RiskXtraSeptember2019
x www.riskxtra.com RISKXtra Security and Risk Management September 2019 Acting on Word of Mouth The Role of Voice Biometrics in Secure Authentication > Business Continuity: Losing The Working Environment Access Control: System Solutions for Corporate Offices Cyber Security: From Firewalls to Fine Grain Permissions Fire Safety Management and Installation Supplement
- Page 2 and 3: Inner Range’s Integriti High Secu
- Page 5 and 6: x RISKXtra Editorial Safety First B
- Page 7 and 8: News Update Blackout Report focuses
- Page 9 and 10: News Analysis: ‘Five Eyes’ Secu
- Page 11 and 12: Opinion: Security’s Role in the B
- Page 13 and 14: Opinion: Security Management If you
- Page 15 and 16: BSIA Briefing property security pro
- Page 17 and 18: Business Continuity: Workplace Solu
- Page 19 and 20: Biometric Security other end of the
- Page 21 and 22: FIRE SAFETY Management & Installati
- Page 23 and 24: system and category of fire protect
- Page 25 and 26: Evacuate everyone EN54-23 Approved
- Page 27 and 28: UPGRADE TO VOICE WITH Fire-Cryer Vo
- Page 29 and 30: FIRE SAFETY Kentec systems help to
- Page 31 and 32: Advertisement Feature: HVM Innovati
- Page 33 and 34: x RISKXtra Access Control: Corporat
- Page 35 and 36: BENCHMARK Smart Solutions BENCHMARK
- Page 37 and 38: Access Control: Emergency Exits and
- Page 39 and 40: BE SMART! Read Risk Xtra Magazine o
- Page 41 and 42: Real-Time Analysis SECURITAS INTELL
- Page 43 and 44: Meet The Security Company: Apleona
- Page 45 and 46: for a safer world 0115 714 9990 CAL
- Page 47 and 48: In the Spotlight: ASIS Internationa
- Page 49 and 50: FIA Technical Briefing: Fire Exting
- Page 51 and 52: Security Services: Best Practice Ca
x<br />
www.riskxtra.com<br />
RISKXtra<br />
Security and Risk Management September 2019<br />
Acting on Word of Mouth<br />
The Role of Voice Biometrics in Secure Authentication<br />
><br />
Business Continuity: Losing The Working Environment<br />
Access Control: System Solutions for Corporate Offices<br />
Cyber Security: From Firewalls to Fine Grain Permissions<br />
Fire Safety Management and Installation Supplement
Inner Range’s Integriti<br />
High Security System is<br />
a complete Hardware/<br />
Software solution designed<br />
specifically for High Security<br />
installations.<br />
Our range includes:<br />
All Software<br />
Hardware Controllers<br />
End of Line Modules<br />
Power Supplies<br />
Keypads<br />
Enclosures<br />
Communications Devices<br />
Access Control Readers<br />
Credentials<br />
WHY TAKE CHANCES?<br />
FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />
T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.com
x<br />
RISKXtra<br />
September 2019<br />
Contents<br />
38 The Changing Face of Security Services<br />
Risk Xtra’s quarterly Security Guarding Supplement features<br />
contributions from both Securitas UK and CIS Security<br />
Best Practice Casebook (pp50-51)<br />
5 Editorial Comment<br />
6 News Update<br />
G4S half-year results, Mitie Security on acquisition trail, Riello<br />
UPS issues Blackout Report, Government on telecoms security<br />
8 News Analysis: ‘Five Eyes’ Security Summit<br />
Senior ministers from the UK, Australia, Canada, New Zealand<br />
and the US reaffirm their commitment to work with industry on<br />
tackling a wide range of security threats. Brian Sims reports<br />
10 Opinion: Security and the Brexit Process<br />
Could the use of cutting-edge security technology provide a<br />
solution that avoids a hard border between Northern Ireland and<br />
the Republic? Alistair Enser considers the issues involved<br />
12 Opinion: Evolution of the Security Manager<br />
Security managers always need to stay one step ahead of the<br />
threats posed by criminals and rogue employees on a daily<br />
basis. Angus Darroch-Warren shows them how<br />
14 BSIA Briefing<br />
Security measures to prevent petty crime must never be<br />
neglected, as Gideon Reichental duly observes<br />
16 Losing The Working Environment<br />
What does “losing the workplace” mean for a business, and<br />
what’s the best thing to do about it? Dr Sandra Bell investigates<br />
42 Meet The Security Company<br />
In association with the NSI, Risk Xtra continues its regular ‘Meet<br />
The Security Company’ series by highlighting the thoughtprovoking<br />
views of Apleona HSG Facility Management UK<br />
46 In The Spotlight: ASIS International UK Chapter<br />
Rachelle Loyear, Mike Hurst, Michael Gips, Tim McCreight and<br />
Tim Wenzel promote the adoption of the Enterprise Security Risk<br />
Management approach<br />
48 FIA Technical Briefing<br />
The use of incorrectly rated pipe and fittings on fixed gaseous<br />
fire extinguishing systems can lead to failure on discharge. Clark<br />
Priestley examines the overriding need for correct specification<br />
50 Security Services: Best Practice Casebook<br />
Be prepared and plan for the worst. That’s the maxim for<br />
managing communications in a crisis. With too little preparation,<br />
asserts Patrick Rea, the business may be forced to guess<br />
solutions when placed under intense pressure<br />
52 Cyber-Physical Security: Working in Unison<br />
Cyber crime is now so prevalent that guarding against it should<br />
be part of standard ‘business as usual’ company procedures.<br />
Tim Northwood outlines why organisations need systems in<br />
place that offer robust cyber and physical security in tandem<br />
54 Risk in Action<br />
55 Technology in Focus<br />
57 Appointments<br />
All the latest people moves in the security business sector<br />
18 Acting on Word of Mouth<br />
Piergiorgio Vittori states that weak passwords will soon be<br />
replaced by a far more secure authentication method: our voice<br />
21 Fire Safety Management and Installation<br />
The FIA, Klaxon, Vimpex and Kentec all feature in our regular<br />
Fire Safety Management and Installation Supplement<br />
33 In Full Control of Access<br />
Stephen Littlewood reviews the different access control system<br />
options available for today’s corporate office buildings<br />
36 Facilitating Means of Escape<br />
The provision of a clear and straightforward means of escape is<br />
absolutely vital for life safety. Liam Hunt elicits the fine detail<br />
59 The Risk Xtra Directory<br />
ISSN 1740-3480<br />
Risk Xtra is published quarterly by Pro-Activ Publications<br />
Ltd and specifically aimed at security and risk<br />
management, loss prevention, business continuity and<br />
fire safety professionals operating within the UK’s largest<br />
commercial organisations<br />
© Pro-Activ Publications Ltd 2019<br />
All rights reserved. No part of this publication may be<br />
reproduced or transmitted in any form or by any means<br />
electronic or mechanical (including photocopying, recording<br />
or any information storage and retrieval system) without the<br />
prior written permission of the publisher<br />
The views expressed in Risk Xtra are not necessarily those of<br />
the publisher<br />
Risk Xtra is currently available for an annual subscription rate<br />
(UK only). Telephone 0208 295 8307 for more details<br />
www.riskxtra.com<br />
Risk Xtra<br />
PO Box 332<br />
Dartford DA1 9FF<br />
Editor Brian Sims BA (Hons) Hon FSyI<br />
Tel: 0208 295 8304 Mob: 07500 606013<br />
e-mail: brian.sims@risk-uk.com<br />
Design and Production Matt Jarvis<br />
Tel: 0208 295 8310 Fax: 0870 429 2015<br />
e-mail: matt.jarvis@proactivpubs.co.uk<br />
Advertisement Director Paul Amura<br />
Tel: 0208 295 8307 Fax: 01322 292295<br />
e-mail: paul.amura@proactivpubs.co.uk<br />
Administration Tracey Beale<br />
Tel: 0208 295 8306 Fax: 01322 292295<br />
e-mail: tracey.beale@proactivpubs.co.uk<br />
Managing Director Mark Quittenton<br />
Chairman Larry O’Leary<br />
Editorial: 0208 295 8304<br />
Advertising: 0208 295 8307<br />
3<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Editorial<br />
Safety First<br />
BAFE has welcomed the publication of ‘Raising The Bar’, the<br />
interim report issued by the Working Groups established<br />
after the Hackitt Review following the Grenfell Tower fire.<br />
BAFE has contributed significantly to a number of the Working<br />
Groups and also supported the Fire Sector Federation with the<br />
deliberations of the Competence Steering Group (CSG).<br />
As outlined in the document, the need for competence and<br />
third party certification of contractors working on fire protection<br />
is an absolute priority. Commendably, BAFE will be working<br />
diligently with all relevant parties to ensure that statutory bodies<br />
develop their requirements to bring about “a significant change”<br />
in the culture of specification and procurement that “properly<br />
reflects the need” for competent providers.<br />
A radical and wide-ranging set of measures to improve the<br />
competence of those who design, construct, inspect, maintain<br />
and operate higher risk residential buildings (HRRBs) and make<br />
them safer for the public has indeed been set out by the CSG,<br />
the cross-industries group backed by Government, the Industry<br />
Safety Steering Group and Dame Judith Hackitt.<br />
The Steering Group has brought together more than 150<br />
institutions and associations across the full spectrum of<br />
construction, the built environment, fire safety and building<br />
owner/manager sectors to work towards the common purpose of<br />
raising competences and improving life safety.<br />
Within the pages of its interim report, the CSG is urging all life<br />
safety-critical disciplines working on HRRBs (including<br />
designers, engineers, building standards officers, site<br />
supervisors, fire safety enforcement officers and fire risk<br />
officials) to adopt the measures outlined.<br />
By way of example, ‘Raising The Bar’ requests a new oversight<br />
body – the Building Safety Competence Committee – to monitor<br />
assessment processes, draw up a central register of duty holders<br />
eligible to work on HRRBs and drive improvements across the<br />
sector. It goes on to suggest that all organisations carrying out<br />
the assessments and reassessments of an individual’s<br />
competence should themselves be subject to a rigorous system<br />
of oversight by a body such as UKAS or the Engineering Council.<br />
The CSG is calling on central Government to play its part by<br />
requiring that any company or individual working on a central<br />
Government construction project – including those focused on<br />
retrofits for existing HRRBs – must meet the competence<br />
frameworks set out within this report. Local authorities and the<br />
wider public and private sectors are being urged to follow suit.<br />
In launching the interim report, Graham Watts (CEO of the<br />
Construction Industry Council and the CSG’s chairman) stated:<br />
“It’s clear that industry organisations have accepted the need for<br />
change. The Working Groups are proposing to raise the bar<br />
through a more rigorous approach, including training,<br />
assessment, reassessment and third party accreditation.”<br />
The CSG feels its proposals will realise “a paradigm change”<br />
that improves competence and industry culture. It’s high time the<br />
fragmented approach to competence was banished forever.<br />
Brian Sims BA (Hons) Hon FSyI<br />
Editor<br />
5<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
4.7% revenue increase posted by<br />
G4S in 2019 half-year financials<br />
G4S has announced its financial results for the<br />
six-month period that ended on 30 June 2019.<br />
Secure Solutions revenues are up by 4.9% and<br />
those for Cash Solutions by 3.9%. The PBITA<br />
margin sits at 6.2% (2018: 6.4%). The positive<br />
impact of growth has been offset by new oneoff<br />
contract mobilisation costs (£4 million in<br />
2019) and also a one-off bullion contract profit<br />
in 2018 of £8 million.<br />
There’s an operating cash flow conversion of<br />
88% (2018: 109%) with the expectation of a fullyear<br />
conversion above 100%. Net debt to<br />
EBITDA is 2.85x (30 June 2018: 2.73x). Interim<br />
dividend is set at 3.59 pence per share (the<br />
exact same figure as per this time last year).<br />
Statutory earnings of £59 million (2018: £101<br />
million) include businesses sold, onerous<br />
contracts and exchange rate movements, £36<br />
million restructuring and separation costs and<br />
£35 million goodwill impairment relating to<br />
Brazilian businesses acquired in 2012.<br />
G4S CEO Ashley Almanza commented: “In the<br />
first half of this year, our improving sales<br />
performance in both Secure Solutions and Cash<br />
Solutions saw the Group deliver underlying<br />
revenue growth of 4.7%. This growth, together<br />
with new contract wins, supports our mediumterm<br />
revenue goal of 4% to 6% per annum.”<br />
Almanza (pictured) added: “Our revenue mix<br />
continued to improve as our technologyenabled<br />
revenues in Secure Solutions grew by<br />
14.8% across the globe and our North American<br />
cash technology revenues grew by 33%. The<br />
Group’s half-year performance, sales pipeline,<br />
revenue momentum and productivity<br />
programmes support a positive outlook.”<br />
On a structural note, Almanza stated: “Our<br />
separation review is now complete and the<br />
Board has approved the separation of Cash<br />
Solutions from the Group. As a result, we’ve set<br />
in motion plans for the de-merger of Cash<br />
Solutions in H1 2020. We believe that this will<br />
create two strong and focused businesses each<br />
with the clear potential to capitalise on marketleading<br />
positions and unlock substantial value<br />
for customers, shareholders and employees.”<br />
G4S has received a number of unsolicited<br />
expressions of interest from third parties to<br />
acquire all or parts of the Cash Solutions<br />
business. The company has actively engaged<br />
with these parties and the Board will continue<br />
to evaluate proposals for all or parts of the<br />
business alongside the implementation of the<br />
aforementioned de-merger plans. No assurance<br />
can be provided at this stage that any third<br />
party proposals will lead to a transaction.<br />
Mitie Security acquires tech specialist Global Aware International Group<br />
Mitie Security has acquired the Global Aware International Group (GAIG), the provider of niche<br />
intelligent software and security solutions, for an undisclosed sum. This move further accelerates<br />
the growth of Mitie’s premium technology-enabled and intelligence-led security solutions offer and<br />
bolsters its credentials in providing truly connected security services.<br />
GAIG’s solutions are specifically designed to support the management of building security across<br />
client estates and are now the products of choice in some of the world’s most iconic high-rise<br />
commercial structures. Mitie Security already has a long-standing partnership with the GAIG, which<br />
currently provides bespoke technology solutions to a number of Mitie’s major retail security clients.<br />
The cloud-based technology solutions designed by GAIG allow clients to manage, communicate<br />
and audit security activity across their estates online via desktops or hand-held devices. This<br />
includes everything from managing routine tasks through to dynamically creating tasks based on<br />
incidents or situation changes. The technology enables the assignment of tasks to individual users<br />
ensuring actions are completed within defined timescales or escalated to a supervisor if necessary.<br />
The technology can be used to guide companies through the management of major incidents,<br />
providing business continuity support without having to refer to operational procedures when time<br />
is critical. Key information is captured and shared with appropriate parties on a secure basis.<br />
The deal means that GAIG’s founder and CEO, David Evans, will now join Mitie Security and take a<br />
seat on its senior leadership team, bringing valuable expertise in security technology development<br />
to the fore. All GAIG staff will join the Mitie Security team.<br />
Evans commented: “The Global Aware International Group team is excited that this acquisition<br />
will further enhance our joint technical solution for clients across Mitie’s portfolio.”<br />
Jason Towse, managing director at Mitie Security, said: “Adding GAIG to the Mitie portfolio is the<br />
next evolution in providing our customers with the best tech-enabled and intelligence-led security.”<br />
6<br />
News Update<br />
Blackout Report focuses on<br />
potential fall-out from electricity<br />
grid failure in UK<br />
Uninterruptible power supply solutions<br />
manufacturer Riello UPS has launched a major<br />
new publication exploring the likelihood of a<br />
nationwide electricity grid failure in the UK.<br />
Only recently, a massive power failure across<br />
virtually all of Argentina, Paraguay and<br />
Uruguay left nearly 50 million people without<br />
electricity. The results of Riello UPS’ new<br />
investigation, entitled ‘The Blackout Report’,<br />
reveal official Government risk assessments<br />
state there’s just a one-in-200 chance of the<br />
UK power grid experiencing a similar complete<br />
shutdown in the next five years.<br />
The comprehensive report explores the most<br />
likely causes of such an incident, from the<br />
increased threat of extreme weather (including<br />
flooding or gales knocking out the network<br />
infrastructure) through to terrorism, industrial<br />
accidents and geomagnetic space weather<br />
storms that play havoc with satellite systems.<br />
The document also asks whether the shift<br />
towards ‘smart’ energy grids heightens our<br />
vulnerability to cyber attacks similar to when<br />
Russian hackers shut down 30 substations in<br />
the Ukraine in December 2015, subsequently<br />
leaving no less than 250,000 individuals<br />
without their electricity supply.<br />
State-sponsored hackers (believed to be the<br />
Russian-based Dragonfly Group) are said to<br />
have infiltrated the UK grid on 8 June 2017 –<br />
the day of the General Election – while there<br />
are growing fears of an escalating ‘Cyber Cold<br />
War’ where countries insert high-grade<br />
malware inside energy networks that could be<br />
used to turn off entire electricity supplies at a<br />
moment’s notice.<br />
The Riello UPS report goes on to examine<br />
the process for ‘re-booting’ the electricity<br />
network if a complete system failure ever<br />
occurs. Known as a ‘Black Start’, worse-case<br />
contingency planning is that it could take<br />
anything up to five-to-seven days for power to<br />
be fully restored.<br />
Such an incident is highly likely to be<br />
accompanied by Rota Disconnections, which<br />
basically ration power by cutting off electricity<br />
for blocks of three hours at a time. This was<br />
last seen on a widespread basis in the UK<br />
back in the 1970s, and notably so during the<br />
infamous “Three-Day Week”.<br />
The Blackout Report also investigates the<br />
catastrophic consequences of a world without<br />
power: mobile phone coverage lost within a<br />
couple of hours, transport systems grinding to<br />
a halt, hospitals and care homes overwhelmed<br />
as electrical devices cease working and<br />
businesses crippled as electronic payment<br />
systems go offline.<br />
Government makes plans to<br />
safeguard future security of UK’s<br />
telecoms sector<br />
The Government has set out plans to improve<br />
security standards and practices across the<br />
UK’s telecoms sector, including in new 5G and<br />
full-fibre broadband networks. The<br />
Government’s proposals include new<br />
legislation to enforce stronger security<br />
requirements in the telecoms sector and<br />
protect the UK from threats.<br />
The Telecoms Supply Chain Review outlines<br />
the Government’s ambition to create a<br />
sustainable and diverse telecoms supply chain<br />
that safeguards the UK’s national security<br />
interests and builds on existing capabilities.<br />
At the Supply Chain Review’s foundation will<br />
be a series of new telecoms security<br />
requirements. Overseen by Ofcom and central<br />
Government, the telecoms operators will need<br />
to design and manage their networks to meet<br />
the new standards. They’ll also be subject to<br />
strict oversight as part of their procurement<br />
and contract management processes.<br />
Operators will need to work more closely<br />
with suppliers to ensure there’s proper<br />
assurance testing for equipment and systems.<br />
The Government has stated: “The UK’s<br />
telecoms sector must prioritise secure and<br />
safe networks for consumers and business.<br />
With the growth of our digital sector and<br />
transformative new services over 5G and fullfibre<br />
broadband in the coming years, this isn’t<br />
something where compromise is an option.<br />
People expect the telecoms sector to be a<br />
