions for Critical<br />

National Infrastructure and high security<br />

environments) was joined at the Glasgow COIE<br />

by leading manufacturers Avigilon, Commend,<br />

Harper Chalice and Paxton. Delegates<br />

comprised an even split between end users and<br />

consultants, while sector representation was<br />

made up of professionals from local authorities,<br />

custodial operations and the banking,<br />

education, healthcare and utilities sectors.<br />

Reflecting on the value of the event for<br />

visitors, Jason Blundell (head of sales at<br />

Cortech Developments) stated: “A key objective<br />

of the COIE series is to provide a platform for<br />

engagement around industry challenges faced<br />

in the management and operation of<br />

technology. We then take this a step further by<br />

addressing many of these challenges through<br />

the live smarter interoperability demonstration<br />

and one-to-one discussions with technology<br />

experts during the course of the day.”<br />

Some of the challenges put forward by<br />

delegates included combining legacy and new<br />

technology, the remote monitoring and control<br />

of technology, closed protocols, futureproofing,<br />

lockdown capability and<br />

understanding the differences between a<br />

Security Management System (SMS) and a<br />

Video Management System (VMS).<br />

Blundell explained that the SMS versus VMS<br />

comparison is largely about education and the<br />

specific strategic objectives and operational<br />

requirements of an organisation. “There seems<br />

to be some confusion among many end users<br />

on the differences between an SMS and a<br />

VMS,” said Blundell. “A VMS platform relies on<br />

ONVIF for third party CCTV integration and is<br />

primarily designed as a video management<br />

solution that markets itself as ‘open’. This<br />

openness is partly due to the reliance on ONVIF<br />

and third party interfaces which are sometimes<br />

not everything that they might seem.”<br />

Blundell continued: “They’re generally lowlevel<br />

integration and suitable for many<br />

applications, but not necessarily suitable for<br />

high-end, mission-critical remote monitoring<br />

and control where the management of the site,<br />

its systems, events and alarms are a<br />

prerequisite. It’s also worth noting that ONVIF<br />

isn’t currently viable for the replay of video.<br />

Therefore, replay would always be via the VMS<br />

manufacturers’ recorders, which could incur an<br />

additional expense. That’s different to the<br />

The Cortech Open Innovation Event (COIE) series returned to<br />

Glasgow on 26 September, bringing into sharp focus industry<br />

challenges, smarter interoperability, innovative technology,<br />

the EU’s General Data Protection Regulation (GDPR) and<br />

cyber security resilience measures. Brian Sims reports<br />

scenario realised when integrating via an SMS<br />

using the manufacturer’s SDK.”<br />

Monitoring and control<br />

An SMS is designed to be the overall Graphical<br />

User Interface (GUI) for all security, fire and<br />

building systems. Operators use 3D maps of<br />

local and remote buildings showing devices<br />

and alarm locations.<br />

Blundell observed: “SMS integration offers<br />

monitoring and control of these security, fire<br />

and building systems, alarm or event<br />

management, measurable response that can<br />

change depending on the time of day or day of<br />

the week, for instance, full audit trail and<br />

management reporting, cause and effect and<br />

situational awareness of all the other systems.”<br />

Blundell added: “Therefore, rather than<br />

being part of one control system interfacing<br />

with others, it’s a separate ‘layer’ that sits over<br />

any manufacturer’s system. The client is free to<br />

choose the ‘Best of Breed’ systems with which<br />

to interface and operate a control platform<br />

that’s truly manufacturer agnostic.”<br />

As with previous COIE events, there was also<br />

a focus on the future and what’s topical and<br />

relevant for the industry moving forward.<br />

Guest speaker Scott Simpson, CEO of The<br />

Security Circle, addressed attendees on GDPR<br />

compliance and the cyber security implications.<br />

“The GDPR provides organisations with an<br />

opportunity to enhance their information<br />

security practice from technical, governance<br />

and legal perspectives,” explained Simpson.<br />

COIE Knutsford<br />

The final COIE of 2017 – for which Risk UK is the<br />

Official Media Partner – will be hosted at<br />

Cortech Developments’ headquarters in<br />

Knutsford, Cheshire on Tuesday 7 November.<br />

Attending manufacturers on this occasion<br />

include Commend, Geutebruck, Grosvenor<br />

Technology and Intech Solutions.<br />

Steve Pilkington (technical director of IT<br />

consultancy Italik) will deliver a Keynote<br />

presentation to delegates offering an insight<br />

into the current cyber crime landscape and the<br />

ten steps towards cyber risk management.<br />

Jason Blundell: Head of Sales<br />

at Cortech Developments<br />

*Join Cortech Developments<br />

and its partners at COIE<br />

Knutsford. Visit<br />

www.coie.uk.com for details<br />

11<br />

www.risk-uk.com


News Special: BCI World Conference and Exhibition 2017<br />

Working Together on Common Objectives<br />

The Business<br />

Continuity Institute’s<br />

annual BCI World<br />

Conference and<br />

Exhibition 2017 takes<br />

place at the Novotel<br />

London West Hotel in<br />

November. Risk UK is<br />

an Official Media<br />

Partner for the event,<br />

previewed here by<br />

Brian Sims<br />

*The online Registration Form<br />

for BCI World 2017 is<br />

available at<br />

www.bciworld2017.com<br />

**Exhibitors at the 2017 event<br />

include Daisy Group, Sungard<br />

Availability Services,<br />

Everbridge, Regus, Fusion<br />

Risk Management, Anvil<br />

Group, Buckinghamshire New<br />

University, Intertek and The<br />

Emergency Planning College<br />

Sir Bernard Hogan-Howe QPM:<br />

Former Commissioner of the<br />

Metropolitan Police Service<br />

BCI World is the largest business continuityfocused<br />

conference and exhibition in the<br />

UK and, indeed, one of the biggest on the<br />

global scale. This year, the event – which runs<br />

across Tuesday 7 and Wednesday 8 November<br />

at the Novotel London West Hotel in<br />

Hammersmith – features a packed conference<br />

programme, an exhibition hall promoting the<br />

latest business continuity-centric products and<br />

services, a themed Gala Dinner and the BCI<br />

Global Awards Ceremony designed to showcase<br />

the best in the industry.<br />

The conference programme includes thought<br />

leadership discussion and debates, detail on<br />

new research, practical demonstrations and<br />

Case Studies centred on the real-world<br />

application of business continuity activities.<br />

The programme is suitable for all levels of<br />

practitioners (be they new to the discipline or<br />

harbouring experience) from a wide range of<br />

sectors. In years gone by, this event has been<br />

attended by heads of emergency management,<br />

business continuity managers, company<br />

directors, senior executives, business<br />

continuity and risk consultants, operational<br />

specialists and risk managers representing –<br />

but not exclusive to – the oil and gas,<br />

Government, financial, manufacturing, retail, IT,<br />

utilities, transport and telecoms sectors.<br />

Those with responsibility for business<br />

continuity, risk management, emergency<br />

management, crisis or incident management,<br />

disaster recovery, security, information security,<br />

Health and Safety, change management,<br />

procurement or facilities management will find<br />

much of interest at this event.<br />

Attendees will be able to share good practice<br />

in business continuity and resilience with<br />

experts and improve both their knowledge and<br />

understanding with a view towards enhancing<br />

professional development.<br />

It’s a golden opportunity for practitioners to<br />

place themselves at the heart of global thought<br />

leadership, gain practical insights and then<br />

apply them to their organisation. They can<br />

benefit from excellent networking opportunities<br />

and view, compare and experience first-hand<br />

the very latest business continuity-related<br />

products, solutions and services.<br />

Keynote Speakers in 2017<br />

One of this year’s Keynote Speakers is Sir<br />

Bernard Hogan-Howe QPM, former<br />

Commissioner of the Metropolitan Police<br />

Service. In this role, which he left in February<br />

this year, Sir Bernard presided over an<br />

organisation of 50,000 people with a budget of<br />

£3.2 billion providing a service for the 8.6<br />

million inhabitants of London. He also held<br />

national responsibilities, including leading<br />

counter-terrorism policing throughout the UK<br />

and protecting the heart of Government.<br />

In the Keynote Plenary at conference, Sir<br />

Bernard will focus on three major themes: the<br />

importance of business continuity planning and<br />

training in order to realise enhanced resilience,<br />

the overriding importance of working in<br />

partnership and also building enough capacity<br />

into the system to make sure that, when a<br />

continuity plan doesn’t quite survive initial<br />

contact with a disruptive event, there’s enough<br />

leadership and resources on hand to ensure an<br />

effective and efficient response.<br />

There’s also going to be a Keynote Speech<br />

from a senior figure at the all-new National<br />

Cyber Security Centre.<br />

‘Bio-Hacking’ and data security<br />

On Day Two, the Keynote Speaker is Kevin<br />

Warwick, Emeritus Professor at Coventry<br />

University and the University of Reading.<br />

Warwick is a world-renowned scientist and<br />

engineer, with his key areas of research being<br />

Artificial Intelligence, control, robotics and<br />

biomedical engineering.<br />

Warwick became the world’s first ‘Cyborg’ in<br />

a set of scientific experiments involving the<br />

surgical implanting of a device into his arm to<br />

link his nervous system directly to a computer.<br />

At BCI World 2017, Warwick will consider the<br />

implications of the potential for microchipping<br />

employees, the advantages of linking a human<br />

brain to a computer, the types of implants that<br />

are being used today (known as ‘bio-hacking’)<br />

and the questions this raises for the security of<br />

data and people.<br />

Readers of Risk UK should note that the first<br />

morning of conference features a particularly<br />

interesting session on designing credible<br />

terrorism threat scenarios to inform business<br />

continuity exercises. An informative<br />

presentation from Richard Bond (senior<br />

consultant at Arup) will address techniques<br />

delegates could apply to monitor changes in<br />

the terrorism threat to their organisations.<br />

Further, delegates will learn how the outputs<br />

from such targeted activity can be used to<br />

inform the design of credible threat scenarios<br />

that underpin exercises intended to validate<br />

business’ ongoing continuity plans.<br />

12<br />

www.risk-uk.com


News Special: NAHS Annual Conference and Awards 2017<br />

Making Sure Security’s in Good Health<br />

The NAHS was formed back in 1994 as a notfor-profit<br />

professional organisation in the<br />

UK. In essence, it exists to support and<br />

enable healthcare provision through the<br />

delivery of professional security, ultimately<br />

enhancing the healthcare environment.<br />

As a stakeholder in healthcare security, the<br />

NAHS supports NHS Protect as the latter<br />

continually develops the strategic direction and<br />

development of NHS healthcare security. This is<br />

duly reflected in NAHS membership of NHSP<br />

Working Groups as a key stakeholder.<br />

One of the NAHS’ key roles is to promote<br />

education and the professional development of<br />

healthcare security practitioners. Nowhere is<br />

this better illustrated than by the organisation’s<br />

Annual Conference. Organised by All Security<br />

Events, this year’s conference and exhibition<br />

runs on Thursday 9 November at The Studio, 7<br />

Cannon Street, Birmingham B2 5EP, with Risk<br />

UK serving as Official Media Partner.<br />

Platinum Sponsor for the day is B-Cam, with<br />

sponsors Carlisle Support Services and Paxton<br />

also in attendance. Also exhibiting at the<br />

conference are Gunnebo, Deister, Skyguard,<br />

Corps Security, Volunteering Values and Lesar.<br />

The event will feature the NAHS’ 2017 Annual<br />

General Meeting and a networking drinks<br />

reception (sponsored by Paxton).<br />

Wealth of knowledge<br />

Jayne King – chairman of the NAHS and head of<br />

security and site services at Guy’s and St<br />

Thomas’ NHS Foundation Trust – is set to chair<br />

the conference proceedings which feature a<br />

Keynote presentation from Tony Porter QPM<br />

LLB, the Surveillance Camera Commissioner.<br />

Porter was appointed Surveillance Camera<br />

Commissioner in March 2014. He harbours a<br />

combination of business and law enforcement<br />

expertise and is an intelligence specialist (most<br />

recently within the financial sector). Porter’s<br />

experience spans community and business<br />

engagement, international counter-terrorism<br />

and serious and organised crime.<br />

As an experienced specialist consultant on<br />

soft restraint and the use of force, Doug Melia<br />

speaks regularly at a multitude of events. In<br />

times past he has written for The Guardian and<br />

The Times’ Education Supplement as well as<br />

Safety Management magazine.<br />

A Security Industry Authority (SIA)-approved<br />

trainer, Melia sits on an Advisory Panel for the<br />

use of mechanical restraints, holds an SIA close<br />

protection licence and, operationally, spent<br />

The National Association for Healthcare Security (NAHS)<br />

works to continually improve security in healthcare facilities<br />

through training and the exchange of information and<br />

experiences, all the while aiming to promote co-operation<br />

and development among its members. Brian Sims previews<br />

the organisation’s Annual Conference and Awards 2017<br />

many years in his teens and early 20s as a door<br />

supervisor working in the North West region.<br />

At the NAHS Conference, Melia will be<br />

delivering a thought-provoking discourse on<br />

‘Reasonable Force – The Taboos’.<br />

Making her presentation under the heading<br />

‘Freedom to Speak Up’ is Georgina Charlton,<br />

deputy Freedom to Speak Up guardian at Guy’s<br />

and St Thomas’ NHS Foundation Trust. Charlton<br />

is responsible for running the ‘Showing We<br />

Care By Speaking Up’ campaign at Guy’s and St<br />

Thomas’. Her role involves ensuring that staff<br />

have a number of safe mechanisms to raise<br />

concerns and working with the Board to create<br />

an open and honest culture for speaking up.<br />

Charlton provides leadership for the London<br />

region of Freedom to Speak Up guardians as<br />

their dedicated chairperson.<br />

Charlton has a clinical background as a<br />

senior diagnostic radiographer and has worked<br />

at Guy’s and St Thomas’ for just shy of a<br />

decade. Her areas of clinical expertise are<br />

dementia awareness and delivering<br />

compassionate care in radiology.<br />

Prior to being seconded to the guardian role<br />

in January, Charlton was responsible for<br />

delivering the largest imaging accreditation<br />

project in the UK collaboratively with Guy’s and<br />

St Thomas’ and King’s College, London.<br />

In addition, a representative from<br />

Crimestoppers will be talking on the unique<br />

public/private sector partnership that has been<br />

forged between that organisation, Carlisle<br />

Support Services and the NAHS.<br />

Other speakers on the day are scheduled to<br />

include sponsors B-Cam and Paxton.<br />

NAHS 2017 Awards<br />

This year’s NAHS Awards are sponsored by B-<br />

Cam, with the categories as follows: Best<br />

Healthcare Security Officer, Best Healthcare<br />

Security Team, Best Contribution to Healthcare<br />

Security and Best Security Supplier.<br />

The special Chairman’s Award is reserved for<br />

nominations of significant merit not covered<br />

within the standard categories.<br />

*For further information and<br />

to register your place at<br />

conference access<br />

www.allsecurityevents.com/<br />

event-pro/nahs/<br />

13<br />

www.risk-uk.com


Safety in Numbers: Risk Management<br />

Regimes for Large-Scale Events<br />

Terrorist attacks<br />

against the public in<br />

Western Europe and<br />

North America have<br />

been on the rise since<br />

2011. According to the<br />

Global Terrorism<br />

Database, we’re<br />

currently experiencing<br />

the highest rate of<br />

incidents since 1994.<br />

Within that scenario,<br />

both the methods and<br />

motives of the<br />

terrorists are evolving.<br />

In the aftermath of<br />

several devastating<br />

events, Andrew<br />

Mortimer observes<br />

why he believes the<br />

way in which large<br />

crowds are protected<br />

and managed merits<br />

reconsideration<br />

This year alone, terrorist attacks have<br />

included the use of firearms, explosives,<br />

bladed weapons and, increasingly, acids,<br />

other chemicals and vehicles. Of late, we’ve<br />

seen vehicles used as weapons against crowds<br />

in London (Westminster, London Bridge and<br />

Finsbury Park), Stockholm, Barcelona and<br />

Charlottesville, Virginia. During the August<br />

Bank Holiday, while a number of attendees at<br />

the Notting Hill Carnival in London were treated<br />

for injuries after being doused in an<br />

unidentified liquid by an assailant.<br />

Attacks at concerts and nightclubs have also<br />

been on the rise in recent years. Gunmen and<br />

suicide bombers have infiltrated venues in Paris<br />

(The Bataclan, 2015), Orlando (the Pulse<br />

nightclub, 2016) and Manchester (MEN Arena,<br />

2017), tragically resulting in the deaths and<br />

serious injury of hundreds of people.<br />

While police forces and counter-terrorist<br />

units have necessarily spearheaded changes to<br />

their approach around such episodes, event<br />

and venue managers, security teams and<br />

facilities management leaders have also had to<br />

address their own methods of operation.<br />

Essentially, anyone with a professional<br />

responsibility for keeping the public safe at<br />

large events has been motivated to ensure their<br />

events/premises are as secure as they can be.<br />

Across the globe, fundamental reviews of<br />

security, training and crowd safety have been<br />

undertaken and put into effect. Overhauling<br />

policies and procedures, however, will put<br />

pressure on venues and their security partners<br />

in terms of increased manpower and<br />

equipment. Yet with strategic contingency<br />

planning, clear communication and frequent<br />

policy reviews, this pressure can be anticipated<br />

and alleviated, at least to some extent.<br />

For its part, the Metropolitan Police Service<br />

holds regular Project Griffin briefings (ie events<br />

for business owners to better equip themselves<br />

when detecting and deterring terrorism). Other<br />

bodies also issue regular advice and guidance.<br />

Indeed, the Project Griffin programme has been<br />

extended so that training can now be delivered<br />

by in-house teams to the wider company<br />

security network. Also, the National Counter-<br />

Terrorism Security Office has widely publicised<br />

its ‘Run, Hide, Tell’ campaign.<br />

In addition to keeping abreast of the latest<br />

advice from industry bodies and the<br />

authorities, and conducting ongoing risk<br />

assessments, security solution providers must<br />

also proactively plan for emerging threats.<br />

Sometimes, this can be as a result of specific<br />

incidents, such as the above mentioned<br />

vehicular attacks, which have led local councils<br />

to review the vulnerability of public spaces and<br />

install protective bollards and barriers.<br />

In the case of sports and music venues,<br />

where visitor experience can be more overtly<br />

influenced by site design, more subtle solutions<br />

can be adopted. For example, the famous<br />

cannon statue at Arsenal FC’s Emirates Stadium<br />

in north London essentially serves the same<br />

purpose as a barrier.<br />

In other instances, risk assessments may be<br />

in response to emerging technologies and<br />

trends, such as the development of ceramic,<br />

plastic, fibreglass or carbon fibre weapons<br />

which are undetectable by traditional metal<br />

sensors, or drone technology (which now poses<br />

a clear threat to open-air events).<br />

Technology and human intelligence<br />

To tackle these challenges, it’s crucial to have a<br />

robust supply chain and trusted partners in<br />

place who can supply rigorous solutions. For<br />

example, anti-drone technology including<br />

radars and GPS disablers is now being invested<br />

in by security providers. For the detection of<br />

weapons, more advanced, high frequency<br />

scanners and x-ray machines are being<br />

deployed in tandem with specially-trained staff.<br />

This combination of technology and human<br />

intelligence is of the utmost importance. While<br />

technology develops at a relentless pace, the<br />

experience and intuition of human beings<br />

cannot be rivalled. Deterring reconnaissance by<br />

would-be attackers is hugely important. Even<br />

the mere presence of well-trained officers with<br />

the ability to detect and identify ‘hostiles’ can<br />

potentially disrupt reconnaissance activity.<br />

Allied to this, new smart CCTV equipment can<br />

recognise the silhouettes of individuals and<br />

identify when their outlines change. This helps<br />

to alert security if someone has left a bag<br />

unattended, but human insight is needed to<br />

assess the true threat – is it a genuinely<br />

suspicious occurrence or an honest mistake?<br />

Only a person can decipher that detail. For staff<br />

to be able to work with these advanced<br />

technologies, though, investment is required.<br />

14<br />

www.risk-uk.com


Opinion: Crowded Places Security and Counter-Terrorism<br />

Focusing on people<br />

When recruiting for security teams, strict<br />

background checks are, of course, vital. When<br />

the right people have been recruited,<br />

investment in ongoing training, including<br />

industry-recommended Security Industry<br />

Authority accreditation and equipment-focused<br />

courses, is needed to ensure they can perform<br />

to their highest ability. Furthermore, this<br />

empowers them to be that much more<br />

confident in making strategic decisions about<br />

responding to specific threats.<br />

Security officers put themselves in harm’s<br />

way so it’s critical that businesses equip them<br />

with the right knowledge and skills to respond<br />

safely to threats. Looking out for the well-being<br />

of its teams should be a key priority of any<br />

security business, and especially so at points of<br />

heightened concern.<br />

Business leaders – including executives and<br />

those based at head office – should be seen<br />

standing shoulder to shoulder with their teams<br />

on the front line on a regular basis, and never<br />

more so than in the wake of an incident.<br />

In the immediate aftermath of the<br />

Manchester Arena attack, many executives and<br />

security leaders across the industry worked<br />

alongside event staff and security teams. The<br />

senior team at OCS was on hand and worked<br />

together with venue executives from the<br />

Liverpool Arena and AEG’s O2 to reassure<br />

colleagues on duty at subsequent Iron Maiden<br />

and Take That concerts. Management working<br />

alongside staff is so important for morale. Not<br />

only does it show solidarity, but also<br />

demonstrates how much we value our security<br />

teams as well as helping those in charge to<br />

better understand the challenges faced by<br />

colleagues on the front line.<br />

Concern for others is a key fundamental in<br />

this industry. People visiting an arena for an<br />

event or a concert are there to enjoy<br />

themselves and, while the goal of the security<br />

team is to be diligent and mitigate risk, the<br />

public’s experience must also be a top priority.<br />

An immediate response<br />

When incidents do happen, we must respond<br />

immediately. This is true not just for<br />

organisations directly affected, but for those in<br />

the wider area and industry. Intelligence comes<br />

at incredible speed from the authorities and<br />

industry bodies. In practice, this means MI5<br />

may raise the terrorism threat level from<br />

‘Substantial’ to ‘Severe’ or even ‘Critical’.<br />

Security companies must be ready to adapt<br />

accordingly in very short order.<br />

At this point, meetings are held by those<br />

responsible for event security to agree what<br />

additional resources are needed and how these<br />

will be deployed. Those resources may include<br />

personal search equipment (metal detectors,<br />

wands and arches, etc), additional surveillance,<br />

physical pat-downs and bag searches and the<br />

introduction of sniffer or general purpose<br />

security dogs or extra staff.<br />

As threat levels rise, so too does the<br />

complexity of the response needed and,<br />

indeed, the cost of implementing it. This is why<br />

initial planning is so important. Changes to<br />

procedures and policies also need to be<br />

reassuringly communicated to the public.<br />

Public opinion and perception is incredibly<br />

important when it comes to events. If people<br />

don’t feel safe when attending events, then the<br />

whole industry – and even the economy – will<br />

suffer. Security must create a feeling of safety<br />

and reassurance around a venue, but not to the<br />

extent that a given premises becomes an<br />

impenetrable fortress. There’s a delicate<br />

balance to be struck between public safety and<br />

rigorous control allied to the need for creating a<br />

hospitable and welcoming environment.<br />

Customer service must be a key priority<br />

following incidents. This needs to be<br />

emphasised to front line security teams. The<br />

importance of reassuring individuals at these<br />

times cannot be understated, and those<br />

messages must be backed up in reality.<br />

The primary goal is to afford customers<br />

positive experiences such that they’re happy to<br />

queue, be scanned and searched and follow<br />

tighter restrictions for safer events.<br />

Andrew Mortimer:<br />

Managing Director of<br />

Destinations and Venues at<br />

OCS Group<br />

“Even the mere presence of well-trained security officers<br />

with the ability to detect and identify ‘hostiles’ can<br />

potentially disrupt reconnaissance activity”<br />

15<br />

www.risk-uk.com


Leave No Stone Unturned<br />

Autumn’s now upon<br />

us. With the nights<br />

already drawing in<br />

and the festive season<br />

only just around the<br />

corner, incidents<br />

involving commercial<br />

burglaries are already<br />

on the rise. Dan Hardy<br />

seeks to identify the<br />

scale of the problem<br />

and, indeed, the<br />

underlying reasons for<br />

commercial burglary<br />

before offering some<br />

timely advice about<br />

what businesses<br />

across all vertical<br />

sectors can do to<br />

prevent themselves<br />

from becoming the<br />

unfortunate victims<br />

Commercial burglary is a year-round<br />

problem, but one that peaks from October<br />

onwards with the darker evenings. It’s a<br />

time of the year when retailers have more<br />

stock, there’s a higher density of people on the<br />

High Street and commercial premises are busier<br />

(as a result of which members of staff might not<br />

be as vigilant as at other times). All of the<br />

above serves to increase the overall risk profile.<br />

Feedback from members of the National<br />

Business Crime Solution (NBCS) suggests that,<br />

so far in 2017, commercial burglary has<br />

increased from between 22% and 55% across<br />

the NBCS’ membership when compared to the<br />

same period last year. Even though this is by no<br />

means a definitive figure, it does suggest that<br />

this type of nefarious activity is a growing trend<br />

and that those with malicious intent in mind<br />

view commercial premises as being vulnerable.<br />

When considering the impact of a commercial<br />

burglary, it’s tempting to focus solely on the<br />

items stolen. However, the true cost of this type<br />

of crime is more far-reaching and can<br />

encompass property damage and repair, loss of<br />

trade, customer dissatisfaction, management<br />

time in dealing with the issue and colleague<br />

time in terms of labour. Then there are the nonfiscal<br />

issues to consider such as reputational<br />

damage and the fact that employees might feel<br />

less safe when carrying out their duties.<br />

Opportunist or planned<br />

Commercial burglaries tend to fall into one of<br />

two types: opportunist or planned. In the<br />

former, an individual will often enter through an<br />

unlocked or non-secured door or window,<br />

tempted by the sight of unprotected stock or<br />

perhaps a laptop or smart phone that’s easily<br />

accessible. In the latter, a level of planning and<br />

hostile reconnaissance will take place. Burglars<br />

will often have a co-ordinated strategy (a recent<br />

high-profile example being the burglary<br />

perpetrated on the Hatton Garden Safe Deposit<br />

Company in London).<br />

With so many variables involved,<br />

organisations must carry out a risk and threat<br />

assessment to ensure that they’re in the best<br />

position possible to deal with any real or<br />

perceived danger, which can then help in<br />

developing a corporate security policy and<br />

strategy document. Undertaking an in-depth<br />

analysis of an organisation’s activities,<br />

premises and facilities means that the risks can<br />

be fully understood and acted upon. Just as<br />

importantly, regular reviews of existing security<br />

programmes and measures are necessary to<br />

maintain adequate safeguards.<br />

The sharing of data/intelligence through<br />

collaboration should never be underestimated.<br />

A centralised intelligence hub for both the<br />

police and the business community is starting<br />

to connect crimes which would have<br />

traditionally been seen as being independent.<br />

Know your onions<br />

Businesses must do all they can to protect<br />

themselves, yet all-too-often they’re failing to<br />

secure their premises. Rather than trying to<br />

cover all elements at once, the best way in<br />

which to approach any security strategy is to<br />

treat it like an onion with different layers. It’s<br />

also worth pointing out that, while much of<br />

what should be considered appears to be<br />

obvious, it’s surprising just how often ignoring<br />

one of these seemingly innocuous factors can<br />

offer burglars an opportunity.<br />

The first layer of the process is to look at a<br />

building’s exterior and identify any vulnerable<br />

areas. It’s also worth reaching out to<br />

neighbouring companies to share Best Practice<br />

and help each other spot any weaknesses or<br />

suspicious behaviour. Talking can often act as a<br />

prompt to address an issue.<br />

A building’s exterior should also be clean, so<br />

graffiti must be cleaned off, rubbish removed<br />

and overgrown vegetation trimmed so as not to<br />

obscure CCTV and reduce the effectiveness of<br />

lighting. Bins must be kept out of sight as they<br />

could serve as a climbing aid, and particularly<br />

so for access to low-level windows.<br />

16<br />

www.risk-uk.com


Opinion: Mind Your Own Business<br />

Access control is vital, so service and fire<br />

doors should be locked when not in use and,<br />

preferably, not used as an out of hours access<br />

point or a way for personnel to exit the building<br />

to have a cigarette break. It’s advisable to use<br />

high quality door frames and doors, steel<br />

reinforcing and anti-thrust bolts on doors and<br />

bars on windows, while dropbars and magnetic<br />

door locks should be regularly inspected for<br />

damage or technical faults, as indeed should<br />

any installed security fogging systems.<br />

Grilles and shutters are an excellent way of<br />

deterring burglars, while fixing bollards into the<br />

ground surrounding a given premises will<br />

protect against ram-raiders. Planning<br />

permission could be required for such a move,<br />

though, so do make a point of checking on this<br />

before embarking on any work.<br />

Window glass is also available in a number of<br />

different formats. Laminated glass in particular<br />

is very difficult to break through because it’s<br />

manufactured by bonding a layer of tough<br />

plastic between sheets of glass. If this option<br />

isn’t feasible, then an alternative cheaper<br />

option is plastic film, which will increase the<br />

strength of the glass and, when a ‘mirrored’<br />

option is used, restrict a burglar’s view into rear<br />

storage areas.<br />

Cause for alarm<br />

Burglars will often try to overcome an intruder<br />

alarm system by cutting the signal and filling<br />

exterior alarm bells with substances such as<br />

foam to prevent then from sounding. A common<br />

ploy is to set the alarm off repeatedly and wait<br />

until the point at which the police service and<br />

key holders stop responding to it, thus giving<br />

burglars more time to act.<br />

It’s also worth remembering that, although<br />

traditional alarms may alert staff or passers-by,<br />

they offer limited police protection. Due to an<br />

increase in false alarms, police services will not<br />

respond to a ringing bell or siren unless there’s<br />

evidence of an offence in progress.<br />

A monitored alarm can provide a confirmed<br />

signal to pass to the Emergency Services (often<br />

a requirement of insurers).<br />

Likewise, a CCTV system must be maintained<br />

and fit for purpose at all times, covering both<br />

internal and external areas. Recorded images<br />

should be set to record for a minimum of 30<br />

days, while stringent Codes of Practice need to<br />

be followed. Stipulations here will include<br />

ensuring that the date and time are<br />

incorporated into the recording before video<br />

evidence can be successfully used in a<br />

prosecution case within a Court of Law.<br />

If for any reason an alarmed zone is switched<br />

off, ensure that it’s switched on again and<br />

make certain secondary alarm equipment is<br />

moved if building layouts change or seasonal<br />

displays are put in place for retail outlets.<br />

It makes sense not to leave tills with money<br />

in them and to hide expensive stock from view.<br />

Safes and secure cages are now available that<br />

are fitted with sensors. Similarly, key security is<br />

vital. Only authorised staff should have access<br />

to certain keys or combination locks. Those<br />

individuals must thoroughly understand their<br />

responsibilities for locking and securing<br />

fastenings on windows and doors, offices,<br />

safes, rooflights and other exits.<br />

Although cyber security should be on the<br />

radars of all organisations, it’s worth<br />

remembering that access to servers and other<br />

IT equipment must also be restricted in order to<br />

secure vital data. Just as importantly, any<br />

Internet Protocol-based devices including CCTV,<br />

access control and intruder alarm systems<br />

should be secured in order to thwart hackers.<br />

Train to gain<br />

A security strategy can only be successful if<br />

everyone within an organisation is given the<br />

correct level of training, such that they can then<br />

keep a watchful eye out for suspicious<br />

behaviour. The old and established saying that<br />

‘a chain is only as strong as its weakest link’ is<br />

relevant here as it’s often those who are Front<br />

of House – such as receptionists – that are in a<br />

prime position to monitor and identify any<br />

questionable behaviour.<br />

Retail environments should adopt an<br />

‘intelligent guarding’ approach that combines<br />

technology – and the data realised by it – with<br />

individuals who can deal with the outputs of<br />

these systems. Knowledge of counter-terrorism,<br />

loss prevention, report writing, behavioural<br />

analysis and profiling, Health and Safety and<br />

data and intelligence gathering – in unison with<br />

First Aid and excellent customer service<br />

abilities – are now vital for the modern day<br />

security officer, as is the ability to work as part<br />

of a team with non-security based personnel.<br />

In the unfortunate event that an organisation<br />

experiences a commercial burglary, the most<br />

positive thing it can do is learn from it and<br />

ensure that measures are put in place to<br />

prevent any reoccurrence. Preventative security<br />

using a common sense approach is the only<br />

way in which to maintain a deterrent effect that<br />

will reduce the likelihood of criminal activity.<br />

Dan Hardy:<br />

Managing Director of the<br />

National Business Crime<br />

Solution (NBCS)<br />

*Mind Your Own Business is the<br />

space where the NBCS examines<br />

current and often key-critical<br />

business crime issues directly<br />

affecting today’s companies. The<br />

thoughts and opinions expressed<br />

here are intended to generate<br />

debate and discussion among<br />

practitioners within the<br />

professional security and risk<br />

management sectors. If you would<br />

like to make comment on the<br />

views outlined, please send an<br />

e-mail to: brian.sims@risk-uk.com<br />

**The NBCS is a ‘Not-for-Profit’<br />

initiative that enables the effective<br />

sharing of appropriate data<br />

between the police service, crime<br />

reduction agencies and the<br />

business community to reduce<br />

crime and risks posed to all. By<br />

providing a central repository<br />

where business crime data is<br />

submitted, shared and analysed,<br />

the NBCS is able to gather the<br />

necessary intelligence and support<br />

to more effectively detect, prevent<br />

and, subsequently, respond to<br />

crimes affecting the UK’s business<br />

community. For further information<br />

access the website at:<br />

www.nationalbusinesscrime<br />

solution.com<br />

“A centralised intelligence hub for the police service and the<br />

business community is starting to connect crimes which<br />

would have traditionally been viewed as being independent”<br />

17<br />

www.risk-uk.com


October 11, 2017<br />

Tatton Park, Knutsford,<br />

Nr Manchester, UK<br />

Axis partners showcased<br />

2N, Aimetis, Agent Vi, Araani, Assa Abloy AB,<br />

Cathexis Europe Ltd, Citilog, ComNet Europe<br />

Ltd, Customer Clever Ltd, Dantech Electronic<br />

Engineering, Digital Barriers, Digital Forge Ltd,<br />

Dot Origin Ltd, EIZO Limited, Entelec Control<br />

Systems Ltd, Falt Communications AB, Genetec<br />

Europe, Herta Security, IPS, Milestone Systems,<br />

Mirasys, Morphean, NVT Phybridge, Observit AB,<br />

Optex (Europe) Ltd, P3R Lab, Prysm, Secure Logiq<br />

Ltd, Seetec GmbH, Siklu Communication, Sound<br />

Intelligence, Telcred AB, Vaxtor, Veracity UK Ltd,<br />

Xtralis UK Ltd, Wavestore Global Ltd<br />

Axis Partner Showcase 2017<br />

Meet the<br />

leading experts<br />

in network video.<br />

Join Axis Communications and 35 of the most innovative companies in<br />

the network video industry and find out what solutions, technologies and<br />

products are available today to help you grow your business!<br />

Register now!<br />

www.axis-communications.com/<br />

Axis_Communications_UK_Partner_Showcase<br />

Video management software, security applications, business management applications,<br />

hardware/technology, physical access control, transmission and storage, and more!


BSIA Briefing<br />

Preventing injury in the workplace should<br />

be a key concern for any employer, of<br />

course, but it ought to be of particular<br />

relevance for employers in our business sector<br />

due to the potentially dangerous environments<br />

and situations in which security personnel can<br />

and do find themselves.<br />

For their part, employers have a legal Duty of<br />

Care towards their employees and any<br />

demonstrable failure to fulfil this obligation can<br />

impact severely on the host business. Those<br />

negative impacts can range from low staff<br />

morale and high staff turnover through to<br />

financial penalties, reputational damage and<br />

even prosecutions in a Court of Law.<br />

In February last year, new guidelines were<br />

issued by the Sentencing Council for Health and<br />

Safety, food and corporate manslaughterrelated<br />

sentencing, enabling the courts to issue<br />

significantly larger fines to those employers<br />

who breach their Duty of Care towards their<br />

employees. Prior to the new guidance being<br />

issued, fines for serious breaches would<br />

typically run to several hundred thousand<br />

pounds, but under the new guidelines, fines<br />

can start at several million pounds for a large<br />

organisation that’s found to be highly culpable<br />

in what’s defined as a Harm Category 1 incident.<br />

Courts are given guidance on how to<br />

determine the offence category using<br />

culpability and harm factors, which are then<br />

used to determine an offending organisation’s<br />

fine from a matrix of suggested ranges.<br />

Culpability is determined to be ‘High’ if an<br />

organisation is proven to have fallen far short<br />

of the appropriate standard, for instance by<br />

failing to put in place measures that are<br />

recognised standards in the industry, ignoring<br />

concerns raised by employees or others, failing<br />

to make appropriate changes following prior<br />

incident(s) exposing risks to Health and Safety<br />

and allowing breaches to subsist over time.<br />

‘Aggravating factors’<br />

The harm category is determined by the<br />

likelihood of the risk of harm created by the<br />

offending organisation’s breach alongside the<br />

seriousness of the harm at risk of being<br />

realised. For example, a Harm Category 2<br />

means that the offending organisation’s breach<br />

risked a high likelihood of harm that could<br />

amount to physical or mental impairment which<br />

has a substantial and long-term effect on the<br />

sufferer’s ability to carry out normal day-to-day<br />

activities, an effect on their ability to return to<br />

work or, alternatively, a progressive, permanent<br />

or irreversible condition.<br />

For a large organisation – ie one in which the<br />

turnover or equivalent is £50 million and over<br />

Health and Safety Issues in<br />

the Security Business Sector<br />

Managing Health and Safety is essential for any business<br />

operating in the UK. Failing to adequately do so can leave an<br />

organisation vulnerable to a number of considerable<br />

business risks. Here, James Kelly discusses Health and Safety<br />

and how various initiatives are helping to address issues<br />

prevalent in the security sector<br />

per annum – that’s found to have high<br />

culpability and a Harm Category 2, the starting<br />

point for an imposed fine would be £1,100,000<br />

within a category range of between £500,000<br />

and £2,900,000.<br />

In addition, there are a number of<br />

‘aggravating factors’ which can result in an<br />

upward adjustment from the starting point. In<br />

some cases, it may be deemed appropriate to<br />

move outside of the identified category range.<br />

With this in mind, it’s vitally important for<br />

employers within the security business sector<br />

to be aware of their Health and Safety<br />

obligations and ensure that they take all of the<br />

necessary steps to prevent Health and Safety<br />

incidents from occurring. The Health and Safety<br />

Executive’s (HSE) website can assist firms in<br />

identifying what they must do to comply with<br />

Health and Safety legislation, while there are a<br />

number of additional resources available to<br />

help in managing this critical facet of business.<br />

Some of the simple things companies can do<br />

to manage this discipline include writing a<br />

Health and Safety policy, providing employees<br />

with training and information, providing the<br />

James Kelly: CEO of the British<br />

Security Industry Association<br />

19<br />

www.risk-uk.com


BSIA Briefing<br />

right workplace facilities and reporting<br />

incidents when they occur such that lessons<br />

can be learned for the future.<br />

‘Near miss’ reporting<br />

An important area that’s often overlooked is<br />

that of ‘near miss’ reporting. Near miss<br />

reporting is a vital part of accident prevention<br />

and helps to create a safer working<br />

environment for everyone.<br />

Many near misses occur and remain<br />

unreported because people often forget the<br />

crucial role that near misses play in accident<br />

and incident prevention. A near miss is an<br />

unplanned event that didn’t result in an injury,<br />

illness or damage, but most certainly had the<br />

potential to do so. For example, when a<br />

member of the security team is carrying out a<br />

vehicle search, a stored item may fall out, but<br />

the officer doesn’t sustain an injury and the<br />

item itself isn’t damaged.<br />

Near miss reporting is not to be confused<br />

with hazard reporting. Hazard reporting is when<br />

a potential hazard – such as a wet floor, for<br />

example – is identified, but a near miss is when<br />

someone actually slips on that wet floor<br />

without sustaining any injury. It’s equally<br />

important to report both.<br />

Reporting near misses enables businesses to<br />

learn essential lessons, take corrective actions<br />

and, most importantly, prevent similar or more<br />

serious occurrences from materialising in the<br />

future. It has been shown that a serious injury<br />

is often preceded by a number of near misses<br />

or warnings, meaning that an unreported near<br />

miss could be the next accident.<br />

As well as the Health and Safety risks present<br />

in most workplaces – such as slips and trips,<br />

working at heights, electrical hazards and<br />

ergonomic hazards (to name a few) – there are<br />

additional risks to consider for security<br />

personnel due to the environments and<br />

situations in which they might find themselves.<br />

Violence reduction<br />

Research commissioned by the Security<br />

Industry Authority (SIA) back in April 2015<br />

identifies that security personnel believe the<br />

potential for violence to be perpetrated on<br />

them is an ongoing problem. They expect to<br />

have to deal with a certain degree of violence<br />

as part of their work.<br />

“Reporting near misses enables businesses to learn<br />

essential lessons, take corrective actions and, most<br />

importantly, prevent similar or more serious occurrences<br />

from materialising in the future”<br />

In fact, the research reveals that, during the<br />

year covered by the study, 37.67% of<br />

respondents had experienced a physical<br />

assault requiring First Aid, with 2.75% of these<br />

interviewees reporting that physical assaults<br />

needing First Aid treatment had occurred ten<br />

times or more. 19.91% of respondents to the<br />

SIA’s research also claimed to have experienced<br />

a physical assault requiring hospital treatment.<br />

It therefore comes as no surprise to learn<br />

that reducing acts of violence against security<br />

personnel is a key concern for our industry<br />

bodies, many of which are represented through<br />

a multi-agency Violence Reduction Advisory<br />

Group established by the SIA.<br />

The group includes representatives from a<br />

wide range of stakeholders, including the<br />

British Security Industry Association, the<br />

Government, the police service, local<br />

authorities, the HSE and both buyers and<br />

providers of private security solutions as well<br />

as a wide range of other organisations. It has<br />

already made significant progress in a number<br />

of areas that contribute towards the SIA’s<br />

violence reduction strategy.<br />

Indeed, the group has provided a healthy and<br />

informed challenge of the SIA’s progress in<br />

delivering on its strategy and action plan and<br />

has championed cross-cutting initiatives which<br />

require support from multiple organisations. An<br />

example of one of these initiatives is training –<br />

either training requirements and standards<br />

mandated by the Regulator or further<br />

voluntarily adopted training. Conflict resolution<br />

training features highly in the SIA’s research<br />

results as a method for reducing violence.<br />

Health and Safety Forum<br />

Another group that aims to improve Health and<br />

Safety within the security industry is the BSIA’s<br />

Health and Safety Forum. The Health and Safety<br />

Forum meets regularly as a vehicle for<br />

employers in the security sector to share<br />

knowledge and Best Practice and remain up-todate<br />

with the latest changes to Health and<br />

Safety legislation and standards.<br />

This group of employers is currently collating<br />

statistics relating to workplace incidents such<br />

that trends specific to the security business<br />

sector may be identified and mitigated.<br />

Members are also planning to develop industryspecific<br />

guidance with a view to helping<br />

employers manage Health and Safety, taking<br />

into account the risks that security personnel<br />

are most likely to encounter in their duties.<br />

Ultimately, by striving to achieve Best<br />

Practice in the management of Health and<br />

Safety, the risks to employees can be<br />

significantly reduced by the host organisation.<br />

20<br />

www.risk-uk.com


They see a well secured airport.<br />

You see smart data to<br />

optimize traveler flow.<br />

Bosch empowers you to build a safer and more secure<br />

world. And with built-in video analytics as of the IP 4000<br />

cameras, we allow you to use video data for more than<br />

security alone. Like identifying interruptions and<br />

patterns in airport traffic.<br />

Find out more at boschsecurity.com<br />

+1<br />

People counting<br />

Queuing alarm<br />

Enforcing safety<br />

regulations


SBD and CPTED: Security’s Pivotal<br />

Role in the Construction Sector<br />

For each building<br />

planned, designed<br />

and built to become a<br />

new part of our city<br />

landscapes, architects<br />

and design firms are<br />

very often the first<br />

links in the chain. The<br />

ingenuity and skill<br />

that they bring to<br />

construction design<br />

processes is<br />

undoubted, but even<br />

these central<br />

individuals need<br />

helping hands. Philip<br />

Strand argues why<br />

security professionals<br />

must be brought into<br />

the process at the<br />

earliest stages<br />

Dr Philip Strand PhD MBA:<br />

Senior Risk Consultant at<br />

CornerStone GRG<br />

22<br />

www.risk-uk.com<br />

Cities continue to grow across the UK. Even<br />

the most conservative construction<br />

industry forecasts predict at least 1.2%<br />

growth through 2018 and beyond. Although<br />

that number may seem small, this equates to a<br />

commitment of more than £500 billion worth of<br />

projects focused on infrastructure, private<br />

housing and commercial properties within the<br />

next few years.<br />

Construction project teams include not only<br />

architects and designers, but also structural<br />

engineers, investors, city planners and a<br />

multitude of other stakeholders who are all<br />

well-qualified to make contributions to the<br />

design process. All too often, however, security<br />

professionals with bespoke education, training<br />

and experience in building operations are<br />

brought into teams far too late to have any<br />

appreciable influence on security-related<br />

aspects of building designs.<br />

While there may be reasons for late<br />

invitations going out to security professionals,<br />

this oversight can come at a significant cost to<br />

both building owners and, more likely than not,<br />

a building’s future users.<br />

Quite sensibly, most designers begin their<br />

projects with the building’s ‘user requirements’<br />

in mind. Early in the design process, workshops<br />

are held to determine the activities that will go<br />

on within the building and how the building’s<br />

users should benefit from its existence.<br />

By way of documents that are logically<br />

similar to the Operational Requirements<br />

Reports of the Centre for the Protection of<br />

National Infrastructure, designers, architects<br />

and engineers conceptualise their buildings<br />

inside and out to meet people’s stated needs.<br />

User groups and their spatial needs, aesthetic<br />

requirements and emotive goals, as well as<br />

practical concerns about Health and Safety, are<br />

all captured in ‘user requirements’ at the early<br />

stages of projects.<br />

Principles of security<br />

Practical requirements related to security,<br />

however, are very often either left out or<br />

woefully underestimated at the early stages of<br />

projects. This occurs not as a function of<br />

designers or other stakeholders being oblivious<br />

to security as a requirement, but rather as a<br />

result of project team leaders mistakenly<br />

viewing ‘security’ as a collection of cameras,<br />

turnstiles and card readers that can all be<br />

simply bolted into the walls and floors after the<br />

majority of the building has been planned (and<br />

sometimes even constructed).<br />

Excluding principles of security from<br />

influential ‘user requirements’ documents and<br />

excluding security professionals from project<br />

teams during the early phases of design<br />

reduces the chances that the building will be<br />

inherently securable which, in turn, increases<br />

the likelihood that awkward, excessive and,<br />

ultimately, more expensive security solutions<br />

will be required after the building is phased<br />

into everyday use.<br />

The idea that early engagement can enable<br />

security professionals to have positive impacts<br />

on construction projects isn’t new. Further,<br />

Secured By Design (SBD) and Crime Prevention<br />

Through Environmental Design (CPTED) are two<br />

well-respected programmes that seek to make<br />

buildings and spaces inherently more secure<br />

before they’re even built.<br />

SBD provides guidance for ‘designing-out<br />

crime’ by ensuring that buildings’ perimeters,<br />

walls and other features are configured in ways<br />

that make it difficult for criminals to operate.<br />

Roads and footpaths leading up to buildings<br />

are also considered from a security perspective.<br />

For its part, CPTED operates on a deeper,<br />

more psychological level. CPTED promotes the<br />

use of basic design principles that make<br />

criminals feel uncomfortable and ‘observed’ to<br />

the point that they’re deterred from causing<br />

trouble in an area. The principles of CPTED<br />

encourage people to come into spaces and use<br />

them for legitimate purposes such that others<br />

cannot use those spaces for illegal reasons.<br />

By incorporating CPTED principles into<br />

building designs, crime can be measurably<br />

reduced, thus cutting back on the need for<br />

expensive technological solutions and<br />

increasing the efficiency of those technological<br />

systems that remain necessary.<br />

Not only are SBD and CPTED’s design<br />

recommendations normally ‘cost neutral’ (from<br />

a design perspective), but they can also reduce<br />

security guarding costs, lessen CCTV camera<br />

requirements and cut back on material losses.<br />

When these reductions are factored into<br />

operating expenditure estimates over the<br />

lifetime of the building, early engagement with<br />

security professionals can then readily be seen


Security in the Built Environment<br />

as an extremely important cost-saving decision<br />

that can be taken.<br />

Dynamic Vehicle Assessments<br />

Beyond crime, if there are risks related to<br />

terrorism present, then there can also be a<br />

great deal of value in engaging early with<br />

explosive blast experts and security<br />

professionals capable of conducting Dynamic<br />

Vehicle Assessments (DVAs).<br />

Since stand-off range is a tremendously<br />

important variable in blast mitigation<br />

strategies, and because tight corners and<br />

spaces are extremely important factors in DVAs,<br />

the input of security experts at the very<br />

beginning of a project is much more valuable<br />

than that which can be provided at some point<br />

after a building’s foundations have been dug.<br />

Sometimes, it can be the case that simply<br />

moving a road or a building just five metres in a<br />

given direction could save stakeholders<br />

hundreds of thousands of pounds in blast<br />

mitigation measures. In more extreme cases,<br />

five metres of extra stand-off can be the<br />

difference between a feasible blast mitigation<br />

strategy and having no feasible options at all.<br />

Fortunately, the problem of late engagement<br />

with security professionals in construction<br />

projects is being addressed by an increasing<br />

number of accreditation schemes that require<br />

projects to incorporate recommendations from<br />

Risk, Threat and Vulnerability (RTV)<br />

Assessments in their designs. Specifically, RTV<br />

Assessments calculate the business impacts<br />

that security incidents might have on the<br />

assets, people and strategic objectives of<br />

organisations using buildings.<br />

Focusing attention on BREEAM<br />

The Building Research Establishment<br />

Environmental Assessment Method (BREEAM)<br />

is the world’s longest-standing method for<br />

ensuring the sustainability of buildings and<br />

calls for new building projects to include a<br />

‘Security Needs Assessment’. This makes sense<br />

given research commissioned by SBD that<br />

estimates six million tonnes of CO 2 is<br />

generated annually by resources spent on<br />

preventing and investigating crime.<br />

The BRE’s new Security Assessment scheme,<br />

entitled SABRE, goes a step further by<br />

encouraging construction projects to fully<br />

integrate security factors throughout the entire<br />

construction process.<br />

BREEAM’s acknowledgement of the<br />

importance of security is a step in the right<br />

direction, but other schemes and methods will<br />

need to adopt similar views before real traction<br />

can be achieved. The Royal Institute of British<br />

Architects’ (RIBA) well-known, five-stage<br />

project management model is understood by all<br />

construction companies within the UK. In<br />

theory, an RTV Assessment should inform the<br />

concept designs generated by construction<br />

project teams in RIBA Stage 2. BREEAM audits<br />

encourage companies to conduct these<br />

assessments by giving additional points for<br />

their completion. More points are awarded if<br />

the companies pass a SABRE accreditation.<br />

In reality, though, RTV Assessments are often<br />

commissioned too late to have any real impact<br />

on a building’s design.<br />

Consider the fact that it can easily take a<br />

procurement team a month or more to go<br />

through a tender process and select a security<br />

company to undertake the RTV Assessment. In<br />

short, if the project team didn’t consider the<br />

RTV Assessment well before beginning Stage 2,<br />

then it’s highly unlikely that a ‘suitablyqualified’<br />

security professional will be<br />

commissioned in time for an assessment to be<br />

completed and its results to have a discernible<br />

impact on the concept design.<br />

The project team will score the extra BREEAM<br />

and SABRE points for having the assessment,<br />

but the practical value of the work is unlikely to<br />

be capitalised upon. The project team will find<br />

out too late that an explosive blast expert or<br />

some other specialist security expert should<br />

have been included within the team.<br />

“Sometimes, it can be the case that simply moving a road<br />

or a building just five metres in a given direction could save<br />

stakeholders much money in blast mitigation measures”<br />

23<br />

www.risk-uk.com


‘The Perimeter’, as it<br />

was once known, is<br />

quickly going the way<br />

of the Dodo. Between<br />

Bring Your Own Device<br />

schemes and the mass<br />

migration to the cloud,<br />

IT security<br />

professionals can no<br />

longer rely on the<br />

boundaries of their<br />

network to be the true<br />

borders in their area of<br />

responsibility. That<br />

being the case, where<br />

do they go from here?<br />

Adam Jaques offers his<br />

take on the matter<br />

Left To Their Own Devices<br />

Quite predictably, Bring Your Own Device<br />

(BYOD) refers to a policy of allowing<br />

employees to literally bring their own<br />

devices into work and use their employer’s<br />

network in order to do their job. It might prove<br />

to be a headache for IT professionals inside the<br />

host company, but has clearly been quite<br />

attractive to management, who often see an<br />

opportunity to save money, increase<br />

productivity and, ultimately, streamline the<br />

working lives of their employees.<br />

This poses tough questions for security<br />

professionals. They’ve every right to be<br />

worried, too. A panoply of studies show that,<br />

time and time again, human error is so often<br />

the prime cause of a breach. Further, recent<br />

reports have indicated that personal devices on<br />

corporate networks are behind many insider<br />

threats. In short, BYOD serves up a whole new<br />

salad of security variables for IT security<br />

professionals, many constituent elements of<br />

which may seem tough to digest.<br />

The moving parts that a BYOD policy<br />

introduces confront IT Departments with a<br />

variety of devices, brands and users and a<br />

veritable kaleidoscope of data that can be<br />

difficult to manage. You’re not only adopting<br />

your employees’ devices, but often the services<br />

and Apps that they regularly use as well.<br />

Let’s be clear that BYOD isn’t going away<br />

anytime soon. The corporate perimeter is<br />

already heading out of sight. Workforces are<br />

increasingly mobile and dispersed with the rise<br />

of networked technology and the proliferation<br />

of ‘Work at Home’ policies. It’s a trend that will<br />

be hard to fight. A study by analyst Gartner<br />

shows that, by the end of this year, 50% of<br />

companies will require employees to use their<br />

own devices for work-related tasks.<br />

BYOD: the central considerations<br />

So what do organisations need to think about<br />

on the path towards BYOD? Compliance<br />

considerations must come before the first draft<br />

of any BYOD policy. Industry regulations and<br />

standards must be understood along with the<br />

issues that concern your specific sector when it<br />

comes to IT.<br />

In the healthcare sector, for example, BYOD<br />

policy needs to take into account the great<br />

wealth of intimately personal data that will flow<br />

through users’ devices. For engineering, the<br />

policy must recognise the value of the<br />

Intellectual Property with which members of<br />

staff are engaged on a daily basis.<br />

All of this becomes especially important for<br />

European organisations, who will soon face the<br />

daunting compliance challenge of the EU’s<br />

General Data Protection Regulation (GDPR),<br />

which comes into effect in May 2018. The raft of<br />

requirements it will introduce are all backed up<br />

by a hefty 4% penalty on global revenue for<br />

particularly delinquent proven offenders.<br />

Survey results published by Strategy<br />

Analytics have shown increasing fears around<br />

BYOD on the part of European businesses, with<br />

10% of those professionals quizzed suggesting<br />

they expect the use of BYOD-enabled tablets to<br />

decrease with the advent of the GDPR.<br />

The GDPR need not become a hindrance to<br />

BYOD adoption, but it does mean organisations<br />

that want to allow mobile IT will have to be all<br />

the more diligent when it comes to<br />

implementation. Even if drafting a policy proves<br />

cumbersome, not having one in place will not<br />

stop employees from using enterprise IT on<br />

their own devices. It will merely leave the<br />

business without a structure to accommodate<br />

this and risks compliance problems at some<br />

juncture further down the line.<br />

Opening up to risk<br />

“There are always going to be some businesses<br />

for whom BYOD is inappropriate,” explained<br />

Vince Warrington, founder of Protective<br />

Intelligence, a consultancy that advises<br />

companies on security. “There are always going<br />

to be people who struggle with not being able<br />

to take their work laptop home, especially if<br />

they need to work late or across a weekend to<br />

meet deadlines. What they’re more likely to do<br />

is e-mail their work to themselves, thus<br />

opening up the enterprise to security risks.”<br />

24<br />

www.risk-uk.com


Mobile Technology: Risk Management for BYOD and The Cloud<br />

Warrington continued: “It’s that balance of<br />

making sure you have the security right. If you<br />

don’t put some kind of policy in place then<br />

people will work around the situation in any<br />

event. They’ll find a way. Your workforce is like<br />

water in that it will always gravitate towards<br />

the path of least resistance. If you turn around<br />

and give people in your working environment<br />

the kind of workloads where they’re having to<br />

operate from home at weekends or while on the<br />

move then you must accept the fact that, unless<br />

you put proper rules in place, they’re going to<br />

do whatever works best for them.”<br />

Core to the introduction of a BYOD policy will<br />

be to give users access to the processes they<br />

need to do their jobs. This involves more than<br />

just securing endpoints in the right way. Steve<br />

Armstrong, a SANS Institute instructor, advises<br />

against relying purely on endpoint solutions,<br />

and instead to “think about controlling your<br />

data before it’s sent to the endpoint.”<br />

You need to think about what data you’re<br />

replicating. Is it reliable? Is it secure? Does this<br />

person actually need access to that data? “It’s<br />

good to have endpoint security,” stated<br />

Armstrong, “but don’t think you’ve just<br />

outsourced the problem.”<br />

EMM comes into play<br />

That access needs to be managed and enforced<br />

with what’s known as Enterprise Mobility<br />

Management (EMM). EMM helps to prevent<br />

unauthorised access and establish acceptable<br />

behaviour for mobile IT, partition accountability<br />

and address the problems of lost and stolen<br />

devices as well as what to do when an<br />

employee and an employer finally part ways.<br />

The simplest EMM solution for the widest<br />

range of devices will be the one that works<br />

best. To be sure, any solution that’s too<br />

complex or restrictive is doomed to failure.<br />

Back in 2014, another study by Gartner<br />

predicted that 20% of all BYOD policies would<br />

fail due to overcomplexity.<br />

Access management must be disciplined.<br />

People (including guests) and devices that<br />

don’t require access to areas of your business<br />

should not have access. It’s as simple as that.<br />

The proliferation of admin rights for regular<br />

users across global organisations is a regular<br />

cause of security breaches. Some EMM<br />

solutions make good use of container security<br />

which effectively separates the data of<br />

employees and enterprises, even when working<br />

on devices that are brought in from home.<br />

Network access control solutions and strong<br />

SSL VPNs will be critical to the adoption of<br />

BYOD, affording users access to what they need<br />

while protecting the business from security<br />

“Survey results published by Strategy Analytics have<br />

shown increasing fears around BYOD, with 10% of those<br />

professionals quizzed suggesting they expect the use of<br />

BYOD-enabled tablets to decrease due to the EU’s GDPR”<br />

risks. Bear in mind that technological solutions<br />

are necessary, but not quite sufficient enough<br />

for an effective BYOD policy.<br />

Humans may be your weakest point, but<br />

they’re also your most critical aspect. They’ll<br />

need to be educated about security cleanliness,<br />

what they can and cannot do on a company<br />

network and how they might work not only<br />

efficiently, but also safely.<br />

Employee perspectives<br />

When looking at the issue from the point of<br />

view of the business itself, it’s easy to forget<br />

about the perspective of the employee. The<br />

benefits of a BYOD policy cannot be taken as a<br />

‘given’ when it comes to employees. They need<br />

to be assured that their privacy will be<br />

respected, just as employers would expect their<br />

security policies to be observed.<br />

Moreover, finding out what employees want<br />

and, just as importantly, what they actually<br />

need from such a policy will only serve to<br />

create a more agile and workable document<br />

which is easier to stomach.<br />

Much of this comes down to education, itself<br />

a fundamental aspect of implementing BYOD.<br />

Education is absolutely critical to the future<br />

safe working of BYOD within your organisation.<br />

In essence, BYOD has to orbit around the<br />

very subject of a BYOD policy: the user. Here,<br />

simplicity is king. Complex policies will mean<br />

inefficient working, blocks to productivity and<br />

hard-to-follow instructions. They’ll merely<br />

increase the likelihood of the user finding some<br />

way of circumventing a cumbersome security<br />

policy and possibly opening up your<br />

organisation to compromise.<br />

What about the future?<br />

Looking ahead, new developments are being<br />

made in BYOD that will allow the introduction<br />

of Artificial Intelligence in workplaces, thus<br />

removing much of the scope for human error<br />

that BYOD sometimes risks. Bring Your Own Bot<br />

(or BYOB) has been touted as the future<br />

iteration of BYOD, with the arrival of intelligent<br />

personal assistants like Amazon Alexa.<br />

BYOD provides a new challenge to security<br />

professionals and one that’s not entirely<br />

avoidable. However, a forward-thinking BYOD<br />

policy will plug security holes far more<br />

effectively than if you choose to ignore them.<br />

Adam Jaques:<br />

Technologist at Pulse Secure<br />

25<br />

www.risk-uk.com


Data Centres: Security and Fire Safety<br />

The Data Centre sector is one of the world’s<br />

fastest-growing industries, with the huge<br />

increase in Internet usage being one of the<br />

key drivers. In the past decade, the number of<br />

users worldwide has increased from 300 million<br />

to over two billion. That represents a<br />

phenomenal growth rate of more than 400%.<br />

Data Centre downtime can mean losing<br />

thousands of pounds per minute. Even an<br />

interruption of one hundredth of a second can<br />

disrupt the entire IT operation of a Data Centre.<br />

Any temporary stoppage of data flow or a<br />

failure in a single element of the facility’s<br />

infrastructure can realise downtime, resulting in<br />

potentially serious consequences for an<br />

organisation’s daily operations and reputation.<br />