beacon of safety and this review will make<br />
sure that safety and security is at the forefront<br />
of future networks.”<br />
In response to the Telecoms Supply Chain<br />
Review’s findings, the Government will<br />
establish a new, robust security framework for<br />
the UK telecoms sector marking a significant<br />
shift from the current model. This new<br />
framework will ensure operators build and<br />
operate secure and resilient networks and<br />
manage their supply chains accordingly. They<br />
will have to assess the risks posed by vendors<br />
to network security and resilience and also<br />
ensure they manage those risks appropriately.<br />
The Telecoms Supply Chain Review has also<br />
identified a lack of diversity in the supply<br />
chain and suggests that regulations enforcing<br />
telecoms cyber security be tightened. The<br />
Government will now develop legislation and<br />
seek to provide Ofcom with stronger powers.<br />
7<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
‘Five Eyes’ Security Summit concludes with<br />
firm pledges to tackle emerging threats<br />
Photograph: Harry Metcalfe<br />
Tech companies<br />
should prioritise the<br />
protection of their<br />
users and the wider<br />
public when designing<br />
services, the UK and<br />
international security<br />
partners have warned.<br />
Senior ministers from<br />
the UK, Australia,<br />
Canada, New Zealand<br />
and the United States<br />
have reaffirmed their<br />
commitment to work<br />
together with industry<br />
to tackle a wide range<br />
of security threats.<br />
Brian Sims reports<br />
The commitment follows a two-day Security<br />
Summit, known as the Five Country<br />
Ministerial, where home affairs, interior<br />
security and immigration ministers of the ‘Five<br />
Eyes’ countries discussed current and emerging<br />
threats which could undermine national and<br />
global security. This important partnership and<br />
these issues will remain a focus for the UK now<br />
and into the post-Brexit period.<br />
During a round table discussion involving<br />
tech firms, ministers stressed that law<br />
enforcement agencies’ efforts to investigate<br />
and prosecute the most serious crimes would<br />
be hampered if the industry carries out plans to<br />
implement end-to-end encryption without the<br />
necessary safeguards. They added that<br />
encrypted services could serve to mask the full<br />
scale of harms on the Internet and put<br />
vulnerable users at risk.<br />
Home Secretary Priti Patel (pictured, right)<br />
said: “The ‘Five Eyes’ are united that tech firms<br />
should not develop their systems and services,<br />
including end-to-end encryption, in ways that<br />
empower criminals or put vulnerable people at<br />
risk. As Governments, protecting our citizens is<br />
our top priority. This is why, through the unique<br />
and binding partnership of ‘Five Eyes’, we will<br />
tackle the emerging threats together.”<br />
Also speaking at the conclusion of the twoday<br />
Security Summit, United States Attorney<br />
General William Barr stated: “The ‘Five Eyes’<br />
partnership is vital. Throughout this week, we<br />
have had substantive, frank and positive<br />
discussions surrounding our shared duty to<br />
protect public safety. Encryption presents a<br />
unique challenge. We must ensure that we<br />
don’t stand by as advances in technology create<br />
spaces where criminal activity of the most<br />
heinous kind can go undetected and<br />
unpunished. Indeed, making our virtual world<br />
more secure should not come at the expense of<br />
making us more vulnerable in the real world.<br />
We’re extremely grateful for the leadership of<br />
Home Secretary Priti Patel in facilitating these<br />
critical discussions and helping to foster a<br />
shared commitment to safety for all.”<br />
Set of voluntary principles<br />
Industry agreed to collaborate with the ‘Five<br />
Eyes’ Governments on a set of voluntary<br />
principles, to be drawn up by the end of<br />
September, on steps they will take to combat<br />
child sexual exploitation and abuse, including<br />
the growing threat of live-streaming.<br />
The theme of this year’s meeting was<br />
‘emerging threats’, with ministers also turning<br />
their attentions towards common risks posed<br />
by new technologies, including connected<br />
devices, the terrorist use of the Internet and<br />
foreign terrorist fighters.<br />
The following commitments were agreed by<br />
those ministers present at the talks:<br />
• to continue to develop and share learning on<br />
cyber threats to improve the collective response<br />
• the importance that supply chains in the 5G<br />
network should be trusted and reliable to<br />
protect it from unauthorised access or<br />
interference<br />
• to create a stronger approach to the misuse<br />
of drones, with the UK hosting an event next<br />
year to enhance co-operation<br />
• to explore enhancing cross-border<br />
information sharing<br />
• to maintain efforts designed to combat<br />
foreign interference in elections, the economy<br />
and academia<br />
The Quintet of Attorneys General from the<br />
‘Five Eyes’ countries also joined the Five<br />
Country Ministerial for meetings on online<br />
harms, encryption and foreign terrorist fighters.<br />
Attorneys General from the UK, the USA,<br />
Canada, Australia and New Zealand are also<br />
discussing a range of shared issues including<br />
cyber crime, hostile state activity and social<br />
media and data privacy issues.<br />
The next Five Country Ministerial will be<br />
hosted in 2020 by New Zealand.<br />
8<br />
News Analysis: ‘Five Eyes’ Security Summit 2019<br />
Threat level system<br />
Changes to the terrorism threat level system<br />
came into effect on Tuesday 23 July. The<br />
changes, which follow an extensive review into<br />
the country’s approach towards dealing with<br />
counter-terrorism following the attacks in 2017,<br />
mean that the system will now directly reflect<br />
the threat posed by all forms of terrorism,<br />
irrespective of ideology.<br />
There will now be a single national threat<br />
level describing the threat to the UK. The threat<br />
from Northern Ireland-related terrorism in<br />
Northern Ireland will remain separate. This<br />
means that, for the first time, the threat from<br />
extreme right-wing and left-wing terrorism will<br />
be reflected in the published threat level.<br />
In his last act as Home Secretary before<br />
being replaced in the role by Priti Patel as part<br />
of new Prime Minister Boris Johnson’s inaugural<br />
Conservative Cabinet, Sajid Javid said: “Our<br />
approach to stopping terrorists is the same,<br />
regardless of the twisted ideology that<br />
motivates them. While the Islamist threat<br />
remains, we’ve recently seen an increase in<br />
terrorist activity motivated by the extreme rightwing.<br />
It’s therefore important the public is<br />
properly informed about the threats we face,<br />
which is why we’re making these changes.”<br />
Until this move from the Conservatives, the<br />
threat level system described the threat from<br />
‘international terrorism’, which has become<br />
largely synonymous with Islamist terrorism.<br />
However, this approach is now outdated as<br />
Islamist terrorism can be home-grown, just as<br />
extreme right-wing terrorism can have an<br />
international dimension.<br />
The changes come after the joint police and<br />
MI5 Operational Improvement Review which<br />
followed the 2017 attacks. Based on<br />
recommendations made in that review, the Joint<br />
Terrorism Analysis Centre (JTAC) began<br />
assessing the threat from all forms of terrorism<br />
in November last year. Now, the published<br />
threat level will reflect JTAC’s assessment.<br />
At present, the level of threat posed hasn’t<br />
changed from SEVERE, meaning that an attack<br />
on the UK mainland is highly likely. JTAC sets<br />
the threat level independently of the<br />
Conservative Government.<br />
Terrorism threat levels give a broad indication<br />
of the likelihood of an attack. They’re an<br />
important tool for security practitioners and the<br />
police to determine what protective security is<br />
necessary. They also keep members of the<br />
general public informed of the threat the<br />
country faces at any given point in time.<br />
Additionally, the definitions of some of the<br />
threat levels are to be updated to ensure<br />
they’re clear and consistent. The definitions of<br />
the LOW, SUBSTANTIAL and CRITICAL threat<br />
levels will change.<br />
The new definitions are as follows:<br />
• CRITICAL – an attack is highly likely in the<br />
near future<br />
• SEVERE – an attack is highly likely<br />
• SUBSTANTIAL – an attack is likely<br />
• MODERATE – an attack is possible, but not<br />
likely<br />
• LOW – an attack is highly unlikely<br />
Crime prevention support<br />
The Home Office has pledged a sum of £5<br />
million to support the development of<br />
innovative technology designed to help police<br />
forces prevent crime. The West Midlands Police<br />
will receive the grant to conduct further testing<br />
on a data analysis system that analyses large<br />
volumes of police-held data to assess the risk<br />
of someone committing a crime or becoming a<br />
victim. The programme is designed to support<br />
police officers and doesn’t replace their<br />
standard decision-making procedures.<br />
During the first year of testing, the National<br />
Data Analytics Solution (NDAS) used police<br />
data on knife and gun offences and on those<br />
who have previously committed them to<br />
identify patterns and common traits among<br />
perpetrators. The programme has drawn on<br />
information held in crime reports and<br />
intelligence logs on instances of modern<br />
slavery in order to identify common indicators<br />
of victims and the networks that help enable<br />
this type of crime.<br />
The funding comes from the Home Office’s<br />
Police Transformation Fund and follows a £4.5<br />
million grant awarded in 2018-2019.<br />
Priti Patel explained: “I fully support the<br />
police service embracing innovative new<br />
technology in the fight against crime and to<br />
protect the most vulnerable victims. Anything<br />
we can do to stay one step ahead of the<br />
criminals should be welcomed as long as<br />
solutions are rigorously tested and ethically<br />
sound. I look forward to seeing the results of<br />
this West Midlands Police trial.”<br />
Once fully tested, it’s hoped that the NDAS<br />
would be made available to forces in England<br />
and Wales who want to use it to improve their<br />
performance and protect the public.<br />
The NDAS is just one programme to benefit<br />
from a total Police Transformation Fund pot of<br />
£175 million for 2019-2020, announced as part<br />
of the police funding settlement in December<br />
last year. Overseen by the Police Reform and<br />
Transformation Board, other beneficiaries of the<br />
Fund include a project transforming domestic<br />
abuse services run by Northumbria Police and<br />
the National Enabling Programme.<br />
9<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
The Final Frontier: Brexit, Security and<br />
Solving ‘The Irish Border Conundrum’<br />
Put simply, outside of the backstop there are<br />
three options: the border remains as is (which<br />
contravenes European legislation), it becomes a<br />
hard border (which is severely problematic for<br />
the UK, Ireland and their residents) or it<br />
becomes a soft border employing a mixture of<br />
openness, technology and, potentially, some<br />
strategically manned points.<br />
This third option doesn’t come without<br />
significant challenges, of course. It would<br />
require compromise, trust and an overriding<br />
willingness to manage attitudes on all sides,<br />
but it also does provide options.<br />
The border that<br />
currently separates<br />
Northern Ireland and<br />
the Republic of Ireland<br />
continues to be a<br />
fundamental sticking<br />
point in the ongoing<br />
Brexit negotiations.<br />
Could the use of<br />
cutting-edge security<br />
technology provide a<br />
workable solution that<br />
avoids a hard border?<br />
Alistair Enser<br />
examines the major<br />
issues involved<br />
Speaking in broad terms there are many<br />
technologies available which could, in<br />
principle, either support or enable a soft<br />
border. To what extent technology’s employed<br />
in this instance is a question of risk and<br />
robustness versus freedom and privacy (ie a<br />
more robust border will generally need more<br />
technology, which may or may not be more<br />
visible or more ‘intrusive’ in nature).<br />
With this in mind, a fundamental question to<br />
address is whether or not technology would be<br />
acceptable from a political, diplomatic or<br />
residential perspective? The answer is<br />
debatable. Additionally, given the complexity of<br />
a 310-mile open border, could the technology<br />
be designed, mobilised, interfaced and fully<br />
implemented before the end of October? That’s<br />
highly improbable.<br />
Where there’s general agreement (and where<br />
the subject of the backstop is often debated) is<br />
around the protection and continuation of an<br />
‘open’ or ‘frictionless’ Irish border (and how<br />
that would look in practical terms).<br />
This isn’t the time or the place to reiterate<br />
the positions of the two sides embroiled in this<br />
debate, but it’s clear that the Irish border is a<br />
matter of great political, diplomatic and<br />
security-based sensitivity. Any proposals put<br />
forward shouldn’t threaten the hard-won, 20-<br />
year peace process or jeopardise the Good<br />
Friday Agreement.<br />
When all’s said and done, there’s clearly no<br />
easy answer to this situation.<br />
Setting the scene<br />
In the event of the UK’s withdrawal from the<br />
European Union (EU), the Irish border will<br />
become the only land border between the EU<br />
and the UK. The land boundary has around 200<br />
crossing points with an estimated 177,000<br />
lorries, 208,000 commercial vehicles and 1.85<br />
million cars passing across every month, in<br />
addition to the estimated 30,000 people who<br />
move between the countries on a daily basis.<br />
Post-Brexit, under current legislation some<br />
checks and controls will need to be in place for<br />
many reasons. These include managing the<br />
flow of controlled or commercial goods for the<br />
purpose of collecting tax and duty.<br />
Additionally, the flow of people between the<br />
UK and Europe will need a degree of control for<br />
the purposes of migration and security. Let’s<br />
not forget that these borders are open today<br />
and we already manage the existing challenge<br />
of differing tax and duty rates between the<br />
North and South. However, what could change<br />
post-Brexit is the perceived increase in<br />
economic, political and security risk posed by,<br />
for example, smuggling and crime.<br />
Reinstating the ‘watch towers’ that were<br />
previously removed in 2007, or using the police<br />
or other security agencies, would certainly not<br />
be ‘frictionless’ and could well create further<br />
risk and unrest, while also impeding the<br />
freedoms of the current residents who today<br />
cross the border freely.<br />
What, then, is the alternative? One mooted<br />
solution to this issue is the use of technology.<br />
There are those for and against this option and<br />
technology’s ability to create an invisible or<br />
‘frictionless’ digital border. The opposition view<br />
is perhaps best summed up by Sadhbh<br />
10<br />
Opinion: Security’s Role in the Brexit Process<br />
McCarthy of the Centre for Irish and European<br />
Security who calls it “complete nonsense” and<br />
adds: “If you say it often enough, it starts to<br />
sound like something that could work.”<br />
Point of order<br />
Others would politely disagree with McCarthy’s<br />
view. From a hypothetical standpoint,<br />
technology certainly exists to create a ‘smart’<br />
border and there are numerous examples all<br />
over the world where this has been achieved,<br />
such as between the USA and Canada, Israel<br />
and Palestine and Norway and Sweden.<br />
It’s the latter example that points one way<br />
forward. The 1,000 miles separating Norway<br />
and Sweden represents the EU’s longest land<br />
border, yet vehicles can travel from one nation<br />
to the other through unmanned border posts<br />
equipped with cameras using ANPR software.<br />
Meanwhile, goods can be declared to customs<br />
before they leave warehouses via a computerbased<br />
‘trusted trader’ system.<br />
Where this concept meets resistance with<br />
regards to the Irish situation is due to the fact<br />
that lorries transporting goods between Norway<br />
and Sweden (and vice-versa) must still stop at a<br />
manned crossing for physical customs checks.<br />
One way of avoiding this could be to develop a<br />
global positioning system-based solution,<br />
whereby drivers’ smart phones are linked to a<br />
satellite. When trucks pass the border they’re<br />
then automatically registered. The EU remains<br />
dismissive of this suggestion, though.<br />
Another option is to combine ‘trusted<br />
traders’, ANPR and analytics, such that the<br />
system allows cars, members of the general<br />
public and trusted vehicles unimpeded access,<br />
while requiring other vehicles (by exception) to<br />
pass through a manned checkpoint. Should the<br />
analytics recognise an unregistered lorry<br />
passing the open border, the system could then<br />
create an exception alert and response, such as<br />
a police intervention.<br />
Furthermore, as the whole of Ireland is<br />
surrounded by water, it could also be possible<br />
to cross-reference through a shared database<br />
those mainland UK and mainland Europe<br />
vehicles which enter from a port and then cross<br />
the land border illegitimately.<br />
Emerging technologies such as Artificial<br />
Intelligence, social media, mobile phones, the<br />
Internet of Things and biometrics could also<br />
play a greater role in border management going<br />
forward, and particularly so when considering<br />
whether an individual has crossed the border.<br />
Most of us are already tracked on a daily basis<br />
through these mediums or sensor points.<br />
Likewise, software analytics can<br />
automatically identify trends, objects,<br />
behaviours or even people (ie through facial<br />
recognition) by matching them to known ‘watch<br />
lists’ which then triggers an event such as a<br />
camera feed for human review/intervention.<br />
That said, facial recognition technology isn’t<br />
without its detractors. For their part, civil<br />
liberties groups including Big Brother Watch are<br />
increasingly vocal in their concern that it<br />
threatens freedoms, gathers information<br />
without consent, invades privacy and has the<br />
potential to wrongly identify individuals.<br />
Issues of trust<br />
Even though facial recognition technology is<br />
under great scrutiny at the moment, it’s worth<br />
remembering that this is only one of many<br />
‘evils’ in some commentators’ eyes. People are<br />
already being monitored and recorded by a<br />
huge network of overt and covert surveillance<br />
technology. Mobile phone operators, for<br />
instance, are able to track the movements and<br />
the location of individuals at any given time.<br />
As with any of these technologies, the key is<br />
the appropriate collection and use of the data.<br />
Where possible, only exceptions should be<br />
collected and recorded, while any potential bias<br />
from software analytics should be verified by<br />
human operators before action is taken, thus<br />
allowing law abiding members of the public to<br />
go about their daily business in freedom.<br />
That said, it’s clear the use of any solution<br />
using technology and data would require not<br />
only a significant PR exercise, but also cooperation,<br />
trust and even a degree of close<br />
regulatory alignment between the EU and the<br />
UK in terms of data sharing.<br />
Freedom of movement and residence for<br />
individuals in the EU is the very cornerstone of<br />
membership and citizens of Member State<br />
nations currently have the right to live and work<br />
here in the UK. The UK Government has<br />
announced that Irish citizens will continue to<br />
have the right to enter and remain in the UK, as<br />
they do now, and will not be required to protect<br />
their status. However, recent pronouncements<br />
suggest that new Home Secretary Priti Patel is<br />
planning to impose border restrictions with the<br />
EU immediately on 31 October so this may<br />
complicate matters somewhat.<br />
The use of technology, data and intelligence –<br />
when deployed correctly – could be the very<br />
key to retaining freedoms and civil liberties.<br />
Alistair Enser:<br />
CEO at Reliance High-Tech<br />
“Emerging technologies such as Artificial Intelligence,<br />
social media, mobile phones, the Internet of Things and<br />
biometrics could also play a greater role in border<br />
management going forward”<br />
11<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Doctor or Dalek? The Evolving<br />
Space of the Security Manager<br />
crime groups through to more localised issues<br />
such as opportunistic burglaries, personal<br />
attacks and increasing terrorist threats (some<br />
sophisticated, others frightening in their<br />
simplicity). It’s now more of a challenge than<br />
ever to mitigate fast-moving threats and<br />
solutions. Like our friend The Doctor, we too<br />
must continuously develop our processes in<br />
order to meet evolving adversarial challenges.<br />
Illustration: Cameraface<br />
If you’re familiar with<br />
the long-running UK<br />
TV Sci-Fi series Doctor<br />
Who, you’ll know that<br />
the lead character<br />
(‘The Doctor’) and<br />
various adversaries<br />
have continually<br />
evolved since the<br />
show’s debut back in<br />
1963. Our hero’s<br />
villains have all<br />
adapted, becoming<br />
more resilient, more<br />
devious in their<br />
behaviour to threaten<br />
the security of various<br />
worlds and, indeed,<br />
the Galaxy as a whole.<br />
This echoes the realworld<br />
security sector,<br />
argues Angus Darroch-<br />
Warren, whereby<br />
security managers<br />
need to stay one step<br />
ahead of the threats<br />
posed by criminals<br />
Doctor Who has a classic foe, the Daleks,<br />
and Davros (their creator). What’s<br />
interesting is the evolution of the Daleks,<br />
based on geographical location around the<br />
Galaxy and their hierarchy. They now feature<br />
strategists, commanders, scientists, soldiers,<br />
reconnaissance specialists, drones and even<br />
the odd renegade.<br />
They’re no longer ‘tin cans on wheels’ and<br />
have even managed to work out how to<br />
conquer their biggest obstacle: stairs.<br />
While the Daleks pose a significant threat,<br />
The Doctor typically has the upper hand<br />
through ingenuity and exploiting their<br />
vulnerability – a reliance on pure logic.<br />
In addition to the Daleks, there’s a whole raft<br />
of classic Doctor Who adversaries whom The<br />
Doctor encounters on a regular basis, including<br />
the Cybermen. To keep the stories more<br />
realistic (if indeed they can be called that) and<br />
maintain interest, the series regularly<br />
introduces new and often radically different<br />
enemies to the traditional militaristic<br />
characters. This ensures that The Doctor and<br />
any allies are often firmly on the back foot<br />
when faced by the likes of the Emojibots or The<br />
Master (a rogue Time Lord who seeks to take<br />
over the universe and generally spread chaos<br />
and mayhem).<br />
Likewise, in the real world, security managers<br />
continuously face an ever-changing threat<br />
landscape. We live in an age of increasingly<br />
diverse and developing threats both globally,<br />
from escalating tensions in the Gulf, activism,<br />
cyber crime (pure and enabled) and organised<br />
Perception of threats<br />
Not so long ago, a security manager’s main<br />
threat was likely to be criminal intruders<br />
looking to steal equipment, property and other<br />
assets. Rarely were commercial organisations<br />
planning for, and managing, threats from<br />
heavily armed terrorists. Yet the past two<br />
decades have seen this type of scenario<br />
become a real possibility in what’s now an<br />
increasingly unstable world.<br />
This has triggered a very steep learning curve<br />
for security practitioners, suppliers, specifiers<br />
and installers along with employees and<br />
visitors to buildings who use security systems<br />
on a regular basis. By necessity, everyone (from<br />
the office cleaner to the CEO) in an organisation<br />
now needs to be security aware to ensure<br />
systems and protocols are effective and threat<br />
detection isn’t confined to a small number of<br />
people. Rather, it’s a shared responsibility.<br />
Any ‘dent in the armour’ is a potential threat<br />
to the overall security of the organisation. We<br />
live in an age of the Internet of Things – a web<br />
of interconnected technology connected by and<br />
to the Internet. Physical security is increasingly<br />
a combination of integrated systems managed<br />
by the cloud. Any weaknesses (both physical<br />
and technological) in this armour can have<br />
serious consequences for the business and<br />
those working for it. It’s our responsibility as<br />
security managers to identify these potential<br />
weaknesses and act accordingly. In this way,<br />
and unlike The Doctor, we’re not caught on the<br />
back foot when facing threats.<br />
Returning to our Doctor Who analogy, The<br />
Doctor is famed for not carrying or using<br />
weapons, but rather employing wit, ingenuity<br />
and reasoning to thwart dangerous adversaries.<br />
While it isn’t possible for a security manager to<br />
do away with physical security tools,<br />
understanding the mentality and behaviour of<br />
threat adversaries and communicating the risks<br />
is a vital part of any modern security approach.<br />
12<br />
Opinion: Security Management<br />
If you can understand the motivations and<br />
tactics of your adversary, it’s easier to develop<br />
the security regime required to deal with and<br />
mitigate potential weaknesses, building in<br />
security advantages from this analysis.<br />
For example, an intruder breaks through or<br />
bypasses a number of security layers, but fails<br />
to penetrate a restricted area and reach an<br />
asset. Evidently, a review and revised security<br />
risk assessment is required, opening up<br />
investigative opportunities from a root cause<br />
analysis perspective. The analysis will ask<br />
questions related to whom the attackers were,<br />
what was their intent and their capabilities and<br />
why the defences were ineffective. Always look<br />
to analyse, rationalise and improve.<br />
Advancing technology<br />
Another element that Doctor Who is famous for<br />
is the TARDIS, The Doctor’s vehicle for moving<br />
around in space and time which is (somewhat<br />
surreally) disguised as an old police call box.<br />
As with many other elements in the show, this<br />
too has evolved over the decades to better<br />
match the contemporary technology of the<br />
viewer. Characters can even call the TARDIS on<br />
their latest smart phone.<br />
However, the TARDIS has its vulnerabilities: it<br />
should be chameleon-like and change its<br />
appearance to match the environment. It needs<br />
a good overhaul largely because the TARDIS<br />
has been attacked by aliens, missiles, guns and<br />
other assorted weaponry. It does its job to<br />
protect The Doctor, who rather likes the<br />
familiarity of the TARDIS. It works, so why seek<br />
to change it?<br />
Technology evolution and integration have<br />
transformed the abilities and expectations of<br />
real-world security. Protective systems need to<br />
be upgraded within a defined life-cycle to<br />
mitigate potential vulnerabilities. Being able to<br />
monitor security systems and situations via a<br />
connected smart device, for example, is now<br />
commonplace. However, while technology<br />
evolution has many benefits for both security<br />
and convenience, it also presents new attack<br />
vectors for the criminal fraternity.<br />
Without a regime of upgrades, security<br />
technologies may create unforeseen<br />
vulnerabilities that can be exploited by our<br />
increasingly sophisticated adversaries. For<br />
example, if a smart device connection isn’t<br />
secure, it can be compromised. Converged<br />
systems may be hacked and security systems<br />
used to aid or enable criminal behaviour.<br />
Doctor Who has a distinct fascination with<br />
machines superseding their creators and taking<br />
control (Davros, the Daleks and the Cybermen<br />
being the embodiment of this idea). Similarly,<br />
“The manager is no longer simply responsible for ‘gates’ and<br />
‘guards’, but also for enterprise risk management, data control,<br />
the convergence of systems and linking IT with security”<br />
systems such as VMS, PSIM and ‘smart’ video<br />
analytics and sensors (supported by deep<br />
learning technologies) are gradually reducing<br />
the need for human intervention when<br />
managing incidents.<br />
Equally, the rapid development of Artificial<br />
Intelligence (AI) systems has the potential to<br />
massively boost security operations’<br />
effectiveness (for instance, taking on the role of<br />
a surveillance observer covering amounts of<br />
footage which a human attention span would<br />
completely fail to monitor) and removing the<br />
risk of human error. Yet this incredible<br />
computing power doesn’t always work in our<br />
favour and can be manipulated by<br />
sophisticated criminals to overcome<br />
unprotected security measures.<br />
Every day, AI techniques are being used to<br />
steal data through social engineering. Chatbots<br />
can impersonate real people and copywriting<br />
styles and idioms. We can see a merging of<br />
technology with the human, in turn creating a<br />
metaphorical ‘Cyberman’ of security risk.<br />
Evolution of the security manager<br />
One of the quirkiest (but also most fascinating)<br />
plot devices in Doctor Who is the ability of The<br />
Doctor to evolve (or ‘regenerate’) into a new<br />
body to continue fighting enemies. The Doctor<br />
has transformed from a crotchety old man at<br />
the outset, through quirky individuals with a<br />
penchant for jelly babies and on to impatient,<br />
insensitive and critical iterations until the latest<br />
incarnation – the first female Doctor. It has only<br />
taken some 55 years and 13 regenerations, so<br />
not dissimilar to the security profession.<br />
While I’m not suggesting a security manager<br />
should morph into another person on a regular<br />
basis, developing oneself must be a continuous<br />
process. As time moves on, new generations of<br />
security professionals will come forward and<br />
take responsibility for managing security<br />
systems and meeting the latest threats. The<br />
manager is no longer simply responsible for<br />
‘gates’ and ‘guards’, but also for enterprise risk<br />
management, data control, the convergence of<br />
systems and linking IT with security.<br />
The security industry thrives on<br />
development, and the current generation of<br />
security professionals will undoubtedly develop<br />
new tactics and technologies to deal with the<br />
threats of the future. There’s much to learn<br />
from the latest technology and new thinking.<br />
Angus Darroch-Warren BA<br />
(Hons) MSc PSP RISC CSyP<br />
FSyI: Director at the Linx<br />
International Group<br />
13<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Security: Thinking Outside of the Box<br />
infestation. Of course, the growing menace we<br />
all now face is the ongoing curse of fly-tipping.<br />
To most people in the<br />
street, ‘security’ as an<br />
issue generally means<br />
protecting individuals<br />
and property from<br />
harm or serious<br />
criminal activity, with<br />
terrorism obviously<br />
being a big focus.<br />
However, as Gideon<br />
Reichental explains,<br />
seemingly lesser or<br />
petty criminal offences<br />
still cause an immense<br />
amount of distress to<br />
the public, thereby<br />
rendering security<br />
measures to prevent<br />
such offences every bit<br />
as important<br />
These so-called lesser issues actually<br />
impact people far more widely and include,<br />
among other things, anti-social behaviour<br />
of all types and polluting or disfiguring the<br />
local environment. Indeed, concern for the<br />
environment is rising up the public agenda. As<br />
well as worrying about the planet’s oceans, rain<br />
forests and wildlife, pollution and global<br />
warming on the macro scale, somewhat closer<br />
to home – and impacting on everyone’s daily<br />
lives – are matters like graffiti, derelict or longterm<br />
empty buildings, littering and fly-tipping.<br />
One man’s graffiti is another man’s piece of<br />
art. Debate rages over this. Meaningless and<br />
indecipherable graphics and expanses of spray<br />
paint across clean walls and surfaces isn’t art<br />
for me, and certainly not a Banksy original<br />
which is a very different proposition altogether<br />
(although obviously still graffiti).<br />
Meaningless graffiti disfigures buildings and<br />
infrastructure, detracts from a given property’s<br />
value and appeal and impacts negatively on the<br />
entire location or neighbourhood. Cleaning it<br />
off takes professional expertise, time and<br />
money. It’s a process that needs to be dealt<br />
with quickly before it encourages any further<br />
acts of such ‘vandalism’.<br />
Litter and general mess proliferates so<br />
quickly and can be anything from overgrown<br />
vegetation around a vacant property to<br />
abandoned takeaway wrappers and plastic<br />
shopping bags full of rubbish, all of which<br />
simply encourage further littering and rodent<br />
Struggling with the problem<br />
At the end of last year, the Local Government<br />
Association (LGA) revealed that councils across<br />
the country are struggling to tackle the problem<br />
amid budget cuts and the lenient sentencing of<br />
perpetrators. The LGA reckons that the illegal<br />
dumping of waste across England has<br />
increased by nearly 40% in the past six years.<br />
The latest figures put incidences in England<br />
alone at just under one million, and that’s only<br />
public sector figures. With private incidences<br />
added, the total will be much, much higher.<br />
No great surprise, though, when apparently<br />
no-one has been sanctioned by the courts to<br />
the maximum penalty of a £50,000 fine or 12<br />
months in prison since tougher guidelines were<br />
issued by the Government back in 2014.<br />
Unfortunately, investigating and bringing the<br />
offenders to justice is a costly and lengthy<br />
process which councils find difficult to afford or<br />
justify. By 2020, the overall funding they’ll<br />
receive from central Government will have been<br />
cut by 60% since 2010.<br />
Added to that, with pressure on budgets, it’s<br />
no surprise the costs to dump commercial<br />
waste at local recycling centres or landfill sites<br />
are rising every year alongside that of the<br />
Landfill Tax. It’s a vicious spiral. No wonder<br />
unscrupulous operators seek to avoid paying to<br />
dump waste. Any unprotected site and vacant<br />
building with easy access and no security is an<br />
invitation to them. They have no regard to the<br />
environmental damage they’re perpetrating.<br />
Regrettably, until someone, somewhere takes<br />
a serious grip of this problem little can be done<br />
to stop this unsightly nuisance on our<br />
roadsides and quiet country lanes. In truth,<br />
simple security measures are easily installed to<br />
prevent fly-tipping on individual properties and<br />
sites. Everything from concrete barriers to<br />
secure fencing and CCTV, in fact.<br />
Even if the site is large and open, such as a<br />
construction site or car park, and there’s no<br />
mains power, temporary CCTV towers can be<br />
used that run on solar energy. These all-seeing<br />
‘eyes’ can be watching everywhere, 24 hours a<br />
day, every day of the year. When the<br />
surveillance images are relayed to an Alarm<br />
Receiving Centre, security patrols or the police<br />
can be on site rapidly to catch the<br />
troublemakers red-handed. Property owners<br />
and managers should be encouraged to call in<br />
14<br />
BSIA Briefing<br />
property security professionals. They would<br />
soon sort out measures to deter trespassers<br />
and fly-tippers.<br />
Anti-social behaviour<br />
According to the police, anti-social behaviour<br />
covers a multitude of problems. From flytipping,<br />
littering and graffiti, as already<br />
mentioned, through to everything from<br />
nuisance neighbours and street drinking and on<br />
to vandalism, prostitution and begging.<br />
However, it’s the inconsiderate or inappropriate<br />
use of vehicles that’s a relatively new craze<br />
currently causing widespread problems at many<br />
empty and open sites.<br />
‘Boy racers’ have always existed, but with the<br />
advent of films such as the ‘Fast and Furious’<br />
franchise, the glamorisation of speed and thrills<br />
from racing and spinning cars and bikes on our<br />
streets and private open spaces, such as car<br />
parks, is growing in appeal. It may seem a petty<br />
or irrelevant nuisance to some, but this growing<br />
trend is another costly annoyance. Not only is it<br />
noisy and dangerous on our city streets, but the<br />
cost of clearing up after the cars and drivers<br />
have left private property can be enormous.<br />
Take, for example, the car park at a wellknown<br />
out-of-town Shopping Centre. It’s<br />
surfaced with special paint to make it safer for<br />
visitors, but cleaning off the disfiguring rubber,<br />
oil and tyre marks also removes the protective<br />
surface and lines. The cost to re-do the car park<br />
by the management? £400,000. That’s just one<br />
car park. No doubt that cost will be passed on<br />
and, somewhere down the line, the shopping<br />
public will end up paying for it somehow.<br />
The problem was finally brought to a halt at<br />
this particular location by locating temporary<br />
mobile CCTV towers which recorded the cars<br />
and number plates of the perpetrators as they<br />
approached the relevant car parks and then<br />
while playing their ‘games’. This evidence was<br />
handed over to the police and those involved<br />
were subsequently prosecuted.<br />
Suddenly, all of the boy racers disappeared<br />
into thin air. An easy solution, then, to put an<br />
end to a costly nuisance.<br />
Vacant property security<br />
Finally, we turn to vacant property and,<br />
specifically, unprotected vacant property. It’s<br />
like a magnet for everything I’ve mentioned,<br />
especially if it has a car park and the whole<br />
spectrum of anti-social behaviour goes on<br />
there. Squatting, vandalism (including arson)<br />
and the theft of anything saleable for cash,<br />
such as copper pipes, lead off the roof and<br />
fireplaces, etc. Vacant property harbours<br />
vagrants and gangs of youths up to mischief.<br />
It’s ideal for drug dealing and use. Illegal<br />
raves can happen there if the building’s large<br />
enough, and so much more besides. All of this<br />
is a nightmare to clean and repair and many<br />
property owners forget they’re also legally<br />
liable for any mishaps that take place on the<br />
premises, even if the people involved are<br />
trespassing. Such are the vagaries of our law.<br />
Clearing up needles and drug detritus is<br />
dangerous. So is dealing with other noxious<br />
substances, not to mention human waste and<br />
controlling pests like rats. Little surprise, then,<br />
that people hate having long-term empty<br />
property in their neighbourhood. To them it<br />
simply invites and breeds trouble, inside and<br />
outside. It’s an easy situation to remedy,<br />
though, with a variety of straightforward<br />
security options ranging from in situ property<br />
guardians through to steel screens and doors<br />
and on again to CCTV. Regular site inspections<br />
can check that all is in order. Prevention is<br />
better than cure, as the old saying goes.<br />
For several years now, my crusade has been<br />
to keep our buildings secure and in good order<br />
and our environment a pleasant one in which to<br />
live and work. We, as the security industry, have<br />
to spread the word that, with modern<br />
technology, it can be so simple and costeffective<br />
to put protective measures in place to<br />
deter and prevent what is perceived as lowlevel<br />
nuisance, criminal activity and anti-social<br />
behaviour which annoys and stresses everyone.<br />
The benefits will certainly be appreciated by<br />
the wider public. Sometimes, it’s always the<br />
little things that annoy the most.<br />
Outside of the box<br />
Given the wide variety of security issues now<br />
needing to be covered by differing clients in<br />
different sectors and with differing needs,<br />
security companies sometimes need to think<br />
outside of the box. We may compete with each<br />
other on one level, but as an industry we<br />
should be pulling together.<br />