Advanced protection systems will encompass<br />

Command and Control solutions, secure<br />

process management, wide-area surveillance,<br />

perimeter and site intrusion protection, access<br />

control for staff, contractors and vehicles, alarm<br />

management, fire detection and extinguishing<br />

solutions, phased evacuation systems, lone<br />

worker monitoring and asset tracking.<br />

By automating routine security and fire safety<br />

tasks, organisations can concentrate on their<br />

core business activities while at the same time<br />

protecting facilities with high performance risk<br />

management systems based on the very latest<br />

safety and security technologies.<br />

High-level security<br />

Threats to Data Centres come in many forms,<br />

from the intruder trying to gain physical access<br />

to the facility and, ultimately, the servers<br />

through to cyber attacks and hackers trying to<br />

access the network as well as stored data.<br />

A whole lifecycle approach to system design<br />

should be at the heart of a proposed<br />

technological solution to deliver maximum<br />

safety, resilience, longevity and reliability. To<br />

facilitate this, single points of system failure<br />

should be designed-out wherever feasible and<br />

worse case parameters used in engineering<br />

calculations to minimise the risk of either<br />

system degradation or failure.<br />

Furthermore, the solution should be<br />

configured to ensure the delivery of efficiencies<br />

in maintenance and running costs.<br />

Due to the sensitive and 24/7 nature of Data<br />

Centres, rigorous identity and access control for<br />

the various zones within is of primary<br />

importance. Ensuring that only the right people<br />

gain access at all times can be achieved by<br />

employing badge or smart card access control<br />

or biometric access using iris, vein or facial<br />

recognition. Optimal security may be ensured<br />

with an intrusion detection system to secure<br />

fences, walls, windows and doors and even<br />

Data Centres: Coping with<br />

‘Information Overload’<br />

The continued growth of social networking, electronic<br />

banking and paperless storage, together with modern IT<br />

services such as virtualisation and cloud computing, have<br />

made businesses heavily dependent on Data Centres. Using a<br />

real world example, Chris Edwards evaluates protection<br />

measures designed to ensure Data Centres are safe, secure,<br />

resilient and sustainable<br />

detect flooding. All areas may be secured using<br />

HD IP cameras to provide the highest image<br />

quality of both live and recorded incidents.<br />

Command and Control platforms that<br />

integrate protection devices across Data<br />

Centres, including multiple sites, will manage<br />

critical situations and enhance procedures by<br />

delivering improved intelligence, information,<br />

advanced reporting and greater operator<br />

effectiveness. Furthermore, these new<br />

generation software solutions incorporate<br />

legacy equipment and adapt to specific<br />

corporate security and safety policies.<br />

Command and Control enables the<br />

synchronisation of inputs from multiple security<br />

and safety devices such that operators can<br />

quickly master each situation. Decision-making<br />

is more systematic, while the need to follow a<br />

logical workflow is vital.<br />

Full integration<br />

Adopting a proactive and preventative security<br />

approach using fully-integrated security<br />

management solutions will protect all<br />

Chris Edwards: Account<br />

Development Manager at<br />

Siemens Building Technologies<br />

27<br />

www.risk-uk.com


Data Centres: Security and Fire Safety<br />

operational processes and ensure the integrity<br />

of the data, building and assets as well as<br />

maximum uptime and business continuity.<br />

The central management of all integrated<br />

security will improve operational performance,<br />

increase visibility, boost response agility for<br />

deployment, enforcement and speed of<br />

response and, ultimately, reduce costs.<br />

Time is critical for many operations, so<br />

operators need to have information at their<br />

fingertips. A decision management workflow<br />

will assign priorities and determine activities<br />

and allow the appropriate actions and<br />

resources. A high level of transparency,<br />

complete with detailed reporting and audit<br />

trails, provides vital information for senior<br />

management to enable a better understanding<br />

of their Data Centre operations, leading to<br />

future improvements and cost efficiencies.<br />

The delivery of high-level intelligence will<br />

enable the detection of a critical event and the<br />

management of the situation through to a<br />

successful conclusion.<br />

Frankfurt Data Centre<br />

Let’s look at a real world example. Frankfurt has<br />

the highest density of Data Centres of any city<br />

in Europe. The German branch of Citigroup has<br />

built its Frankfurt Data Centre (FDC) as a high<br />

performance, energy-efficient facility with highlevel<br />

protection and availability. Processed data<br />

is stored in duplicate within the Data Centre<br />

and mirrored to other Citigroup Data Centres.<br />

The FDC meets the Tier IV Standard awarded by<br />

the Uptime Institute for maximum redundancy<br />

and maintains 99.995% availability.<br />

Redundancy, high system availability,<br />

security and energy efficiency are key elements<br />

for Citigroup. We’ve delivered intelligent safety<br />

and security technology for this client<br />

alongside reliable building automation that<br />

cools and conditions the air based on demand,<br />

keeping the servers from overheating, and an<br />

uninterruptible and redundant power supply.<br />

To guarantee the safety and security of the<br />

building, assets and processed data, all of the<br />

installed security and safety systems are<br />

aligned with Citigroup’s global safety and<br />

security requirements, so too the facility for<br />

regular emergency evacuation and safety drills.<br />

Any operational Data Centre should harbour<br />

the highest level of fire safety due to the<br />

presence of a constant ignition source of<br />

electricity as well as a plentiful supply of<br />

combustible materials.<br />

Fire detection in Data Centres can be<br />

challenging for traditional smoke detection<br />

systems. Fires typically start slowly before<br />

erupting into flame, so the early detection of<br />

smoke is essential. However, the high level of<br />

ventilation necessary to prevent equipment<br />

from overheating also disperses smoke, making<br />

it more difficult to detect and enhancing the<br />

risk of fast fire distribution within the space.<br />

To mitigate the risk of fire, Data Centres<br />

require advanced detection, offering the<br />

earliest possible warning. Intelligent detectors<br />

will evaluate each situation minute by minute<br />

and take decisions on complex criteria,<br />

eliminating the potential for unwanted alarms<br />

due to environmental influences. Detectors<br />

must only alarm when there’s a real risk of fire<br />

and offer 100% reliability. They should adapt to<br />

reflect environmental changes in room usage.<br />

Aspirating Smoke Detectors (ASDs) are<br />

designed to operate in extremely demanding<br />

situations, even before any smoke is visible.<br />

Innovative, dual wavelength technology can<br />

detect minute smoke particles, determine false<br />

fire phenomena and provide an instant fire<br />

alert. ASDs actively draw smoke to the detector<br />

through boreholes within a piping system that<br />

runs throughout the protected area. This offers<br />

a significantly higher level of protection, as<br />

standard systems can only respond if smoke<br />

can actually reach the detection element, which<br />

may often be too late in critical environments.<br />

For high risk environments where water<br />

damage to assets and materials can outweigh<br />

that of an uncontrolled fire, inert gas and<br />

chemical extinguishing systems deliver reliable<br />

protection. Clean extinguishing technologies<br />

safeguard valuable equipment in<br />

data/computing, electrical and<br />

telecommunications rooms. Inert gases<br />

displace air during the discharge.<br />

A further consideration is the adoption of<br />

specialist ‘silent’ extinguishing to ensure the<br />

protection of vulnerable hard disk drives<br />

(HDDs). This reduces ‘noise’ during<br />

extinguishing to about 1/100th that of<br />

conventional systems and shifts the sound<br />

frequency away from the crucial spectrum to<br />

which HDD devices are sensitive, all without<br />

affecting the efficient distribution of the<br />

extinguishing agent.<br />

“Adopting a proactive and preventative security approach using fullyintegrated<br />

security management solutions will protect all operational<br />

processes and ensure the integrity of the data, building and assets”<br />

28<br />

www.risk-uk.com


Advertisement Feature<br />

ISM: Pioneering Integrated Security<br />

Management Systems<br />

Physical Security Information Management<br />

(PSIM) systems have come a long way in<br />

an incredibly short space of time, with<br />

solution manufacturers in this particular space<br />

having made big and bold claims about how<br />

their systems are being developed and what<br />

they can do for procuring end user customers.<br />

At ISM, however, we don’t talk. Rather, we<br />

act. We don’t ‘do’ PSIM systems any longer, at<br />

least not in the way that PSIM is currently<br />

understood. We’ve gone beyond PSIM into a<br />

new generation of Integrated Security<br />

Management Systems (ISMS). Indeed, they’re<br />

already installed and protecting Critical<br />

National Infrastructure projects worldwide.<br />

ISM recognised that ‘true’ PSIM systems<br />

were being undervalued, with glorified Video<br />

Management Systems oversold as something<br />

rather more capable and special.<br />

We also recognised that there’s a world of<br />

difference between a manufacturer’s system<br />

that’s capable of controlling and managing<br />

cameras and network video recorders of a<br />

similar make and a ‘true’ ISMS that controls<br />

multiple technologies from multiple<br />

manufacturers. The former delivers an<br />

integrated solution up to a point, but ‘true’<br />

integration is only achieved by those systems<br />

that can accommodate any technology of any<br />

make and, what’s more, do so across multiple<br />

sites and even multiple countries.<br />

Genesys Enterprise<br />

It’s with this in mind that we’ve launched our<br />

latest generation of Genesys Enterprise<br />

technology, offering end user customers<br />

unparalleled scale, redundancy and ease of<br />

use. Put simply, Genesys Enterprise is leading<br />

the market as a proven solution.<br />

As an enhancement of the existing Genesys2,<br />

the Enterprise version has been developed with<br />

the largest organisations in mind. Genesys is<br />

fully-scalable to manage and control multiple<br />

sites from a single Control Room (or even a<br />

single workstation) across a country or even<br />

across continents. It features the most<br />

advanced levels of encryption configured to<br />

ensure network security, and is accredited to<br />

the highest standards of Government national<br />

infrastructure security.<br />

Stephen Smith, managing director of ISM,<br />

explained to Risk UK that the extension of the<br />

Genesys range affords end user customers<br />

greater choice. “Genesys Enterprise resolves<br />

those issues associated with the increasing<br />

geographical scope of clients, corporations,<br />

Governments and institutions, while also<br />

adhering to a multi-tiered hierarchy (or<br />

‘federated’ system) where total control is<br />

centralised, but allows individual sites to<br />

maintain local control,” stated Smith.<br />

“The new addition is ideally suited to those<br />

large organisations with multiple sites across<br />

multiple regions who might also want to ‘flex’<br />

to accommodate further sites and geographies<br />

as their needs evolve. As this solution<br />

emanates from the Genesys stable, current end<br />

users only have to upgrade from their existing<br />

version to Enterprise without the expense of a<br />

complete technology ‘refresh’.”<br />

Integration of multiple systems<br />

Crucially, the new development allows the<br />

integration of multiple systems from multiple<br />

manufacturers – all from one holistic and<br />

integrated security system.<br />

Every electronic security or fire safety device<br />

from CCTV and intruder alarms through to<br />

electronic locking and Public Address can be<br />

monitored and controlled from a single<br />

platform, regardless of who made them.<br />

Most importantly, Genesys Enterprise<br />

includes the existing Migrating 3+ technology, a<br />

patented automatic failover technology that<br />

adds higher levels of automatic configurable<br />

redundancy and power. Control is effectively<br />

distributed across multiple workstations.<br />

Operating from an<br />

extensive<br />

manufacturing and<br />

design facility located<br />

close to Gatwick<br />

Airport, ISM has been<br />

a world pioneer in<br />

integrated security<br />

systems and<br />

integrated security<br />

solutions since 1989.<br />

Here, the UK’s leading<br />

developer of<br />

integrated security<br />

management,<br />

intercom and cell call<br />

systems focuses on<br />

the development of<br />

Integrated Security<br />

Management Systems


Advertisement Feature<br />

“We take power to your PC and multiply it by<br />

the number of PCs on your network,” continued<br />

Smith. “What this means is that, if one PC fails,<br />

control is seamlessly migrated to another PC,<br />

with no interruption or downtime. Therefore,<br />

our system isn’t restricted in its performance by<br />

the size or capability of a server, nor does it<br />

require the expense of moving to server farms<br />

or using clustering software. We deliver the<br />

most extreme redundancy characteristics for<br />

the threats you’ve thought of, as well as those<br />

that you haven’t.”<br />

Tested and proven<br />

Genesys is a ‘true’ ISMS system built around<br />

intuitive software that combines a range of<br />

industry-leading features and benefits<br />

including an enhanced Graphical User Interface<br />

experience, 3D modelling and a comprehensive<br />

event management database. Events and<br />

alarms are presented to the operator clearly as<br />

and when they happen.<br />

“The Enterprise development within the<br />

Existing Genesys isn’t a development waiting<br />

for a trial site,” outlined Smith, “but rather one<br />

that has already been installed within a highsecurity<br />

Critical National Infrastructure project.<br />

It’s tested and proven at the highest level under<br />

the most demanding of conditions and has<br />

been very successful.”<br />

Operators can be quickly trained to gain<br />

maximum advantage. “The system also enables<br />

end users to make better use of their staff and<br />

resources, since you don’t have to have all of<br />

your Control Rooms working 24 hours,”<br />

observed Smith. “Genesys is a truly unique<br />

solution offering advanced system architecture,<br />

unparalleled ease of use for the operators and<br />

very low lifecycle costs for the end customer.”<br />

Protection for Haringey residents<br />

A new concierge and ISMS solution developed<br />

by ISM is now protecting two tower blocks in<br />

the London Borough of Haringey, enabling<br />

authorised employees to control door access<br />

and manage fire and security systems from<br />

anywhere within Haringey Council’s estate.<br />

Newbury House, Finsbury House, John Keats<br />

House and Thomas Hardy House in London’s<br />

Wood Green already feature four of ISM’s stateof-the-art<br />

Ultimate door entry systems as well<br />

as another duo of third party technology<br />

systems from Entrotec, using its Apex dual path<br />

speech technology.<br />

Thanks to the Genesys ISMS, multiple<br />

technologies can be controlled regardless of<br />

the manufacturer of those technologies, in turn<br />

providing enhanced security for residents in<br />

over 500 flats across a total of six tower blocks.<br />

This delivers greater flexibility and control,<br />

eliminates the potential disruption caused by<br />

installing new equipment and protects Haringey<br />

Council’s legacy investment. It also means that<br />

further buildings with existing ISM or Entrotec<br />

systems can be added as and when required<br />

with only minimal additional investment.<br />

Genesys allows the integration not just of<br />

door entry systems, but also multiple systems<br />

from multiple manufacturers – all from one<br />

holistic integrated security system. As<br />

mentioned previously, every electronic security<br />

or fire safety device from CCTV and intruder<br />

detection alarms to electronic locking and<br />

Public Address systems can be monitored and<br />

controlled from a single platform.<br />

The solution for Haringey Council features<br />

the aforementioned Migrating 3+ technology.<br />

Len Fevrier, senior electrical engineer at<br />

Homes for Haringey, has been extremely<br />

impressed with the system and how it has<br />

performed so far.<br />

“We’ve used the ISM Ultimate door entry<br />

products and the company’s Genesys Control<br />

Room software platform extensively in the<br />

Borough over many years now and have<br />

enjoyed excellent product reliability and<br />

technical support. To improve our efficiency and<br />

give faster responses to our residents we<br />

needed to provide concierge services for all of<br />

our estates. The development of the Entrotec<br />

integration into the Genesys platform allowed<br />

Haringey to combine technology, including<br />

CCTV and fire safety systems, without going to<br />

the expense of replacing legacy door entry<br />

equipment unnecessarily. This delivers a much-


Advertisement Feature<br />

needed saving during what are challenging<br />

economic times for local councils. We now plan<br />

to roll out this system across the rest of the<br />

Broadwater Farm Estate and, potentially, other<br />

sites in the Borough as well.”<br />

Built around intuitive software<br />

ISM’s Stephen Smith firmly believes that this<br />

project is indeed a perfect example of the<br />

flexibility of Genesys and the company’s door<br />

entry system range.<br />

The PSIM software operates as a standalone<br />

platform over LAN or WAN networks for remote<br />

and local sites with workstations that can be<br />

transferred to any operating Security Control<br />

Room on the network. This offers the end user<br />

flexibility when closing down sites or buildings<br />

for off-peak or ‘out of normal hours’ working or<br />

in the unlikely event of any system failures.<br />

Ultimate is a fully-addressable digital<br />

telephone entry system that’s robust in design<br />

and easy to install. Unlike other door entry<br />

systems on the market, it boasts multi-speech<br />

paths that allow numerous conversations to be<br />

had at one time.<br />

Such was the complexity of the project that<br />

from initial design of the system to completing<br />

the installation took around two years.<br />

Importantly for the client, fire alarms, access<br />

control and CCTV systems can all now be<br />

controlled from one computer on Haringey<br />

Council’s network.<br />

Intergrated Security Manufacturing (ISM) in Focus<br />

Intergrated Security Manufacturing (ISM) is the UK’s leading developer of Integrated Security<br />

Management Systems (ISMS), a new generation of solutions that has moved beyond Physical<br />

Security Information Management (PSIM) as the industry knows it.<br />

Established in 1989 and now operating from the company’s extensive manufacturing and design<br />

facility in Sussex, ISM is once again leading the way in how security management technologies<br />

are defined. It’s not just taking PSIM to another level. The company is already there with its ISMS<br />

installed, working and proven on the world stage.<br />

The business’ global client base encompasses many of the world’s most prominent institutions<br />

and includes central and local Government, Critical National Infrastructure concerns, healthcare<br />

establishments, education campuses, shopping centres, financial institutions and law<br />

enforcement agencies.<br />

ISM’s established Genesys platform enables the integration of many types and makes of<br />

equipment including CCTV, DVRs, access control systems, fire alarms, intruder detection alarms,<br />

audio matrix, intercoms, Public Address and paging systems – all from one holistic security<br />

management system.<br />

For further information access the ISM website at www.ism-uk.com<br />

Stephen Smith:<br />

Managing Director of ISM


Access Control: Developments in Biometric Security<br />

Thanks – in no small part – to the magic<br />

conjured up by film producers, directors<br />

and computer graphics specialists resident<br />

in the Hollywood hills, biometrics have become<br />

something of a go-to metaphor for what might<br />

best be described as ‘bleeding edge, bulletproof<br />

security’. It’s easy to see why, too, as<br />

high-tech equipment like iris scanners, for<br />

example, makes for a gripping spectacle within<br />

cinema theatres and on our television screens.<br />

Of late, biometrics based on brain<br />

(electroencephalogram) and heart<br />

(electrocardiogram) signals have emerged. A<br />

research group at the University of Kent led by<br />

Ramaswamy Palaniappan has shown that<br />

people have certain distinct brain and heart<br />

patterns specific to each individual.<br />

This new generation of biometric systems is<br />

called the ‘biometrics of intent’ and aims to<br />

scan intent. The technology will analyse<br />

physiological features such as eye movement,<br />

body temperature and breathing, etc and then<br />

predict dangerous behaviour or hostile intent<br />

before it materialises into physical action.<br />

A recent and detailed report produced by<br />

MarketsandMarkets.com predicts a 17% annual<br />

growth in the gross biometric recognition<br />

systems global market between 2105 and 2022,<br />

from a figure of $10.74 billion to $32.73 billion.<br />

Of this marked increase, fingerprint recognition<br />

technology holds the largest single factor<br />

authentication segment and is predicted to<br />

continue to occupy that pole position for the<br />

foreseeable future.<br />

In light of recent appalling terrorist attacks<br />

across the world, the need for security has<br />

never been greater and, while travel and<br />

immigration will no doubt continue to hold the<br />

largest share of the biometric systems market<br />

(with the USA still the largest customer), the<br />

somewhat less dramatic use of fingerprint<br />

readers across a wide range of sectors is<br />

actually the main driver of growth.<br />

The primary reason for this is that fingerprint<br />

recognition systems are proving to be far more<br />

secure and cost-effective than the traditional<br />

alternatives of numeric key pads or magnetic<br />

swipe cards, rapidly paying for themselves with<br />

a far lower lifetime cost as they require no<br />

additional consumables (such as additional<br />

cards). Nor do they have to be reprogrammed –<br />

as is the case for numeric keypads – should<br />

security be breached at some point.<br />

Probably of more importance to practising<br />

end users is the fact that biometric recognition<br />

systems can help to provide an infallible access<br />

control system that may be used for a variety of<br />

additional purposes once successfully<br />

integrated with suitable software.<br />

In Search of Recognition<br />

The last five years have seen biometrics extricated from the<br />

‘Mission Impossible’ scenario espoused by Hollywood and<br />

dropped squarely into the lives of everyday consumers,<br />

whereupon they’re now fast assuming a central role in the<br />

sphere of digital identity management. Here, Shaun Oakes<br />

explains how biometric recognition devices can offer very real<br />

benefits for today’s practising security and risk managers<br />

A typical example may be a UK Government<br />

Data Centre where various levels of access are<br />

required. To even be considered for such a<br />

contract, of course, the access control system<br />

would have to be Centre for the Protection of<br />

National Infrastructure-approved, while the<br />

readers themselves would have to integrate<br />

seamlessly and provide data for access systems<br />

controlling access points such as turnstiles,<br />

barriers, doors or even computer terminals.<br />

The resultant data can be used not only for<br />

access control and reporting, but also for<br />

personnel records such as payroll. Indeed, this<br />

is particularly useful in the construction and<br />

industrial sectors when a large site will have a<br />

number of sub-contractors in situ in addition to<br />

directly employed personnel. Here, the access<br />

system becomes an effective and vital front end<br />

resource for workforce management.<br />

Accurate and reliable<br />

A biometric lead system will serve to provide<br />

highly accurate and reliable information which<br />

can, with the right software, administer not<br />

only access control, but also time and<br />

Shaun Oakes:<br />

Managing Director of ievo<br />

33<br />

www.risk-uk.com


Access Control: Developments in Biometric Security<br />

attendance, fire roll-call, Health and Safely and<br />

payroll records.<br />

For construction and other industrial sectors,<br />

biometrics can also be used to control access to<br />

plant and other forms of potentially dangerous<br />

equipment whereby only authorised users are<br />

permitted access to keys. By combining key<br />

access systems or secure lockers with<br />

biometric recognition, a potential ultra-secure<br />

system is thereby created that duly safeguards<br />

and tracks the release of specific keys to<br />

specific individuals.<br />

Within other sectors, biometric recognition<br />

systems are gaining market share for other<br />

reasons. Across the education sector, for<br />

example, in addition to access control they’re<br />

being used for controlling free school meals<br />

and even fool-proof library control. Within the<br />

leisure sector, gym operating clients prefer<br />

them to traditional means as they prevent any<br />

fraudulent entry, and thereby potential loss of<br />

income, and rapidly pay for themselves<br />

because a member of staff is no longer required<br />

to verify identities and permit access.<br />

Given the trend for 24/7 access to gyms and<br />

a growing appetite for customer convenience, a<br />

robust access system with biometric control at<br />

its heart can provide plenty of benefits for<br />

members, staff and gym owners alike.<br />

Other sectors have their own access and<br />

security challenges for which reliable biometric<br />

recognition devices are providing solutions. Our<br />

ageing population and increased requirements<br />

for care and support, for example, has led to a<br />

booming care home sector where access<br />

control becomes of paramount importance for<br />

the protection of vulnerable residents,<br />

increasing numbers of whom may well suffer<br />

from dementia or other complex conditions.<br />

Fingerprint readers not only prevent entry to<br />

unauthorised visitors, but can also control exits<br />

for vulnerable residents who may well not be<br />

safe outside unsupervised areas. Other benefits<br />

are restriction of access to expensive medical<br />

supplies as well as dispensary areas. Today,<br />

there are secure cabinets and storage units that<br />

offer integrated biometric security for<br />

controlled and monitored access.<br />

In addition, time and attendance software<br />

integration provides data that supplies realtime<br />

reliable information for payroll, flexi-time,<br />

absenteeism control and holiday planning. The<br />

“Biometric recognition systems can help to provide an<br />

infallible access control system that may be used for a<br />

variety of additional purposes once successfully integrated<br />

with suitable software”<br />

information starts to flow in as soon as the<br />

fingerprint readers are activated and continues<br />

to track staff attendance for whatever purpose<br />

the organisation requires – managing flexi-time<br />

schemes, holiday planning, conformance with<br />

the European Working Time Regulations,<br />

production of payroll information and forecasts,<br />

etc – resulting in both reduced costs and<br />

increased efficiencies.<br />

Biometrics in retail<br />

The retail sector is also benefiting from the<br />

increased levels of security biometric readers<br />

provide for securing stock storage areas and<br />

tracking and managing staff movements.<br />

Given that storing high value or large<br />

quantities of stock is now a routine requirement<br />

for the majority of retail outlets, the security of<br />

such areas is of prime importance. Biometric<br />

readers limit access to purely authorised<br />

personnel, thereby controlling stock and<br />

preventing unwanted pilfering.<br />

When the data’s integrated with time and<br />

attendance software, vital Health and Safety<br />

information is provided should a building<br />

evacuation become necessary. Wholly accurate<br />

payroll data can also be generated.<br />

Integration with alarm equipment is another<br />

development which is becoming increasingly<br />

relevant for both the SME and domestic<br />

markets by providing a single comprehensive<br />

system architecture and peripheral range of<br />

devices, such as CCTV and audible alarms,<br />

managed by biometric control. Intruder alarm<br />

systems can be activated and disarmed by<br />

reading a registered fingerprint. Those systems<br />

may also be extended to relay information used<br />

for a single door access control entry point to<br />

further functionality.<br />

The key here is a blend of convenience and<br />

enhanced security for end users. Numeric code<br />

PINs and fobs can be forgotten, lost or stolen,<br />

but a biometric reading – whether facial or<br />

fingerprint recognition in form – is unique to<br />

that user. Once enrolled, only that end user<br />

may then set or disable the alarm.<br />

Going forward, biometric recognition devices<br />

will continue to replace traditional numeric<br />

keypads and card/fob entry devices primarily<br />

due to the higher levels of security they<br />

provide. Keypads may be accessed by anyone<br />

with the correct data, but biometric recognition<br />

provides a higher level of security which offers<br />

enhanced reliability and greater convenience.<br />

Leading an access control system with<br />

biometric data allows a security infrastructure<br />

to be built that realises the benefits of real-time<br />

data for management specifically catered to an<br />

individual organisation’s needs.<br />

34<br />

www.risk-uk.com


The New Camera Line Mx6 Creates More Possibilities.<br />

More Images, in All Light Conditions, in Every Standard<br />

More Intelligence Is on the Way<br />

The new Mx6 6MP camera system from MOBOTIX offers increased performance.<br />

A frame rate that is up to twice as fast than that of other cameras allows it to capture<br />

quick movements even better and simultaneously deliver sharp images in MxPEG,<br />

MJPEG and, for the first time in H.264, the industry standard. The innovative Mx6<br />

camera line is faster, more flexible and higher-performing, opening up new application<br />