One size never fits all and we can rarely be<br />
experts in everything. Joining forces or subcontracting<br />
helps to win contracts and can offer<br />
a better and wider service to clients with<br />
special or differing needs, or perhaps one-off<br />
projects or events that demand expert input.<br />
We’re all singing from the same hymn sheet<br />
and very much want to see standards raised.<br />
Gideon Reichental:<br />
Chairman of the BSIA’s Vacant<br />
Property Protection Section<br />
“Unfortunately, investigating and bringing the offenders to<br />
justice is a costly process which councils find difficult to<br />
afford. By 2020, the overall funding they’ll receive from<br />
central Government will have been cut by 60% since 2010”<br />
15<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Losing The Working Environment<br />
In spite of best<br />
intentions, protective<br />
measures, vigilance<br />
and forward planning,<br />
organisations will<br />
always be at risk of<br />
losing their workplace<br />
due to reasons such as<br />
fire, flooding/extreme<br />
weather conditions or<br />
structural collapse.<br />
Likewise, access may<br />
be denied due to<br />
contamination, lack of<br />
power or water or the<br />
location finding itself<br />
within a police cordon<br />
following a terrorist<br />
incident. What does<br />
“losing the<br />
workplace” actually<br />
mean for an<br />
organisation, and<br />
what’s the best thing<br />
to do about it?<br />
Dr Sandra Bell<br />
investigates<br />
Regardless of what caused the issue, the<br />
end result is the same – the loss of a<br />
normal place of work. It may well be for<br />
just a few hours in the case of a utility outage<br />
or it could be for many months – or even<br />
indefinitely – for more severe incidents.<br />
Governments, religious orders and the<br />
military have long recognised the benefits of<br />
formal places where centralised administration<br />
can take place in a controlled manner. Similarly,<br />
when large-scale mechanisation facilitated the<br />
growth of commercial enterprise, many<br />
industries followed suit by creating spaces for<br />
organised order processing, accounting and<br />
document filing in order to cope with the size<br />
and complexity of their operations.<br />
Even in times of austerity or conflict, it’s fair<br />
to say that these administrative centres have<br />
always been much more than simply functional<br />
spaces. Rather, they’re visible statements of<br />
prestige and power both to the outside world<br />
and for those individuals within them.<br />
Therefore, the true cost of losing a workplace<br />
office is always greater than the actual physical<br />
loss. There are losses associated with the<br />
immediate operational disruption caused by<br />
the fact that businesses cannot meet the<br />
physiological and security needs of their<br />
workers to enable them to transact the duties<br />
for which they’re paid. There are also losses<br />
associated with reduced efficiency. Over long<br />
periods of time, members of staff’s activity can<br />
no longer be as easily co-ordinated and<br />
managed as it would in an office environment.<br />
Without the workplace, businesses can also<br />
no longer meet the higher-level needs of<br />
employees – such as the human need to<br />
belong, contribute and grow – which can then<br />
lead to lower morale and engagement.<br />
Finally, by losing an external power symbol,<br />
businesses also signal to their clients,<br />
competitors and stakeholders a weakness,<br />
realising the potential for loss of custom and<br />
providing competitors with an opportunity to<br />
win market share.<br />
Modern technology has, in most cases,<br />
allowed information to be disconnected from<br />
place and time which means that, with a little<br />
forward planning and investment, it’s fairly<br />
straightforward to have an affected office’s<br />
occupants up-and-running at alternative<br />
locations such as home, a hotel, a rented office<br />
or a purpose-built disaster recovery facility.<br />
All that said, research shows that if the<br />
workplace is fragmented without paying<br />
attention to the management and co-ordination<br />
activity or the social and recognition needs of<br />
workers following an office disaster, the costs<br />
can be very high indeed. Likewise, an<br />
organisation that normally exudes trust and<br />
efficiency through a smart, well-organised and<br />
secure office environment is unlikely to foster<br />
the same confidence in its clients if everyone’s<br />
working from home or from local Internet cafes.<br />
Although intangible, these impacts are no<br />
less damaging than the impacts associated<br />
with the direct operational disruption. As an<br />
indicator of the cost of business disruption, the<br />
2018 Allianz Global Claims Review reports that<br />
the average insurance claim for business<br />
interruption is more than $3 million. That’s<br />
almost 40% higher than the average cost<br />
claimed for property damage. The same<br />
research also shows that the magnitude of the<br />
losses is now being driven by the indirect<br />
impacts of disruption, such as loss of<br />
confidence in the organisation, loss of<br />
customers, fines, penalties and lawsuits.<br />
In short, the threats that have the ability to<br />
prevent a workplace from operating as it should<br />
can be physical, virtual or reputational.<br />
Crucially, however, all impacts are financial.<br />
Indeed, the largest losses are now being driven<br />
by the indirect impacts rather than the direct<br />
property damage and operational disruption.<br />
As a direct result, businesses must re-think how<br />
they accommodate the workforce in the event<br />
that they cannot access their office.<br />
Reducing the impact<br />
The most effective way in which to reduce the<br />
impact of a workplace office loss is to<br />
instantaneously pick up the whole thing (ie<br />
people, information, management, personal<br />
knick-knacks, support structures, etc) and<br />
‘transplant’ it somewhere else that’s equally<br />
easy to access and has the same feel and<br />
culture as the original. However, in the real<br />
world, things are not quite so simple.<br />
Good physical security and building<br />
resilience (such as ensuring the building isn’t<br />
located on a flood plain and having more than<br />
one power and communications link, etc) are a<br />
great starting point. Likewise, the Business<br />
Continuity Institute’s Good Practice Guidelines<br />
offer four basic recommendations relating to<br />
the loss of a building and working environment<br />
to help mitigate the immediate operational<br />
disruption. On that note, it’s worth every<br />
business considering the following:<br />
16<br />
Business Continuity: Workplace Solutions<br />
• Diversification Having a separate location<br />
where activity occurs in parallel such that, if<br />
one location is lost, the work can carry on at<br />
another location – albeit with the negative<br />
consequences of an increased workload for the<br />
undamaged building occupants and loss of<br />
activity for those who normally work from the<br />
damaged location<br />
• Replication Having a separate premises that<br />
harbours all of the facilities required to<br />
undertake an activity, but it’s not currently<br />
being used<br />
• Standby A separate premises that has some<br />
of the facilities required to undertake an<br />
activity, but additional facilities will be required<br />
before the activity can be undertaken. For<br />
example, a physical premises, but where an<br />
operational copy of the IT system to support<br />
the activities of the workforce is held together<br />
with a back-up of its data that needs to be<br />
loaded and tested with manual switching in<br />
order to be made live<br />
• Post-incident acquisition Where suitable<br />
premises can be acquired which may or may<br />
not already have the facilities needed to<br />
undertake an activity<br />
Beware... There are a number of pitfalls that<br />
need to be negotiated to gain the most out of<br />
these strategies. For example, many<br />
organisations have a plan that includes relying<br />
on people being able to carry out their normal<br />
activities remotely from their home. However,<br />
unless the organisation’s in the fortunate<br />
position of being able to issue users with a<br />
second laptop that lives at their home, it can<br />
never be made sure they’ll be available at the<br />
time of the incident. Many employees are not at<br />
their desks when a crisis happens. Most of<br />
them will not take their laptops home at night.<br />
Equally, does the user have sufficient and<br />
suitable space for working from home?<br />
Likewise, is it safe? The employer still has a<br />
responsibility to ensure a safe working<br />
environment for members of staff even when<br />
they are working from home.<br />
An alternative workplace can also be<br />
troublesome. Does it have the right<br />
connectivity? Is it secure? Who else is the space<br />
shared with? Is it somewhere that client<br />
meetings could be held?<br />
Working as a team<br />
Workplace offices are not simply warehouses<br />
that provide shelter and warmth to individuals<br />
who carry out their tasks autonomously. While<br />
they all afford a rich environment for interaction<br />
and innovation and enable efficiency by<br />
specialisation, they do come in various<br />
different forms that facilitate the culture.<br />
There are collections of elegant individual<br />
offices, banks of cubicles, arrays of open plan<br />
desks, trendy meeting spaces with ping-pong<br />
tables and beanbags and networked virtual<br />
workers, etc. Each one has been meticulously<br />
designed to foster the right atmosphere and<br />
maximise efficiency, creativity or knowledge<br />
transfer and communicate the status and ethos<br />
of the company to the outside world.<br />
The myriad impacts of losing the place that<br />
facilitates the culture due to a disaster can be<br />
mitigated, but only as a direct result of people<br />
in the disrupted organisation pulling together<br />
as a team. They will only do so if there’s clear<br />
leadership and they have a temporary space<br />
that they can make their home.<br />
The environment in which organisations<br />
operate today is now characterised by<br />
uncertainty, complexity and risks involving<br />
adversaries. The magnitude and frequency of<br />
the losses is driven primarily by how an<br />
organisation as a whole responds rather than<br />
how that company mitigates the immediate<br />
operational disruption of losing its premises in<br />
the first place.<br />
Often, organisations that adopt an holistic<br />
stance and incorporate point business<br />
continuity solutions such as workplace and IT<br />
disaster recovery into a larger resilience<br />
strategy suffer fewer losses primarily because<br />
they’re readily able to address all aspects of the<br />
corporate culture. The loss of a workplace then<br />
becomes a minor operational blip as opposed<br />
to a full blown disaster.<br />
Dr Sandra Bell:<br />
Head of Resilience Consulting<br />
at Sungard Availability<br />
Services<br />
“The myriad impacts of losing the place that facilitates the<br />
culture due to a disaster can be mitigated, but only as a<br />
direct result of people in the disrupted organisation pulling<br />
together and working as a team”<br />
17<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Traditional login<br />
systems have enjoyed<br />
a remarkable<br />
longevity, writes<br />
Piergiorgio Vittori.<br />
Today, though, they’re<br />
no longer fit for<br />
purpose. The problem<br />
isn’t with the concept<br />
of the username and<br />
password<br />
combination. Rather,<br />
it’s that the system<br />
relies on the weakest<br />
element of any<br />
information security<br />
chain, namely the<br />
human being<br />
Piergiorgio Vittori:<br />
Global Development Director<br />
at Spitch<br />
Acting on Word of Mouth<br />
John Shepherd-Barron, the inventor of the<br />
ATM, famously chose four digits as the<br />
standard PIN code because his wife claimed<br />
that she couldn’t remember a longer one. The<br />
payment card/PIN combination has’t<br />
traditionally been a problem because it’s a twofactor<br />
form of authentication, requiring a token<br />
and a password.<br />
However, in the digital world, where no token<br />
is required, we tend to opt for an insecure,<br />
easy-to-crack password such as ‘123456’ or<br />
that perennial favourite ‘password1’ as we’re no<br />
longer able to remember the several dozen<br />
passwords now required at home and at work.<br />
Thankfully, weak passwords will soon be a<br />
thing of the past, replaced by a far more secure<br />
method of authentication: our voice.<br />
Biometric authentication has a long history –<br />
first in our imaginations and then in reality. In<br />
the 1968 Science Fiction epic ‘2001: A Space<br />
Odyssey’, the spaceship’s computer HAL 9000<br />
could identify humans by their “voice<br />
harmonics”. Fast forward to 1987 and<br />
‘RoboCop’ realised facial recognition. Two years<br />
later, ‘Back To The Future 2’ predicted<br />
fingerprint scanners. Fast forward to today and<br />
we’re now beginning to witness these<br />
technologies replace passwords as a secure<br />
means of authentication.<br />
Here in the UK, for example, some large<br />
organisations – among them Lloyds Bank,<br />
HBOS and Vodafone – are starting to deploy<br />
voice biometrics.<br />
Password authentication<br />
Advances in Artificial Intelligence (AI)-led voice<br />
biometrics technology now mean that it’s ready<br />
to replace traditional password authentication<br />
systems, bringing many significant advantages<br />
not just limited to logins. However, not every<br />
biometric authentication system is created<br />
equal. It’s important to recognise the differing<br />
capabilities of several authentication systems<br />
on the market today.<br />
Traditionally, we’ve tended to consider<br />
biometrics as a whole without looking at the<br />
various advantages and disadvantages of voice<br />
recognition, fingerprints and facial recognition<br />
as separate entities. It’s easy to think that each<br />
one provides the same degree of protection<br />
against hackers, but in truth each of these<br />
methods affords very different levels of<br />
accuracy and usability.<br />
Much is made, for example, of the<br />
uniqueness of human fingerprints, but this<br />
owes more to our fascination with the wonders<br />
of the human body than it does to the actual<br />
security benefits. It’s perfectly possible to<br />
‘clone’ someone’s fingerprint to break into their<br />
device, while there have been disturbing<br />
reports of people using a sleeping person’s<br />
finger to unlock their phones.<br />
IMost of the new generation smart phones do<br />
have built-in fingerprint recognition features,<br />
while some offer ‘four fingers’ authentication<br />
for greater security. The problem with these<br />
systems is that they require a smart and fairly<br />
expensive device with a built-in HD camera to<br />
capture the prints. That significantly limits the<br />
accessibility of this authentication method.<br />
When it comes to facial recognition, many<br />
security concerns have surrounded the<br />
technology itself, with San Francisco banning<br />
facial recognition outright.<br />
In light of these weaknesses, the most<br />
reliable and practical way to authenticate users<br />
could well be voice biometrics.<br />
Secure customer experience<br />
Companies are increasingly aware of the<br />
potential damage of data breaches, both from a<br />
reputational viewpoint and, of course, in terms<br />
of the hefty fines mandated under the General<br />
Data Protection Regulation, etc. At the same<br />
time, they understand full well the<br />
consequences of time-consuming and complex<br />
authentication procedures that can lead to a<br />
great deal of frustration and damage<br />
consumers’ perception of their brand.<br />
Businesses are, therefore, seeking to balance<br />
information security with protecting the<br />
customer experience. Voice biometrics<br />
technology promises one of the safest and<br />
most convenient methods of authentication<br />
available today. One of the key advantages is<br />
that there’s no need for specialist equipment to<br />
use voice biometrics. The technology is<br />
transparent and doesn’t require user or device<br />
activation, an expensive HD camera or an<br />
external application.<br />
Consumers can use a traditional telephone<br />
line, a smart phone or a web-based application,<br />
which then also enables organisations to<br />
deliver more inclusive customer services to all<br />
users irrespective of their age, income levels,<br />
proficiency with smart tech or their ability to<br />
afford a smart phone in the first place.<br />
Voice verification happens ‘live’ throughout<br />
the conversation, safeguarding against any<br />
change of circumstances – or people – on the<br />
18<br />
Biometric Security<br />
other end of the line. Another important point<br />
to note is that, with voice biometrics, there’s no<br />
need for the user to share any personal or<br />
confidential data to be authenticated. Their<br />
voice sample is all that matters.<br />
Overall, voice biometrics technology provides<br />
a much safer and universally-accessible method<br />
of securely authenticating customers. What’s<br />
more, such intelligent AI-led technology is able<br />
to pick up and recognise callers’ sentiment and<br />
intent. If you’re calling your bank and asking<br />
them to transfer a large sum of money over the<br />
phone with an undertone of frustration in your<br />
voice – let’s say that there’s a possibility you’re<br />
being held at gunpoint – the technology will<br />
give you a ‘lifeline’ by suggesting that the<br />
system’s currently down and ask you to come<br />
into one of the nearest bank brunches to<br />
process the payment.<br />
Technologies such as passive voice<br />
biometrics go even further by facilitating<br />
customer on-boarding. Instead of making the<br />
user repeat a sample phrase several times over<br />
until the system captures enough samples<br />
required for authentication during the onboarding<br />
stage, passive voice biometrics allows<br />
for the user ‘voice print’ to be created during a<br />
normal conversation.<br />
Once the user gives their consent, the agent<br />
can capture their ‘voice print’ and subsequently<br />
verify the identity of the caller. Next time the<br />
user calls the organisation, they can speak<br />
freely to authenticate themselves – all while<br />
resolving their problem and having a<br />
meaningful conversation.<br />
The technology provides a practically<br />
seamless way of passing through security: it’s<br />
quick, intuitive and secure.<br />
Harnessing the power of AI<br />
Voice biometrics technology has come a long<br />
way in the last few years, not least thanks to AI.<br />
AI-driven voice biometrics tech works by<br />
ensuring a user’s unique voice (in a natural<br />
language live interaction) is compared with the<br />
voice print stored in a database in real-time<br />
over the course of the entire conversation<br />
based on numerous parameters. The solution is<br />
therefore very difficult – if not nearly impossible<br />
– to hack. Since there’s no set of static data<br />
required in the interaction that could be<br />
recorded, it’s incredibly difficult for a fraudster<br />
to gain access to someone’s account or profile.<br />
What’s more, voice biometrics can also be<br />
used actively in the fight against the same<br />
fraudsters. If an attempted fraud is detected,<br />
it’s possible to use the audio obtained to create<br />
the fraudster’s ‘voice print’, which will then be<br />
added to a blacklist of fraudsters. The end<br />
result is that anyone who has been caught<br />
committing fraud over the phone will be<br />
reported and obviously easily detected in the<br />
system during any further attempt to do so.<br />
As a method of detecting and discouraging<br />
fraud, voice biometrics is an incredibly<br />
convincing solution for many business sectors.<br />
Above all, it’s the basis of a superior and userfriendly<br />
customer experience.<br />
Alongside these advantages, the great thing<br />
about voice biometrics is that it doesn’t rely on<br />
the user remembering a password or having a<br />
physical token to hand. The technology can<br />
recognise speech patterns and modulations<br />
that are impossible for even the best<br />
impressionist to mimic.<br />
Of course, organisations don’t have to rely on<br />
voice as their sole means of authenticating<br />
customers. It’s both possible and advisable for<br />
businesses, and in particular securityconscious<br />
industries such as banking, to<br />
combine voice with other methods of two-factor<br />
authentication such as tokens and – yes –<br />
passwords where and when appropriate.<br />
Voice biometrics technology does promise to<br />
solve one of the most pressing problems facing<br />
organisations in a range of industry sectors:<br />
how to deliver secure, yet seamless<br />
authentication for the customer base.<br />
“One of the key advantages is that there’s no need for<br />
specialist equipment to use voice biometrics. The technology<br />
is transparent and doesn’t require user or device activation”<br />
19<br />
www.riskxtra.com>
With more than 150 years’<br />
experience, we stand for security,<br />
sustainability and reliability<br />
Our comprehensive product portfolio and<br />
industry experience means we listen, we<br />
know the on-site requirements and ask the<br />
right questions to ensure that we come up<br />
with smart, secure access solutions.<br />
Entrance Systems<br />
Mobile Access<br />
Solutions<br />
Electronic Access<br />
and Data<br />
Door Hardware<br />
Interior Glass<br />
Systems<br />
Mechanical Key<br />
Systems<br />
Best In Class<br />
Service<br />
Safe Locks<br />
Lodging Systems<br />
dormakaba continues<br />
to strive to become the<br />
industry leader in innovation,<br />
providing reliable access and<br />
security solutions.<br />
dormakaba UK & Ireland<br />
T: +44 (0)1462 477600 E: info.gb@dormakaba.com<br />
www.dormakaba.co.uk
FIRE SAFETY<br />
Management & Installation<br />
Fire Protection and Prevention<br />
with Technology and Innovation<br />
Special Supplement in association with:
FIRE SAFETY<br />
Andrew Speake: National<br />
Technical Manager at Aico, a Fire<br />
Industry Association member<br />
company. Andrew works closely<br />
with a number of leading industry<br />
organisations and assists with<br />
R&D on new products<br />
Improved Protection<br />
and Clarification<br />
Andrew Speake examines the<br />
revised British Standard focused<br />
on domestic fire alarms<br />
BS 5839-6 is the Code of Practice for the<br />
design, installation, commissioning and<br />
maintenance of fire detection and fire alarm<br />
systems in domestic premises. When it was first<br />
introduced back in 1995, BS 5839-6 changed<br />
everything. Whether you were a landlord, a<br />
specifier or an installer, here at last was a clear and<br />
detailed set of standards to be observed. The<br />
contents of BS 5839-6 were quickly adopted and<br />
have been standard practice since then in both<br />
existing dwellings and new builds. The Building<br />
Regulations and other guidance documents<br />
reference this British Standard, so its importance<br />
cannot be over emphasised.<br />
BS 5839-6 was revised in 2004 and then again<br />
in 2013, both times taking into consideration<br />
technological developments and addressing Best<br />
Practice accordingly. Its been around a decade<br />
between each set of revisions so why, just six years<br />
since the last set of revisions, was a new version<br />
released this year on Tuesday 30 April?<br />
The answer isn’t to be found in new technology,<br />
but rather in the will of professionals in housing,<br />
fire and safety to improve the level of fire<br />
protection in domestic dwellings, which ultimately<br />
provides residents with a greater chance of escape<br />
unharmed from a fire in their home.<br />
While there have been a number of minor<br />
revisions within BS 5839-6:2019, plus multiple<br />
definitions that have been updated throughout, the<br />
biggest changes by far apply to the grades of<br />
alarms and the type/level of protection for each<br />
identified dwelling. The ‘Grade’ determines the<br />
type of alarm to be used and the ‘Category’ the<br />
level of protection required.<br />
Changes to Fire Alarm Grades<br />
Under BS 5839-6, fire alarms are classified into<br />
grades from A to F. Grades B and E have been<br />
removed in 2019, with Grade D being the common<br />
for domestic properties that will form the focus of<br />
this particular discourse.<br />
Under the previous standard, Grade D required<br />
one or more interlinked mains powered smoke<br />
alarms (and heat alarms if required), each with an<br />
integral back-up supply, with the back-up supply to<br />
be delivered in the form of a rechargeable lithium<br />
or alkaline battery.<br />
Under the revised BS 5839-6, Grade D has been<br />
replaced with Grades D1 and D2 which differ in<br />
terms of the back-up power supply:<br />
• Grade D1 calls for a tamper-proof standby supply<br />
consisting of a battery or batteries, with lithium<br />
being the standard battery type. These are long-life<br />
battery cells lasting the recommended lifespan of<br />
the alarm and are designed such that they cannot<br />
easily be removed by the user. Grade D1 alarms are<br />
the preferred option for social housing as they<br />
remove the risk factor<br />
• Grade D2, on the other hand, requires an integral<br />
standby supply consisting of a battery or batteries<br />
(usually 9 V PP3) which need to be replaced at<br />
regular intervals by the end user throughout the<br />
life of the alarm by<br />
Changes to these grades provide greater clarity<br />
for alarm specifiers and installers, which is very<br />
much to be welcomed.<br />
While Grade D alarms feature most heavily in<br />
BS 5839-6:2019, Grade F systems also warrant<br />
mention here due to changes in Scottish legislation<br />
earlier this year which permits their use. Grade F<br />
systems use only battery-powered alarms. As with<br />
Grade D, Grade F has now been divided into F1 and<br />
F2 in the same fashion as that noted above.<br />
Minimum levels of protection<br />
Under BS 5839-6, different classes of premises are<br />
identified and the minimum grade of fire alarm<br />
22<br />
www.riskxtra.com
system and category of fire protection provided for<br />
that specific type of property are listed. It’s here, in<br />
the 2019 revisions, that we’ve seen the biggest<br />
changes that will have a major impact on what type<br />
of fire alarms are fitted and where. In the main, this<br />
is due to an increase in the category of fire<br />
protection from LD3 where previously listed, which<br />
requires one mains-powered optical alarm in the<br />
hallway and another upstairs on the landing,<br />
interconnected together, to Category LD2. LD2<br />
involves additional alarm coverage, with a heat<br />
alarm in the kitchen and a further smoke alarm in<br />
the main living area, once again all interconnected.<br />
This upgrade in fire protection is most notable<br />
in existing rental properties and Houses in Multiple<br />
Occupation (HMOs):<br />
• Existing two and three-storey maisonettes and<br />
houses in the rental sector have now been<br />
upgraded from the low category of fire protection<br />
(LD3) to the medium category LD2 and graded D1<br />
(ie mains-powered alarm with tamper-proof battery<br />
back-up power). New build properties of this<br />
nature remain LD3 (unless a risk assessment<br />
indicates otherwise)<br />
• Existing HMOs have been set as the category of<br />
LD2 whereas before it was a mixture of LD2 and<br />
LD3 depending on the nature of the property and<br />
inhabitants. Grade D1 is now the requirement<br />
Other property types that have made an<br />
appearance in the BS 5839-6 property<br />
classification are supported housing and shortterm<br />
holiday lets. Both are allocated the highest<br />
category of protection (ie Grade D1, LD1).<br />
“BS 5839-6:2019 is a Code of Practice for fire detection and<br />
fire alarm systems in domestic premises, not a set of legal<br />
requirements. There’s no penalty if an organisation or<br />
individual chooses to ignore it and no date for ‘compliance’”<br />
Other changes of note<br />
Weekly alarm testing was previously recommended<br />
in BS 5839-6, but this has now been changed to<br />
monthly (apart from Grade A systems). Although<br />
weekly testing of alarms remains ideal, it’s not a<br />
realistic expectation, whereas monthly is far more<br />
manageable and therefore likely. The important<br />
message to note here is that end users should<br />
continue to test their alarms at regular intervals.<br />
Recommendations contained within the NFCC<br />
Specialised Housing Guide regarding all fire<br />
detection, alarm and transmission/signalling to an<br />
Alarm Receiving Centre has been incorporated into<br />
BS 5839-6:2019, which is useful and recognises<br />
that valuable document.<br />
Carbon Monoxide alarms have been<br />
acknowledged for the first time in BS 5839-6 2019<br />
as they’re increasingly been installed alongside fire<br />
alarm systems or incorporated within them. BS<br />
5839-6 states that mains-powered Carbon<br />
Monoxide alarms conforming to BS EN 50291 and<br />
installed in compliance with BS EN 50292 may also<br />
be interlinked with the fire detection and alarm<br />
system if the manufacturer of all the components<br />
makes such a recommendation.<br />
Implications for the future<br />
BS 5839-6:2019 is a Code of Practice for fire<br />
detection and fire alarm systems in domestic<br />
premises, not a set of legal requirements. There’s<br />
About the Fire Industry Association<br />
The Fire Industry Association (FIA) is a not-for-profit<br />
organisation. We’re the leading Trade Association for the fire<br />
industry in the UK. The education and training that we offer<br />
through our qualifications and industry-recognised courses<br />
exists to provide you with a high level of knowledge and<br />
understanding that will help in terms of developing your career and building your business.<br />
Our courses are delivered by experienced professionals from the industry who can not only<br />
deliver the courses, but also answer questions and provide real-life examples, in turn enabling<br />
all delegates to deliver excellent results for their organisations.<br />
Combined with our website (fia.uk.com), we aim to provide a service that contributes towards<br />
and promotes technical developments in the industry. Standards are constantly being revised<br />
and updated and it’s vital to stay up-to-date with the changes. By taking our qualifications and<br />
courses and using our extensive Resource Library on the website, you can be sure that you’ll be<br />
well informed of any recent changes as and when they happen.<br />
Our range of professional qualifications and training programmes – along with our extensive<br />
membership benefits – are all designed to support learners and their organisations to grow,<br />
develop technical knowledge and increase their professional networks.<br />
www.riskxtra.com<br />
23
FIRE SAFETY<br />
“We’ve lived by BS 5839-6 for almost a quarter of a century<br />
now and the standard has served us well. There’s no doubt<br />
that it has helped to save lives. BS 5839-6:2019 builds on the<br />
success of the original document”<br />
no penalty if an organisation or individual chooses<br />
to ignore it and no date for ‘compliance’. However,<br />
the standard is considered Best Practice and those<br />
who choose to ignore it do so at their own risk.<br />
Certainly, social housing organisations place great<br />
emphasis on it and complying with it is regarded<br />
as being essential.<br />
Many RSLs have been moving towards LD2<br />
systems over the past year in the anticipation of<br />
the revisions and we’re now witnessing a large<br />
number rewriting their alarm specifications<br />
accordingly and planning upgrade programmes as<br />
part of their overall process.<br />
With the 2019 revisions, we’ve benefited from<br />
greater clarity and, in a number of cases, an increase<br />
in the level of fire protection. Of course, with this<br />
comes a need for additional alarms per property<br />
which has an associated cost, not just in alarm units,<br />
but also in terms of installation. Some of this cost can<br />
be mitigated by using wireless alarm interconnection<br />
technology and by employing alarms that have been<br />
designed to be quick and easy to install.<br />
Control and maintenance<br />
With larger fire alarm systems come issues over<br />
control and maintenance as more alarms will need<br />
to be tested. It’s important to be able to locate the<br />
precise alarm which originally triggered. In these<br />
cases, an alarm controller should be considered<br />
(especially important if a Carbon Monoxide alarm<br />
is included in the system). These wall-mounted<br />
devices feature test, silence and locate features,<br />
subsequently adding an extremely valuable extra<br />
measure of controllability to an LD2 system.<br />
We’ve lived by BS 5839-6 for almost a quarter<br />
of a century now and there’s no doubt that the<br />
standard has served us well. There’s also no doubt<br />
that it has helped to save lives. BS 5839-6:2019<br />
builds on the success of the original document<br />
and, if adhered to in the correct manner, should<br />
always ensure greater safety and even better<br />
practice across the industry.<br />
www.fia.uk.com<br />
Takt is<br />
true integration<br />
Taktis® is Kentec’s most powerful and sophisticated analogue addressable<br />
fi re panel. Intelligent and technically robust, the next generation Taktis 16L has<br />
enhanced integration and networking capabilities designed to meet the current<br />
and future needs of larger buildings and installations. As a truly Open Protocol<br />
panel it offers installers and their customers maximum fl exibility in systems’<br />
design, site-customisation and in the third-party devices that they use.<br />
+44 (0)1322 222121 www.taktis.co.uk<br />
24<br />
www.riskxtra.com
Evacuate everyone<br />
EN54-23 Approved Fire Beacons<br />
Sonos Pulse and Nexus Pulse devices contain Pulse Alert Technology,<br />
Klaxon’s EN54-23 compliant visual notification for wall and ceiling<br />
mount devices. Pulse Alert Technology provides visual notifications that<br />
are unmissable and unmistakable, ensuring that everyone is notified of<br />
a fire evacuation emergency.<br />
Seminars<br />
Klaxon currently run a certified EN54-23 CPD seminar for Consultants, Integrators and End Users.<br />
Please contact us now to book a ‘lunch and learn’ EN54-23 CPD Seminar.<br />
Phone +44 (0)1706 212524 or visit www.klaxonsignals.com/fire<br />
EN54-3 Sonders & Beacons<br />
Nexus 105/110/120 Sounders<br />
High output sounders certified to EN54-3.<br />
Sonos Sounder Beacon<br />
Electronic sounder beacon certified to EN54-3.<br />
VISIT US: STAND FX415
FIRE SAFETY<br />
Pulse Alert Visual<br />
Alarm Devices (VADs)<br />
from Klaxon lower<br />
installation costs,<br />
making the latest fire<br />
evacuation technology<br />
affordable without<br />
compromising on<br />
system performance<br />
Klaxon achieves<br />
ISO 9001:2015<br />
ahead of deadline<br />
To ensure thet the business<br />
adheres to the high standards<br />
its customers and partners<br />
have come to expect, Klaxon<br />
Signals transitioned to the<br />
new ISO 9001:2015 standard<br />
ahead of the deadline of<br />
Friday 15 March 2019.<br />
The new standard focuses<br />
on quality management,<br />
ensuring that customers<br />
receive consistently good<br />
quality products, while at the<br />
same time suppliers are<br />
always strongly customerfocused.<br />
It reflects the new<br />
and different challenges that<br />
businesses now face.<br />
Klaxon Signals is the fire<br />
safety brand of Texecom,<br />
which has itself been ISOaccredited<br />
with the BSI since<br />
1996.<br />
To view the certificate<br />
access the QR code here:<br />
Pulse Alert Technology<br />
Fire alarm systems should be able to assist in<br />
evacuating everyone from a given building.<br />
Relying on audible fire alarm notification<br />
alone, however, disadvantages those with hearing<br />
impairments or individuals working or living in a<br />
sound-reducing environment. Even something as<br />
simple as wearing a pair of headphones could<br />
prevent someone from hearing an audible fire<br />
evacuation warning. To successfully evacuate<br />
everyone from a building, fire alarms should signal<br />
effectively using light as well as sound.<br />
Klaxon Signals’ Pulse Alert Technology is a<br />
beacon warning system which produces a light<br />
output that can protect most rooms with just a<br />
single device. Using new LED lighting technology<br />
derived from automotive applications, it disperses<br />
light evenly and efficiently, in turn maximising its<br />
effectiveness. Its patented electronic design also<br />
maximises electrical efficiency and reduces<br />
current consumption, minimising the<br />
cost of ownership and allowing<br />
more devices to be installed on<br />
a single alarm system.<br />
Pulse Alert Technology<br />
provides all the benefits that<br />
an EN54-23-compliant system<br />
can bring, while answering all<br />
of the design challenges in<br />
doing so. This means a greater<br />
coverage area with lower current<br />
consumption in tandem with greater<br />
flexibility for system designers. There’s also the<br />
benefit of reduced cost of ownership for end users<br />
with no compromise on evacuation notification<br />
performance.<br />
Pulse Alert: how it works<br />
Pulse Alert is able to provide EN54-23-compliant<br />
visual alarm signalling without any increase in<br />
power consumption because of three essential<br />
technological breakthroughs:<br />
• Intelligent Power Management Pulse Alert<br />
converts power intelligently, minimising power<br />
usage and presenting a near-perfect current source<br />
to fire alarm panels. This means the Sonos Pulse<br />
and Nexus Pulse VADs require less power than<br />
previous models, while also exceeding EN54-23<br />
light output requirements<br />
• LED Drive Pulse Alert features the latest highpower<br />
LED technology and advanced LED Drive<br />
circuitry, further improving efficiency, light output<br />
performance and long-term device reliability.<br />
Sonos Pulse and Nexus Pulse LED circuits are both<br />
designed to provide over five years of continual<br />
operation without any degradation of light output<br />
• Lens Technology The optics for both ceilingmount<br />
and wall-mount versions are optimised to<br />
produce an even light dispersion over the covered<br />
area. This minimises ‘hot spots’ and ensures that<br />
all of the available light is contributing towards<br />
alerting people of any active fire emergency<br />
Extent of coverage<br />
The simpler an evacuation system is, the more<br />
effective it’s likely to be. Sonos Pulse and Nexus<br />
Pulse fulfil evacuation requirements with just a<br />
single device for most rooms. Ceiling-mounted<br />
devices are rated at 15 metre-diameter coverage,<br />
while wall-mounted devices can cover an 11.5 x 11.5<br />
metre square room. System design<br />
requirements are therefore<br />
made easier, evacuation<br />
messages are clearer and<br />
more people are protected<br />
than ever before.<br />
Energy efficiency<br />
Pulse Alert technology<br />
ensures that Klaxon Signals’<br />
VADs notify all personnel of a<br />
fire emergency, while also reducing<br />
the power consumption of each device.<br />
Ultimately, this means that systems can be<br />
upgraded without imposing any restrictions on the<br />
number of devices used or otherwise compromising<br />
system performance in any way.<br />
Low power consumption is vital to fire system<br />
designers and installers – Sonos Pulse and Nexus<br />
Pulse ensure that all buildings can provide the very<br />
best standards of fire evacuation.<br />
Low installation costs<br />
Pulse Alert VADs lower installation costs, making<br />
the latest fire evacuation technology affordable. A<br />
wider coverage area per device reduces both the<br />
number of devices needed and expensive cabling<br />
requirements, while low current consumption<br />
removes the need for additional power supplies.<br />
With a greater coverage pattern, fewer devices<br />
are required to cover open areas. Sonos Pulse<br />
ceiling-mount units have a 15-metre coverage<br />
diameter capable of covering a 10 x 10-metre room<br />
with a single device.<br />
26<br />
www.riskxtra.com
UPGRADE<br />
TO VOICE<br />
WITH<br />
Fire-Cryer Voice Sounders<br />
• High quality speech reproduction<br />
• Single or multi-message options<br />
• Ideal for lockdown alert systems<br />
• Easy to upgrade or new install<br />
• EN 54-3 approved<br />
• Manufactured in UK by Vimpex<br />
Fire-Cryer Voice Sounders<br />
Voice Message<br />
Controllers<br />
Fire-Cryer Voice<br />
Sounders<br />
Mini Fire-Cryer Base<br />
Sounder<br />
Available with or<br />
without VIDs<br />
World class fire evacuation,<br />
signalling and building<br />
infrastructure system<br />
products.