and integration opportunities for to you to meet all requirements.<br />

MOBOTIX AG • Langmeil, Germany • www.mobotix.com


Counter-Terrorism: Hostile Vehicle Mitigation<br />

With the threat level<br />

posed by terrorism in<br />

the UK currently set at<br />

‘Severe’, Alice<br />

Higginson outlines<br />

what can be done by<br />

security professionals<br />

in their bid to protect<br />

crowded places<br />

Alice Higginson:<br />

Marketing and Sales Coordinator<br />

at Bristorm<br />

Protection for the Masses<br />

The nature of recent terrorist attacks – some<br />

of which have involved vehicles being used<br />

as weapons – has resulted in a clear focus<br />

for practising security professionals. When it<br />

comes to general street scenes, crowded and<br />

commercial locations, temporary high-profile<br />

events and Critical National Infrastructure<br />

protection, the attention is necessarily focused<br />

on making thorough site and operational<br />

assessments to identify vulnerable areas and<br />

access points that require solutions appropriate<br />

for mitigating a perceived threat.<br />

The need to protect and secure locations<br />

where the general public are present is<br />

increasing. This puts more pressure on security,<br />

risk and facility managers, architects and<br />

project engineers alike. Considering the<br />

integration of Hostile Vehicle Mitigation (HVM)<br />

systems prior to the development of any new or<br />

existing site is crucial if appropriate defence<br />

measures are to be implemented.<br />

The standards associated with HVM systems<br />

are still not immediately recognised by the<br />

wider industry, often making it difficult for the<br />

necessary solutions to be specified and<br />

implemented. Alongside this, it’s important to<br />

recognise the external factors that may prevent<br />

appropriate HVM from being procured, such as<br />

cost, aesthetics, operational processes,<br />

controlling pedestrian flow and enabling access<br />

routes for maintenance and Emergency<br />

Services vehicles and personnel.<br />

Specific HVM solution manufacturers are now<br />

delivering technical presentations to<br />

architectural practises around the UK. This is a<br />

concept soon to be supported by the Perimeter<br />

Security Suppliers Association. There’s a<br />

limited understanding of the standards<br />

associated with HVM, but these presentations<br />

have allowed manufacturers to grasp the<br />

aesthetic requirements architects and project<br />

engineers have in mind when working on<br />

particular schemes. As a result, subtle,<br />

sophisticated and unique designs have been<br />

developed that will not compromise the overall<br />

performance rating of the HVM system.<br />

Mitigating the threat<br />

Limited understanding may result in the<br />

installation of unsuitable HVM systems,<br />

meaning that a perceived threat will not be<br />

mitigated. Other factors may include cutting<br />

costs on the system required, incorrect<br />

installation that’s non-compliant with BSI PAS<br />

69 or IWA 14-2, a limited or lack of knowledge<br />

on the system required or that an insufficient<br />

site assessment was performed.<br />

Integrating aesthetics and HVM products will<br />

hopefully build a crucial bridge between<br />

manufacturers, architects, end clients, project<br />

engineers and the local Counter-Terrorism<br />

Security Advisors working on one particular<br />

project, therefore reducing the need to cut<br />

corners by installing inappropriate or untested<br />

HVM solutions.<br />

The Centre for the Protection of National<br />

Infrastructure has sponsored the development<br />

of BSI PAS 170, a Publicly Available<br />

Specification that describes an efficient way of<br />

testing the performance of a single bollard<br />

when hit by a 2,500 kg vehicle at low speed.<br />

BSI PAS 170 provides a quick, inexpensive<br />

and proportionate way of evaluating bollards<br />

that will be installed in a car park or retail<br />

outlet and typically be hit accidentally by a low<br />

speed passenger vehicle or a vehicle criminal at<br />

approximately 10 or 20 mph. BSI PAS 170-<br />

tested Stopper Bollards are currently the only<br />

systems commercially available in the UK, but<br />

they provide end clients, architects and project<br />

engineers with a cost-effective and reliable<br />

alternative when higher security solutions<br />

tested to BSI PAS 68 or its equivalent are not<br />

deemed to be essential.<br />

Most technical presentations focus on the<br />

HVM systems commercially available in the UK<br />

and the standards associated with these<br />

products, including the aforementioned BSI<br />

PAS 68, BSI PAS 170, IWA 14-1 and ASTM<br />

F2656-7/15. Testing procedures, compliancy<br />

and installation guidelines (BSI PAS 69 and IWA<br />

14-2) are also discussed throughout to ensure<br />

that any HVM product may be accurately<br />

incorporated within all drawings and plans<br />

prior to beginning the procurement process.<br />

36<br />

www.risk-uk.com


Manufacturing X-ray Machines<br />

in the UK since 1950<br />

Call or Email to claim your<br />

FREE THREAT ASSESSMENT<br />

and advice on your direct and associated risks by the UK’s<br />

leading manufacturer of high end security x-ray machines<br />

01480 832202<br />

www.toddresearch.co.uk<br />

xray@toddresearch.co.uk


Counter-Terrorism: Physical Security Solutions<br />

Further reinforced by a<br />

lack of Government<br />

investment in safety<br />

measures such as the<br />

police service itself, it<br />

has now become<br />

increasingly important<br />

for organisations to<br />

invest in their own<br />

security solutions.<br />

That investment is<br />

absolutely vital. Here,<br />

Anton Pieterse<br />

outlines precisely why<br />

Anton Pieterse:<br />

Managing Director of Safetell<br />

The Steadfast Approach<br />

Look around you. The world is changing...<br />

and fast. We once dreamed about the year<br />

‘2017’ and a far-flung future with flying<br />

cars, self-tying shoes and pill-sized dinners. In<br />

reality, 2017 has become something much<br />

bleaker. With rising levels of crime and terror,<br />

especially in densely populated locations such<br />

as shopping malls and stadiums, and austerity<br />

continuing to create divides, the protection of<br />

citizens is now as important as it has ever been.<br />

A cost-effective security plan can be<br />

produced by analysing the benefits of a<br />

security solution and confirming if the cost is at<br />

least equal to that of the protected assets,<br />

while also considering the additional costs that<br />

might be incurred due to an incident. The<br />

potential risks and costs can range from loss of<br />

business during the investigation to<br />

replacement costs, loss of reputation, potential<br />

injury/stress and overall downtime.<br />

Last year, the British Retail Consortium<br />

reported a staggering 40% increase in violence<br />

and abuse against staff working in retail<br />

positions, highlighting an obvious rise in those<br />

who believe they can conduct crime and exhibit<br />

aggression as they do so. This increase in<br />

violence has occurred even though the number<br />

of CCTV systems increases year-on-year. That<br />

begs the question as to how effective CCTV<br />

really is in reducing incidents of violent crime.<br />

One of the common misconceptions when<br />

first developing a security solution alongside a<br />

security audit is to focus on electronic security,<br />

such as CCTV, that provides greater surveillance<br />

and networked benefits. However, as noted in a<br />

study by the UK’s College of Policing when<br />

reviewing 41 studies about the effectiveness of<br />

CCTV, successful usage is only found through<br />

significant investment in constant, well-staffed<br />

live monitoring stations with the efficient<br />

deployment of security personnel to locate,<br />

identify and capture aggressors.<br />

The study found that, overall, CCTV can<br />

reduce crime in a certain area by dint of<br />

displacement to neighbouring areas.<br />

The most significant finding in the study is<br />

that there was no evidence of an effect on<br />

violent crime. CCTV is considered a type of<br />

‘formal surveillance’ that can benefit a security<br />

team in terms of visibility, but can only actively<br />

prevent crime when working with an effective<br />

and often costly deployment team.<br />

CCTV is seen to be significantly more<br />

successful when combined with other deterrent<br />

and intervention methods in the form of<br />

physical security.<br />

Deter and defend<br />

Physical security has the ability to deter and<br />

defend through a series of target-hardening<br />

solutions, such as installing attack-resistant<br />

screens on counters, doors, walls and windows<br />

within a premises. Physical security solutions<br />

can deter attackers and protect staff in the<br />

absence of a reaction team that could deal with<br />

the matter, while also still providing hardened<br />

resistance to the assets protected within.<br />

The ability exists to design and construct<br />

physical security products to exact<br />

requirements, allowing for protection against<br />

high intensities of fire, manual attack, bullet<br />

attacks and even blast explosion, providing<br />

protection for secure environments – such as<br />

retail counters, Data Centres and banks – from<br />

some of the most violent physical attacks.<br />

Counter-terrorism solutions come in all forms<br />

and for all environments. They often require<br />

bespoke elements to be designed and installed<br />

for seamless integration. As a general rule in<br />

security, no standard is fit for all applications.<br />

Plenty of great physical security and electronic<br />

solutions can exist and work successfully, but<br />

an ideal strategy for one environment doesn’t<br />

necessarily translate exactly to another.<br />

Indeed, bespoke installations and physical<br />

security systems have risen in prominence,<br />

allowing for organisations to gain a full counterterrorism<br />

solution for their exact working<br />

practices at specification stage.<br />

In today’s world, there’s one statement that<br />

rings very true indeed: no business security<br />

means your business is at risk.<br />

38<br />

www.risk-uk.com


Counter-Terrorism: Security Screening Best Practice<br />

Security screening<br />

checks are<br />

commonplace when<br />

members of the public<br />

attend events and are<br />

now increasingly<br />

being conducted at<br />

high-profile buildings.<br />

Once upon a time<br />

those checks were<br />

considered a<br />

nuisance, or at best a<br />

necessary<br />

inconvenience, but<br />

people now<br />

understand the<br />

important role they<br />

play as a deterrent<br />

and as part of a wider<br />

security solution.<br />

Jason Wakefield<br />

examines Best<br />

Practice procedures<br />

Jason Wakefield: Sales<br />

Director at Todd Research<br />

Be Seen to Screen<br />

Screening people and their belongings at<br />

entry points can help reduce the likelihood<br />

of explosive devices, weapons and other<br />

prohibited items being brought into buildings<br />

or on to sites. Similarly, searching personnel as<br />

they exit can assist in reducing the risk of the<br />

unauthorised removal of items and/or sensitive<br />

company information.<br />

When designing a security checkpoint, the<br />

first port of call should be the PAS 127<br />

guidelines. PAS 127:2014 is the first publication<br />

of its kind to present guidance on good practice<br />

for checkpoint security screening of people and<br />

their belongings. Commissioned by the Home<br />

Office’s Centre for Applied Science and<br />

Technology, its development was facilitated by<br />

the British Standards Institution with input<br />

from a panel of industry experts.<br />

The level of risk is an important factor to<br />

consider before any implementation of<br />

screening. Measures must be appropriate to<br />

minimise any potential risk, but excessive<br />

measures will result in unnecessary expense<br />

and use of staff and space and are likely to<br />

interfere with normal functioning of the site.<br />

Consideration should be given to the<br />

different groups of individuals entering the<br />

premises. Given differing risk profiles, it may be<br />

appropriate for some individuals to undergo<br />

different screening regimes.<br />

Once an assessment of risk has been made,<br />

it’s then time to decide what equipment is<br />

needed. Sometimes the risk can be so low that<br />

only random bag searches are required.<br />

However, if screening machines are demanded,<br />

it’s important to calculate the anticipated level<br />

of screening (eg the number of people expected<br />

to be screened per day and the amount of time<br />

available to clear each person).<br />

The screening process should exert the<br />

minimal impact possible on daily business<br />

activities. External security consultants can be<br />

useful in helping to calculate requirements at<br />

this planning stage and then determine the<br />

type of equipment required on site.<br />

Checkpoint location<br />

The location for the screening checkpoint is<br />

extremely important. It should be on the<br />

perimeter of the establishment and in an area<br />

free from any interference that might be due to<br />

metallic objects. An ‘Area of Declaration’ will<br />

need to be established where pockets can be<br />

emptied, shoes and belts taken off and<br />

prohibited items removed.<br />

A well-laid out, ‘obvious flow’-style queueing<br />

system should be put into place. Once bags<br />

and contents are placed on the x-ray conveyor,<br />

visitors should then proceed to a search area<br />

where the potential presence of metals or<br />

explosives can be checked by dint of security<br />

staff using either walk-through or specialist<br />

trace detection equipment.<br />

When selecting a walk-through metal<br />

detector, a multi-zone technology detector will<br />

increase screening efficiency and cut operating<br />

costs. Multi-zones of detection allow the exact<br />

location of any concealed item to be<br />

pinpointed. As a direct result, security<br />

personnel can immediately target the object<br />

that served to create the alarm.<br />

Hand-held metal detection wands should<br />

also be used as a secondary confirmation tool<br />

for pinpointing any positive alarms.<br />

It’s important that x-ray and metal detection<br />

system operators are fully-trained in the use of<br />

the units and how to look for prohibited items.<br />

Importantly, this training should be regularly<br />

updated to ensure members of staff are always<br />

aware of all new and emerging threats and<br />

detection methods.<br />

Finally, all procedures should be captured,<br />

reviewed and regularly updated.<br />

Due to increased security threats, screening<br />

looks set to become an ever-more present<br />

process in our everyday lives. It’s important to<br />

keep those being screened onside and<br />

understanding of the need. To achieve this,<br />

screening operations must be effective and<br />

efficient in order to minimise the impact on<br />

people as far as possible. Initiatives such as the<br />

PAS 127 guidelines, the continuously improving<br />

technology that underpins screening and<br />

detection equipment and well-trained security<br />

personnel will be the keys to success.<br />

40<br />

www.risk-uk.com


Counter<br />

Terror<br />

specifications<br />

30 Years of Security Excellence<br />

bespoke<br />

to your<br />

requirement<br />

Find a bespoke and personalised solution to fit your<br />

organisational requirements, specified with help from our<br />

security experts.<br />

Our physical security solutions can provide protection for<br />

buildings, staff and assets across a variety of manual, bullet and<br />

blast resistant specifications in the form of counters, security<br />

doors, security screens/windows and walls.<br />

Building Security + Staff Protection<br />

Asset Protection<br />

Find your solution at...<br />

Safetell.co.uk<br />

Specification to Installation<br />

We are fully accredited...<br />

+44 (0)1322 223<br />

www.safetell.co.uk<br />

sales@safetell.co.uk


A Touch of Retail Security Therapy<br />

As part of an ongoing<br />

commitment aimed at<br />

redefining the role of<br />

the retail security<br />

operative, Cardinal<br />

Security and<br />

Amberstone (part of<br />

The Cardinal Group)<br />

are working in<br />

partnership with<br />

Dixons Carphone on a<br />

strategy that<br />

combines skilled<br />

personnel with<br />

electronic surveillance<br />

and reporting<br />

systems. Risk UK<br />

examines the<br />

outcomes already<br />

achieved to date<br />

42<br />

www.risk-uk.com<br />

When Dixons and Carphone Warehouse<br />

completed a £3.9 billion merger back in<br />

2014, the deal integrated two wellknown<br />

High Street names to create what is now<br />

one of Europe’s largest electrical and<br />

telecommunications retailers. Renamed Dixons<br />

Carphone, the company has interests across<br />

the continent and is one of the UK’s last<br />

remaining large-scale businesses of its kind<br />

with a bricks and mortar presence.<br />

Online shopping, home delivery and ‘Click<br />

and Collect’ have now become commonplace.<br />

According to the Office for National Statistics,<br />

the value of online sales increased by 8.9% in<br />

March 2016 compared with March 2015. The<br />

‘omnichannel’ is now firmly established and<br />

means that traditional High Street stores need<br />

to adapt their approach to attract customers.<br />

Dixons Carphone is at the forefront of this<br />

process and, early on this year, the company’s<br />

CEO Seb James announced his aspiration to<br />

“reinvent retail as we know it”. In order to<br />

revolutionise the shopping experience, Dixons<br />

Carphone has now brought its Currys, PC World<br />

and Carphone Warehouse brands together<br />

under one roof at its 3-in-1 stores.<br />

The company’s 3-in-1 megastore at Hedge<br />

End in Southampton, which opened in<br />

September 2015, is truly the shape of things to<br />

come. It boasts a number of innovative<br />

features, with smaller, interactive exhibits that<br />

are designed to draw people in. For example,<br />

the vacuum cleaner section has three types of<br />

flooring such that customers can try out which<br />

device would work best for their home. In the<br />

audio section, shoppers can switch the music<br />

between different speakers, while headphones<br />

are displayed in such a way that allows<br />

consumers to be hands-on and compare and<br />

contrast what’s on offer.<br />

Every element of the store’s design and<br />

layout has been analysed, scrutinised and<br />

reconfigured to offer customers the best<br />

possible experience and increase sales.<br />

A key part of this new retail process is the<br />

way in which security and loss prevention are<br />

being approached. In point of fact, it’s<br />

something that has proven to be just as radical<br />

as the store concept itself.<br />

Moving the mindset<br />

Cardinal Security had worked closely with<br />

Carphone Warehouse for a number of years and<br />

now operates with Dixons Carphone across all<br />

of its outlets. For Simon Chapman, Cardinal<br />

Security’s CEO, the Hedge End store is an<br />

exemplar of how retail security needs to be<br />

approached in the modern age.<br />

“There has been a distinct reluctance, or an<br />

inability, to move on from the ‘cops and<br />

robbers’ mindset that has prevailed for<br />

decades,” stated Chapman. “However, we’re<br />

now beginning to witness a massive change in<br />

the way that retailers operate. We’ve worked<br />

closely with Dixons Carphone’s loss prevention<br />

team in order to introduce a new intelligent<br />

guarding model that does away with the<br />

customer denial approach and, instead, actively<br />

integrates the duties of a security officer with<br />

technology, electronic systems and the allimportant<br />

data they produce.”<br />

The store employs a covert security specialist<br />

in the form of Dan McKee (pictured, left). Asked<br />

to explain how his role differs from that of a<br />

typical security officer, McKee responded: “I<br />

adopt a customer service-based method to<br />

deter theft. For example, I’ll approach store<br />

visitors and ask them whether they need any<br />

help in a polite and friendly manner. Genuine<br />

customers love this approach but, for obvious<br />

reasons, potential thieves hate it. Furthermore,<br />

the store encourages a culture whereby all staff<br />

are part of the security and loss prevention<br />

team. I work closely with all staff members and<br />

offer specific guidance in this area.”<br />

CCTV in the retail space<br />

CCTV has been used in retail outlets for<br />

decades, of course. However, far from being<br />

considered a proactive tool, it has been used<br />

retrospectively, often when it’s too late and


Retail Security and Loss Prevention: Dixons Carphone Case Study<br />

stock has been stolen or the barriers at the<br />

front of the store have been activated and the<br />

offender is long gone.<br />

To help him do his job, McKee has real-time<br />

remote access to the in-store CCTV system via a<br />

tablet, which he can use to study customer<br />

behaviour, while analytics platforms provide<br />

direct alerts about any suspicious behaviour,<br />

such as someone being in a particular area<br />

longer than is considered usual.<br />

Suzanne Borg (project manager in the Group<br />

Loss Prevention Department at Dixons<br />

Carphone) observed: “Having products on open<br />

display brings with it certain security concerns<br />

that we’re addressing through the use of<br />

sophisticated technology. Customers want to<br />

touch and experience products. They no longer<br />

wish to see them locked down or behind<br />

cabinets, so we have to accommodate their<br />

desires. However, this brings with it increased<br />

risk, so early warning technology is absolutely<br />

central to mitigating any risk and thwarting<br />

those with criminal intent in mind.”<br />

As a result, Amberstone’s smart shelves have<br />

been installed. When product is picked up,<br />

McKee receives an alert via a headset, directing<br />

him to the area and product concerned, while<br />

specific items – such as vacuum cleaners – have<br />

tags attached that also relay information. As<br />

well as significantly reducing losses, this allows<br />

McKee to play a key role in the customer<br />

experience, in turn helping the host retailer to<br />

sell more and lose less.<br />

Organised shoplifting<br />

Organised shoplifting gangs are a major<br />

concern for retailers. Groups of professional<br />

thieves now travel the length and breadth of<br />

the country to steal products which they can<br />

then sell on. To combat this problem, Dixons<br />

Carphone employs electronic technologies such<br />

as ANPR and facial recognition that identify<br />

known vehicles or offenders.<br />

“The profiling of individuals and their<br />

behaviour is crucial in order to recognise the<br />

difference between good and bad customers,”<br />

explained McKee. “With the use of data sharing<br />

and analytical tools, we can share information<br />

and allow ad hoc tasks to be added centrally<br />

from regional field or head office teams, while<br />

also ascertaining exactly which products are<br />

being targeted. We use the analysis of online<br />

auction sites and recent store thefts to profile<br />

the risk against the year, month or day to gain a<br />

better understanding of when thieves are most<br />

likely to strike.”<br />

Given that he’s a vital part of the senior<br />

management team at the store, Cardinal<br />

Security has provided McKee with<br />

investigaton, evidence gathering and statement<br />

writing training (the latter used within morning<br />

briefings). Dixons Carphone staff are made<br />

aware of any current risks and work very much<br />

as part of a team. This holistic approach to<br />

security is highly effective and deters both<br />

organised and opportunist offenders.<br />

Return on investment<br />

Like all other aspects of modern retailing, the<br />

security function at Dixons Carphone has to<br />

deliver a return on investment. Suzanne Borg<br />

commented: “Part of Dan’s job is to use the<br />

technology-based tools at his disposal to<br />

constantly assess risk and report back. Data<br />

provides a clear picture of the cost of his<br />

employment and what he returns. This is<br />

measured through shrink reduction, assistance<br />

in increased sales, greater staff safety and a<br />

focus on stock loss reduction. This dynamic<br />

approach builds a comprehensive risk model<br />

and creates decision-making and business<br />

rules out of the back of it.”<br />

The new store concept, combined with such<br />

an innovative approach to security and loss<br />

prevention, has already enjoyed some notable<br />

successes. The sale of high risk products,<br />

including headphones, increased in the first<br />

year of opening, while McKee was directly<br />

involved with the arrest of an organised gang<br />

leader who was subsequently sentenced to two<br />

years in prison.<br />

Onwards and upwards<br />

These are good times for Dixons Carphone,<br />

which saw its trading over Christmas 2016 beat<br />

all forecasts as the business reported its fifth<br />

consecutive year of growth. As the company<br />

continues to redefine its retailing strategy, it’s<br />

plainly obvious the key role that cutting-edge<br />

security techniques will play in its ongoing<br />

success are very much to the fore.<br />

“Dan McKee is the embodiment of the<br />

modern security officer and absolutely integral<br />

to what our company is doing at the Hedge End<br />

store,” concluded Suzanne Borg. “As a<br />

dedicated security solutions provider, Cardinal<br />

Security is clearly able to develop security<br />

operatives who are confident, articulate and<br />

technologically savvy in their work. It’s<br />

precisely this type of approach that the modern<br />

retailer must look to embrace as part of a<br />

successful loss prevention strategy.”<br />

“We use the analysis of online auction sites and recent store<br />

thefts to profile the risk against the year, month or day to<br />

gain a better understanding of when thieves might strike”<br />

43<br />

www.risk-uk.com


Healthcare Sector Security: Body-Worn Cameras<br />

With NHS Protect<br />

reporting that assaults<br />

on NHS staff in<br />

England are up by<br />

around 5% year-onyear<br />

(67,864 assaults<br />

in 2014-2015 versus<br />

70,555 in 2015-2016),<br />

NHS Trusts are doing<br />

what they can to<br />

improve the safety of<br />

employees and<br />

patients alike. Herman<br />

Vermaak explains how<br />

body-worn cameras<br />

are now ably assisting<br />

security personnel<br />

Herman Vermaak:<br />

Managing Director of B-Cam<br />

Security’s Watching Brief<br />

It seems almost beyond belief that someone<br />

could launch an attack on a healthcare<br />

professional trying to help people in need,<br />

but that’s one very grim reality of Britain in the<br />

21st Century. During 2015-2016, NHS staff in<br />

England reported more than 70,000 assaults,<br />

equating to 53 instances per 1,000 workers.<br />

Staggeringly, criminal sanctions were brought<br />

on only 1,740 occasions. Many of our NHS<br />

Trusts have simply had enough, and are now<br />

turning towards technology to lend them a<br />

helping hand with prevention measures.<br />

The use of body-worn cameras is on the rise.<br />

Security officers at Guy’s and St Thomas’ in<br />

London wear such devices in an effort to halt<br />

abuse and violent behaviour from patients.<br />

These ‘bodycams’ act as a visible deterrent to<br />

those who may be intent on causing harm, and<br />

also serve as a trusted source of evidence<br />

should any incident occur.<br />

At Guy’s and St Thomas’, staff had seen a<br />

surge in violent behaviour, particularly towards<br />

nurses and other front line employees. Between<br />

April and September last year, a total of 850<br />

incidents were recorded (up 27% on the same<br />

period in 2015, when 620 were recorded).<br />

Dame Eileen Sills, chief nurse at Guy’s and St<br />

Thomas’, said: “At times, our staff and patients<br />

have felt threatened and intimidated by a small<br />

number of fellow patients and visitors. We want<br />

to send a clear message to people that our staff<br />

are here for them. Please let them do their jobs<br />

safely. Any unprovoked violence and aggression<br />

towards staff is unacceptable. If people do<br />

abuse our staff we will take robust action and<br />

pursue them through the courts.”<br />

The cameras being used by security<br />

personnel only operate when activated, and are<br />

therefore not inappropriately recording<br />

personal and protected data. Once activated, a<br />

light on the camera ensures those being filmed<br />

are also aware that recording is taking place.<br />

Jayne King, head of security and site services<br />

at Guy’s and St Thomas’, said: “We’ve taken<br />

this step to assure our staff of their safety and<br />

send a message to people who are violent or<br />

abusive on Trust premises that these recordings<br />

will be used to bring them to justice.”<br />

The devices employed at Guy’s and St<br />

Thomas’ have a tamperproof design, meaning<br />

that data cannot be removed from them. The<br />

devices cannot be easily destroyed, thereby<br />

protecting the chain of evidence.<br />

Any patient or service user information that’s<br />

recorded is secure and inaccessible without the<br />

relevant software to download the video and<br />

audio recordings.<br />

Support from the police<br />

Body-worn cameras are supported by the<br />

police. Superintendent Roy Smith of the<br />

Metropolitan Police Service explained: “We<br />

respond to any assaults on NHS staff very<br />

seriously indeed. Body-worn cameras act as an<br />

excellent deterrent and provide really good<br />

evidence for us to bring offenders to justice.<br />

They capture evidence really early on, so the<br />

likelihood of us securing a guilty plea at an<br />

early stage in proceedings is increasing.”<br />

Smith went on to comment: “If there’s any<br />

sort of violence perpetrated, people can see<br />

instantly that they’re being recorded on bodyworn<br />

video. Our experience and evidence<br />

suggests this immediately de-escalates a<br />

number of situations.”<br />

Body-worn camera technology is also being<br />

used at Princess Royal University Hospital in<br />

Orpington, Kent. Security manager Len Jeffrey<br />

told Risk UK: “My security staff were called to<br />

an urgent and violent incident on a ward as a<br />

visitor was being abusive towards staff and<br />

patients. On seeing security with a body-worn<br />

camera, the male immediately calmed down<br />

and co-operated, thereby preventing the<br />

escalation of his anti-social behaviour”.<br />

The challenges facing 21st Century<br />

healthcare professionals are substantial<br />

enough in extent without them having to be<br />

constantly concerned about their physical wellbeing.<br />

The number of attacks on staff is rising,<br />

but the number of those convicted remains low.<br />

The application of secure body-worn camera<br />

technology can provide vital reassurances and<br />

enhance the safety of all those who work in this<br />

critically important sector.<br />

44<br />

www.risk-uk.com


Smart, Integrated,<br />

Security Solutions<br />

Easy access control<br />

from Paxton<br />

Leading<br />

• Market leaders, over 30 years experience<br />

Integrated<br />

• IP ready solutions integrating with<br />

CCTV, door entry, intruder & fire alarms<br />

Support<br />

• Free design & specification help and advice<br />

Scalable<br />

• Access control and door entry systems for<br />

a variety of sites<br />

Want to know more?<br />

Visit: paxton.info/2973<br />

Easy to specify Easy to fit Easy to deal with


Healthcare Sector Security: Access Control Solutions<br />

Healthcare facilities<br />

have numerous assets<br />

that need to be<br />

protected from theft or<br />

damage, while staff,<br />

patients and visitors<br />

must be kept safe at<br />

all times. Gareth<br />

O’Hara explains why<br />

networked access<br />

control is an ideal<br />

security solution<br />

Gareth O’Hara:<br />

Chief Sales Officer at Paxton<br />

Living Life On The Network<br />

Healthcare security is one of the most<br />

complex of security functions. The<br />

National Health Service takes security<br />

very seriously indeed. Patients need to be kept<br />

safe while in hospital, so at all times access<br />

must be limited to those people with a genuine<br />

reason to be on hospital premises.<br />

Electronic access control can provide an<br />

efficient and convenient way of offering secure,<br />

flexible and cost-effective building access<br />

management. It allows people to move freely<br />

around a facility while also permitting specific<br />

areas (for example, an operating theatre or the<br />

pharmacy) to be managed with higher security<br />

where required.<br />

Using IP technology, access control systems<br />

can connect directly to the building’s network.<br />

The beauty is that you don’t need to be an IT<br />

expert to make the most of ‘IP ready’ access<br />

control. It’s simple and straightforward to<br />

manage and, if you’re looking to extend<br />

building security beyond access control, it’s<br />

also possible to integrate it with a range of<br />

third party systems including CCTV, biometrics,<br />

fire systems and intruder alarms.<br />

There are a range of solutions available. On<br />

that basis, it’s important to ask the right<br />

questions when discussing security<br />

requirements with your installer and/or<br />

consultant in order to ensure the solution<br />

matches defined needs. Systems can vary in<br />

type, from a secure barrier in the car park<br />

through to a video entry system at a visitor<br />

entrance or an external door with hands-free<br />

access and on to an integrated solution with<br />

CCTV and intruder alarm systems.<br />

Total convenience<br />

If you’re thinking about improving the security<br />

of a healthcare facility with an electronic access<br />

control system, there are several ‘essentials’ to<br />

bear in mind.<br />

Networked access control has several<br />

benefits over using traditional locks and keys,<br />

with an important factor being that numerous<br />

security functions can be centrally and<br />

conveniently managed via a PC. This can control<br />

the flow of people around a building and<br />

restrict who has access to its various zones.<br />

Unlike keys, electronic access control tokens<br />

can easily be barred from the system if they’re<br />

lost, stolen or not returned by staff or visitors.<br />

High security options are available via<br />

specific applications to add an extra layer of<br />

protection if needed for certain designated<br />

areas of a building.<br />

Biometric integration includes fingerprint,<br />

facial recognition and retinal scanners which<br />

use the unique biological characteristics of an<br />

individual to confirm access. Multi-factor<br />

authentication means that a given end user<br />

would have to present an access token in<br />

addition to entering a PIN to gain entry.<br />

Access control software can be used as an<br />

effective HR and administration tool, providing<br />

easy time and attendance reporting. By<br />

allocating specific token readers for clocking in<br />

and out, the software can be used to log the<br />

working hours of employees. It can also note<br />

periods of time that staff or contractors are<br />

absent for reasons such as holidays and unpaid<br />

leave. Reports can then be exported for use<br />

with a variety of HR applications.<br />

Cost-effective solutions<br />

There are multiple opportunities where an<br />

access control system can be used to help save<br />

money. For example, switching utilities on or off<br />

automatically when a user presents their<br />

electronic token/card provides a convenient<br />

service that businesses can use effectively.<br />

With some access control software solutions,<br />

system administrators can easily create rules to<br />

grant varying permissions to different users. For<br />

example, this might be used to assist in<br />

meeting Health and Safety requirements,<br />

prevent untrained staff from operating certain<br />

machinery or stop people from accessing<br />

restricted areas, in turn reducing the potential<br />

risk of accidents involving staff and/or visitors.<br />

46<br />

www.risk-uk.com


Healthcare Sector Security: UHEI 2017 Event Preview<br />

Where Education Meets Healthcare<br />

Following on from the<br />

huge success of the<br />

inaugural University<br />

and Healthcare<br />

Estates and<br />

Innovation Conference<br />

and Exhibition last<br />

year, organiser Ascent<br />

Events has mapped<br />

out an even bigger<br />

and bolder<br />

programme for 2017<br />

that runs over two<br />

days at the University<br />

of Birmingham on 14<br />

and 15 November.<br />

Brian Sims previews<br />

the content on offer<br />

for delegates<br />

*To learn more about UHEI<br />

2017 and register your<br />

attendance, access the<br />

event’s dedicated website at<br />

www.ascentevents.co.uk/<br />

uhei-birmingham-2017.php<br />

48<br />

www.risk-uk.com<br />

The similarities and distinct parallels<br />

between the higher education and<br />

healthcare sectors are striking. Both<br />

manage large, complex and demanding sites.<br />

Both manage compliance, deliver projects and<br />

control diverse property portfolios. The two<br />

worlds tackle many of the same issues, use<br />

many of the same suppliers and procure,<br />

construct and maintain at scale.<br />

Bearing this in mind, the University and<br />

Healthcare Estates and Innovation (UHEI) event<br />

– for which Risk UK is an Official Media Partner<br />

– offers a unique opportunity for security and<br />

risk management practitioners to meet and<br />

hear from sector experts, network and share<br />

solutions and experiences.<br />

Designed to build upon 2016’s highly<br />

successful inaugural gathering, the fervent<br />

hope is that this year’s event will lead to even<br />

closer future collaboration between the sectors<br />

by stimulating opportunities for shared<br />

thinking and mutual benefits.<br />

Last year, upwards of 50 separate NHS Trusts<br />

and more than 30 universities visited the event,<br />

while over 250 visitors attended on the day<br />

itself. The quality of the attendees was very<br />

high, with large numbers visiting from the NHS<br />

and education sectors including security,<br />

facilities and operations-based professionals.<br />

Run in partnership with AUDE, UHEI 2017 is<br />

supported by ASIS International’s UK Chapter,<br />

the British Institute of Facilities Management,<br />

BESA, BIM4 Health, Brighton and Sussex<br />

University Hospitals NHS Trust, The Carbon &<br />

Energy Fund, Carbon Trust, CIC, Digital 2 All, the<br />

University of Birmingham, the University<br />

Hospitals of North Midlands NHS Trust and the<br />

University of Liverpool.<br />

This year’s exhibitors are Built Off-Site,<br />

Clarke Energy, Clearview Intelligence, Cortech<br />

Developments, Ecophon, Estate Strategy Group,<br />

Extraspace Solutions, Fusion, Healthcare<br />

Estates and Facilities, HJA Recruitment, Hydrop,<br />

IHEEM, Jewson, Integrated Environmental<br />

Solutions, Langley Design, Micad, MWA<br />

Technology, Paxton, PPL Training, SFG20, Shire<br />

Controls, Smart Environmental Products,<br />

Synapsis and Search Higher.<br />

Conference programme<br />

Day One of conference on Tuesday 14 November<br />

is kick-started by a welcoming address from<br />

Trevor Payne (director of estates at the<br />

University of Birmingham), who informed Risk<br />

UK: “We’ve put together a timely, relevant and<br />

comprehensive educational programme.”<br />

From 9.30 am until 10.00 am, the focus is on<br />

collaboration and innovation, with Simon<br />

Corben (director and head of profession at NHS<br />

Estates and Facilities) at the lectern. This<br />

presentation is followed by perspectives from<br />

AUDE and IHEEM (for whom the latter’s<br />

chairman Pete Sellars is the speaker).<br />

In the wake of coffee and networking, IHEEM<br />

CEO Julian Amey chairs a session running from<br />

11.35 am until noon, during which Andrew<br />

Burgess (deputy chief operating officer at<br />

Loughborough University) offers his thoughts<br />

on the potential impacts of Brexit upon the<br />

Higher Education estate.<br />

Prior to luncheon, there’ll be detailed<br />

presentations from Kevin Oxley (director of<br />

estates, procurement and ICT at South Tees<br />

NHS Foundation Trust) and Steve Banister<br />

(managing director of Northumbria Healthcare<br />

Facilities Management) on – respectively –<br />

property management and an alternative<br />

delivery model for E&F services within the NHS.<br />

The afternoon session from 2.40 pm through<br />

until 3.20 pm concentrates on campus<br />

masterplanning in the education sector, with<br />

one of the presentations being made by Karen<br />

Johnson (operations director at University<br />

Hospital in Birmingham).<br />

Emergency preparedness<br />

On Day Two of conference, the pre-luncheon<br />

sessions should be of particular interest for<br />

practising risk and security management<br />

professionals. Between 12.45 and 1.00 pm,<br />

Ashley Kirby (policy and planning advisor at the<br />

University of Aberdeen) looks at this topic from<br />

the Higher Education perspective, with Anthony<br />

Searle (commercial manager at access control<br />

solutions specialist Paxton) delivering his<br />

thoughts on the matter from the point of view<br />

of NHS Trusts and hospitals.<br />

From 3.35 pm until 3.50 pm, ‘Sharing<br />

Processes and Resources: How a Common<br />

Process Can Work for Disparate Organisations’<br />

is the subject of John Scarry’s presentation.<br />

Scarry is business excellence manager at<br />

Medirest (part of Compass Group).<br />

Conference closes at 4.20 pm with a<br />

summary of the two days delivered by Robert<br />

McNamara MBIFM (director at Capitec).


Advertisement Feature<br />

Inner Range’s Integriti: Encrypted High Security<br />

Inner Range’s Integriti Encrypted High<br />

Security system witnesses the company add<br />

a new level of security to the current product<br />

range. This latest offering is certain to attract<br />

serious consideration from Government<br />

departments and Critical National Infrastructure<br />

projects as well as those commercial end users<br />

who are serious about hardening their<br />

dedicated security system communications.<br />

From a technical standpoint, Inner Range’s<br />

Integriti Encrypted High Security system offers<br />

end-to-end encryption of access control and<br />

alarm points, in turn providing many features<br />

previously required by installations in the high<br />

security sector at an affordable cost.<br />

Fundamentally, the Encrypted High Security<br />

system includes encrypted communications<br />

from sensor to controller and on to keypad and<br />

reader. Up until now, organisations requiring<br />

encryption of all parts of an integrated access<br />

and security system had very limited choices.<br />

The way in which Inner Range’s Encrypted<br />

High Security system works is that the<br />

company’s End of Line Modules (ELM) are<br />

embedded into third party PIRs, reed switches<br />

or other security-related input devices. The ELM<br />

is wired into such an input device, handles<br />

tamper and alarm conditions and connects via<br />

an encrypted RS-485 serial connection to a<br />

special Encrypted High Security expander. Bus<br />

data and the expander to the control module<br />

are encrypted to AES-128, as are comms from<br />

control module to keypad.<br />

SIFER readers provided by Inner Range for<br />

access control also offer encryption at this level<br />

from credential to reader and on to controller.<br />

Suite of products<br />

The Integriti Encrypted High Security system<br />

consists of a suite of products which, taken<br />

together, provide all the elements necessary to<br />

build a fully-integrated high security system<br />

that provides complete end-to-end data<br />

encryption. The Integriti range of products<br />

includes controllers, input expansion modules,<br />

the aforementioned End of Line Modules,<br />

keypads, card readers, power supplies and<br />

equipment enclosures.<br />

The system’s modular design provides scope<br />

for expansion, while also boasting a hybrid<br />

architecture. The hybrid architecture supports<br />

both high security (ELMs) and standard<br />

commercial grade (resistor network) areas at<br />

the same facility at the same time. By ensuring<br />

that budget allocations are made for the high<br />

security zones only where necessary, the end<br />

result is a single, holistic and affordable<br />

security solution for the entire organisation.<br />

Expansion of the Integriti system is achieved<br />

by installing additional encrypted modules to<br />

the high security controller’s RS-485 LAN, or by<br />

adding additional controllers to the system. The<br />

entire platform, including multiple controllers,<br />

can be managed from the specialist Integriti<br />

Enterprise software.<br />

Integriti is perfect for small sites through to<br />

large multi-campus institutions. Only pay for<br />

what you want when you need it: Integriti’s<br />

flexible modular design means that it grows<br />

with you. As it’s an IP-based networked<br />

solution, you can use new or existing IT<br />

infrastructure for boundless connectivity.<br />

Everyday use of the Integriti system is<br />

simple. Unlock doors and turn security areas<br />

on or off all by simply presenting a card at a<br />

reader or by using the colour graphic keypad.<br />

End users can manage their entire system via<br />

intuitive Windows-based software.<br />

Integriti in use<br />

Monitor and control the movement of all<br />

personnel and vehicles in your facility. Protect<br />

critical assets and manage the safety of your<br />

staff and visitors. Easily assign access<br />

permissions, mandating who can go where and<br />

when (including visitor access). Manage the<br />

reporting of security alarms and audit their<br />

responses. Ensure compliance with business<br />

systems and Government regulations. Respond<br />

to emergency situations, lockdowns and alerts.<br />

Integriti is an<br />

integrated access<br />

control, security alarm<br />

and automation<br />

system designed by<br />

Inner Range. It’s the<br />

result of more than 20<br />

years of continuous<br />

industry participation<br />

and product<br />

development. Integriti<br />

Encrypted High<br />

Security is an addition<br />

to the Integriti range<br />

and sets new industry<br />

standards


Advertisement Feature<br />

Manage your occupational Health and Safety<br />

liability by dint of using competency-based<br />

access control. Remotely monitor and control<br />

your Integriti system with iOS and Android<br />

Apps. Manage your entire security operation<br />

from a single user interface.<br />

With Integriti acting as the complete security<br />

management system, end users are able to<br />

integrate a variety of security and operational<br />

sub-systems, among them CCTV, biometrics,<br />

mobile duress, lighting, air conditioning,<br />

intercoms and fire safety solutions.<br />

Why choose Integriti?<br />

Integriti boasts powerful, yet intuitive<br />

cardholder permission programming. The use of<br />

‘Allow’ and ‘Deny’ functions greatly simplifies<br />

system administration. Operator training, as<br />

well as associated costs, are minimal.<br />

Integriti also includes a feature-rich suite of<br />

tools such as graphical maps, powerful<br />

reporting, card printing, alarm management,<br />

compliance-based access control and e-<br />

mail/SMS/pager communications. As stated,<br />

Mobile Apps for Apple and Android are<br />

available for remote monitoring and control.<br />

The Integriti system enables cardholder<br />

location and activity information to be shared<br />

with Building Management Systems, thereby<br />

helping to reduce energy costs.<br />

In addition, the Integriti system can share<br />

cardholder data with your company’s employee<br />

database, payroll system or booking system to<br />

reduce the labour costs associated with data<br />

entry and cardholder record management.<br />

Integriti supports a wide range of nonproprietary<br />

cards, readers, locks, detectors and<br />

other peripheral devices. You’re not locked into<br />

buying the manufacturer’s specific<br />

consumables or peripheral components. A<br />

choice of vendors gives you, the end user<br />

buyer, the competitive advantage.<br />

Integriti is a non-proprietary system. You<br />

have a wide choice of competent security<br />

companies from which to choose. Refer to the<br />

Inner Range website (www.innerrange.com) for<br />

details of recommended companies.<br />

Encrypted High Security Controller<br />

• Encrypted RS-485 LAN module limit: 32<br />

• Encrypted inputs: 256*<br />

• Standard inputs: 1,024*<br />

• Security areas: 250<br />

• Doors: 264*<br />

• SIFER card readers: 528*<br />

• Users: 10,000 (expandable to 100,000)<br />

• Event database: 30,000 (expandable to<br />

100,000)<br />

*Maximum quantity shown is per controller and<br />

assumes all 32 LAN modules will be of the<br />

same type. Multiple controllers can be used to<br />

greatly increase system capacity<br />

Encrypted LAN modules<br />

• Integriti 8-zone encrypted expander<br />

• Integriti encrypted Elite keypad/terminal<br />

• Integriti encrypted Prisma keypad/terminal<br />

• Integriti encrypted Prisma keypad/terminal<br />

with built-in SIFER reader<br />

• Integriti/Integriti Standard 8-zone expander<br />

(expandable to 32 zones)<br />

• Integriti/Integriti Standard LAN access<br />

module (SLAM: 2 doors)<br />

• Integriti/Integriti Intelligent LAN access<br />

module (ILAM: 2 doors, expandable to 8)<br />

• SIFER card readers<br />

LAN communications<br />

Integriti has been designed as a modular<br />

system that’s able to effortlessly scale with the<br />

addition of RS-485 LAN modules.<br />

Communications between the controller,<br />

expanders, keypads and SIFER card reader<br />

(including fob/card credentials) are all<br />

encrypted to AES 128-bit with MAC<br />

authentication as standard.<br />

Data encryption ensures secure LAN<br />

communications at all times, while the<br />

programmable supervisory polling system<br />

continuously monitors the LAN to detect cable<br />

tamper, cable fault conditions, module off-line<br />

and module substitution.<br />

The efficient data format has been developed<br />

to ensure fast, secure and reliable comms<br />

regardless of the size of the system.<br />

Integrated access control<br />

In addition to a high security alarm system, the<br />

Integriti platform boasts an integrated access<br />

control platform. At the heart of Integriti lies<br />

the Integriti Access Controller (IAC). The IAC is<br />

an IP-based enterprise access controller which<br />

supports two doors and up to four readers onboard<br />

(a further 262 doors and additional<br />

readers may be added via UniBus and LAN<br />

expansion modules).<br />

Inner Range SIFER card readers can be used<br />

with the IAC. These are multi-drop, RS-485-<br />

based readers that employ AES 128-bit<br />

encryption from the card through to the door<br />

module. A far superior level of security is<br />

provided than that offered by traditional<br />

Wiegand-based card readers. SIFER readers use<br />

the Mifare DESfire EV1 card format.<br />

The aforementioned ELMs are designed to be<br />

installed within (or adjacent to) a detection<br />

device such as a PIR or Reed sensor switch. In<br />

conjunction with the Integriti encrypted


Advertisement Feature<br />

expander, ELMs provide an encrypted data<br />

communications link between the detector and<br />

the control equipment.<br />

During times of normal operation, Integriti’s<br />

dedicated supervisory polling system<br />

continuously monitors ELMs to detect any<br />

communication failure, device substitution or<br />

tamper conditions.<br />

Intruder detection<br />

Integriti offers powerful and flexible security<br />

and intruder detection capabilities in a very<br />

affordable package. Integriti delivers full<br />

coverage and reporting of security detection<br />

points, offering advanced single site or multitenancy<br />

monitoring for up to 250 areas.<br />

Support for special duress, panic and holdup<br />

functions is provided, while connection with<br />

a vast range of wireless or wired detection<br />

devices is possible.<br />

Integriti is the industry leader in security<br />

communications providing the flexibility you<br />

need in any environment. A single panel can<br />

support up to four simultaneous<br />

communication interfaces. Reporting is<br />

available in a variety of formats including:<br />

Contact ID, SIA, IRFast, IP (GPRS, Ethernet),<br />

GSM or SMS. Advanced back-up reporting<br />

options allow reporting to multiple central<br />

stations and multiple client codes.<br />

Furthermore, Integriti’s mobile application<br />

allows you to arm or disarm your security<br />

system and review events from it wherever you<br />

may be, in turn giving you convenient control<br />

of your system.<br />

Integriti controllers are equipped with<br />

powerful scripted logic capabilities allowing<br />

the system to be configured to automate many<br />

applications. Functions such as auto-closing a<br />

roller door at a certain time, or automatically<br />

switching lights on or off based on time or<br />

movement within a building are typical<br />

examples of Integriti’s automation capabilities.<br />

Indeed, there are many other applications<br />

where Integriti’s automation features may be<br />

employed to manage the day-to-day<br />

requirements of your facility.<br />

Inner Range: Intelligent Security Solutions for Security Professionals<br />

Inner Range is a world leader in the design and manufacture of state-of-the-art access control and<br />

security solutions. Since the company’s formation in 1988, upwards of 100,000 Inner Range<br />

systems have been installed in over 30 different countries. Consultants who specify the company’s<br />

products, technicians who install them and people who use them benefit on a daily basis from the<br />

remarkable versatility of Inner Range’s systems.<br />

A privately-owned company, Inner Range is built around a team with a lifelong passion for the<br />

electronic security industry. The business is wholly focused on developing the world’s very best<br />

hardware and software solutions for practising security and risk management professionals’<br />

security and access control needs. A large proportion of the company’s product development<br />

resources is committed to building reliable products capable of enduring harsh environments, in<br />

turn affording end users piece of mind about their security and access control investments.<br />

Around the globe, Inner Range is backed by a strong technical support infrastructure. The<br />

business’ quality-driven technical support team and factory-certified training ensure that your<br />

system can be specified, quoted, installed and maintained on a reliable basis without delay.<br />

For further information on Inner Range’s solutions access the website at www.innerrange.com<br />

Tim Northwood:<br />

General Manager at Inner<br />

Range Europe


ENCRYPTED HIGH SECURITY<br />

CLASS 5<br />

Encrypted High Security<br />

End of Line Modules Are Only the Beginning<br />

Inner Range’s Infiniti Integriti Class 5<br />

is High a complete Security Hardware/Software<br />

System<br />

solution is a complete designed Hardware/Software<br />

specifically for<br />

Class solution 5/Zone designed 3 installations. specifically for<br />

High Security installations.<br />

Our range includes:<br />

Our All range Software includes:<br />

Hardware All Software Controllers<br />

End Hardware of Line Controllers Modules<br />

Power End of Supplies Line Modules<br />

Keypads Power Supplies<br />

Enclosures Keypads<br />

Communications Enclosures Devices<br />

Access Communications Control Readers Devices<br />

Credentials<br />

Access Control Readers<br />

Why Credentials take chances?<br />

Full<br />

Why<br />

End<br />

take<br />

to End<br />

chances?<br />

Encryption<br />

compliant Full End to with End AS/NZS Data Encryption 2201.1:2007<br />

Class Externally 5 Externally Certified Certified<br />

BEST NEW PRODUCT<br />

OF THE YEAR<br />

MEMBER<br />

AUSTRALIAN SECURITY INDUSTRY<br />

ASSOCIATION LIMITED<br />

T: +44 +61 3 (0)845 9780 4300 470 5000<br />

E: integriti@innerrange.com<br />

IREnquiries@innerrange.com<br />

W: innerrange.com<br />

T: 1300 319 499 W: csd.com.au


Mail Room Security Management: Systems and Procedures<br />

Following on from the recent powder and<br />

Improvised Explosive Device (IED) attacks<br />

on Government and religious<br />

establishments, mail room security has now<br />

become one of the biggest challenges facing<br />

heads of risk and security. Indeed, any of the<br />

regular readers of Risk UK may be surprised to<br />

learn that suspected IEDs and other suspect<br />

packages are regularly discovered in the UK.<br />

As the methods by which suspect packages<br />

might be delivered are changing every day, it’s<br />

also very easy for organisations to become<br />

complacent in relation to their daily mail room<br />

operations. With effective training and the use<br />

of scanning devices, mail room operatives are<br />

the first line of defence against postal threats.<br />

Regularly reviewing and updating mail room<br />

security and personnel training should become<br />

a normal part of security planning for any large<br />

organisation, but what steps need to be taken?<br />

The first step for any business looking to<br />

secure its mail room is to undertake a threat<br />

assessment. That detailed assessment should<br />

begin by examining all current processes and<br />

equipment and identifying specifically how the<br />

organisation will combat any potential postal<br />

threats. Conducted on a regular basis, this<br />

process will ensure the business remains on<br />

the front foot and prepared for any evolving<br />

security threats.<br />

The threat assessment should examine risk<br />

at entry to the building and how visitors are<br />

screened and bags searched at this juncture.<br />

How post is delivered, the physical location of<br />

the mail room and pinpointing any potential<br />

surrounding threats that may be business<br />

critical are further considerations.<br />

Rather than a single point of entry, we often<br />

find that there are multiple points of entry for<br />

post in a building (for example, Royal Mail and<br />

courier deliveries into a loading bay and handdelivered<br />

items through reception). These<br />

access points – and the security level required<br />

at each of them – must be considered as part of<br />

the overall threat assessment.<br />

Organisations should then look at how they<br />

identify and handle each type of specific<br />

security threat. Current known threats include<br />

chemical or biological agents in powder or<br />

liquid form, as well as explosives and items<br />

deliberately designed to inflict physical and<br />

psychological harm.<br />

In addition, the location of the mail room and<br />

any critical services, such as computer servers<br />

or utilities, as well as any neighbouring<br />

personnel should be considered. If they’re<br />

within any potential blast area, changes may be<br />

required to ensure that any attack or<br />

detonation would have the minimum possible<br />

Signed, Sealed, Delivered<br />

Would your members of staff know precisely what to do if a<br />

situation should arise whereby a suspect package is found in<br />

the company’s building? Jason Wakefield shares his insights<br />

on this hugely important topic, explains the risks faced by<br />

today’s Mail Room operations and evaluates in detail how to<br />

effectively address them<br />

effect on the business and that the area<br />

affected can be closed off safely with ease.<br />

Containment issues<br />

Following the threat assessment,<br />

recommendations and an action plan should be<br />

produced detailing all required security<br />

measures, including what to do if a suspect<br />

package, weapons, powders or explosives<br />

should be found. This affords a thorough<br />

understanding of the threats and how to<br />

protect the building and the people within it.<br />

Full procedures with actions on finding<br />

suspect devices should be written, practised<br />

and updated on a regular basis such that<br />

operators and security staff know exactly what<br />

to do if a suspect device should be found.<br />

Following a threat assessment, many<br />

organisations will decide to invest in or<br />

upgrade the mail room scanning technology<br />

they have at their disposal. If an organisation<br />

currently owns an x-ray scanning machine that’s<br />

over eight years old, the chances are this<br />

machine will be inadequate for dealing with the<br />

advancing capabilities of today’s terror threats.<br />

There are various types of machine available<br />

to consider from a variety of manufacturers, but<br />

Jason Wakefield: Sales<br />

Director at Todd Research<br />

53<br />

www.risk-uk.com


Mail Room Security Management: Systems and Procedures<br />

essentially there are two types, specifically<br />

conveyors and cabinets.<br />

A conveyor machine is similar to those seen<br />

at any airport used to scan hand luggage. It’s<br />

an effective scanner for when the flow of mail is<br />

constant and there are many large packages<br />

entering the business.<br />

Many of today’s conveyors have useful<br />

additional optional software options that<br />

should be considered, such as Advanced<br />

Detection Software (ADS) and Threat Image<br />

Projection (TIP). The former is advanced<br />

algorithm software that works by identifying<br />

the atomic number in explosive substances and<br />

contraband. Explosives are highlighted to the<br />

operator within a red box and contraband<br />

within a yellow box, making it easier for the x-<br />

ray machine user to identify potentially<br />

dangerous or banned substances.<br />

TIP technology is useful for quality control,<br />

risk analysis and the assessment of individual<br />

screener performance. It can show screeners<br />

artificial, but realistic x-ray images of threats<br />

during a routine baggage x-ray screening<br />

operation in order to aid and also test their<br />

security threat identification skills.<br />

Cabinet scanners<br />

Cabinet scanners are now also proving popular<br />

with many end user organisations because they<br />

create a lower carbon footprint and cost 50%<br />

less than a conveyor machine. As if to<br />

emphasise their popularity, every British<br />

Embassy across the world currently uses a<br />

cabinet scanner for security purposes.<br />

These scanners are operated by opening the<br />

chamber door and placing inside the items to<br />

be scanned. A single push-button operation<br />

then generates an image. Once the image has<br />

been generated, the advanced feature<br />

operating software makes the identification of<br />

suspect items easier.<br />

These advanced features can include<br />

Enhanced Powder Detection for the ease of<br />

identifying powders such as anthrax or ricin, as<br />

well as an e-mail facility to send the picture of a<br />

suspect package to a third party for<br />

assessment. Other useful advanced features<br />

can include zoom control, density alerts and<br />

three-point colour, all of which have been<br />

designed to help the user easily identify what’s<br />

inside the package they’re scanning.<br />

“The threat assessment should examine risk at entry to the<br />

building and how visitors are screened and bags searched<br />

at this juncture. How post is delivered and the physical<br />

location of the mail room are further considerations”<br />

Once any new scanning equipment is in<br />

place, it should be regularly reviewed as part of<br />

an ongoing threat assessment process to<br />

ensure that it’s maintained and upgraded to<br />

counter any new threats as required. Scanning<br />

operators should also be tested and training<br />

invested in to ensure that they’re up-to-date<br />

with all the latest security Best Practice. Often,<br />

the leading scanning machine providers will<br />

include introductory training for operators as<br />

part of the package when equipment is bought.<br />

Business continuity<br />

Once the assessment and action plan has been<br />

put into place, organisations should then look<br />

to consider the safety, information and<br />

business continuity implications.<br />

For example, it’s important that organisations<br />

achieve and maintain full Ionising Radiations<br />

Regulations 1999 (IRR99) compliance for staff<br />

using x-ray scanning security equipment. This<br />

document is aimed at the protection of the<br />

public and the health of those staff who work<br />

with ionising radiations and points directly at<br />

those employers with duties under IRR99.<br />

Organisations using x-ray security scanning<br />

machinery fall under these regulations.<br />

The organisation should also put in place<br />

mechanisms to ensure that all security staff are<br />

kept up-to-date with all current terror threats<br />

by following the countrywide alert status set by<br />

MI5. They should be aware of the location and<br />

contact details for the regional Counter-<br />

Terrorism Security Advisor should that person’s<br />

assistance be required. An overview of groups<br />

that may wish to target the organisation can be<br />

identified. In addition, it’s important to consider<br />

the lone activist, the disgruntled employee or<br />

customers with a grudge.<br />

A reporting schedule will need to be put into<br />

place, recording any mail attacks and tracking<br />

current trends and methods used by individuals<br />

or groups which can also be used as a staff<br />

training tool.<br />

Finally, the host organisation should make an<br />

assessment and ensure that it could still<br />

operate effectively if the mail room area had to<br />

be evacuated because of a security threat. This<br />

can be achieved by identifying and/or<br />

establishing a co-location either on another site<br />

or in a different part of the building.<br />

Implementing and continually checking on<br />

security measures for an organisation’s mail<br />

room can be a challenging task. As a result,<br />

many choose to work with professional security<br />

organisations to carry out some or all the tasks<br />

identified. There’s no simple answer as to which<br />

course your organisation should take, but help<br />

is at hand should assistance be required.<br />

54<br />

www.risk-uk.com


Meet The<br />

Security Company<br />

This is the fourth<br />

instalment in a new<br />

series of articles for<br />

the readers of Risk UK<br />

where we shine the<br />

spotlight on NSIapproved<br />

businesses<br />

for the benefit of risk<br />

and security managers<br />

who purchase security<br />

guarding as well as<br />

systems-focused<br />

solutions. Answering<br />

our questions this<br />

time around is Scott<br />

Boyd, managing<br />

director of Securi-<br />

Guard Fire and<br />

Security<br />

About the National Security Inspectorate<br />

Risk UK: Can you briefly describe your<br />

business’ activities and what you consider to<br />

be your USP as an organisation?<br />

Scott Boyd: Established back in 1982, Securi-<br />

Guard is a family-owned NSI Gold, BAFE and<br />

Security Industry Authority (SIA) Approved<br />

Contractor Scheme (ACS) accredited fire and<br />

security solutions specialist with offices in<br />

Plymouth and Wellington in Somerset.<br />

Celebrating its 35th Anniversary in April next<br />

year, the business is now recognised as the<br />

largest independent ‘one-stop shop’ fire and<br />

security solutions provider in the South West.<br />

On that note, end user organisations are now<br />

increasingly seeing the cost benefits of<br />

combining services from one trusted specialist.<br />

Many clients prefer to use our wide scope of<br />

services rather than four or five different<br />

suppliers, which can have a significantly<br />

positive impact on the buyer’s bottom line.<br />

Risk UK: What do your clients value most<br />

about the services you deliver?<br />

Scott Boyd: We believe there’s a positive<br />

perception of an independent, family-owned<br />

business like ours which is locally based and<br />

boasts a solid heritage and proven track record.<br />

The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />

company limited by guarantee and operates as a UKAS-accredited certification<br />

body specialising in the security and fire safety sectors.<br />

For over 40 years, the NSI has served to protect businesses, homeowners<br />

and the general public alike, raising standards by providing robust and high<br />

quality audits of both security and fire safety service providers.<br />

The highest levels of customer service are at<br />

the very heart of our company ethos and we’ve<br />

built a solid foundation of trust and integrity<br />

among our client base.<br />

Equally important is our wide range of quality<br />

assured and industry accredited services<br />

delivered by a dynamic and highly-skilled<br />

cohort of engineers and security personnel, all<br />

of whom are supported by a strong<br />

management team. We’re dedicated to not just<br />

meeting, but exceeding clients’ expectations.<br />

That’s probably what our customers value the<br />

most alongside the NSI, BAFE and SIA<br />

accreditations mentioned previously.<br />

Risk UK: How do you feel accreditations have<br />

assisted your company?<br />

Scott Boyd: Industry accreditations are hugely<br />

important to us as a business as they set a<br />

benchmark for quality and professionalism in<br />

which clients can place their trust.<br />

We’ve been committed to meeting the high<br />

standards set by the respective accreditation<br />

organisations. It’s a company policy that has<br />

paid dividends, too. We’re now multiple NSI<br />

Gold, BAFE and SIA ACS accredited for security<br />

guarding, fire and security systems and 24/7<br />

monitoring services.<br />

We do find that, while local authorities and<br />

larger businesses recognise the benefits of an<br />

accredited company, there’s still a lack of<br />

knowledge in the general marketplace about<br />

accreditation and a perception that it adds to<br />

the cost for the buyer rather than adding value.<br />

All of us work hard to change such perceptions<br />

by helping to educate clients such that they can<br />

see the benefits.<br />

Risk UK: Specifically, what value does ACS<br />

registration and NSI Guarding Gold approval<br />

bring to your business and its clients?<br />

Scott Boyd: Our NSI Gold and SIA ACS<br />

accreditations are a major benefit when it<br />

comes to carrying out third party work for<br />

‘other’ security guarding companies. Being a<br />

part of our industry themselves, clearly they<br />

have much better knowledge of what these<br />

accreditations mean so what matters to them is<br />

that our team members always deliver the<br />

correct processes and procedures.<br />

56<br />

www.risk-uk.com


Meet The Security Company: Securi-Guard Fire and Security<br />

In association with the<br />

Having the accreditations is obviously very<br />

important, but being consistently able to meet<br />

the requirements of those accreditations is<br />

absolutely vital.<br />

Risk UK: In practice, what are the main<br />

differences between ACS registration and NSI<br />

Guarding Gold approval?<br />

Scott Boyd: There’s probably very little<br />

difference in as much as both schemes<br />

recognise that, as a company, we’re<br />

consistently meeting the highest standards of<br />

service delivery which should afford our clients<br />

and potential customers alike reassurances.<br />

As the NSI has been providing certification<br />

for more than four decades now, the<br />

organisation’s ‘seal of approval’ does carry a<br />

good deal of clout in our industry.<br />

In its commitment to opening up new<br />

business opportunities for the private security<br />

sector, the SIA’s ACS has also been beneficial. It<br />

helps in making sure that we don’t let our<br />

professional standards slip.<br />

Risk UK: How do you think technology has<br />

changed the industry over the last couple of<br />

years and what do you feel will be the<br />

direction of travel in the future?<br />

Scott Boyd: We could see how fast technology<br />

was likely to develop and recognised its growth<br />

potential, and so formed separate divisions for<br />

the business, each with its own management<br />

team and associated accreditations.<br />

Those divisions cover security services (ie<br />

guarding, key holding and mobile patrols), fire<br />

and security systems (CCTV, access control and<br />

alarms, etc), fire safety services (such as fire<br />

extinguishers and fire door holders) and 24/7<br />

monitoring services (security and fire alarm as<br />

well as CCTV monitoring).<br />

Technological innovation is now at the<br />

forefront of our industry. A large number of our<br />

clients have moved away from the traditional<br />

24/7 manned security service. Increasingly,<br />

they’re making good use of cutting-edge<br />

electronic systems combined with ‘office hours’<br />

security officers, 24/7 monitored fire and<br />

security systems and ‘out of hours’ mobile<br />

security officer response/patrol services.<br />

Risk UK: When it comes to negotiating<br />

contracts and responding to tender requests,<br />

what aspects are of most value to customers<br />

and how are these changing?<br />

Scott Boyd: Customer satisfaction is the best<br />

advert for any company’s services. We’re<br />

extremely fortunate that the majority of<br />

requests come to us through recommendations<br />

and/or knowledge of the company’s reputation.<br />

Ease of communication is also vital, which is<br />

why our key team members are always<br />

available on a 24/7 basis.<br />

Increasingly, clients are asking for ‘shared’<br />

services (ie reducing/removing their manned<br />

security cover and introducing mobile patrols to<br />

open/close sites, carry out random patrols and<br />

respond to any security system activations that<br />

occur during ‘the silent hours’).<br />

Risk UK: How has Government legislation (eg<br />

the National Minimum Wage, the National<br />

Living Wage and holiday pay) affected your<br />

business? Do you believe such legislation is<br />

a good thing?<br />

Scott Boyd: We agree with the introduction of<br />

the legislation you’ve mentioned, but as<br />

referenced earlier, over the last few years we’ve<br />

witnessed an increase in clients requesting a<br />

review of their existing ‘manned’ security cover<br />

with the specific intention of reducing their<br />

annual spend and replacing this service with<br />

24/7 monitored fire and security systems in<br />

tandem with police/security response services.<br />

Risk UK: What are the most important<br />

attributes you look for in your security<br />

officers and staff members in general?<br />

Scott Boyd: We seek candidates who wish to<br />

be a part of our security and fire family. We<br />

want committed and dedicated team players<br />

who have the skills and knowledge to deliver<br />

the best possible service for all of our clients.<br />

When we invest in our staff, we’re investing in<br />

the future strength of the business and, to date,<br />

that effort has most certainly paid dividends. Of<br />

the 154 members of staff employed by the<br />

company at present, 58 of them have over ten<br />

years of service with us.<br />

Risk UK: How can the SIA, the NSI and<br />

industry standards best serve the sector in<br />

addition to the needs of your company’s<br />

clients and the wider public interest? Will<br />

the introduction of business licensing be a<br />

positive step?<br />

Scott Boyd: It’s imperative that we continue to<br />

have a robust accreditations system in place<br />

that’s always raising the bar and challenging<br />

companies across our sector to not only prove<br />

their professionalism and worth, but<br />

consistently maintain – and, ideally, improve<br />

upon – those high standards.<br />

What would the introduction of a business<br />

licensing regime from the Regulator ensure?<br />

Greater accountability and better practises. It<br />

would afford customers the added assurance<br />

that they’re dealing with a reputable business<br />

working within the strict confines of the law.<br />

Name<br />

Scott Boyd<br />

Job title<br />

Managing Director<br />

Time in the security sector<br />

I’ve served in the security<br />

sector since 1985, having<br />

joined Securi-Guard Fire and<br />

Security that very year<br />

Location of the business<br />

Securi-Guard Fire and<br />

Security operates from offices<br />

in Plymouth, Devon and<br />

Wellington in Somerset. Main<br />

areas covered by Securi-<br />

Guard Fire and Security<br />

across Devon and Cornwall<br />

include Bideford, Dartmouth,<br />

Exeter, St Ives and Truro<br />

Areas of expertise<br />

Security guarding, alarm<br />

response, mobile patrol and<br />

key holding services, security,<br />

fire alarm and CCTV systems,<br />

fire safety services and 24/7<br />

monitoring solutions<br />

(security and fire alarm<br />

monitoring, CCTV monitoring,<br />

lone worker alarm monitoring<br />

and vehicle tracking)<br />

Accreditations<br />

NSI Guarding Gold, NACOSS<br />

Gold, NSI Fire Gold (BAFE<br />

SP201 and BAFE SP2013-1),<br />

NSI ARC Gold, SIA ACS<br />

(Security Guarding, Key<br />

Holding, CCTV)<br />

Scott Boyd:<br />

Managing Director of Securi-<br />

Guard Fire and Security<br />

57<br />

www.risk-uk.com


www.coie.uk.com<br />

Cortech Open<br />

Innovation Event<br />

Cortech Developments Headquarters, Withers Lane, Knutsford,<br />

Cheshire, WA16 0SG, 7 November 2017<br />

The Mitigation of Risk for Workplace Safety, High Security<br />

and Building Efficiency<br />

An event with a difference for end users, consultants and main contractors:<br />

Be educated, informed and better equipped to manage evolving building needs<br />

Keep abreast of the latest advances in security, fire and building control technology<br />

See technology in action as part of the live demonstration<br />

Discover the latest smart integration techniques<br />

Discuss industry challenges with fellow security professionals and technology experts<br />