FIRE SAFETY<br />
Lockdown Alerts: The Message is Clear<br />
A growing number of UK schools are being exposed to major<br />
incidents or threats of violence on the premises. As this<br />
trend sadly continues, it’s not just schools that need to have<br />
a robust dynamic lockdown alert system in place should an<br />
event occur: medical and healthcare facilities,<br />
manufacturing plants, offices and, indeed, any public<br />
buildings could benefit from such systems<br />
“Vimpex’s Fire-Cryer<br />
Plus offers a simple,<br />
fully-synchronised and<br />
cost-effective voice<br />
evacuation solution for<br />
end users”<br />
28<br />
Many organisations use a fire bell or a<br />
sounder to double-up for a host of alerts<br />
from school class to factory shift<br />
changes, as well as emergency situations such<br />
as evacuation and lockdown. Using the same or<br />
similar alarm sounds for a range of different<br />
alert scenarios can be confusing to building<br />
occupants. Is it the fire alarm? Is it an<br />
emergency exit alarm? Or a public safety alert?<br />
It also goes against Government<br />
recommendations for lockdown procedures. In<br />
the event of a possible violent intruder on the<br />
premises, the last thing any organisation wants<br />
is people streaming out of buildings and<br />
gathering outside at assembly points. A<br />
dynamic lockdown alert system ensures that an<br />
emergency message can be broadcast over<br />
multiple floors and even multiple buildings<br />
simultaneously, such that occupants across the<br />
whole premises are able to react instantly.<br />
While some recommend that the use of fire<br />
alarms should be avoided to reduce the chances<br />
of an incorrect response to an incident, the<br />
infrastructure of fire alarm systems can be<br />
particularly useful for the sending of secure and<br />
fully-monitored messaging.<br />
Existing cabling can be used to either<br />
support a separate lockdown system or the<br />
existing alarm devices can be retrofitted with<br />
voice sounders able to broadcast fire, class<br />
change and lockdown messages in one product.<br />
There’s also the added benefit of having a<br />
system that’s fully-monitored, battery backedup<br />
in cases of power failure and fully serviced,<br />
with sound outputs designed to existing British<br />
Standards such a BS 5839-1 for good coverage.<br />
Voice evacuation systems: The<br />
message is clear<br />
Vimpex’s Fire-Cryer Plus offers a simple, fullysynchronised<br />
and cost-effective voice<br />
evacuation solution. Whether retrofitted into an<br />
existing installation or as part of a new system<br />
design, the four unique Fire-Cryer Plus models<br />
can be fully integrated into the fire alarm system<br />
and work on a conventional two-wire bell circuit.<br />
With multiple sounder circuit<br />
synchronisation, up to seven pre-recorded<br />
messages are available in a single sounder. A<br />
fire alarm system can be expanded to include<br />
inputs for a range of alerts or announcements,<br />
including bomb alerts, terrorist threats, coded<br />
warnings, water leakage alerts, class change<br />
announcements, system tests, ‘all clear’<br />
announcements, machinery shut down<br />
warnings, Health and Safety reminders and, of<br />
course, ‘fire’ alarm messages.<br />
Vimpex’s Fire-Cryer is a very versatile<br />
product: it can be used as a drop-in replacement<br />
for basic tone sounders or as part of a<br />
sophisticated engineered solution. When<br />
specified as a multi-message system, the Fire-<br />
Cryer has been used extensively in schools (for<br />
fire, lockdown and class change), Shopping<br />
Centres, museums, on the London Underground<br />
and also for a raft of mixed-use residential,<br />
retail and commercial spaces.<br />
Established in 1994, Vimpex is an<br />
independent manufacturer and distributor of<br />
fire detection, alarm and evacuation products<br />
and accessories. The company produces and<br />
distributes a range of high quality evacuation,<br />
signalling and building infrastructure system<br />
products, both Vimpex-manufactured and<br />
supplied by its manufacturing partners<br />
www.vimpex.co.uk<br />
www.riskxtra.com
FIRE SAFETY<br />
Kentec systems help to keep Brenntag UK & Ireland safe<br />
A highly sophisticated Taktis fire alarm and control panel from Kentec is<br />
providing the highest levels of fire safety for Brenntag UK & Ireland<br />
Brenntag is a market leader in chemical<br />
distribution with a global network of more<br />
than 580 locations across 73 countries. Its<br />
North East team moved into the new site in<br />
Sunderland (one of the company’s 24 sites<br />
across the UK and Ireland) last December.<br />
Pitts Wilson, the electrical contractor, was<br />
approached by Brenntag to recommend and<br />
install a comprehensive fire safety and alarm<br />
system for the entire site. The business selected<br />
Kentec’s technology as an integral part of the<br />
installation which has since assisted Pitts<br />
Wilson to pass a BAFE/National Security<br />
Inspectorate inspection.<br />
Kentec’s Taktis panel ranges from two to 16<br />
detection loops to provide up to 144 zone<br />
indicators and can network up to 128 panels. Its<br />
enhanced integration and networking<br />
capabilities mean that it’s able to meet the<br />
current and future needs of the largest sites.<br />
Mark Ellse, fire systems manager at Pitts<br />
Wilson, commented: “The flexibility of the Taktis<br />
panel makes it very simple to install and<br />
commission, and because it’s fully open<br />
protocol it’s also fully integrated with the<br />
Hochiki systems on site.”<br />
Ellse added: “The touch-screen display is<br />
easy for the customer to use and understand,<br />
especially in an emergency. Along with providing<br />
a great system, Kentec also afforded excellent<br />
customer support throughout the project.”<br />
Kevin Swann, managing director at Kentec,<br />
believes that Taktis is the ideal solution for large<br />
and complex sites and infrastructure.<br />
Swann said: “The scalability of Taktis means<br />
that it provides a future-proofed solution able to<br />
expand and develop in line with Brenntag’s<br />
requirements. As it’s truly open protocol, it<br />
provides installers and end users alike with<br />
maximum choice in their system design.”<br />
“The scalability of<br />
Taktis means that it<br />
provides a futureproofed<br />
solution”<br />
www.kentec.co.uk<br />
Do you suffer<br />
fer<br />
from false fire<br />
alarms?<br />
Protective covers designed to reduce<br />
the threat of accidental or malicious<br />
activations causing unwanted fire<br />
alarms, evacuations and disruption<br />
More than 14,000 false fire alarms were<br />
accidentally triggered across England in<br />
2017/18 – disrupting schools and businesses,<br />
placing unnecessary strain on our emergency<br />
services and reducing the confidence the<br />
general public have in fire alarms.<br />
www.sti-emea.com<br />
info@sti-emea.com<br />
01527 520 999
Advertisement Feature: HVM<br />
Protecting Your World<br />
Frontier Pitts is the award-winning British<br />
manufacturer of security gates, automatic<br />
barriers, road blockers, rising and static<br />
bollards, pedestrian control gates and<br />
turnstiles, as well as the Anti-Terra Hostile<br />
Vehicle Mitigation (HVM) range which has been<br />
successfully IWA 14 and PAS 68 impact-tested.<br />
Here, the company explains some of the specific<br />
solutions on offer for end users<br />
From its UK headquarters in Crawley, Sussex, Frontier Pitts<br />
can provide a complete range of services for security and<br />
risk managers including design, site surveys, manufacture,<br />
installation and maintenance.<br />
Since 2004, the company has fulfilled its customers’<br />
requirements to protect their sites from acts of terrorism<br />
involving Vehicle-as-a-Weapon (VAW). Today, the company has<br />
the complete range of its impact-tested systems listed within the<br />
Centre for the Protection of National Infrastructure’s catalogue.<br />
That list includes a range of HVM solutions designed to<br />
mitigate VAW-style attacks. Frontier Pitts’ Terra gates, barriers<br />
and blockers are emboldened by a wide range of rising and static<br />
Terra bollards, all of which havel been successfully impact tested<br />
to IWA 14 and PAS 68.<br />
One of the company’s latest products is the HVM PAS 68 Terra<br />
Quantum side-folding retractable bollard solution. With a<br />
shallow foundation depth of only 450 mm required on site, the<br />
Terra Quantum bollard has been successfully PAS 68 impact<br />
tested and halts a 7.5-tonne vehicle travelling at 30 mph (48<br />
kph), resulting in zero penetration.<br />
Frontier Pitts has also designed the LPS 1175 bi-folding and<br />
sliding Platinum security gate range to Security Rating 2 and 3<br />
(which are proven to withstand forcible attack by an intruder<br />
using readily available hand tools).<br />
The Terra Diamond turnstile boasts a Security Rating of 3 and<br />
4 and has been approved for Government use. Interested parties<br />
should contact the CPNI direct (www.cpni.gov.uk).<br />
All of these products are also Secured by Design (the police<br />
service’s ‘designing out crime’ initiative) accredited.
Advertisement Feature: HVM<br />
Innovation in HVM<br />
While it’s not possible to secure every single<br />
street against vehicles being used in a criminal<br />
capacity, Heald outlines precisely why it’s<br />
absolutely imperative for security professionals<br />
and town planners alike to work together on<br />
ensuring risk mitigation at key locations<br />
Deployed as a tactic by terrorists acting in a lone wolf<br />
capacity, vehicle-based attacks are also now increasingly<br />
being used for other crimes (including ram-raids) and even<br />
as a means for assault. Securing key locations not only reduces<br />
the risk of harm from potential vehicle attacks, but also plays a<br />
vital role in creating a safe haven for people gathering together<br />
for public events and encourages footfall on High Streets.<br />
The challenge of providing effective security measures which<br />
work in built environments had also been an ongoing challenge<br />
for the hostile vehicle mitigation (HVM) industry. That is until<br />
Heald launched the only sliding bollard solution, known as the<br />
Matador, which can be installed both via shallow mount and<br />
surface mount technology.<br />
Stockton-on-Tees and South Tyneside have already installed<br />
sliding bollards around key areas to provide safe High Streets<br />
and outdoor event spaces on a permanent basis having opted<br />
for shallow mount installations which take into consideration<br />
issues with underground infrastructure.<br />
Cities such as Sheffield temporarily installed the Matador, in<br />
this instance to protect the World Snooker Championships<br />
following the bollards’ installation at the 2012 London Olympics.<br />
Such high security measures often result in a high carbon<br />
footprint, but Heald has continued to innovate the Matador in a<br />
bid to minimise the product’s environmental impact. The electromechanically<br />
operated Matador requires zero oil and uses up to<br />
80% less electricity.<br />
With readily available access to vehicles, it’s unlikely that they<br />
will cease to be used for criminal purposes, which is why it’s<br />
crucial the industry continues to innovate and provide end user<br />
solutions that seamlessly fit in with their surroundings.<br />
• To discover how Heald can support your organisation’s<br />
security needs visit www.heald.uk.com<br />
INNOVATORS, MANUFACTURERS<br />
AND INSTALLERS OF PERIMETER<br />
SECURITY PRODUCTS<br />
IWA crash<br />
tested to halt<br />
a 7.2 tonne<br />
truck at<br />
50 mph!<br />
THE ONLY SLIDING BOLLARD<br />
SOLUTION IN THE WORLD<br />
THE MATADOR<br />
THE COMMANDER<br />
THE RAPTOR<br />
Image: Chapman Brown Photography<br />
UNIQUE SECURITY PRODUCTS<br />
CRASH TESTED SECURITY<br />
SOLUTIONS FOR A SAFER WORLD<br />
www.heald.uk.com<br />
+44 (0)1964 535858<br />
@healduk<br />
Heald Ltd<br />
info@heald.uk.com<br />
Heald Ltd
Annual Conference & Awards<br />
Professionalising Healthcare Security<br />
14 November 2019<br />
Powered by<br />
We would like to thank these organisations for their support of<br />
the event of the important work NAHS does<br />
Conference Sponsors<br />
Awards Sponsor<br />
Food and Drink Sponsor<br />
Networking Drinks Sponsor<br />
Networking Drinks Sponsor<br />
There’s still time to book an exhibition space at NAHS 19,<br />
please contact hello@allsecurityevents.com<br />
For more information about the services AllSecurityEvents.com offer, please contact<br />
info@allsecurityevents.com
x<br />
RISKXtra<br />
Access Control: Corporate Offices<br />
There are a range of buildings that house<br />
corporate offices – from smaller, single-use<br />
structures that accommodate one business<br />
through to large multi-story, multi-tenancy<br />
blocks. In addition, these offices could be used<br />
for a range of businesses. Some may simply<br />
play host to marketing teams and act as a<br />
home base for a company’s IT Department,<br />
whereas others could be used as data banks for<br />
large organisations that contain a wealth of<br />
sensitive personal and financial data.<br />
With so many varying needs, choosing the<br />
ideal security solution can become a daunting<br />
task. However, working closely with an<br />
experienced manufacturer of security hardware<br />
can ensure the end user’s confidence in their<br />
choice and the safety of a building’s occupants<br />
and contents. What, then, are the options?<br />
Revolving doors<br />
Often found in multi-storey office blocks, there<br />
are two types of revolving door offered by<br />
access solution manufacturers. The first is a<br />
standard revolving door, which has the<br />
preliminary purpose of keeping adverse<br />
weather outside while at the same time<br />
allowing consistent, open access to the<br />
building. As the door is never fully “open”, it<br />
keeps out noise, rain and wind, while also still<br />
allowing for a continuous flow of people traffic.<br />
These types of doors are typically used to<br />
gain access to a reception area that will have<br />
further internal security behind.<br />
The second type is a security revolving door.<br />
Equipped with card readers, sensors and other<br />
security measures, these revolving doors are<br />
specifically installed with the intention of<br />
regulating access to a building and to prevent<br />
‘tailgating’ such that only one individual will be<br />
permitted to enter at a time, with sensors<br />
detecting if a second person has tried to follow<br />
close behind. If that scenario is detected, the<br />
door will lock down and refuse admission.<br />
To further improve security, regardless of the<br />
type of revolving door installed, today’s<br />
solution manufacturers can offer these doors<br />
with attack-rated and bullet-resistant glass.<br />
To select a revolving door that’s right for your<br />
building, it’s very important to approach<br />
leading manufacturers at the early stages of the<br />
design process and inform them of how the<br />
doors will be used, the footfall they experience<br />
and also, from an aesthetic standpoint, how the<br />
door will need to look. By providing these<br />
details early on, the ideal solution can be<br />
specified on schedule and to budget without<br />
costly delays or amendments down the line.<br />
For more stringent security measures, such<br />
as in those office developments where financial<br />
In Full Control of Access<br />
With a range of security systems on offer for corporate office<br />
buildings, it can be difficult to establish which one to specify.<br />
On that basis, Stephen Littlewood explains the different<br />
system options available for practising security and risk<br />
managers and outlines where they’re commonly specified<br />
information and Data Centres are stored, an<br />
ideal solution would be a security interlock.<br />
The highest level of security available for<br />
corporate offices, this two-door system requires<br />
an individual to present their identification card<br />
or number to the scanner or keypad and the<br />
first door opens. Once inside the interlock<br />
chamber, the first door will close and lock,<br />
which then allows the second door to open and<br />
the authorised individual to enter the premises.<br />
Only allowing one person in at a time through<br />
a combination of space limitations and a range<br />
of sensors built into the system, these are highend<br />
security solutions that require minimal<br />
space and are ideal for buildings experiencing<br />
low traffic and containing sensitive information.<br />
In addition to this, manufacturers will supply<br />
these interlock solutions with attack-tested and<br />
bullet-resistant glass to ensure robust<br />
protection of a building’s occupants and the<br />
equipment contained within.<br />
Turnstiles for access<br />
Having been around since the early 20th<br />
Century, turnstiles were originally used as a<br />
means to keep livestock penned-in to areas<br />
while allowing people to freely move in and out.<br />
Since then, while they’ve developed to<br />
incorporate identification and authorisation<br />
Stephen Littlewood:<br />
Specification Team Manager at<br />
dormakaba<br />
33<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Access Control: Corporate Offices<br />
technology, the mechanics have remained<br />
essentially the same. In essence, turnstiles use<br />
fixed arms to create physical restrictions of<br />
space to prevent unauthorised entry.<br />
The most typically used type of turnstile,<br />
often seen in entrances to office car parks or<br />
through reception areas, is a waist-high<br />
turnstile. With a sensor located either inside or<br />
on top of the panel beside it, the turnstile then<br />
turns once to allow one person entry. Due to<br />
the tight space between arms, this means<br />
tailgating isn’t going to be possible.<br />
More robust alternative<br />
However, waist-high barriers do have the risk of<br />
being jumped over due to their low height.<br />
While this is unlikely to be a risk in a reception<br />
area or the area connecting an office to its car<br />
park, security and risk managers operating in<br />
corporate offices with more sensitive data or<br />
car parks that are also connected to public<br />
spaces may want something more robust to<br />
protect occupants and vehicles.<br />
In this instance, the correct turnstile to be<br />
used would be a full-height turnstile.<br />
Commonly around 2.1 metres in height, these<br />
are installed with a high fence or wall either<br />
side in order to eliminate the risk of someone<br />
being able to jump the turnstiles.<br />