Learn about the 10 steps to cyber risk management<br />

Attending Partners<br />

Cortech<br />

Developments<br />

Media Partner


The Security Institute’s View<br />

We’ve all heard the debates surrounding<br />

the so-called ‘race to the bottom’ where<br />

pay and charge rates are concerned,<br />

read the stories on ‘full employment’ across the<br />

UK as reported in the mainstream media or<br />

been privy to statements about how security is<br />

a “grudge purchase”. Putting all of that ‘noise’<br />

to one side for a moment, there’s a very real<br />

need to look at the basic evidence and try to<br />

understand where some of the challenges lie.<br />

At the time of writing, I can surf the Internet<br />

and see security vacancies in London,<br />

Manchester, Leeds, Edinburgh, Cardiff and<br />

Belfast paying from £7.50 per hour (£7.20 in<br />

Belfast) through to £9.15 (Edinburgh), £9.50<br />

(Manchester), £10.00 (Cardiff), £10.45 (Leeds),<br />

£11.05 (Belfast) and £15.00 (London). Now,<br />

contrast this scenario in the security business<br />

sector with retailer Aldi. For the role of a shop<br />

assistant, that company pays between £9.75<br />

and £10.61 per hour in London and £8.53 and<br />

£10.15 seemingly everywhere else, with no<br />

requirement to undertake licence-linked<br />

training, buy a licence (which is renewable<br />

every three years) or externally patrol buildings<br />

or respond to alarms at two o’clock in the<br />

morning in the pouring rain or freezing cold.<br />

Let’s not forget, either, that working in retail<br />

also means you’re likely to be afforded<br />

employee discounts which can be very<br />

appealing, and especially so if you happen to<br />

be working in a store which is connected to<br />

your leisure time hobbies or interests.<br />

UK’s unemployment rate<br />

In a recent report published by the United<br />

Kingdom Crowd Management Association,<br />

entitled ‘Benchmarking Security and<br />

Stewarding Resourcing’, a figure of a 40%<br />

reduction in renewals of SIA licences was<br />

quoted. Although the Security Industry<br />

Authority (SIA) has since responded to the<br />

report and provided a degree of clarification<br />

and context, the Regulator’s own figures – as<br />

quoted in its latest Approved Contractor<br />

Scheme Update – show that, from the high<br />

point of just after the London 2012 Olympic<br />

Games when there were 224,619 licensed door<br />

supervisors in operation, we’re now down to<br />

201,821 annual renewals. This represents a<br />

drop of just over 10%. Figures for the other<br />

licensable sectors are not quoted.<br />

Standing at just 4.3%, the UK’s<br />

unemployment rate remains at its lowest level<br />

since 1975. Indeed, a senior Office for National<br />

Statistics statistician was recently quoted on<br />

the BBC saying that: “The number of people<br />

aged 16 to 64 not in the labour force because<br />

they’re looking after their family or home is the<br />

An Assessment of Staff<br />

Recruitment and Retention in<br />

the Security Business Sector<br />

One of the biggest challenges currently facing the private<br />

security sector is the initial recruitment and subsequent<br />

retention of high quality individuals. It doesn’t appear to<br />

matter whether the prospective employer is in the Top Ten in<br />

the industry or an SME, or whether it’s guarding or technical<br />

recruitment: there seems to be a worrying dearth of<br />

individuals looking to join the sector. Mike White addresses a<br />

significant problem that must be solved<br />

lowest since records began at less than 2.1<br />

million.” While this may be positive for the<br />

economy as a whole, it presents something of a<br />

challenge for those trying to recruit – and,<br />

thereafter, retain – new security officers.<br />

There’s also the not inconsequential matter<br />

of Brexit uncertainties to be considered, and<br />

how this might affect recruitment or, indeed,<br />

how it might affect our European colleagues<br />

from the other 27 EU Member States currently<br />

working in the sphere of private security<br />

solutions provision.<br />

If we’re going to professionalise the private<br />

security industry and make it a career of first<br />

choice – an objective regularly reiterated by<br />

every Trade Association, representative body or<br />

institute you may care to mention – then we<br />

need to do so across a range of areas.<br />

Training in the sector<br />

As regards training, there’s a significantly better<br />

range of training courses available today than<br />

ever before to allow people to progress through<br />

Mike White MSyI:<br />

Director of The Security<br />

Institute and Head of Risk,<br />

Compliance and Assurance (UK<br />

and Ireland) at G4S<br />

59<br />

www.risk-uk.com


The Security Institute’s View<br />

a career in the private security industry, from<br />

Levels Two and Three when they join right up to<br />

a professional doctorate. Courses exist across<br />

multiple disciplines within the sector.<br />

Yes, there has been suspected and proven<br />

training malpractice and we do see<br />

enforcement action being taken against the<br />

minority who seek to break the rules, but in<br />

truth training is just one part of a complex,<br />

three-dimensional recruitment and retention<br />

jigsaw puzzle that still challenges even the<br />

brightest of minds. Pay and conditions will<br />

undoubtedly be part of this jigsaw, as indeed<br />

will working practices.<br />

Of course, the private security industry<br />

continues to suffer an ongoing negative image<br />

within the mainstream media. Such an image is<br />

grossly unfair given the immense contribution<br />

made by the industry to the safety and security<br />

of this country and its citizens on a day-to-day<br />

basis. Indeed, there are not many jobs outside<br />

of the military, the medical profession or law<br />

enforcement that have such a profound impact<br />

on people’s lives.<br />

Whether it’s the security officer who helped<br />

apprehend a criminal, one who prevented<br />

unauthorised access to a building, another who<br />

heroically responded to a terrorist attack or one<br />

who reunited a lost child with their parents in a<br />

shopping centre, what security officers do<br />

really matters in the here and now.<br />

For all of the negative publicity that the<br />

industry sadly attracts, there are plenty of<br />

outstanding individuals and companies<br />

operating in our world that make substantial<br />

contributions. Despite it being asked to do<br />

more across a range of sectors in the light of<br />

public sector cuts and a heightened terrorist<br />

threat, including significant involvement in<br />

securing elements of the UK’s Critical National<br />

Infrastructure, the private security industry has<br />

yet to come close to reaching its full potential.<br />

Recruitment and retention<br />

How, then, do we go about attracting more<br />

individuals into the sector when it seems that<br />

the available pool of candidates is shrinking,<br />

and when it appears that evidence suggests<br />

once those individuals are part of the mix we<br />

then struggle to retain them?<br />

What isn’t going to work is anything being<br />

undertaken by one organisation on its own or<br />

one employer in isolation. This is an industrywide<br />

issue that demands a co-ordinated and<br />

industry-wide response. That response needs<br />

to set aside self-interest and, instead, examine<br />

all the factors involved, consider all the<br />

possible solutions – however radical some of<br />

them may be – prioritise what needs to be done<br />

and then draft a series of recommendations<br />

that the private security industry as a whole<br />

can comment on and, hopefully and more<br />

importantly, implement in the real world.<br />

Crucially, the response needs to encompass<br />

everything from training and working<br />

conditions through to regulation and business<br />

profit margins as well as everything in-between.<br />

‘Bonfire of the Quangos’<br />

The fact remains that this industry isn’t good at<br />

coming together as a whole and responding in<br />

a concerted manner to achieve a positive,<br />

lasting outcome but, I would argue, it can be<br />

done. Back in the autumn of 2010, you may well<br />

recall the news being leaked to the BBC that<br />

there would be a number of Government<br />

‘quangos’ abolished as part of a wider plan to<br />

reduce the number and cost of public bodies: a<br />

plan referred to by the mainstream media as<br />

the ‘Bonfire of the Quangos’. The SIA was<br />

selected to be one of them.<br />

In response, the private security industry<br />

joined forces as never before and, in a coordinated<br />

manner, lobbied the Government –<br />

and lobbied hard – with the message that this<br />

would be a retrograde step that would severely<br />

damage the sector by putting the already light<br />

touch regulatory framework at risk. The<br />

outcome was that, late in the evening on 23<br />

March 2011, the House of Lords passed an<br />

amendment to the Public Bodies Bill removing<br />

the SIA from the list of those bodies to be<br />

abolished. The industry as a whole thought that<br />

this was an issue well worth challenging, and<br />

that hunch was proven to be justified.<br />

Recruitment and retention challenges are<br />

now bordering on being a crisis for the industry.<br />

As a matter that appears to be affecting<br />

employers both large and small, local and<br />

national, it’s crying out for a unified response.<br />

Put simply, we need to draw on the<br />

significant lessons learned from our coordinated<br />

response to the ‘Bonfire of the<br />

Quangos’, set aside any differences between<br />

individuals, businesses and associations and<br />

come together in devising a common strategy.<br />

“How do we attract more individuals into the sector when it seems that<br />

the available pool of candidates is shrinking and evidence suggests<br />

once those individuals are part of the mix we struggle to retain them?”<br />

60<br />

www.risk-uk.com


7<br />

CONFERENCE, EXHIBITION & GALA DINNER<br />

University & Healthcare<br />

Estates and Innovation<br />

14th -15th NOVEMBER 2017 / UNIVERSITY OF BIRMINGHAM<br />

Universities & Healthcare Estates and Innovation is a unique conference and exhibition<br />

that addresses some of the key issues facing the University and Healthcare sectors.<br />

The conference addresses each issue from a University perspective, and then from a<br />

Healthcare perspective - allowing delegates to gain insight into both areas and share<br />

best-practice.<br />

The event will feature a wide range of high profile industry speakers that will focus on<br />

identifying the synergies and opportunities between these two sectors, and how<br />

best-practice can be shared effectively.<br />

If you would like to find out more, please contact:<br />

Ascent Events<br />

T: 01892 530027 E: info@ascentevents.co.uk<br />

or register at http://www.ascentevents.co.uk/uhei-birmingham-registration.php<br />

@UHEI_UHEI<br />

Event Partner<br />

Hosted By<br />

Supported By


A 21st Century Crisis: What Does It<br />

Look Like in the Real World?<br />

The threats and<br />

dangers we’re facing<br />

are developing and<br />

mutating at an almost<br />

inconceivable pace.<br />

It’s a paradox that, at<br />

a time when the world<br />

has never been safer,<br />

it has also never been<br />

in as great a danger.<br />

David Rubens focuses<br />

on six key areas of<br />

interest – among them<br />

pandemics and<br />

terrorism – before<br />

examining the<br />

implications for<br />

today’s practising risk<br />

and security<br />

management<br />

professionals<br />

Dr David Rubens DSyRM CSyP<br />

FSyI MSc: Managing Director of<br />

Deltar Training Solutions<br />

62<br />

www.risk-uk.com<br />

Every morning seems to bring to light a new<br />

crisis that’s bigger, more destructive and<br />

more expensive to fix than anything that<br />

came before it. Whether it’s hurricanes, cyber<br />

failures, pandemic scares or infrastructural<br />

breakdown, the impact those events have on<br />

both the local communities involved and global<br />

awareness is of a different level of intensity to<br />

that ascribed to what could be considered<br />

‘traditional’ crisis events.<br />

The question is whether this is just some<br />

anomaly, or whether the world is actually<br />

changing in terms of the threats we’re facing<br />

and the challenges they’re posing.<br />

Here at Deltar, we use the phrase ‘21st<br />

Century Crisis Management’ quite a lot,<br />

because in our minds there has been a<br />

significant change in the last 20 years between<br />

20th Century crisis events, which were<br />

relatively isolated, manageable and limited,<br />

and 21st Century crisis events. The latter are of<br />

a different order of magnitude in terms of their<br />

complexity and consequences and encompass<br />

much larger ‘footprints of destruction’.<br />

We’ve identified six areas of significant<br />

interest where there has been an important<br />

evolution in the nature of threats associated<br />

with those sectors, and the implications arising<br />

for strategic planners as well as emergency and<br />

crisis response managers. These are natural<br />

disasters, Critical National Infrastructure (CNI),<br />

pandemics, political and/or social unrest, cyber<br />

failures and terrorism. Let’s look at each in turn.<br />

Natural disasters<br />

Whether or not one accepts the reality of<br />

climate change, it’s clear that not only are high<br />

impact natural disasters – ie typhoons,<br />

tornadoes, floods, earthquakes and landslides<br />

– becoming more frequent and of a larger scale,<br />

but they’re also having a much larger impact on<br />

significantly large sections of the population.<br />

This is only going to increase as the developing<br />

‘mega cities’ are concentrated either on the<br />

coast or in coastal regions, which means that<br />

increasingly dramatic adverse weather events<br />

are going to have an effect on those areas and<br />

the populations living in them.<br />

By their very nature, natural disasters are<br />

‘long-tailed’ events, which have high levels of<br />

often catastrophic impacts not just on the<br />

communities they strike, but also on the<br />

surrounding infrastructure (eg roads, railways,<br />

power, communications and water purification).<br />

In the UK, CNI is officially listed as including<br />

chemicals, civil nuclear communications,<br />

defence, emergency services, energy, finance,<br />

food, Government, health, space, transport and<br />

water. However, from a strategic risk<br />

management perspective, these different<br />

sectors are increasingly becoming<br />

interdependent, with serious disruptions to one<br />

sector likely to have cascading impacts across<br />

the other sectors as well.<br />

An example of failure in CNI can be seen in<br />

the increasingly regular occurrence of power<br />

disruption across large areas, often<br />

transcending national boundaries and<br />

jurisdictions. The highly complex<br />

interconnectedness in power systems means<br />

that a relatively minor disruption in one part of<br />

the system can create almost instantaneous<br />

cascading failures across other systems which<br />

had no knowledge of – or control over – the<br />

original triggering event.<br />

The major power failure across Europe back<br />

in 2006 is a typical example. Following what<br />

was seen as a minor outage due to an<br />

unusually high power flow in a sub-station in<br />

Germany, 28 seconds later an electrical<br />

blackout had cascaded across Europe<br />

extending from Poland in the North East to the<br />

Benelux countries and France in the West,<br />

through to Portugal, Spain and Morocco in the<br />

South West and across to Greece and the<br />

Balkans in the South East.<br />

What about pandemics?<br />

It could be said that the last true pandemic was<br />

the influenza outbreak between 1918 and 1920<br />

that infected 500 million people across the<br />

world, including those in remote Pacific Islands<br />

and in the Arctic, and caused the death of<br />

between 50 million and 100 million people (up<br />

to 5% of the global population at the time).<br />

However, the growth of international travel<br />

combined with the return of previously<br />

declining diseases, not to mention the rapid<br />

expansion of urbanisation, means that many<br />

observers consider it only a matter of time until<br />

another global pandemic hits us.<br />

There have been increasing warnings of the<br />

impact a significant outbreak could have, with<br />

AIDS, SARS, Ebola, Swine Flu, Bird Flu and Zica


In the Spotlight: ASIS International UK Chapter<br />

all transcending local areas of infection to<br />

become potentially global pandemics.<br />

The question that needs to be asked is: ‘Have<br />

the global, regional and national authorities<br />

used these experiences to increase global<br />

resilience to pandemics and prepare for the<br />

impacts that would happen if another major<br />

pandemic was to occur?’<br />

Unfortunately, and perhaps predictably, the<br />

generally accepted answer is that these ‘near<br />

misses’ haven’t been used to both practice and<br />

improve upon global response capabilities.<br />

Political and social unrest<br />

When Francis Fukuyama scripted his bestselling<br />

book ‘The End of History’, the claim was<br />

made that, with the victory of social democracy<br />

and market-led capitalism, the great divides<br />

that had characterised human history were<br />

over, and we now had the opportunity to gain<br />

from the benefits that world peace and<br />

prosperity would bring.<br />

The last decade has seen the upheavals<br />

caused by the Arab Spring, the rise of Islamic<br />

terrorism and the impacts on Western Europe of<br />

the influx of refugees and economic migrants.<br />

However, we’ve also witnessed a modern,<br />

globally-connected country like Qatar being cut<br />

off from the world due to the pressure of its<br />

surrounding neighbours, the aggressive<br />

expansionism of China across what it sees as<br />

its own natural sphere of influence and the<br />

resurgence of Russian military and political<br />

influence, both in its own back yard – Georgia,<br />

Crimea and the areas around the Baltic States –<br />

and regions where the US would once have<br />

considered itself the main player (eg Syria).<br />

This has all been combined with a growing<br />

alienation and polarisation between the<br />

political elites and the mass of people who feel<br />

the world has left them behind, and who look<br />

to the traditional ‘enemies’ – the stranger, the<br />

outsider and the weak and vulnerable – which,<br />

in turn, is having impacts on both the rhetoric<br />

and reality of local and national politics.<br />

For those with a political memory, parallels<br />

with the period of the 1930s, involving both a<br />

global recession and increasingly violent<br />

political rhetoric, are not exaggerated. From a<br />

risk management perspective, any city in the<br />

world can be considered potentially high risk in<br />

terms of a rapid destabilisation, with the<br />

emergence of a street environment that’s both<br />

volatile and perhaps highly challenging.<br />

Cyber failures<br />

Although we often talk about cyber terrorism,<br />

it’s the wider aspect of cyber failures that’s<br />

equally worrying. Although there’s no denying<br />

the fact that targeted cyber attacks – whether<br />

from state actors, international terrorists, cyber<br />

criminals or the bored hacker – are<br />

undoubtedly serious, the potential for<br />

catastrophic cyber failures on a global scale is<br />

becoming increasingly more likely.<br />

Low-level, home-grown terrorism has become<br />

the ‘new normal’. It was interesting to see that<br />

the recent ‘bucket bomb’ attack in London on<br />

Friday 15 September, which injured 30 people<br />

and created a ‘wall of fire’ inside a crowded<br />

London Underground train, served as headlines<br />

for 24 hours before being relegated to<br />

‘updates’ on the progress of the operation to<br />

identify and find the perpetrators.<br />

If home-grown and low-level attacks are the<br />

‘new normal’, then it’s perhaps only a matter of<br />

time before the ‘new new normal’ emerges –<br />

which would be some form of home-grown dirty<br />

bomb. Whether chemical, biological or<br />

radiological in nature, the impact this would<br />

have on a major city – and the consequences in<br />

terms of ‘reactive security’ in other cities across<br />

the world – is almost incalculable.<br />

Crises can no longer be deemed to be mere<br />

one-off isolated events. Rather, they must<br />

increasingly be viewed in terms of system-wide<br />

failures impacting on the global network of<br />

interconnected dependencies, with both<br />

instantaneous impacts and catastrophic effects<br />

being realised.<br />

“Although there’s no denying the fact that targeted cyber<br />

attacks are undoubtedly serious, the potential for<br />

catastrophic cyber failures on a global scale is becoming<br />

increasingly more likely”<br />

63<br />

www.risk-uk.com


Qualifications: The Future of Fire<br />

Detection and Alarm Practitioners<br />

What’s the future for<br />

those working in the<br />

fire detection and<br />

alarms sector? Given<br />

that staring into a<br />

crystal ball will likely<br />

not help in finding the<br />

answer, Martin<br />

Duggan analyses the<br />

facts and looks at the<br />

reasons why there’s a<br />

growing trend towards<br />

both the need for<br />

professional<br />

qualifications in this<br />

sector and also a<br />

requirement to upskill<br />

and grow the market<br />

through the provision<br />

of quality services<br />

Martin Duggan:<br />

General Manager at the Fire<br />

Industry Association<br />

64<br />

www.risk-uk.com<br />

Here in the UK, the problem at present is<br />

that there’s no ‘upfront’ legal requirement<br />

for a formal qualification in the fire<br />

detection profession. Technically speaking,<br />

there’s nothing to stop anyone, however<br />

unqualified they may be, from commissioning a<br />

fire alarm system.<br />

To make matters worse, that applies whether<br />

the unqualified individual is installing or<br />

designing a system for a small office, a nuclear<br />

power station or even a large hospital, where<br />

the risks could be exponential if matters are not<br />

handled properly. It’s likely that only after a<br />

disaster has played out would poor<br />

workmanship be discovered, which means that<br />

many ‘problems’ remain undetected.<br />

Currently, the only necessity is written into<br />

the Regulatory Reform (Fire Safety) Order 2005,<br />

which states that the individual must be<br />

“competent” – but the definition is vague. The<br />

best we have is in the guidance documents<br />

which state the following: “A person with<br />

sufficient training and experience or knowledge<br />

and other qualities to enable him/her to<br />

properly assist in undertaking the preventative<br />

and protective measures.”<br />

The fire detection and alarm industry has a<br />

‘company’ competency benchmark, specifically<br />

the third party certification schemes: BAFE<br />

SP203-1 or LPS 1014. These are supported –<br />

again somewhat vaguely, it must be said –<br />

within the guidance documents by the<br />

statement that: “Third party certification<br />

schemes for fire protection products and<br />

related services are an effective means to<br />

providing the fullest possible assurances,<br />

offering a level of quality, reliability and safety<br />

that non-certificated products may lack.”<br />

Each scheme is different, but essentially each<br />

one provides an independent audit of a<br />

company to help prove quality and competency.<br />

Part of the inspection process is to look at staff<br />

and how they’re trained and selected.<br />

These schemes are generally very good and<br />

the audits strong, which is precisely why the<br />

Fire Industry Association (FIA) has always<br />

supported them and made them the criteria for<br />

membership acceptance.<br />

A qualification should raise the competence<br />

bar to a new level and provide an extra layer of<br />

knowledge and expertise. Not only will it help<br />

to bolster an individual technician’s credentials,<br />

but will also afford companies a competitive<br />

advantage, and especially so if they can<br />

demonstrate that all of their technicians are<br />

qualified. This would provide for a much easier<br />

check within the company scheme inspections.<br />

Purchasing decisions<br />

Consumers and purchasers in today’s world are<br />

more and more savvy, often placing more effort<br />

into finding out what sort of service they’ll<br />

receive and at what price. They’re also starting<br />

to fully understand their responsibilities and<br />

are looking at how they can mitigate risk.<br />

While price alone might lead the way on<br />

some purchasing decisions, that isn’t always<br />

the case. Many discerning purchasers will look<br />

to discover if they’re receiving a good level of<br />

service for their money.<br />

This is where EN 16763: 2017 Services for Fire<br />

Safety Systems and Security Systems is useful.<br />

Although not mandatory, it helps to set out<br />

minimum education requirements for staff in<br />

the industry. EN 16763 clearly defines the level<br />

of education those working in the fire and<br />

security services industries should have at their<br />

disposal. According to EN 16763, those working<br />

within fire detection and alarm services should<br />

hold a Level 3 qualification on the European<br />

Qualifications Framework.<br />

To assist those companies in preparation for<br />

adopting this standard, and to further improve<br />

the level of training available for service<br />

technicians, the FIA has worked to develop four<br />

new qualifications in the field of fire detection<br />

and alarms aimed at the four main job roles<br />

within the fire detection and alarm services<br />

sector. These four roles are the designer,<br />

installer, maintainer and commissioner.<br />

The new qualifications are one stage higher<br />

than those mentioned in the European<br />

Qualifications Framework (as a UK Level 3 is the<br />

equivalent of a European Level 4, and the<br />

European Standard calls for Level 3) and<br />

equivalent to an A-Level within the UK.<br />

Method of differentiation<br />

Why did the FIA become involved? We provide a<br />

service to our members and they want to<br />

increase the knowledge and understanding of<br />

their workforce and new recruits. They wish to<br />

differentiate themselves from the ‘cowboys’.<br />

Also, the FIA is a not-for-profit organisation<br />

so any money made either goes back into<br />

training and development or research.