Full-height turnstiles are also available in two<br />
different options – High Entrance/Exit Turnstiles<br />
(HEET) and Exit-Only. HEET turnstiles can rotate<br />
in both directions and allow two-way traffic,<br />
whereas Exit-Only turnstiles only work in one<br />
way and don’t allow re-admission subsequent<br />
to someone exiting the building.<br />
However, for office use, these will typically be<br />
HEET turnstiles to allow optimum access for<br />
authorised individuals.<br />
Speed gates<br />
Speed gates are the most commonly used form<br />
of access control solution to be found in a<br />
corporate office environment. Using glass door<br />
leaves and barrier sensors, these are often<br />
found in the reception areas of large, multistorey<br />
corporate buildings.<br />
With additional waist-high sensors in either<br />
side of the barrier, tailgating will not be<br />
possible so the gates only open for one person<br />
at a time. For extra peace of mind,<br />
manufacturers can also offer a further option of<br />
having larger sensors put in place in order to<br />
tighten the gap between individuals passing<br />
through the barriers.<br />
To know which type is most suited for a<br />
particular project, it’s best to discuss the<br />
options with a manufacturer early on in the<br />
design process. During this time, they can<br />
establish the amount of footfall the barriers will<br />
see, ascertain exactly what level of security is<br />
required for any data or items inside the<br />
building and how much space that’s available in<br />
the area concerned for installation.<br />
For example, if it’s a high traffic building<br />
which needs to allow through a frequent<br />
amount of authorised personnel, more speed<br />
gates will be required to facilitate less delays<br />
for colleagues entering the building.<br />
Another example will be the level of external<br />
security available in the area. For instance, a<br />
reception area that’s manned on a constant<br />
basis by, for example, a security officer will<br />
likely require standard height door leaves of<br />
around waist height as the chances of someone<br />
trying to jump over the barriers are slim.<br />
However, if the reception area isn’t manned<br />
by a physical presence, or the offices behind<br />
the gates contain sensitive data, it’s<br />
recommended that glass door leaves up to a<br />
height of 1.8 metres tall be deployed. At this<br />
height, and with the space in-between gates<br />
being limited by slim barriers, the chance of<br />
someone jumping over the gates is eradicated.<br />
For interior use only<br />
It’s also crucial to note that speed gates are<br />
strictly for interior use only. Due to the sensitive<br />
nature of the sensors, stray debris from rain,<br />
leaves or dirt could interfere with the barriers,<br />
thus eradicating the level of security.<br />
Corporate offices come in all shapes and<br />
sizes – from multi-tenancy buildings that house<br />
many different companies to singular offices<br />
that contain highly sensitive data and computer<br />
banks. All must have tight security in place to<br />
prevent unauthorised personnel from entering.<br />
To ensure the most appropriate system has<br />
been specified, it’s crucial for security and risk<br />
managers to engage in early discussions with<br />
leading manufacturers of access control<br />
regimes who’ll be able to supply a system<br />
solution that allows workers to enter and exit<br />
their place of work with ease and remain safe.<br />
“Speed gates are the most commonly used form of access control<br />
solution to be found in a corporate office environment. Using glass door<br />
leaves and barrier sensors, these are often found in the reception areas<br />
of large, multi-storey corporate buildings”<br />
34<br />
BENCHMARK<br />
Smart Solutions<br />
BENCHMARK<br />
Innovative and smart solutions can add value and benefits to<br />
modern systems for customers. With the technological landscape<br />
rapidly evolving, the Benchmark Smart Solutions project assesses<br />
the potential on offer from system integration, advanced<br />
connectivity and intelligent technology. Bringing together field trials<br />
and assessments, proof of concept and real-world experience of<br />
implementing smart solutions, it represents an essential resource<br />
for all involved in innovative system design.<br />
Launched in 2017, Benchmark Smart Solutions is the industry’s only real-world resource for security<br />
professionals who are intent on offering added value through the delivery of smarter solutions.<br />
@Benchmark_Smart<br />
Partner Companies<br />
www.benchmarksmart.com
x<br />
RISKXtra<br />
Facilitating Means of Escape<br />
Under Article 14 of the<br />
Regulatory Reform<br />
(Fire Safety) Order<br />
2005, the designated<br />
‘responsible person’<br />
must ensure that<br />
“routes to emergency<br />
exit from premises and<br />
the exits themselves<br />
are kept clear at all<br />
times”. The provision<br />
of a clear and<br />
straightforward means<br />
of escape is vital for<br />
life safety. As Liam<br />
Hunt points out, any<br />
failure to do so can<br />
prove to be immensely<br />
costly – in every sense<br />
of the word<br />
The importance of effective escape routes is<br />
highlighted by British engineer and civil<br />
servant Dame Judith Hackitt in her<br />
Independent Review of Building Regulations<br />
and Fire Safety. “One of the significant risks<br />
created by these emergency situations,”<br />
observes Dame Judith, “is the possibility of<br />
panic resulting in crowding in escape routes<br />
and at exits where people may be put at risk of<br />
significant harm – emphasising the importance<br />
of ensuring that routes and exits have been<br />
designed, specified and constructed with this<br />
risk in mind.”<br />
The Independent Review’s final report –<br />
published in May last year – was commissioned<br />
by central Government following the Grenfell<br />
Tower fire in June 2017 in order to make<br />
recommendations on the future regulatory<br />
system. In addition to a new regulatory system,<br />
Dame Judith also outlined the need for clear<br />
responsibilities (a lack of clarity on roles and<br />
responsibilities when it comes to buildings’<br />
safety was, according to Dame Judith, one of<br />
the circumstances that realised the Grenfell<br />
Tower disaster), more rigorous enforcement<br />
powers for monitoring building safety, more<br />
effective product testing and better<br />
procurement practices.<br />
All emergency routes and exits must lead as<br />
directly as possible to a place of safety and be<br />
adequate for everyone to escape quickly and<br />
safely, but far too frequently it appears that<br />
escape routes are becoming makeshift storage<br />
areas, while fire safety is itself becoming<br />
something of an afterthought.<br />
A disregard for the fire safety regulations can<br />
have dire consequences. Back on Tuesday 8<br />
May 1979, a fire ripped through Manchester’s<br />
flagship Woolworths’ store opposite Piccadilly<br />
Gardens. A number of fire safety failures<br />
caused the death of ten people inside the<br />
premises and left 47 individuals with injuries.<br />
It’s believed that the fire was started by a<br />
damaged electrical cable, which had furniture<br />
stacked in front of it. An inquiry showed that,<br />
although the store’s fire precautions met all<br />
legal requirements, the spread of the fire and<br />
the high number of casualties were in part due<br />
to the absence of measures such as a fire<br />
sprinkler system to stop the spread of the fire<br />
from the Furniture Department and the use of<br />
polyurethane foam in the furnishings – a<br />
material which is highly highly toxic, but cheap<br />
and (at that time) legal for use in items of<br />
furniture. This episode would have<br />
consequences for later legislation.<br />
Emergency exits were poorly marked. Some<br />
exit doors required a key, while others had<br />
been locked to prevent shoplifting. Those<br />
attempting to flee the toxic smoke were unable<br />
to escape through the very doors that were<br />
there to save them. People actually died within<br />
touching distance of the emergency exits.<br />
As we’re all well aware, tragedies involving<br />
flawed fire safety are not confined to the<br />
history books. Some 40 years later lessons<br />
have seemingly not been learned. Escape<br />
routes and exits continue to be misused.<br />
One popular High Street retailer was ordered<br />
to pay almost £70,000 after an escape route<br />
inside one of its stores was reduced to just 30<br />
cm by the ‘dumping’ of crates and stock, while<br />
a care home in Somerset was hit with a<br />
£100,000 fine after fire doors and escape<br />
routes were found to be blocked.<br />
Preventing misuse<br />
In addition to emergency lighting and dedicated<br />
signage, extra precautions can be taken to<br />
prevent misuse. Door alarms may be fitted to<br />
vulnerable emergency exit doors. The alarmed<br />
devices are a highly effective way in which to<br />
alert the management team of any<br />
unauthorised exits and entries through<br />
emergency exit doors.<br />
Text and symbols act as an additional<br />
deterrent to misuse, with the unit serving as an<br />
inexpensive security device helping to guard<br />
36<br />
Access Control: Emergency Exits and Evacuations<br />
against theft, safeguarding escape routes for<br />
real emergencies and eliminating the<br />
temptation to lock emergency exits to<br />
discourage would-be thieves.<br />
To comply with current regulations and<br />
ensure adequate means of escape, emergency<br />
egress must not rely on the operation of an<br />
access control system that requires the use of<br />
an electronic key or other means.<br />
In case of emergency<br />
In case of emergency, appropriate override<br />
arrangements must be in place to maintain a<br />
clear means of escape. This is particularly<br />
important in the case of fail-secure locks. The<br />
provision of such a device is normally found in<br />
the form of a green break glass unit. This is in<br />
accordance with BS 7273-4 which requires a<br />
green break glass point that provides a reliable<br />
override control and a secure route to safety.<br />
Even in those instances where a fail-safe lock<br />
is employed (and whereby an emergency door<br />
is wired such that, when a fire alarm sounds,<br />
the door automatically opens) it’s still Best<br />
Practice to install a break glass Call Point next<br />
to the exit in case of any failure with the fire<br />
alarm system. This is also important for<br />
emergency scenarios not related to fire.<br />
Opening an access control-monitored door<br />
through the operation of an emergency door<br />
release break glass unit will result in an alarm<br />
event. This is, of course, useful in a real<br />
emergency situation, but can create nuisance<br />
false alarms when the unit’s confused with a<br />
non-emergency switch for releasing an<br />
electronically locked door.<br />
BS 5839 and Call Points<br />
Additionally, BS 5839 recommends that fire<br />
manual Call Points should be located on all<br />
final exits. Due to this close proximity, some<br />
false alarms occur when an individual fails to<br />
distinguish the difference between the two.<br />
This was just one of the findings noted by the<br />
Building Research Establishment (BRE) in its<br />
research into the causes of false fire alarms,<br />
which cost the UK an estimated £1 billion every<br />
year. The BRE’s research project entitled ‘Live<br />
Investigations of False Fire Alarms’ revealed<br />
that: “Some false fire alarms arise from<br />
accidentally trying to use a manual Call Point to<br />
release an electronically locked door, rather<br />
than the normal control provided for this<br />
purpose, or the emergency override.”<br />
The latest Home Office figures reveal that<br />
there were a total of 14,600 false fire alarms in<br />
2018-2019 caused by a person ‘accidentally or<br />
carelessly’ activating apparatus. That’s the<br />
highest figure for over five years and<br />
“Fitted with an alarm, the tough covers can prevent<br />
malicious and accidental activation while acting as an<br />
additional pre-alarm in a real emergency scenario”<br />
demonstrates an increase of 491 on the<br />
previous year.<br />
Break glass units are particularly vulnerable<br />
to accidental activations in high volume areas<br />
such as busy corridors where a stray bag or a<br />
misguided trolley can easily knock and activate<br />
a Call Point. Call Points with a re-settable<br />
element that mimic the feel of breaking glass<br />
without the need to replace sensitive broken<br />
parts help to save both time and money.<br />
Appropriate signage<br />
BS 7273-4 recommends that, in situations<br />
where the break glass unit is likely to be used<br />
by persons other than trained staff, appropriate<br />
signage must be provided and should read: “In<br />
emergency, break glass to open door” (thus<br />
distinguishing it from a fire alarm Call Point).<br />
However, signage is often ignored or easily<br />
overlooked, meaning that the threat of<br />
accidental activation persists. In these<br />
situations a more robust approach to tackling<br />
false alarms is required. Polycarbonate covers<br />
can retrofit over a break glass Call Point, in turn<br />
preventing the emergency door release from<br />
being used in non-emergency situations.<br />
Fitted with an alarm, the tough covers can<br />
prevent accidental and malicious activation<br />
while acting as an additional pre-alarm in a real<br />
emergency scenario. Covers can even be<br />
embedded with a ‘Glow Guide’ making it easier<br />
to locate the break glass unit in unlit areas.<br />
This embellishes any emergency exit lighting.<br />
Maintaining a balance<br />
In regards to fire safety, a recent revision to BS<br />
5839-1:2017 recommends: “All manual Call<br />
Points should be fitted with a protective cover<br />
which is moved to gain access to the frangible<br />
elements.” It’s advisable that the same<br />
recommendation would be suitable for an<br />
access control application.<br />
Anchored by legislation, technical standards<br />
and research, emergency exits and escape<br />
routes are fundamental to life safety. Although<br />
maintaining a balance between security and fire<br />
safety can be difficult, green break glass units<br />
provide a solution.<br />
While the use of such apparatus can<br />
contribute to unnecessary false alarms, options<br />
are available to negate misuse, allowing for an<br />
effective partnership between access control<br />
and means of escape and helping to save lives.<br />
Liam Hunt:<br />
Marketing Executive (EMEA) at<br />
Safety Technology<br />
International (STI)<br />
37<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
The Changing Face of Security Services<br />
Better Screened, Better Trained, Better Paid<br />
for everyone and working hard to increase<br />
gender diversity in a male-dominated industry.<br />
Recruitment, selection and screening<br />
processes simply must reflect the importance<br />
and value of the role of the security officer. In<br />
an age where open source intelligence is<br />
becoming the norm, security providers<br />
increasingly use leading-edge technology to<br />
provide an enhanced level of screening.<br />
Security services is an<br />
industry where,<br />
historically, pay is low<br />
and employee<br />
turnover is high. It’s<br />
where officers regard<br />
their role as a job<br />
rather than a career.<br />
Does this sound like<br />
the professional<br />
security services<br />
industry in which we<br />
work? Craig Robb<br />
examines the<br />
importance of<br />
perception<br />
BE SMART!<br />
Read Risk Xtra<br />
Magazine on your tablet<br />
or smartphone using<br />
the FREE app<br />
x<br />
RISKXtra
x<br />
RISKXtra<br />
The Changing Face of Security Services<br />
Appealing to Generation Z<br />
from being helpful in driving valuable talent<br />
into our business sector.<br />
Now more than ever we need to provide easy<br />
access to the digital resources and<br />
opportunities available and really reach the<br />
foundations of connectivity for our future<br />
security professionals.<br />
With security playing a part in most people’s<br />
everyday lives, be it setting the house alarm,<br />
reporting a phishing e-mail or watching the<br />
latest episode of Line of Duty, we do seem to<br />
find it challenging to be a career of choice for<br />
the next generation. If we’re to become more<br />
attractive, it’s ourselves who must make the<br />
sector more appealing. Tired offices with<br />
outdated management styles and/or promotion<br />
based on length of service don’t make the cut<br />
any longer and need to be banished to the past.<br />
Four generations are<br />
now employed side by<br />
side – Baby Boomers,<br />
Generation X,<br />
Millennials and<br />
Generation Z – and<br />
each go to work with<br />
their own set of values<br />
and attitudes. Neill<br />
Catton explains why<br />
Generation Z will<br />
become increasingly<br />
important for the<br />
security sector<br />
Neill Catton:<br />
Managing Director of CIS<br />
Security<br />
With a surge of Baby Boomers gradually<br />
retiring, Generation Z are the young<br />
recruits of today and the future<br />
candidate base. To compete for these<br />
candidates now and into the future, employers<br />
in the security industry need to tune into this<br />
generation’s unique characteristics.<br />
One of the most distinctive features of<br />
Generation Z is that they’re the most technically<br />
literate and technologically ‘savvy’ generations.<br />
Having been immersed in technology and the<br />
digital world from birth, they’re continually<br />
wired and plugged-in and have finessed multitasking<br />
to the Nth degree.<br />
I recently spoke with Rick Mounfield (CEO of<br />
The Security Institute). The Institute has<br />
produced a video regarding careers in this<br />
sector. This shows a wealth of opportunities for<br />
aspiring security professionals.<br />
While the content and commitment in the<br />
video are excellent, I believe that this should be<br />
shared on a far greater stage. Rick confirmed<br />
that the video is being rolled out through Job<br />
Centres and links with the Security Industry<br />
Authority as well as the DWP. Further steps are<br />
needed to promote this good work to attract<br />
what I see as untapped talent in Generation Z<br />
(ie 15 to 25 year-olds).<br />
Generation Z’s members expect to access<br />
information differently compared to previous<br />
generations, which ultimately translates into a<br />
different perception towards future job<br />
perspectives. They’re looking for quick access<br />
and ease of use. A couple of clicks and, if it’s<br />