FIA Technical Briefing: Qualifications in the Fire Sector<br />

The second objective listed in our<br />

Memorandum of Association is all about<br />

providing education and training for the sector.<br />

Consequently, the FIA is well placed to offer<br />

training that can help to prove competence. The<br />

organisation has been running fire detection<br />

and alarm training for over 20 years (since its<br />

formation in 2007 and in its previous guise as<br />

the BFPSA) having trained more than 30,000<br />

delegates across its 17 different courses.<br />

Current run rates are 300 courses across the<br />

year around the country, providing training for<br />

circa 4,000 delegates every year. FIA training<br />

has become a widespread requirement in fire<br />

detection and alarm technicians’ recruitment,<br />

and it’s fair to suggest that qualifications will<br />

only enhance this truism still further.<br />

This year, the FIA is proud to have become an<br />

approved Awarding Organisation which, in<br />

essence, means that we can now write<br />

qualifications which are then approved by the<br />

Office of Qualifications and Examinations<br />

Regulation (Ofqual) and other official<br />

Government bodies for examinations. The FIA<br />

spent years researching and creating the<br />

qualifications, talking to members and training<br />

customers to find out what they wanted from a<br />

qualification. We then tested what we learned<br />

from surveys. The results helped us to design<br />

and create our qualifications.<br />

The four new qualifications in fire detection<br />

and alarms are currently being developed to<br />

enhance the learner’s knowledge even further<br />

than before. The FIA’s present training provision<br />

will eventually be phased out for the new<br />

qualifications, since these will contain new<br />

areas and topics not previously seen within the<br />

provision currently given.<br />

Four units to study<br />

For each of the four qualifications there are four<br />

units to study. Three units are common to each<br />

of the qualifications. These are: Foundation,<br />

Health and Safety and Environment. Learners<br />

must pass each stage in order to progress to<br />

the next unit. Thereafter, they can then choose<br />

a specialist advanced unit in their chosen area,<br />

whether that be design, installation,<br />

maintenance or commissioning.<br />

In the Foundation Unit, the learner develops<br />

their knowledge and understanding of fire<br />

safety legislation (which is different depending<br />

on whether you’re in England and Wales,<br />

Scotland or Northern Ireland), as well as<br />

relevant standards, Best Practice and the<br />

theory that underpins all of the advanced<br />

principles in the later specialist advanced units.<br />

The standard for the qualifications is<br />

incredibly high. Experts from across the<br />

industry have collaborated to create the course<br />

content and write the examinations.<br />

There will not be an examination-only option<br />

for those who think that they already have<br />

enough knowledge to pass. This is because the<br />

qualification is comprehensive, and the<br />

questions will be complex, so we believe<br />

people need to complete the course to have<br />

learned enough to pass the exams at the end of<br />

each unit. These are likely to be demanding and<br />

extensive so learners will really need to put in<br />

the hours of education. We estimate that the<br />

average time for an examination will be twoand-a-half<br />

hours.<br />

This isn’t a simple exercise. It’s a test of a<br />

learner’s knowledge. We think it will be the vital<br />

step that raises the level of professionalism in<br />

fire detection and makes those working in the<br />

field expert professionals, which should<br />

improve the industry for everyone.<br />

Going back to the beginning, what will the<br />

future bring? We don’t know for certain, but it<br />

looks like there will be a trend of moving<br />

towards higher levels of professionalism in the<br />

industry. If we were to look deep into that<br />

crystal ball, it would say: “Qualifications are<br />

the new black”. Better quality service<br />

technicians mean a better quality of service.<br />

*To find out when the new<br />

booking system goes live,<br />

sign up to receive the Fire<br />

Industry Association’s e-mail<br />

Newsletter at www.fia.uk.com<br />

“While price alone might lead the way on some purchasing<br />

decisions, that isn’t always the case. Many discerning<br />

purchasers will look to discover if they’re receiving a good<br />

level of service for their money”<br />

65<br />

www.risk-uk.com


An Exercise in Logistics<br />

Company warehouses<br />

are often the target for<br />

both opportunistic<br />

and organised crime.<br />

While a robust and yet<br />

fairly static approach<br />

to security may hold<br />

off the opportunist,<br />

this kind of regime will<br />

not deter organised<br />

criminals. Catching the<br />

thieves can be akin to<br />

a game of ‘cat and<br />

mouse’. Brendan<br />

Musgrove outlines<br />

how and why an agile<br />

approach to security is<br />

the best way forward<br />

The 2017 Spring Budget Statement – the<br />

first to be delivered by Chancellor Philip<br />

Hammond – was met with mixed opinion in<br />

the logistics sector, with most industry<br />

commentators feeling pretty disappointed. As<br />

expected, the Chancellor showed little appetite<br />

for new spending ahead of the Brexit<br />

negotiations, while investment promises for<br />

transport were somewhat scarce.<br />

Announcements focused on freezes to<br />

Vehicle Excise Duty, the HGV Road User Levy<br />

and fuel duty were all welcomed in equal<br />

measure, but the Chancellor’s pledges of<br />

money to ease motorway congestion, improve<br />

road infrastructure and boost research in<br />

driverless vehicles were met with a lukewarm<br />

response. To put it bluntly, for many logistics<br />

industry observers, the Spring Budget was<br />

heavy on soundbites, but light on substance.<br />

There’s little doubt that the logistics industry<br />

faces the same high-level challenges as any<br />

other sector – the need to cut costs, increase<br />

efficiencies and attract the right talent to work<br />

within. Crucially, specialists in this field must<br />

make sure their security procurement is right<br />

and that they partner with the very best<br />

guarding solutions provider they can find.<br />

There are five key steps that should form the<br />

foundation of every security guarding solution<br />

in the logistics space. First of all, the security<br />

provider and client absolutely need to conduct<br />

regular reviews. These reviews must be both<br />

open and candid, wherein current aspects of<br />

loss are discussed and proposals for<br />

addressing them agreed upon.<br />

Through a full understanding of the profile of<br />

the losses being faced, this will enable both<br />

parties to change the shape of security<br />

provision and precisely target any altering<br />

patterns or threats. After all, what might have<br />

been fit for purpose six months ago simply may<br />

not be so appropriate now as the nature of the<br />

risks faced could well have changed.<br />

Degree of flexibility<br />

Second, the supplier then needs a level of<br />

flexibility to put these plans into play. This<br />

flexibility may take the shape of contract<br />

reviews, placed periodically through the<br />

lifecycle of the contract, wherein the provision<br />

is formally reviewed and the contract reengineered<br />

as appropriate. That said, the<br />

changing nature of loss doesn’t wait for these<br />

punctuation points in a contract’s development.<br />

At those junctures when acute issues are<br />

found, this flexibility may have to be achieved<br />

at very short notice, which may mean moving<br />

officers around the site, or indeed drafting in<br />

additional resource with immediate effect.<br />

Therefore, it’s also important that the solution<br />

supplier has a deep resource of well-trained<br />

and licensed officers to draw upon as needed.<br />

Here, the level of training is key. Logistics is a<br />

sector with particular requirements. Placing an<br />

officer not versed with the right skills in such an<br />

environment is simply unacceptable.<br />

Third, and as stated above, while all officers<br />

should be well-trained, there’s a time and a<br />

place for an ‘elite’ resource to be called upon.<br />

When actively pursuing a reduction in loss,<br />

there are moments when specialist skills – for<br />

instance, those demanded to undertake covert<br />

duties or enhanced security searches – will be<br />

needed as part of the approach that are not<br />

economically viable to be trained into all onsite<br />

security personnel.<br />

Fourth, all of the security guarding elements<br />

mentioned thus far need to be properly<br />

integrated with technology. This may involve<br />

the short-term tactical use of systems such as<br />

covert cameras or vehicle trackers, or it might<br />

focus on working together when the discussion<br />

turns to longer-term capital projects.<br />

Finally, the security provider needs to liaise<br />

with the client to make recommendations<br />

regarding working practices and operational<br />

procedures. By using the intelligence gained<br />

through security operations, some areas of risk<br />

can be managed or mitigated via appropriate<br />

process design and procedure.<br />

Specific problems<br />

Once these parameters have been agreed upon,<br />

it’s then time to address specific issues and<br />

problems. There’s an estimated 5% shrinkage<br />

rate in warehouses and depots caused by staff<br />

66<br />

www.risk-uk.com


Security Services: Best Practice Casebook<br />

thefts that can put a big dent in company<br />

profits, and especially so in the current<br />

economic climate wherein margins are tight.<br />

These thefts are a mixture of opportunistic and<br />

organised crime. Sadly, this problem shows no<br />

sign of abating, as in recent years the tactics<br />

being deployed by potential thieves have<br />

become more sophisticated.<br />

The challenge for companies is that,<br />

inevitably, all of their staff tend to become very<br />

familiar with the buildings in which they’re<br />

working and the security measures already in<br />

place. They have first-hand knowledge of how<br />

the guarding patrols operate, where the<br />

technology such as CCTV is located and where<br />

valuable items of stock are resident. All of this<br />

makes it relatively easy for a potential thief.<br />

Many seasonal staff tend to work across<br />

several warehouses in a region and are able to<br />

identify those which are the least secure.<br />

Individuals with criminal intentions will<br />

exchange information and tactics and<br />

sometimes work in collaboration to try and<br />

smuggle goods out of a warehouse.<br />

The drivers know that there are not the<br />

resources available to search every vehicle and<br />

just simply wait until another vehicle has been<br />

stopped before adding ‘stolen’ items or failing<br />

to scan certain parcels. They know that the<br />

static security provision in a warehouse will<br />

have no meaningful ability to catch them once<br />

they’re through the perimeter gates.<br />

Although vetting procedures such as<br />

checking employment history are employed<br />

when recruiting staff to try and avoid taking on<br />

‘risky’ individuals, such measures will not<br />

prevent all forms of theft. While the designs of<br />

warehouses have evolved to feature increased<br />

technology and multi-level access control<br />

including turnstiles, cages and locked-off areas<br />

for high value items, at the end of the day such<br />

precautions can only go so far.<br />

profiling. Within a traditional security set-up,<br />

searches may become rather predictable in<br />

terms of frequency and location. Therefore,<br />

‘high impact teams’ may be employed to<br />

augment this standard approach, arriving on<br />

site unannounced to check areas such as<br />

property and lockers, in addition to staff and<br />

contractors. They’re often acting on<br />

‘intelligence’ and tip-offs and use the latest<br />

technology, such as body-worn video, to record<br />

evidence vital for building a criminal case.<br />

As well as searching vehicles as they leave<br />

the depot, team members can deliver covert<br />

monitoring of drivers on their rounds, often<br />

alerted by the GPS that shows an employee has<br />

veered off route, possibly to offload stolen<br />

property somewhere. In short, the thieves have<br />

no way of knowing when or where the ‘high<br />

impact teams’ will appear. It’s this level of<br />

unpredictability that’s key to reducing loss.<br />

Over the past four years, the ‘high impact<br />

teams’ deployed by Cordant Security have been<br />

responsible for discovering over 3,000 thefts<br />

across a range of clients that have resulted in<br />

employees being dismissed and, in some cases,<br />

the police making arrests. For one client, we<br />

saved over £2 million per annum in static<br />

security guarding costs which they have<br />

partially reinvested in having much greater<br />

national coverage courtesy of our teams.<br />

It’s also a solution that will work for smallersized<br />

businesses that often struggle with the<br />

costs of a traditional security solution. At a<br />

fixed price, they can procure as many high<br />

impact searches as they need without any longterm<br />

commitment and easily ramp this up or<br />

down in line with changes in their business.<br />

Brendan Musgrove: Managing<br />

Director of Cordant Security<br />

High impact teams<br />

In response to this, security solutions have had<br />

to evolve. While technology remains key and<br />

the traditional model of having static security<br />

teams on site is still very effective for some<br />

organisations, we’re increasingly<br />

recommending the use of ‘high impact teams’<br />

to complement or even replace them.<br />

Fundamentally, these ‘high impact teams’ are<br />

designed to make security provision far more<br />

dynamic in meeting the changing profile of risk,<br />

while at the same time introducing a level of<br />

unpredictability for the potential thief.<br />

Such teams are trained to the highest<br />

standards in a range of techniques such as<br />

covert activity, search procedures and offender<br />

“While technology remains key and the traditional model<br />

of having static security teams on site is still very effective<br />

for some organisations, we’re increasingly recommending<br />

the use of ‘high impact teams’ to complement them”<br />

67<br />

www.risk-uk.com


Visual Hacking: Combating Mobile and<br />

Bring Your Own Device Security Risks<br />

appropriate security technologies suitable for<br />

the particular device or application’.<br />

Within the UK Government, the Security<br />

Policy Framework states that Government<br />

departments and agencies must adopt clear<br />

computer screen policies in those areas where<br />

sensitive assets are handled. The Department<br />

of Work and Pensions and the Foreign and<br />

Commonwealth Office have both specifically<br />

referenced the need for protecting screens and<br />

mention privacy filters in this context.<br />

Securing mobile<br />

communications is<br />

one of the biggest<br />

challenges<br />

organisations are<br />

facing today, with the<br />

inevitable<br />

complications of<br />

employees often using<br />

the same device for<br />

both work and home<br />

life, plus the sheer<br />

volume and diversity<br />

of mobile endpoints<br />

involved: different<br />

smart phones, tablets,<br />

laptops and operating<br />

systems, as well as a<br />

multitude of Apps that<br />

can be downloaded in<br />

seconds. As Peter<br />

Barker explains,<br />

there’s another factor<br />

that has potentially<br />

huge risk implications:<br />

visual hacking<br />

Visual hacking is the term given to the<br />

ability to view potentially sensitive or<br />

confidential content on someone’s screen<br />

– on a desktop monitor, laptop, tablet or smart<br />

phone – and then use that information for<br />

illegal or malicious purposes, such as financial<br />

gain, identity theft or sharing company<br />

information with a third party. Many of us will<br />

have inadvertently seen something on someone<br />

else’s screen that we know wasn’t for public<br />

consumption, so it’s not difficult to imagine<br />

how easily a ‘visual hack’ might take place.<br />

Unlike more sophisticated forms of security<br />

breaches, visual hacking doesn’t require any<br />

computer expertise. With mobile devices now<br />

incorporating increasingly clever cameras, it’s<br />

also becoming simpler to ‘snap’ sensitive<br />

details instead of having to rely on memory.<br />

This is why a growing number of<br />

organisations are adding visual hacking<br />

prevention to their overall security strategies<br />

and investments. Some private and public<br />

sector organisations are mandating visual<br />

hacking as part of their ISO 27001 processes. In<br />

the financial services market, for example,<br />

visual privacy is implicit within industry<br />

guidelines issued by the Financial Conduct<br />

Authority several years ago.<br />

In the legal profession, the Bar Council has<br />

issued Best Practice guidelines, stating that:<br />

‘Where possible, computers should not be<br />

placed so that their screens can be overlooked,<br />

especially in public places’ and ‘You should use<br />

Higher on the agenda<br />

At this point, you may well be wondering why<br />

visual hacking hasn’t been higher on the<br />

business security agenda before now. There are<br />

a couple of likely reasons for this.<br />

First, while there has been considerable talk<br />

about mobile security for several years now, in<br />

the case of many organisations, they’ve only<br />

recently focused the spotlight on this area,<br />

while research highlights the fact that plenty of<br />

companies are still lagging behind.<br />

Second, the lack of ‘hard numbers’ around<br />

the scale and type of security breaches is<br />

notoriously difficult. This includes visual<br />

hacking, which is also extremely hard to trace<br />

(there are no viruses, Trojan horses or other<br />

software-based threats to uncover). However, a<br />

couple of recent studies have demonstrated the<br />

speed and ease of a visual hack.<br />

The Public Spaces Survey, conducted earlier<br />

this year, also unearthed the fact that concern<br />

about visual hacking isn’t being matched by<br />

efforts to ensure its prevention. The study,<br />

which was conducted by The Ponemon Institute<br />

on behalf of 3M, involved interviewing business<br />

people working in open spaces such as cafes<br />

and hotel lobbies.<br />

Nine out of ten of those people questioned<br />

said they had caught someone looking at data<br />

on their laptops in public. 77% of them<br />

expressed the view that they were somewhat or<br />

very concerned about visual hacking, with 43%<br />

worried it could lose them their jobs, 23%<br />

concerned about identity theft and 63% having<br />

a gut feeling that visual hacking is a bigger<br />

issue than most of us realise.<br />

Despite this level of concern, more than 50%<br />

of respondents also said that they hadn’t taken<br />

any steps to protect sensitive company<br />

information while working in public spaces.<br />

68<br />

www.risk-uk.com


Cyber Security: Visual Hacking Risk Management<br />

Of course, laptops and other mobile devices<br />

are not just used in public spaces – many of us<br />

access them at the office as well. Indeed, with<br />

the advent of ‘mobile first’ this development is<br />

only going to increase, because that’s the<br />

concept of having one handset that transfers<br />

seamlessly from internal voice and data<br />

networks to cellular networks.<br />

Global Visual Hacking<br />

The potential risk of visual hacking in open plan<br />

offices was highlighted by the Global Visual<br />

Hacking Experiment conducted by The<br />

Ponemon Institute and sponsored by 3M.<br />

Covering eight countries, among them the<br />

UK, the Global Visual Hacking Experiment<br />

involved a total of 157 ‘trials’ encompasing the<br />

offices of a variety of organisations harbouring<br />

from 25 to 100 employees. In all cases,<br />

designated people at the participating<br />

companies were given two days’ notice before<br />

each trial, which involved a White Hat hacker<br />

(complete with a valid and visible security<br />

badge) impersonating a temporary office<br />

worker. The total estimated time for each trial<br />

was two hours.<br />

The trials involved trying to obtain sensitive<br />

or confidential information in several ways:<br />

walking through the office looking for<br />

information left in full view on desks,<br />

monitoring screens and other locations such as<br />

printers and copiers, taking a stack of business<br />

documents labelled ‘Confidential’ from a desk<br />

and putting them in a briefcase and using a<br />

smart phone to take images of confidential<br />

information displayed on computer screens. All<br />

tasks were carried out in full view of other<br />

office workers.<br />

Information obtained was varied and<br />

included personal identification information,<br />

customer and employee details, general<br />

business correspondence, access and log-in<br />

credentials, confidential or classified<br />

documents and attorney-client privileged<br />

documents in addition to financial, accounting<br />

and budgeting information.<br />

While the UK’s results were often better<br />

when compared to other countries, the<br />

numbers are still alarmingly high, with 87% of<br />

visual hacks successful, over half taking place<br />

in 15 minutes or less and 44% of sensitive<br />

information gained by viewing people’s<br />

screens. An average of 3.1 pieces of confidential<br />

or sensitive data were obtained per experiment,<br />

while the visual hacker was only confronted in<br />

39% of attempts.<br />

Globally, where visual security practices were<br />

in place – such as clean desk policies,<br />

workplace monitoring and surveillance,<br />

“Unlike more sophisticated forms of security breaches,<br />

visual hacking doesn’t require any computer expertise.<br />

With mobile devices now incorporating increasingly clever<br />

cameras, it’s becoming simpler to ‘snap’ sensitive details”<br />

bespoke training and awareness programmes<br />

and standardised document shredding<br />

processes – there was an average 26%<br />

reduction in successful visual hacks.<br />

Compared to some types of security<br />

management, visual hacking is relatively easy,<br />

cost-effective and quick to mitigate if the right<br />

processes are implemented, not just on<br />

screens, but also for paper-based information.<br />

To reduce the paper risk, encourage staff to<br />

clear their desks at the end of the day and lock<br />

away any document deemed sensitive or<br />

confidential. Check the Post Room and printer<br />

trays to make absolutely sure documents are<br />

not being left in full view. If not already in<br />

place, instigate the routine shredding of key<br />

documents and discourage any unnecessary<br />

printing and copying of them.<br />

Adopt the mantra of ‘Close It Down’.<br />

Screensavers and log-in prompts after a few<br />

minutes’ inactivity are effective and simple<br />

ways in which to reduce the time a screen is<br />

exposed to prying eyes.<br />

Cultural attitude is important, too. Visual<br />

privacy policies are more likely to be followed if<br />

they’re mandated at the management level and<br />

staff are educated about their personal<br />

responsibility to improve visual privacy.<br />

Employing privacy filters<br />

Make screens hard to view. A very simple step<br />

is to ensure that a given screen’s angled such<br />

that it cannot be viewed, for instance facing a<br />

café wall, rather than in full view of the coffee<br />

counter queue.<br />

Last, but not least, use privacy filters. These<br />

can be easily slipped on and off screens of all<br />

kinds and prevent on-screen data from being<br />

viewable except straight on and at close range.<br />

Someone taking a sideways glance or who may<br />

be several feet behind the screen will witness<br />

only a blank image.<br />

Given that these are all very achievable<br />

preventative steps to take, and that visual<br />

hacking is potentially a very real risk for UK<br />

organisations in this day and age, it makes<br />

perfect sense for companies to include them<br />

within overall security practices.<br />

While visual hacking might only be one of<br />

many tools in the hackers’ current armoury, it’s<br />

also one that can be practically locked down<br />

more easily than others. Worth bearing in mind.<br />

Peter Barker: EMEA Market<br />

Development Manager<br />

(Display Materials and<br />

Systems Division) at 3M<br />

69<br />

www.risk-uk.com


Raising Standards: A Commitment to<br />

Learning in the Security Business Sector<br />

future. Indeed, both are absolutely essential<br />

when it comes to raising standards and quality<br />

across the industry.<br />

As the management<br />

team resident at any<br />

leading business will<br />

readily tell you, a<br />

company’s people are<br />

the key to its success,<br />

both in the here and<br />

now and, indeed, the<br />

future. This is<br />

particularly true of the<br />

security guarding<br />

sector where<br />

harnessing the<br />

‘people factor’ has<br />

been something of a<br />

constant challenge.<br />

Duaine Taylor<br />

searches for a longterm<br />

solution<br />

Motivating and engaging security staff –<br />

and making them feel a valued part of<br />

the host organisation – is absolutely<br />

vital, but in a general environment where their<br />

role and importance is being steadily<br />

undermined by a host of factors, and margins<br />

remain under pressure, it’s beholden upon us<br />

to think more imaginatively about how we<br />

retain and invest in a quality workforce.<br />

There’s not one single reason that has<br />

brought about this situation, but rather a<br />

combination of factors. What’s important,<br />

however, is to instil security officers, clients and<br />

the public at large with greater confidence in<br />

what it is that we do. Part of the answer here<br />

focuses squarely on promoting security<br />

guarding not just as a temporary ‘make do’ job<br />

until something better comes along, but as<br />

more of a career and one with real prospects of<br />

personal and professional development.<br />

Thankfully, there are signs that this shift in<br />

mindset is already starting to take hold.<br />

Employee surveys suggest that there’s now a<br />

renewed enthusiasm for the role of ‘security<br />

officer’, with those working on the front line<br />

having career ambitions that deserve to be<br />

nurtured and developed. We want to retain<br />

these individuals, give them the skills to<br />

progress and, in doing so, shape a better longterm<br />

future for the business sector as a whole.<br />

Let’s be clear. Learning and development for<br />

security officers is – and will continue to be – a<br />

key driver for change both now and in the<br />

Taking back control<br />

Learning and development is an area that has<br />

generated considerable debate. Most<br />

commentators in our sphere are agreed that, to<br />

raise standards, it’s essential to better train the<br />

men and women resident in security teams.<br />

Licensing thanks to the Security Industry<br />

Authority was (and is) part of this quality drive,<br />

but progress has been hampered somewhat by<br />

a number of instances where external training<br />

providers have been shown not to be delivering<br />

the mandatory training required for a licence to<br />

be granted or renewed.<br />

At this point, I should stress that this isn’t<br />

our own experience. Indeed, we’ve worked hard<br />

with our training partners to ensure that all of<br />

our security officers are fully-equipped for the<br />

role for which they’re employed. However, such<br />

episodes have served to knock confidence in<br />

the licensing regime, arguably so to the point of<br />

de-valuing the licence itself.<br />

Perception is a big part of the problem. For<br />

security companies to be truly accountable,<br />

there’s a strong argument for training their<br />

officers in-house. Real quality, it could be said,<br />

is best delivered by maintaining thorough<br />

control of the ‘product’. It was with this very<br />

thought in mind that we set about creating our<br />

own dedicated learning and development<br />

business some 18 months ago.<br />

The culmination of our thinking and analysis<br />

of future needs has led to the opening of The<br />

Axis Academy – a new training business which<br />

sits within the Axis Group. By setting up our<br />

own regulated training operation, we believe<br />

that we’re reducing risk and re-claiming that<br />

‘confidence’ for our employees and customers.<br />

Bespoke learning<br />

The Axis Academy is the cornerstone of the Axis<br />

Group’s broader people strategy. Its<br />

fundamental purpose is to provide the right<br />

learning and development opportunities for<br />

employees of the businesses which form the<br />

Axis Group, including Axis Security (our security<br />

guarding business) and Acuity, which delivers<br />

bespoke and specialist Front of House services.<br />

The key benefit of having our own training<br />

business as part of the Axis Group is that we’re<br />

70<br />

www.risk-uk.com


Training and Career Development<br />

able to tailor our training courses to the specific<br />

needs of the learner, building the course<br />

content within the context of the environment<br />

in which they operate on a daily basis.<br />

Prior to joining the Axis Group, I was a<br />

commercial trainer delivering safety, security<br />

and medical training to individuals working<br />

within the security business sector. I saw firsthand<br />

how the content of these courses had to<br />

be necessarily ‘generic’, because the courses<br />

themselves had to cater for a diverse number of<br />

people employed in an equally diverse range of<br />

roles. While such training is useful up to a<br />

point, it cannot be said to be raising standards<br />

in the truest sense of the phrase.<br />

Our approach is different. We recognise that,<br />

by tailoring each course and including realistic<br />

scenarios and Case Studies that are appropriate<br />

to a specific role, we’re able to make the<br />

learning experience far more engaging.<br />

Delegates are being trained by people who<br />

truly understand what it is they do and the<br />

environments they’re confronted by each day<br />

when on duty. By making the content more<br />

‘relevant’, we will generate better learning<br />

outcomes and, in doing so, raise standards.<br />

Devising new training<br />

It isn’t just in security training that we can<br />

enhance the content. We’ve found that even in<br />

First Aid, fire and other areas of Health and<br />

Safety, we now have a better understanding of<br />

what delegates need to learn.<br />

We’ve also been able to create new training<br />

courses which were not previously available<br />

among the ‘traditional’ learning providers. We<br />

had a particular business need, for example, to<br />

provide special Bedwatch training.<br />

As a regulated provider, we’ve worked with<br />

the NHS and Andy McCormack, an expert and<br />

well-recognised trainer within this field, to<br />

devise our own four-day instruction course. This<br />

course doesn’t simply cover the ‘basics’, but<br />

goes into the detail of mental health awareness<br />

and conflict resolution training, which includes<br />

the common causes of conflict when dealing<br />

with the elderly, people with dementia, delirium<br />

or learning difficulties and the relevant physical<br />

intervention skills that may be required.<br />

We’ve used real historic data to create actual<br />

scenarios and profiles of people our security<br />

officers might encounter in a typical healthcare<br />

environment. This wasn’t about ticking a box.<br />

Rather, it’s about about taking training to a<br />

higher level.<br />

Ongoing training in security is now a key part<br />

of the job. Most security officers request<br />

opportunities to expand their skill sets. Our aim<br />

is to create a true learning culture across the<br />

“Ongoing training in security is now a key part of the job.<br />

Most security officers request opportunities to expand<br />

their skill sets. Our aim is to create a true learning culture”<br />

Axis Group. For Axis Security, this means giving<br />

our employees the right training at the right<br />

time and delivering it in such a way that it’s as<br />

convenient and accessible as possible.<br />

Identifying what learning and development is<br />

required is fundamental to raising standards<br />

and supporting employees. For every new<br />

employee we conduct a training needs analysis<br />

as standard, but it doesn’t stop there.<br />

We have ‘training champions’ who carry out<br />

this analysis and work with the line managers<br />

to identify areas of strength and weakness and<br />

devise a training pathway for each employee.<br />

They also work closely with the operational<br />

management teams to identify and reduce risk<br />

and focus on succession planning.<br />

We’re analysing statistics from accident<br />

reports. They may highlight spikes in assaults<br />

or verbal abuse, for example. If so, we can<br />

encourage our security officers on key sites to<br />

improve their understanding and skills in<br />

conflict management and resolution.<br />

We also take into account the current<br />

terrorism threat level, working with Project<br />

Griffin’s counter-terrorism teams and the<br />

Metropolitan Police Service to deliver further<br />

training where it’s needed (for example, we<br />

conduct dedicated training around vehicle<br />

searches). It’s important to gather insights from<br />

across the business, our customers and<br />

relevant law enforcement agencies in order to<br />

provide the very best learning solutions.<br />

Adopting a blended approach<br />

To make learning and development as<br />

accessible as possible we’re taking a blended<br />

approach, harnessing technology where<br />

appropriate. We ensure that all licence-linked<br />

training, and courses such as First Aid, are<br />

delivered face-to-face to maintain standards.<br />

This is complemented by further e-learning.<br />

We also encourage our security officers to<br />

embark on regular refresher training. Webinars<br />

will also be featuring as they offer a very<br />

convenient form of learning experience when<br />

used for appropriate topics.<br />

There’s a balancing act to be struck with all<br />

training. At one level, it must meet the<br />

contractual requirements of the customer and<br />

the Regulator. At another, training needs to go<br />

beyond the tick-box with a view to developing<br />

individuals and equipping them with the skills<br />

they need to further their careers.<br />

Duaine Taylor: Head of<br />

Learning and Development at<br />

the Axis Group<br />

71<br />

www.risk-uk.com


Risk in Action<br />

Business process<br />

enhanced at Coventry<br />

University courtesy of<br />

Traka’s key input<br />

Coventry University is using<br />

Traka’s state-of-the-art<br />

intelligent key management<br />

solution to add value and<br />

establish a sophisticated<br />

business process for staff<br />

and contractors working<br />

across its multi-site facilities<br />

on a 24/7 basis.<br />

Control over keys and access cards for technicians and contractors alike<br />

ensures that access for vehicles and to sensitive areas (including the<br />

communications server room) is only granted to authorised personnel, as is the<br />

case for roof access, associated PPE equipment and fire and security alarms.<br />

A highly-developed e-mail system created within Traka’s specialist software<br />

presents live reports and instant notifications along with a complete audit trail<br />

capability, including attendance and curfew notifications and even illegal<br />

handover notifications, all of which adds to the accountability of staff,<br />

technicians and contractors.<br />

Nigel Young, building services and contractors manager for the university,<br />

explained to Risk UK: “With over 1,400 different contractors working across our<br />

sites, we needed a system that could help keep track of keys and cards and<br />

enable us to know who’s on what site at any given time. Traka’s solution allows<br />

us to achieve these objectives and more. With the real-time e-mail system we<br />

can monitor usage and instantly keep control of keys and access. From a<br />

management perspective, it also improves our efficiencies and professional<br />

response times. We can use it as a KPI support tool where we have emergency<br />

response requirements within contracts.”<br />

Wayne Kynaston, education market development manager for Traka, added:<br />

“We’re delighted to see the system working so effectively for this university. As<br />

Coventry University’s campus sites grow, we look forward to expanding the<br />

operation and increasing our support still further.”<br />

Anvil announces partnership with<br />

Airbnb designed to safeguard<br />

corporate business travellers<br />

Anvil, the travel and operational risk company,<br />

has connected its Employee Travel Monitoring<br />

System (ETMS) with short-term rental giant<br />

Airbnb. This direct connection will significantly<br />

ease the booking burden and enable<br />

organisations to maintain their Duty of Care<br />

requirements for corporate travellers now<br />

wishing to use Airbnb as a business travel<br />

accommodation provider.<br />

The shared space rental economy is growing<br />

in popularity. Many individuals are now making<br />

use of these short-term rental options outside<br />

of work, but are then restricted to more<br />

traditional options when it comes to bespoke<br />

business travel. The benefits of using such<br />

services are clear: more relaxed and homely<br />

surroundings for the business traveller<br />

combined with reduced costs for the<br />

organisation. It’s therefore becoming a more<br />

appealing option for all concerned.<br />

As corporate travellers continue to search for<br />

a temporary ‘home-away-from-home’ while<br />

they’re on a business trip, their organisations<br />

still need to ensure that they’re able to track,<br />

locate and communicate with them in order to<br />

provide the appropriate levels of Duty of Care.<br />

This latest development at Anvil allows clients<br />

to do exactly that.<br />

Multitone solution chosen by<br />

Canary Wharf Group for effective<br />

communications management in<br />

retail zones<br />

Multitone Electronics plc’s Mall Call<br />

communications system has been chosen by<br />

Canary Wharf Group for its retail facilities. The<br />

flexibility, reliability and security of Mall Call is<br />

perfectly suited to the needs of a large retail<br />

management team.<br />

The scope of communications requirements<br />

at Canary Wharf is vast, from everyday<br />

planning messages (such as for opening times<br />

or maintenance) through to dealing with<br />

shoplifters or even an emergency and<br />

evacuation scenario. Mall Call enables the<br />

estate’s management team to instantly<br />

communicate with the security teams and<br />

retail tenants when required.<br />

Based on Multitone’s powerful i-Message<br />

platform, Mall Call is designed to provide high<br />

levels of communications availability to all<br />

relevant teams, with a tailored interface for<br />

the bespoke requirements of the specific<br />

applications and organisations using it.<br />

Mall Call employs a robust and seamless<br />

touchscreen interface which can be used on<br />

any suitable smart device (including a smart<br />

watch). The whole system is hosted on a<br />

secure fixed and wireless system at Canary<br />

Wharf for full control of communications.<br />

With Phase One of the project underway,<br />

Multitone is working closely with the team at<br />

Canary Wharf Group to investigate potential<br />

ways of expanding the project in the future.<br />

72<br />

www.risk-uk.com


Risk in Action<br />

Chubb secures major contract with<br />

Charnwood Borough Council in bid<br />

to protect the vulnerable<br />

Chubb Fire & Security’s Community Care<br />

business has won a major new service and<br />

maintenance contract to help protect more<br />

than 2,500 elderly and vulnerable residents<br />

on behalf of Charnwood Borough Council in<br />

northern Leicestershire.<br />

The contract requires the maintenance of<br />

third party telecare systems across the<br />

Borough’s assisted living and sheltered<br />

housing accommodation. Systems include<br />

assisted living and carephone solutions with<br />

devices such as pull cords and alarm<br />

pendants. No less than 14 sheltered housing<br />

properties are included in the contract, as<br />

well as more than 1,000 carephones within<br />

the Council’s wider portfolio.<br />

Telecare is the term for offering remote<br />

care of elderly and physically less able<br />

people, providing the care and reassurance<br />

needed to allow them to remain resident in<br />

their own homes. The use of sensors may be<br />

part of a package which can provide support<br />

for people with illnesses such as dementia,<br />

or those at risk of falling.<br />

Most telecare mitigates harm by reacting<br />

to untoward events and raising a help<br />

response quickly. Some telecare solutions,<br />

such as safety confirmation and lifestyle<br />

monitoring, have a preventative function in<br />

that a deterioration in the telecare user’s<br />

well-being can be spotted at an early stage.<br />

In a competitive tender involving six<br />

companies, suppliers had to demonstrate<br />

their expertise and capacity to adhere to<br />

strict Key Performance Indicators regarding<br />

maintenance response times.<br />

Sally Ramalho, principal officer for<br />

supported housing at Charnwood Borough<br />

Council, said: “Chubb has successfully<br />

delivered on everything that was set out in<br />

the tender process. We have regular<br />

meetings where maintenance response<br />

times are openly discussed and any possible<br />

improvements are suggested.”<br />

ESG signs compliance consultancy<br />

agreement with Royal Albert Hall<br />

SOCOTEC company Environmental Services Group<br />

(ESG) – a leading provider of testing, inspection<br />

and compliance services offering comprehensive<br />

solutions for the infrastructure, built environment<br />

and energy and waste sectors – has been selected<br />

to work with the Royal Albert Hall. The new<br />

agreement represents an exciting opportunity for<br />

ESG to demonstrate its extensive capabilities<br />

within such a historic and iconic building.<br />

Since the Royal Albert Hall’s official opening by<br />

Queen Victoria in 1871, the world’s leading artists<br />

from many performance genres have appeared on<br />

its stage and it has become one of the UK’s most<br />

treasured and distinctive buildings. The location of<br />

some of the most notable events in British culture, each year the building hosts<br />

more than 390 shows in the main auditorium, including classical, rock and pop<br />

concerts, ballet, opera, film screenings with live orchestras, sports, award<br />

ceremonies, school and community events, charity performances and<br />

banquets. A further 400 events are held each year in the building’s nonauditorium<br />

spaces.<br />

The agreement with ESG was formed as a result of the company’s proven<br />

technical expertise encompassed by a wide-ranging resource pool of flexible<br />

working staff, as well as an internal IT team that’s able to develop the ESGi<br />

online client portal for convenient access to client reports.<br />

Indeed, ESG can guarantee that the Royal Albert Hall will receive a coordinated<br />

service that has the potential to extend beyond the length and<br />

breadth of the current contract agreement.<br />

Nick Harper, operations director for built environment services at ESG,<br />

informed Risk UK: “We’re very proud to support this prestigious building.”<br />

Advanced fire panels protect<br />

Liberty Stadium in Swansea<br />

The Liberty Stadium, home of Premier<br />

League football club Swansea City and<br />

Guinness Pro14 rugby union side<br />

Ospreys, is being protected by<br />

intelligent fire panels from Advanced.<br />

Opened in 2005, the 20,750-capacity<br />

stadium was the first venue in Wales to<br />

host Premier League football and is the<br />

country’s third largest. Having played<br />

host to international football matches, rugby and high-profile concerts – with<br />

Take That scheduled to appear at the venue on 22 October – it has become one<br />

of the most recognisable stadiums in the UK.<br />

The new Advanced MxPro 5 fire panels were supplied by Discount Fire<br />

Supplies and installed by Kelden Fire and Security, both long-time Advanced<br />

partners. Covering the entire stadium including all public and back of house<br />

areas, the installation is comprised of six MxPro 5 panels linked by faulttolerant<br />

network cards and supplemented by two touchpad display terminals.<br />

Lee Kellaway, director of Kelden Fire and Security, commented: “The system<br />

has been installed in all of the open concourse areas of the stadium which are<br />

regularly used by sports fans, so on that basis it’s hugely important the fire<br />

system is always kept up-to-date.”<br />

MxPro offers customers a choice of two panel ranges, four detector protocols<br />

and a completely open installer network that enjoys free training and support.<br />

Photograph: Alexander Ridler<br />

73<br />

www.risk-uk.com


Technology in Focus<br />

Gallagher Security teams with EyeLynx to add Full-HD VMS<br />

solution for Command Centre integrations<br />

Gallagher Security has extended the range of video management systems<br />

(VMS) which can integrate into its ubiquitous access and control solution.<br />

EyeLynx has now developed a plug-in to integrate its SharpView NVR with the<br />

Gallagher Command Centre.<br />

Specifically, this integration allows security managers operating a Gallagher<br />

Command Centre for site control to view the high-end recording capabilities of<br />

SharpView all in one place.<br />

Security operators can respond swiftly and appropriately to any security<br />

threats through the real-time display of outputs from complementary security<br />

and site management solutions<br />

defined uniquely for their site.<br />

SharpView offers full-resolution<br />

recording and remote monitoring<br />

from an unlimited number of HD<br />

CCTV cameras. It’s in use at highsecurity<br />

water, utilities and<br />

education sites and is praised by the<br />

Metropolitan Police Service.<br />

www.eyelynx.com<br />

OPTEX Europe issues upgraded<br />

version of VX Shield sensor<br />

OPTEX Europe has launched an enhanced<br />

version of its best-selling sensor across<br />

Europe, namely the VX Shield, with a new<br />

housing design and features that make it<br />

even easier to install.<br />

The outdoor intrusion detector, which<br />

provides 12 metre x 90 degree detection<br />

coverage, now includes a rotation lock to<br />

make it easier to open/close the cover.<br />

Sensor adjustment components are also<br />

identified in blue to make it obvious which<br />

parts allow manipulation of the sensor<br />

detection area. This renders the sensor<br />

easier to adjust. A spirit level has also been<br />

incorporated, while an automatic ‘walk test’<br />

mode kick-starts upon closing the cover.<br />

www.optex-europe.com<br />

B-Cam’s Compact camera range<br />

packs power into small frame<br />

B-Cam – a leading supplier of body-worn<br />

security cameras for the military, Government,<br />

police and security solutions providers around<br />

the world – has just unveiled its new Compact<br />

camera as the latest product in the company’s<br />

range of surveillance systems.<br />

The Compact model packs plenty of power<br />

into its 110 mm by 60 mm frame, with over<br />

eight hours of continuous recording and the<br />

ability for end users to record in 480p, 720p<br />

(HD), 1080p (FHD) or 2000p (2K resolution).<br />

Compact cameras are capable of both low-light and infrared recording, and<br />

are supplied with a rear 2” configurable display screen. The units are<br />

waterproof and boast a memory of up to 64 GB.<br />

Impressively, these new cameras weigh just 170g. That’s less than half a<br />

small loaf of bread.<br />

B-Cam is at the forefront of delivering body-worn camera solutions to police<br />

services, operatives in the National Health Service, shopping centres, football<br />

clubs and security-related events globally where high quality audio and video<br />

recordings are captured and used to facilitate evidence management<br />

procedures during criminal and/or anti-social incidents.<br />

Herman Vermaak, managing director of B-Cam, informed Risk UK: “B-Cam is<br />

all about trying to support the people who help to keep us safe and secure. The<br />

B-Cam Compact affords security professionals the surveillance capabilities they<br />

need in a package that will not weigh them down. The Compact camera is a<br />

highly visible visual deterrent to potential trouble-makers.”<br />

With a configurable display screen and different resolution options, the B-<br />

Cam Compact affords end users plenty of operational options.<br />

Vermaak concluded: “The B-Cam Compact may be small, but it’s capable of<br />

powerful things.”<br />

www.b-cam.net<br />

Invixium integrates with Paxton’s<br />

established Net2 Access Control<br />

Paxton has announced the integration of its<br />

networked access control system, Net2, with<br />

Invixium’s biometric software, designated IXM<br />

WEB. The integration allows for real-time<br />

synchronisation between the two applications,<br />

removing the need to enter user data in two<br />

places and dramatically reducing set-up time.<br />

The integration provides customers with the<br />

benefit of expanding their access control offer<br />

with a biometric solution. From installation to<br />

adding new users, the Net2 and IXM WEB<br />

integration has been carefully scripted.<br />

www.paxton.co.uk<br />

74<br />

www.risk-uk.com


Technology in Focus<br />

Ocucon’s surveillance technology<br />

set to “revolutionise” fight against<br />

criminals targeting UK businesses<br />

“Groundbreaking” surveillance technology is<br />

set to “revolutionise” the ability of UK<br />

businesses to defend against fraudulent cases<br />

of slips, trips and falls which are currently<br />

estimated to cost more than £800 million per<br />

annum. The “world’s first” Video Surveillance<br />

as a Service (VSaaS) system – designated<br />

Ocucon – will provide unlimited storage for<br />

unlimited cameras within the cloud.<br />

Launched in the UK in partnership with<br />

Google Cloud, the new technology will remove<br />

physical limitations on the amount of<br />

surveillance footage an organisation can save.<br />

Delivering a cloud-based storage and<br />

retrieval platform, Ocucon combines intelligent<br />

data analytics with the facility to store, analyse<br />

and retrieve video surveillance footage from<br />

within the Ocucon portal.<br />

Ocucon’s co-founder Gary Trotter (pictured)<br />

commented: “Providing organisations with the<br />

flexibility to store uncapped amounts of data<br />

for as long as required will revolutionise the<br />

way in which businesses defend themselves<br />

against wrongful allegations.”<br />

www.ocucon.com<br />

Induction-based mechatronic keys<br />

signal further technological<br />

innovation from LOCKEN<br />

LOCKEN’s permanent quest for innovation has<br />

been an important factor in the company<br />

leading the way for smart digital keys, with<br />

over 150,000 buildings equipped throughout<br />

Europe. Now, the business has taken a further<br />

significant step forwards with a new solution<br />

based on magnetic induction.<br />

Central to this new process, LOCKEN<br />

combines the advantages of a traditional<br />

mechanical lock with a state-of-the-art<br />

electronic solution to offer what it calls “an<br />

unprecedented standard” of reliability.<br />

In this new mechatronic solution, the<br />

information is exchanged between the key and<br />

the cylinder by magnetic induction rather than<br />

an electrical contact. This has two major<br />

benefits. First, it allows for much smoother<br />

Harnessing radar technology<br />

for security surveillance<br />

addressed by 360 Vision<br />

Technology and Navtech Radar<br />

Harbouring a strong emphasis on<br />

technical innovation and design, CCTV<br />

solutions manufacturer 360 Vision<br />

Technology has partnered with Navtech<br />

Radar to create effective surveillance<br />

camera solutions for wide area security<br />

monitoring and intruder detection.<br />

Perfect for many electronic<br />

surveillance applications, radar<br />

technology is often thought to be the<br />

preserve of only airports and ports, but<br />

the advantages of radar can be used<br />

across a wide variety of security<br />

surveillance applications.<br />

Radar operates using the same<br />

principles as echolocation – the same<br />

system that bats and dolphins use to<br />

navigate with – by emitting sounds that<br />

bounce off nearby objects. Based on the<br />

volume of the sounds that return and<br />

the time it takes, systems are able to<br />

produce a map of their environment.<br />

Radar can track multiple objects (up to 40<br />

in the case of 360 Vision Technology’s<br />

Predator Radar ‘all-in-one’ wide area PTZ<br />

camera). Its sophisticated on-board software<br />

will identity target objects and continue to<br />

track them until they leave the monitored<br />

area (or beyond if required). This alerts CCTV<br />

operators to a developing situation and<br />

identifies the location of given objects.<br />

www.360visiontechnology.com<br />

use by opening the lock almost<br />

instantaneously, because the<br />

information is exchanged<br />

between the key and the cylinder<br />

in fewer than 80 milliseconds (ie<br />

the time it takes a regular key to<br />

recognise a mechanical cylinder).<br />

Second, all communication<br />

between the key and the cylinder<br />

is contact-free, so it’s not<br />

disrupted by problems due to rust, wear or the<br />

presence of dust in the cylinder. Consequently,<br />

the reliability of the locks is “unmatched”.<br />

A Bluetooth module means the mechatronic<br />

key communicates with the end user’s smart<br />

phone using the MyLocken App. In this case,<br />

it’s capable of offering centralised control and<br />

case-by-case, real-time access control,<br />

reaching standards of security usually only<br />

available from online access control systems.<br />

www.locken.eu<br />

75<br />

www.risk-uk.com


National Association for<br />

Healthcare Security<br />

Annual Conference and Exhibition<br />

November 9th, Birmingham<br />

PLATINUM SPONSOR B-CAM<br />

Organisers AllSecurityEvents.com<br />

“Protecting the Million”<br />

This year, the National Association for Healthcare<br />

Security Annual Conference moves to Birmingham<br />

at a cool, contemporary venue, minutes from New<br />

Street Station.<br />

The Conference, supported by our Platinum<br />

Sponsor, body-worn camera specialists, B-CAM<br />

will include a leading security speakers and subject<br />

matter experts, including<br />

• Philip Ingram MBE – ex senior British<br />

Intelligence officer, media commentator and<br />

writer<br />

• Tony Porter – the Surveillance Camera<br />

Commissioner<br />

NAHS Awards<br />

#NAHS17 will also feature our new awards,<br />

recognising those who have made a significant<br />

contribution to healthcare security - for details on<br />

how to enter contact hello@allsecurityevents.com<br />

We thank our sponsors and exhibitors for their<br />

support, helping NAHS provide a safe and secure<br />

environment for staff and patients in the healthcare<br />

sector.<br />

Exhibitors include<br />

B-Cam<br />

Carlisle Support<br />

Services<br />

Corps Security<br />

Deister<br />

Gunnebo<br />

Paxton<br />

SkyGuard<br />

Volunteering Values<br />

Book for #NAHS17 here<br />

https://goo.gl/EH9SHM<br />

Media Partners


Appointments<br />

Tim Briggs-Mould<br />

NG Bailey’s IT Services<br />

division has appointed<br />

Ministry of Defence (MoD)<br />

veteran Tim Briggs-Mould<br />

to the position of defence<br />

operations director to<br />

oversee the firm’s existing<br />

defence contracts.<br />

Having served in the<br />

Royal Navy for 37 years, Briggs-Mould joins the<br />

business from the MoD where he has spent the<br />

last five years working as head of the British<br />

Forces’ Cyprus CIS branch and also as head of<br />

information systems and services in Cyprus.<br />

An experienced communications specialist in<br />

the maritime field, Briggs-Mould is well versed<br />

in the delivery and maintenance of IT services<br />

and infrastructure, having overseen the CIS<br />

transformation of Cyprus into what is now a<br />

modern, capable and versatile hub for<br />

operations in the Levant.<br />

“NG Bailey’s IT Services division harbours<br />

over a decade’s worth of specialist experience<br />

in delivering structured cabling contracts to the<br />

defence industry and continues to play a critical<br />

role in the sector’s digital transformation,”<br />

commented Briggs-Mould. “Few IT services<br />

firms can claim to have over 200 engineers<br />

actively supporting current defence contracts.<br />

I’m very excited to be joining a business that’s<br />

so engaged in my specialist sector.”<br />

Briggs-Mould will report directly to Kelly<br />

Tedesco, business development director for IT<br />

Services, who stated: “Digital transformation in<br />

the defence sector remains a key growth area<br />

for us. Providing effective IT services to this<br />

sector requires a depth of knowledge and<br />

awareness that only a defence specialist can<br />

deliver. Tim’s experience will help us to ensure<br />

that we remain at the forefront of this sector.”<br />

Graham Lowe<br />

Life safety solutions manufacturer Hochiki<br />

Europe (UK) has appointed Graham Lowe as<br />

its new managing director. Lowe – who<br />

previously held the position of sales director –<br />

has worked for the business for more than 20<br />

years and, in total, has built up four decades<br />

of experience within the life safety industry.<br />

Lowe’s appointment is announced in the<br />

wake of a successful financial year at Hochiki<br />

Europe, with the business celebrating a record<br />

annual turnover for 2016-2017.<br />

Lowe joined Hochiki Europe in 1996 as<br />

regional sales manager for the Northern<br />

region. Throughout his career, which has been<br />

spent in various roles within the company,<br />

Appointments<br />

Risk UK keeps you up-to-date with all the latest people<br />

moves in the security, fire, IT and Government sectors<br />

Liam Bateman<br />

Evidence Talks, the Milton Keynes-based digital<br />

forensic triage specialist, has made two new<br />

appointments to strengthen the company’s<br />

presence in the digital forensics sector. The<br />

move sees Liam Bateman appointed as principal<br />

forensic consultant and Laura Allen in the role<br />

of sales consultant.<br />

Combining a strong background in IT security<br />

with a specialism in forensic analysis, Bateman<br />

joins from risk management company Advanced<br />

Discovery (previously Millnet). After more than<br />

15 years of investigating computer crime and<br />

performing forensic investigations at the<br />

highest level, Bateman’s outstanding track<br />

record combines successes in the presentation<br />

of evidence in criminal and legal proceedings<br />

and in leading incident response projects, as<br />

well as in finance, sales and technology.<br />

As principal forensic consultant, Bateman will<br />

conduct all of the company’s forensic service<br />

work, drive growth into the eDiscovery market<br />

and lead Evidence Talks through the ISO 17025<br />

process. He’ll also be involved in R&D and help<br />

to create new product technical specifications.<br />

Joining the business as a recent graduate in<br />

Criminology from the University of Leicester,<br />

Laura Allen will assist with the planning and<br />

tactical implementation of sales and marketing<br />

initiatives. While taking a lead in managing the<br />

company’s digital content strategy, Allen will<br />

also be involved in business development and<br />

ongoing initiatives that add value for resellers.<br />

Lowe has developed expertise in all aspects of<br />

the life safety industry – from electrical<br />

engineering and the design of fire detection<br />

systems right through to specific sales and<br />

senior management tasks.<br />

Commenting on his appointment, Lowe<br />

informed Risk UK: “Over the last decade,<br />

Hochiki Europe has continued to lead the way<br />

in the design and manufacture of innovative<br />

life safety solutions. This last year has been an<br />

especially exciting one for the business. We<br />

were able to strengthen our position in the<br />

Italian market with the acquisition of Device<br />

and Electronic Systems (DES srl) and the<br />

creation of Hochiki Italia. We also increased<br />

our presence in Africa by investing in our sales<br />

team presence in the region.”<br />

77<br />

www.risk-uk.com


Appointments<br />

Tom Brookes<br />

Tom Brookes, a senior figure within the fire sector, has<br />

been appointed as the new chairman of the Fire &<br />

Security Association (FSA).<br />

Brookes harbours over 25 years’ experience within the<br />

fire industry, having started work as a fire engineer back<br />

in 1992. He bought Lindum Fire Services in 2002, and has<br />

turned the business into one of the major fire detection<br />

and alarm systems organisations in Lincolnshire.<br />

Brookes’ career has included involvement with a range<br />

of industry bodies. He has served as a Technical Committee member at the<br />

British Standards Institution and as chairman of the British Fire Consortium.<br />

Steve Martin, head of the FSA, commented: “With the fire industry currently<br />

in the spotlight, Tom is the ideal person to ensure the FSA becomes a key<br />

player in ensuring that standards and safety are placed at the forefront of<br />

building development and improvement.”<br />

Speaking about his new role at the FSA, Brookes informed Risk UK: “I’m<br />

delighted to be taking over as chairman of the FSA at what is a very crucial time<br />

for our industry. I aim to use my extensive experience in the fire sector to<br />

ensure that the industry drives through improvements in the safety of both<br />

residential and commercial buildings.”<br />

Gary Harmer<br />

Hikvision UK & Ireland has<br />

appointed security<br />

industry veteran Gary<br />

Harmer as sales director.<br />

Harmer brings with him a<br />

wealth of knowledge and<br />

expertise having held<br />

roles in manufacturing<br />

and engineering and<br />

boasting over 27 years’ experience in the<br />

sphere of security distribution.<br />

In this new role, Harmer is heading up<br />

Hikvision UK & Ireland’s business development<br />

team. Overseeing the day-to-day operations of<br />

the sales function, he’s also working closely<br />

with Hikvision’s authorised distribution<br />

channel, security installers and systems<br />

integrators in addition to key end users.<br />

Commenting on his appointment, Harmer<br />

informed Risk UK: “As the largest security<br />

manufacturer in the world with a vast array of<br />

technologies currently available and many soon<br />

to be released, I’m delighted to be joining<br />

Hikvision’s UK & Ireland team. I’m very excited<br />

at the prospect of working closely with our<br />

distribution and installation partners to deliver<br />

our Best in Class solutions.”<br />

Jason Yang, general manager for Hikvision UK<br />

& Ireland, added: “We’re delighted to welcome<br />

Gary to the Hikvision team and feel that his<br />

knowledge of the UK security industry as well<br />

as his leadership skills will prove invaluable.”<br />

In parallel, Louise Parsons has been<br />

appointed as senior business bevelopment<br />

manager for the South West of England region.<br />

Parsons will report directly to Gary Harmer.<br />

Morgan Vessier<br />

Morgan Vessier has been<br />

appointed as the new<br />

head of risk at BNP<br />

Paribas Leasing Solutions<br />

UK. Within the BNP<br />

Paribas Group, BNP<br />

Paribas Leasing Solutions<br />

specialises in leasing and<br />

rental solutions for<br />

professional equipment, offered either directly<br />

to businesses or through its partners.<br />

Vessier succeeds Mike Quinn, who recently<br />

took over as head of the company’s UK<br />

technology finance division.<br />

Joining the BNP Paribas Group back in 2005,<br />

Vessier has since worked across several key<br />

business units, including BNP Paribas Personal<br />

Finance, where he served as the head of centre<br />

for scoring and the Turkish Economic Bank,<br />

where he acted as director of retail and small<br />

business risk analytics.<br />

“Morgan’s a natural choice for this role,”<br />

stated Jean-Michel Boyer, CEO of BNP Paribas<br />

Leasing Solutions UK. “He brings with him a<br />

huge depth of market knowledge and<br />

experience and, undoubtedly, he will be a<br />

terrific asset to our UK business.”<br />

Rajiv Datta<br />

Colt Technology<br />

Services has appointed<br />

Rajiv Datta as chief<br />

operating officer of the<br />

company, reporting<br />

directly to CEO Carl<br />

Grivner. In this new<br />

expanded role, Datta –<br />

who previously served<br />

as Colt’s CTO – will now bring together Colt’s<br />

operational and technological capabilities,<br />

customer experience strategy and product<br />

and innovation teams under one<br />

organisational framework.<br />

In his 18 months as CTO at Colt, Datta was<br />

responsible for the development of the<br />

company’s network technology strategy and<br />

the creation of its next generation of<br />

products and services, including the<br />

evolution of an SDN-based network.<br />

Datta has also been a key driver of Colt’s<br />

high bandwidth strategy, enabling this<br />

through redesigning, simplifying and<br />

innovating the Colt IQ Network.<br />

Prior to his time with Colt, Datta held a<br />

number of senior positions in the telecoms<br />

and communications infrastructure industry,<br />

including that of chief operating officer at<br />

AboveNet Communications.<br />

78<br />

www.risk-uk.com


“<br />

You have to be here if you want<br />

to be regarded as a key player<br />

in the security market.<br />

“<br />

27,658<br />

visitors from<br />

116 countries<br />

79%<br />

of visitors come to<br />

source new products<br />

£20.7bn<br />

total budget of<br />

visitors to IFSEC 2017<br />

Enquire about exhibiting at IFSEC 2018: ifsec.events/international<br />

Proud to be supported by:


Best Value Security Products from Insight Security<br />

www.insight-security.com Tel: +44 (0)1273 475500<br />

...and<br />

lots<br />

more<br />

Computer<br />

Security<br />

Anti-Climb Paints<br />

& Barriers<br />

Metal Detectors<br />

(inc. Walkthru)<br />

Security, Search<br />

& Safety Mirrors<br />

Security Screws &<br />

Fastenings<br />

Padlocks, Hasps<br />

& Security Chains<br />

Key Safes & Key<br />

Control Products<br />

Traffic Flow &<br />

Management<br />

see our<br />

website<br />

ACCESS CONTROL<br />

KERI SYSTEMS UK LTD<br />

Tel: + 44 (0) 1763 273 243<br />

Fax: + 44 (0) 1763 274 106<br />

Email: sales@kerisystems.co.uk<br />

www.kerisystems.co.uk<br />

ACCESS CONTROL<br />

ACCESS CONTROL<br />

ACT<br />

ACT – Ireland, Unit C1, South City Business Park,<br />

Tallaght, Dublin, D24 PN28.Ireland. Tel: +353 1 960 1100<br />

ACT - United Kingdom, 601 Birchwood One, Dewhurst Road,<br />

Warrington, WA3 7GB. Tel: +44 161 236 9488<br />

sales@act.eu www.act.eu<br />

ACCESS CONTROL – BARRIERS, GATES, CCTV<br />

ABSOLUTE ACCESS<br />

Aberford Road, Leeds, LS15 4EF<br />

Tel: 01132 813511<br />

E: richard.samwell@absoluteaccess.co.uk<br />

www.absoluteaccess.co.uk<br />

Access Control, Automatic Gates, Barriers, Blockers, CCTV<br />

ACCESS CONTROL<br />

COVA SECURITY GATES LTD<br />

Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards<br />

Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68<br />

Tel: 01293 553888 Fax: 01293 611007<br />

Email: sales@covasecuritygates.com<br />

Web: www.covasecuritygates.com<br />

ACCESS CONTROL & DOOR HARDWARE<br />

ALPRO ARCHITECTURAL HARDWARE<br />

Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks,<br />

Waterproof Keypads, Door Closers, Deadlocks plus many more<br />

T: 01202 676262 Fax: 01202 680101<br />

E: info@alpro.co.uk<br />

Web: www.alpro.co.uk<br />

ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />

HTC PARKING AND SECURITY LIMITED<br />

St. James’ Bus. Centre, Wilderspool Causeway,<br />

Warrington Cheshire WA4 6PS<br />

Tel 01925 552740 M: 07969 650 394<br />

info@htcparkingandsecurity.co.uk<br />

www.htcparkingandsecurity.co.uk<br />

ACCESS CONTROL<br />

INTEGRATED DESIGN LIMITED<br />

Integrated Design Limited, Feltham Point,<br />

Air Park Way, Feltham, Middlesex. TW13 7EQ<br />

Tel: +44 (0) 208 890 5550<br />

sales@idl.co.uk<br />

www.fastlane-turnstiles.com<br />

ACCESS CONTROL<br />

SECURE ACCESS TECHNOLOGY LIMITED<br />

Authorised Dealer<br />

Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />

Email: info@secure-access.co.uk<br />

Website: www.secure-access.co.uk<br />

ACCESS CONTROL MANUFACTURER<br />

NORTECH CONTROL SYSTEMS LTD.<br />

Nortech House, William Brown Close<br />

Llantarnam Park, Cwmbran NP44 3AB<br />

Tel: 01633 485533<br />

Email: sales@nortechcontrol.com<br />

www.nortechcontrol.com<br />

Custom Designed Equipment<br />

• Indicator Panels<br />

• Complex Door Interlocking<br />

• Sequence Control<br />

• Door Status Systems<br />

• Panic Alarms<br />

<br />

• Bespoke Products<br />

www.hoyles.com<br />

sales@hoyles.com<br />

Tel: +44 (0)1744 886600<br />

ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES<br />

UKB INTERNATIONAL LTD<br />

Planet Place, Newcastle upon Tyne<br />

Tyne and Wear NE12 6RD<br />

Tel: 0845 643 2122<br />

Email: sales@ukbinternational.com<br />

Web: www.ukbinternational.com<br />

Hoyles are the UK’s leading supplier of<br />

custom designed equipment for the<br />

security and access control industry.<br />

From simple indicator panels to<br />

complex door interlock systems.<br />

BUSINESS CONTINUITY<br />

ACCESS CONTROL, INTRUSION DETECTION AND VIDEO MANAGEMENT<br />

VANDERBILT INTERNATIONAL (UK) LTD<br />

Suite 7, Castlegate Business Park<br />

Caldicot, South Wales NP26 5AD UK<br />

Main: +44 (0) 2036 300 670<br />

email: info.uk@vanderbiltindustries.com<br />

web: www.vanderbiltindustries.com<br />

BUSINESS CONTINUITY MANAGEMENT<br />

CONTINUITY FORUM<br />

Creating Continuity ....... Building Resilience<br />

A not-for-profit organisation providing help and support<br />

Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845<br />

Email: membership@continuityforum.org<br />

Web: www.continuityforum.org<br />

www.insight-security.com Tel: +44 (0)1273 475500


CCTV<br />

CCTV<br />

Rapid Deployment Digital IP High Resolution CCTV<br />

40 hour battery, Solar, Wind Turbine and Thermal Imaging<br />

Wired or wireless communication fixed IP<br />

CE Certified<br />

Modicam Europe, 5 Station Road, Shepreth,<br />

Cambridgeshire SG8 6PZ<br />

www.modicam.com sales@modicameurope.com<br />

CCTV SPECIALISTS<br />

PLETTAC SECURITY LTD<br />

Unit 39 Sir Frank Whittle Business Centre,<br />

Great Central Way, Rugby, Warwickshire CV21 3XH<br />

Tel: 01788 567811 Fax: 01788 544 549<br />

Email: jackie@plettac.co.uk<br />

www.plettac.co.uk<br />

CONTROL ROOM & MONITORING SERVICES<br />

CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS<br />

ALTRON COMMUNICATIONS EQUIPMENT LTD<br />

Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />

Tel: +44 (0) 1269 831431<br />

Email: cctvsales@altron.co.uk<br />

Web: www.altron.co.uk<br />

CCTV<br />

G-TEC<br />

Gtec House, 35-37 Whitton Dene<br />

Hounslow, Middlesex TW3 2JN<br />

Tel: 0208 898 9500<br />

www.gtecsecurity.co.uk<br />

sales@gtecsecurity.co.uk<br />

ADVANCED MONITORING SERVICES<br />

EUROTECH MONITORING SERVICES LTD.<br />

Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring<br />

• Vehicle Tracking • Message Handling<br />

• Help Desk Facilities • Keyholding/Alarm Response<br />

Tel: 0208 889 0475 Fax: 0208 889 6679<br />

E-MAIL eurotech@eurotechmonitoring.net<br />

Web: www.eurotechmonitoring.net<br />

DISTRIBUTORS<br />

CCTV/IP SOLUTIONS<br />

DALLMEIER UK LTD<br />

3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH<br />

Tel: +44 (0) 117 303 9 303<br />

Fax: +44 (0) 117 303 9 302<br />

Email: dallmeieruk@dallmeier.com<br />

SPECIALISTS IN HD CCTV<br />

MaxxOne<br />

Unit A10 Pear Mill, Lower Bredbury, Stockport. SK6 2BP<br />

Tel +44 (0)161 430 3849<br />

www.maxxone.com<br />

sales@onlinesecurityproducts.co.uk<br />

www.onlinesecurityproducts.co.uk<br />

CCTV & IP SECURITY SOLUTIONS<br />

PANASONIC SYSTEM COMMUNICATIONS COMPANY<br />

EUROPE<br />

Panasonic House, Willoughby Road<br />

Bracknell, Berkshire RG12 8FP UK<br />

Tel: 0207 0226530<br />

Email: info@business.panasonic.co.uk<br />

AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />

DISTRIBUTOR OF SECURITY AND LOW VOLTAGE PRODUCTS.<br />

ADI GLOBAL DISTRIBUTION<br />

Distributor of electronic security systems and solutions for over 250 leading manufacturers, the company<br />

also offers an internal technical support team, dedicated field support engineers along with a suite of<br />

training courses and services. ADI also offers a variety of fast, reliable delivery options, including specified<br />

time delivery, next day or collection from any one of 28 branches nationwide. Plus, with an ADI online<br />

account, installers can order up to 7pm for next day delivery.<br />

Tel: 0161 767 2990 Fax: 0161 767 2999 Email: sales.uk@adiglobal.com www.adiglobal.com/uk<br />

COMMUNICATIONS & TRANSMISSION EQUIPMENT<br />

KBC NETWORKS LTD.<br />

Barham Court, Teston, Maidstone, Kent ME18 5BZ<br />

www.kbcnetworks.com<br />

Phone: 01622 618787<br />

Fax: 020 7100 8147<br />

Email: emeasales@kbcnetworks.com<br />

WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS,<br />

PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.<br />

MAYFLEX<br />

Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ<br />

Tel: 0800 881 5199<br />

Email: securitysales@mayflex.com<br />

Web: www.mayflex.com<br />

DIGITAL IP CCTV<br />

SESYS LTD<br />

High resolution ATEX certified cameras, rapid deployment<br />

cameras and fixed IP CCTV surveillance solutions available with<br />

wired or wireless communications.<br />

1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG<br />

Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333<br />

Email: info@sesys.co.uk www.sesys.co.uk<br />

www.insight-security.com Tel: +44 (0)1273 475500


THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESS<br />

CONTROL AND INTRUDER DETECTION SOLUTIONS<br />

NORBAIN SD LTD<br />

210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP<br />

Tel: 0118 912 5000 Fax: 0118 912 5001<br />

www.norbain.com<br />

Email: info@norbain.com<br />

INTEGRATED SECURITY SOLUTIONS<br />

INNER RANGE EUROPE LTD<br />

Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead,<br />

Reading, Berkshire RG74GB, United Kingdom<br />

Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001<br />

Email: ireurope@innerrange.co.uk<br />

www.innerrange.com<br />

UK LEADERS IN BIG BRAND CCTV DISTRIBUTION<br />

SATSECURE<br />

Hikivision & MaxxOne (logos) Authorised Dealer<br />

Unit A10 Pear Mill, Lower Bredbury,<br />

Stockport. SK6 2BP<br />

Tel +44 (0)161 430 3849<br />

www.satsecure.uk<br />

PERIMETER PROTECTION<br />

IDENTIFICATION<br />

ADVANCED PRESENCE DETECTION AND SECURITY LIGHTING SYSTEMS<br />

GJD MANUFACTURING LTD<br />

Unit 2 Birch Business Park, Whittle Lane, Heywood, OL10 2SX<br />

Tel: + 44 (0) 1706 363998<br />

Fax: + 44 (0) 1706 363991<br />

Email: info@gjd.co.uk<br />

www.gjd.co.uk<br />

COMPLETE SOLUTIONS FOR IDENTIFICATION<br />

DATABAC GROUP LIMITED<br />

1 The Ashway Centre, Elm Crescent,<br />

Kingston upon Thames, Surrey KT2 6HH<br />

Tel: +44 (0)20 8546 9826<br />

Fax:+44 (0)20 8547 1026<br />

enquiries@databac.com<br />

INDUSTRY ORGANISATIONS<br />

PERIMETER PROTECTION<br />

GPS PERIMETER SYSTEMS LTD<br />

14 Low Farm Place, Moulton Park<br />

Northampton, NN3 6HY UK<br />

Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />

E-mail: info@gpsperimeter.co.uk<br />

Web site: www.gpsperimeter.co.uk<br />

POWER<br />

TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY<br />

BRITISH SECURITY INDUSTRY ASSOCIATION<br />

Tel: 0845 389 3889<br />

Email: info@bsia.co.uk<br />

Website: www.bsia.co.uk<br />

Twitter: @thebsia<br />

POWER SUPPLIES – DC SWITCH MODE AND AC<br />

DYCON LTD<br />

Unit A, Cwm Cynon Business Park, Mountain Ash, CF45 4ER<br />

Tel: 01443 471900 Fax: 01443 479 374<br />

Email: sales@dyconpower.com<br />

www.dyconpower.com<br />

THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY<br />

SSAIB<br />

7-11 Earsdon Road, West Monkseaton<br />

Whitley Bay, Tyne & Wear<br />

NE25 9SX<br />

Tel: 0191 2963242<br />

Web: www.ssaib.org<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

ADEPT POWER SOLUTIONS LTD<br />

Adept House, 65 South Way, Walworth Business Park<br />

Andover, Hants SP10 5AF<br />

Tel: 01264 351415 Fax: 01264 351217<br />

Web: www.adeptpower.co.uk<br />

E-mail: sales@adeptpower.co.uk<br />

INTEGRATED SECURITY SOLUTIONS<br />

SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />

HONEYWELL SECURITY AND FIRE<br />

Tel: +44 (0) 844 8000 235<br />

E-mail: securitysales@honeywell.com<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

UNINTERRUPTIBLE POWER SUPPLIES LTD<br />

Woodgate, Bartley Wood Business Park<br />

Hook, Hampshire RG27 9XA<br />

Tel: 01256 386700 5152 e-mail:<br />

sales@upspower.co.uk<br />

www.upspower.co.uk<br />

www.insight-security.com Tel: +44 (0)1273 475500


SECURITY<br />

ANTI-CLIMB SOLUTIONS & SECURITY PRODUCT SPECIALISTS<br />

INSIGHT SECURITY<br />

Units 1 & 2 Cliffe Industrial Estate<br />

Lewes, East Sussex BN8 6JL<br />

Tel: 01273 475500<br />

Email:info@insight-security.com<br />

www.insight-security.com<br />

CASH & VALUABLES IN TRANSIT<br />

CONTRACT SECURITY SERVICES LTD<br />

Challenger House, 125 Gunnersbury Lane, London W3 8LH<br />

Tel: 020 8752 0160 Fax: 020 8992 9536<br />

E: info@contractsecurity.co.uk<br />

E: sales@contractsecurity.co.uk<br />

Web: www.contractsecurity.co.uk<br />

QUALITY SECURITY AND SUPPORT SERVICES<br />

CONSTANT SECURITY SERVICES<br />

Cliff Street, Rotherham, South Yorkshire S64 9HU<br />

Tel: 0845 330 4400<br />

Email: contact@constant-services.com<br />

www.constant-services.com<br />

ONLINE SECURITY SUPERMARKET<br />

EBUYELECTRICAL.COM<br />

Lincoln House,<br />

Malcolm Street<br />

Derby DE23 8LT<br />

Tel: 0871 208 1187<br />

www.ebuyelectrical.com<br />

LIFE SAFETY EQUIPMENT<br />

C-TEC<br />

Challenge Way, Martland Park,<br />

Wigan WN5 OLD United Kingdom<br />

Tel: +44 (0) 1942 322744<br />

Fax: +44 (0) 1942 829867<br />

Website: www.c-tec.com<br />

PERIMETER SECURITY<br />

TAKEX EUROPE LTD<br />

Aviary Court, Wade Road, Basingstoke<br />

Hampshire RG24 8PE<br />

Tel: +44 (0) 1256 475555<br />

Fax: +44 (0) 1256 466268<br />

Email: sales@takex.com<br />

Web: www.takex.com<br />

FENCING SPECIALISTS<br />

J B CORRIE & CO LTD<br />

Frenchmans Road<br />

Petersfield, Hampshire GU32 3AP<br />

Tel: 01730 237100<br />

Fax: 01730 264915<br />

email: fencing@jbcorrie.co.uk<br />

INTRUSION DETECTION AND PERIMETER PROTECTION<br />

OPTEX (EUROPE) LTD<br />

Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre<br />

optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B<br />

Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ<br />

Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311<br />

Email: sales@optex-europe.com<br />

www.optex-europe.com<br />

SECURITY EQUIPMENT<br />

PYRONIX LIMITED<br />

Secure House, Braithwell Way, Hellaby,<br />

Rotherham, South Yorkshire, S66 8QY.<br />

Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042<br />

www.facebook.com/Pyronix<br />

www.linkedin.com/company/pyronix www.twitter.com/pyronix<br />

SECURITY SYSTEMS<br />

BOSCH SECURITY SYSTEMS LTD<br />

PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />

Tel: 0330 1239979<br />

E-mail: uk.securitysystems@bosch.com<br />

Web: uk.boschsecurity.com<br />

INTRUDER AND FIRE PRODUCTS<br />

CQR SECURITY<br />

125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />

Tel: 0151 606 1000<br />

Fax: 0151 606 1122<br />

Email: andyw@cqr.co.uk<br />

www.cqr.co.uk<br />

SECURITY EQUIPMENT<br />

CASTLE<br />

Secure House, Braithwell Way, Hellaby,<br />

Rotherham, South Yorkshire, S66 8QY<br />

TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042<br />

www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity<br />

www.twitter.com/castlesecurity<br />

SECURE CONNECTIVITY PROVIDERS<br />

CSL<br />

T: +44 (0)1895 474 474<br />

sales@csldual.com<br />

@CSLDualCom<br />

www.csldual.com<br />

SECURITY PRODUCTS<br />

EATON<br />

Eaton is one of the world’s leading manufacturers of security equipment<br />

its Scantronic and Menvier product lines are suitable for all types of<br />

commercial and residential installations.<br />

Tel: 01594 545 400 Email: securitysales@eaton.com<br />

Web: www.uk.eaton.com Twitter: @securityTP<br />

INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS<br />

RISCO GROUP<br />

Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton,<br />

Manchester, M24 2SS<br />

Tel: 0161 655 5500 Fax: 0161 655 5501<br />

Email: sales@riscogroup.co.uk<br />

Web: www.riscogroup.com/uk<br />

SECURITY SYSTEMS<br />

VICON INDUSTRIES LTD.<br />

Brunel Way, Fareham<br />

Hampshire, PO15 5TX<br />

United Kingdom<br />

www.vicon.com<br />

www.insight-security.com Tel: +44 (0)1273 475500

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!