not there, attention could be focused on a<br />
parody security clip on YouTube which is far<br />
Employee-focused<br />
We must make our industry more employeefocused,<br />
have flexible working arrangements<br />
and invest in both technology and training and<br />
development. If we want to attract some of the<br />
best talent and empower it, we need to emulate<br />
what the best can offer. Simple touches like<br />
more welcoming facilities, more tangible<br />
performance plans, mentorship and<br />
meaningfulness in what our people do are key.<br />
Continuous appraisal processes are what the<br />
younger generations seek.<br />
This is also a call to action for all security<br />
services companies to engage with local<br />
schools. Maybe find a particular sixth form with<br />
which you can engage and offer opportunities.<br />
The desire for apprentice schemes is<br />
increasing. Although the Apprenticeship Levy is<br />
challenging, there’s scope to fund leadership<br />
training and develop the supervisors, managers<br />
and specialists of the future.<br />
We must go to the source. We face stiff<br />
competition from the ‘new tech’ and the<br />
perceived glamour that goes with this.<br />
Generation Z will become an increasingly<br />
important segment of the future of the security<br />
world so we must devise strategies to attract,<br />
train, engage and retain a motivated pool of<br />
professionals coming from such younger<br />
generations. Access the Institute’s video at<br />
https://www.youtube.com/watch?v=Fxx4wy7a<br />
FBc. Pass the link on to every contact you know<br />
who may have direct involvement with school<br />
leavers and graduates.<br />
I’m sure we’ll be able to reap the rewards<br />
coming from it in business performance and the<br />
quality of the security services provided.<br />
40<br />
Real-Time Analysis<br />
SECURITAS<br />
INTELLIGENCE UNIT<br />
In a world where businesses constantly<br />
face an ever-increasing array of risks and<br />
threats, how confident are you that your<br />
business is safe?<br />
Securitas has a global network of security<br />
risk experts ready to evaluate your current<br />
security service.<br />
Whether you need 24/7 support from our<br />
Securitas Intelligence Unit, or access to<br />
intelligence services for specific events<br />
or live incidents, our analysts provide<br />
actionable intelligence based on specific<br />
threat assessments and investigations.<br />
Get in touch today to find out how we can<br />
keep your business safe.<br />
soc.intelligence@securitas.uk.com<br />
@SecuritasUK<br />
www<br />
securitas.uk.com<br />
24/7 Reporting
x<br />
RISKXtra<br />
Meet The Security Company<br />
upwards of 30 countries, delivering the best<br />
possible service designed to meet and,<br />
ultimately, exceed the needs of our clients.<br />
This is the twenty first<br />
instalment in a series<br />
of articles for the<br />
readers of Risk Xtra<br />
where we shine the<br />
spotlight on NSIapproved<br />
businesses<br />
for the benefit of risk<br />
and security managers<br />
who purchase security<br />
guarding as well as<br />
systems-focused<br />
solutions. Answering<br />
our questions on this<br />
occasion is Jacqui<br />
Paice, managing<br />
director of Apleona<br />
HSG Facility<br />
Management UK<br />
About the National Security Inspectorate<br />
Risk Xtra: Can you briefly describe your<br />
business’ activities and what you consider to<br />
be your USP as an organisation?<br />
Jacqui Paice: Apleona HSG Facility<br />
Management, which is part of the global<br />
Apleona Group, is a UK and Ireland provider of<br />
integrated facilities management. With a client<br />
base that extends across more than 250 UK and<br />
Ireland operational sites, we employ circa 3,000<br />
members of staff to deliver service solutions<br />
that work for our clients.<br />
Our service solution is tailored to deliver<br />
facilities management and workplace services<br />
that focus through a model of self-delivery. We<br />
provide a full range of hard and soft services for<br />
private and public organisations across a range<br />
of sectors, including corporate, retail and<br />
Shopping Centres, banking, pharmaceuticals,<br />
engineering and processing, education, local<br />
and central Government and hospitals. Critical<br />
and non-critical environments are covered.<br />
Apleona in the UK and Ireland uniquely<br />
benefits from being part of a leading European<br />
real estate and facility management company.<br />
With this pan-continental support, we’re in the<br />
fortunate position of being able to work<br />
alongside more than 20,000 colleagues in<br />
The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />
company limited by guarantee and operates as a UKAS-accredited certification<br />
body specialising in the security and fire safety sectors.<br />
For over 40 years, the NSI has served to protect businesses, homeowners<br />
and the general public alike, raising standards by providing robust and high<br />
quality audits of both security and fire safety service providers.<br />
Risk Xtra: What do your clients value most<br />
about the services you deliver?<br />
Jacqui Paice: As a trusted service provider, our<br />
clients value how we optimise their workspace<br />
and our quality assured self-delivery capability,<br />
which is strengthened by smart technology.<br />
In addition, our open and honest approach<br />
towards business and the reassurance that our<br />
service delivery is underpinned by one of<br />
Europe’s leading estates and facilities<br />
management companies is highly significant.<br />
Risk Xtra: How do you feel accreditations<br />
have assisted your company?<br />
Jacqui Paice: The accreditations that Apleona<br />
has for the services we provide, for example<br />
Approved Contractor Scheme (ACS)<br />
accreditation with the Security Industry<br />
Authority (SIA) and NSI Gold for security, are an<br />
indication to potential clients that we provide a<br />
high standard of customer service and<br />
compliance with security legislation.<br />
In addition, the high marks achieved in the<br />
external auditing of the company, placing the<br />
business in the Top 5% of all ACS-accredited<br />
companies, absolutely demonstrates the<br />
importance that Apleona as an organisation<br />
places on achieving and maintaining a high<br />
level of customer service.<br />
Risk Xtra: Specifically, what value does ACS<br />
registration and NSI Guarding Gold approval<br />
bring to your business and its clients?<br />
Jacqui Paice: SIA ACS approval is not only a<br />
source of confidence for buyers of security<br />
services as they seek to select a trusted<br />
provider, but it also offers an excellent<br />
framework for setting, improving and<br />
monitoring our own standards.<br />
Additionally, it has key links to our certified<br />
9001 Quality Management System.<br />
SIA ACS approval is voluntary and positions<br />
our company as having been independently<br />
assessed to meet a recognised level of<br />
performance. Being approved to SIA ACS<br />
demonstrates our committment to customer<br />
service and compulsory employee licensing.<br />
42<br />
Meet The Security Company: Apleona HSG Facility Management UK<br />
In association with the<br />
Risk Xtra: In practice, what are the main<br />
differences between ACS registration and NSI<br />
Guarding Gold approval?<br />
Jacqui Paice: The SIA introduced the ACS to<br />
raise performance standards within the security<br />
industry. The ACS is the quality benchmark<br />
within security, and sets out criteria that<br />
companies must adhere to in order to be SIA<br />
ACS registered. This is referred to as the<br />
Standard approval.<br />
Apleona is further accredited to NSI Guarding<br />
Gold that enables the company to apply for the<br />
ACS accreditation via the passport scheme,<br />
which is officially defined as follows. Under<br />
Routes to Approval on its website, the SIA<br />
explains: “An accredited ACS passport scheme<br />
is an alternative to the standard route to<br />
approval via a scheme managed entirely by an<br />
assessing body. A passport scheme has<br />
additional requirements and benefits and adds<br />
value to private security industry businesses.<br />
Assessment bodies (of which the NSI is one of<br />
only four) are able to certificate businesses<br />
against a variety of standards independently to<br />
us. Some relate specifically to the security<br />
industry, while others are more general<br />
business or quality standards. A passport<br />
scheme will specify the standards required and<br />
any other criteria required to be met in order to<br />
achieve certification. These are often called<br />
approval criteria.”<br />
The definition continues: “The assessment<br />
body will compare its passport scheme<br />
requirements to those of the ACS. Where there<br />
are gaps, it must address these. The<br />
assessment body will do this by specifying<br />
additional requirements. These are often<br />
referred to in a separate document called a<br />
passport specification. A range of standards,<br />
together with the assessment body’s other<br />
criteria and passport specification, make up<br />
their ACS passport scheme. This is the passport<br />
scheme we have accredited as being equivalent<br />
to or better than the ACS standard route. Where<br />
the assessment body has assessed a business<br />
against its passport scheme, and the business<br />
has met the passport scheme requirements, the<br />
assessing body will then issue a passport<br />
certificate. This certificate can then be<br />
submitted to us as part of an ACS application.”<br />
It should be noted that NSI Gold<br />
accreditation is recognised as the most<br />
stringent accreditation to obtain in the security<br />
industry. In addition, NSI Gold approval<br />
signifies that, as well as complying with<br />
industry-specific standards, a company<br />
operates a Quality Management System (no<br />
written QMS is required under the ACS, only<br />
that an organisation will have to demonstrate<br />
to an assessor how its chosen methods are<br />
effective in delivering high levels of customer<br />
satisfaction and a sustainable business) and is<br />
compliant with BS EN 9001.<br />
Risk Xtra: How do you feel technology has<br />
changed the industry over the last couple of<br />
years and what do you believe will be the<br />
direction of travel in the future?<br />
Jacqui Paice: Technology has provided a<br />
potentially safer working environment for<br />
security personnel, a good example of which is<br />
the radio-based ‘Man Down’ system used<br />
primarily by lone workers. ‘Man Down’ uses a<br />
tilt-switch (special motion sensors) in the radio<br />
which can detect and alarm in the following<br />
circumstances: when the user isn’t moving,<br />
when the user is moving more than what’s<br />
considered to be normal and when the radio is<br />
positioned in a different angle than usual for a<br />
defined period of time.<br />
Another good example of technology<br />
bringing about positive change is through<br />
body-worn video cameras whereby the wearer<br />
activates the system when they feel they’re<br />
entering into potential conflict situations. This<br />
system not only records what’s seen, but also<br />
what’s said and ensures that the wearer acts in<br />
a correct and proper manner while also<br />
providing vital evidence to the police service<br />
and wider authorities should this be required.<br />
Security innovations in the future will<br />
concentrate on the cyber realm, access control<br />
systems to include intruder alarm security,<br />
enhancements to CCTV systems – for example,<br />
facial recognition that’s 100% accurate –<br />
counter-terrorism measures and a form of<br />
technology that could potentially remove the<br />
need for a physical security presence on site in<br />
its entirety.<br />
Risk Xtra: When it comes to negotiating<br />
contracts and responding to tender requests,<br />
what aspects are of most value to customers<br />
and how are these changing?<br />
Jacqui Paice: For many customers, it must be<br />
said that price, value for money and the quality<br />
of service being delivered by competent and<br />
skilled staff remain the most important aspects.<br />
However, innovation – often through the<br />
introduction of new technologies as part of a<br />
security programme – is now increasingly<br />
important to many of our customers.<br />
In order to ensure that we deliver the best<br />
possible bespoke service to our clients,<br />
Apleona continuously looks to fully understand<br />
the culture, vision, values and unique<br />
circumstances of each potential partner<br />
organisation. The simple fact is there’s no ‘off-<br />
Jacqui Paice:<br />
Managing Director of Apleona<br />
HSG Facility Management UK<br />
43<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Meet The Security Company: Apleona HSG FM UK<br />
Name<br />
Jacqui Paice<br />
Job title<br />
Managing Director<br />
Time in security business<br />
sector<br />
Occupied senior FM roles<br />
within the business for more<br />
than eight years. Promoted to<br />
managing director for UK FM,<br />
a Board position, in June 2019<br />
Location of the business<br />
UK and Ireland-wide with<br />
head offices in London and<br />
Dublin<br />
Areas of expertise<br />
Apleona employs trained and<br />
qualified security officers who<br />
patrol car parks, monitor<br />
Control Rooms, deliver key<br />
holding services, manage<br />
loading bays, security-check<br />
visitors and provide access<br />
control solutions<br />
Accreditations<br />
NSI Guarding Gold, SIA<br />
Approved Contractor,<br />
SafeContractor, OHSAS 18001,<br />
CHAS, ISO 14001, ISO 9001,<br />
Investors in People, Member<br />
of the International<br />
Professional Security<br />
Association, Member of the<br />
Institute of Workplace and<br />
Facilities Management<br />
the-shelf’ solution for any client and this is<br />
precisely why we wouldn’t offer one.<br />
Apleona aims to be the best in everything<br />
that we do and we continuously look to<br />
develop innovative approaches to enhance our<br />
service provision, such as our award-winning<br />
Ops 9 system hand-held technology solution<br />
employed on behalf of UK clients including<br />
Shopping Centres.<br />
Risk Xtra: How has Government legislation<br />
(eg the National Minimum Wage, the<br />
National Living Wage and changes to holiday<br />
pay) affected your business? Do you believe<br />
such legislation is a good thing?<br />
Jacqui Paice: The National Minimum Wage, the<br />
National Living Wage and changes to holiday<br />
pay have most certainly affected the business<br />
in respect of placing additional pressures upon<br />
the ongoing challenge of supporting clients for<br />
whom cost control remains an increasingly<br />
high priority.<br />
As an organisation that places the people<br />
delivering our services at the heart of<br />
everything we do, Apleona supports legislation<br />
that ensures those who work for us are<br />
rewarded with fair rates of pay rising in line<br />
with inflation. Indeed, Apleona has worked<br />
with its clients to go further than the required<br />
legislation and, for example, looks to pay the<br />
Living Wage to our employees.<br />
Risk Xtra: What are the most important<br />
attributes you look for in your security<br />
officers and staff members in general?<br />
Jacqui Paice: Apleona firmly believes that our<br />
teams and individuals are the face of our<br />
company. They’re responsible for the delivery<br />
of our services day in, day-out and are the<br />
most obvious touch point for our clients.<br />
With this very firmly in mind, we look to<br />
recruit the appropriate talent for all of our roles<br />
and, as well as the absolute core competencies<br />
of being professional, honest, having integrity,<br />
possessing good communication skills and<br />
being adaptable to challenging situations, our<br />
‘Apleona Values’ help to identify what might be<br />
termed the additional ‘X-Factor’ that makes for<br />
a special employee.<br />
Thanks to the ‘Apleona Values’ we target<br />
three key areas: ‘Attitude’, ‘Performance’ and<br />
‘Style’. Through these, ‘We Champion<br />
Individuality’, ‘We Create Real Impact’ and ‘We<br />
Strive To Inspire’.<br />
By way of our internal awards programme,<br />
designated the ‘Apleona All-Stars’, we<br />
continually recognise and reward those who<br />
best demonstrate these key attributes. This<br />
helps to ensure that our teams and individuals<br />
always embody exactly what Apleona stands<br />
for as an organisation.<br />
Risk Xtra: How can the SIA, the NSI and<br />
industry standards best serve the sector in<br />
addition to the needs of your company’s<br />
clients and the wider public interest? Will<br />
the planned introduction of business<br />
licensing be a positive step?<br />
Jacqui Paice: This can be achieved by the<br />
Regulator and the Inspectorate engaging in<br />
regular dialogue and consultation with those<br />
involved in the provision of security services.<br />
Through this, the SIA and the NSI will be in a<br />
position to listen to the concerns of such<br />
organisations, while at the same time keeping<br />
up-to-date in regards to changes in technology<br />
that may affect the legislation. The Regulator<br />
can also learn about some of the restrictions<br />
encountered by companies in complying with<br />
that legislation.<br />
As yet, there’s still no date set as to when<br />
business licensing will come into effect.<br />
However, when it does we believe that it will be<br />
a positive step. The requirement for all security<br />
services providers to demonstrate that they’re<br />
‘fit and proper’ to adequately supply such<br />
services for clients can only be positive for the<br />
quality and reputation of the industry and will<br />
prove to be further progress beyond the<br />
present system of ‘badges’ for security officers,<br />
CCTV operators, door supervisors and the<br />
voluntary ACS.<br />
Among the factors regarding whether or not<br />
a business will gain a licence is ‘integrity’, a<br />
word which (as the advice document sets out)<br />
covers not only facts such as SIA ‘compliance<br />
actions’ against a firm or going insolvent, but<br />
matters of opinion such as ‘any significant<br />
complaints against the business’.<br />
To gain a licence, any business and its<br />
‘controlling minds’ will also have to show<br />
‘financial probity’ and pass criminal record<br />
checks ‘in relation to all controlling minds’<br />
even if individuals have already been subject to<br />
such checks for individual SIA licences. It can<br />
be expected that business licensing would<br />
provide a further degree of comfort to clients.<br />
44<br />
for a safer world 0115 714 9990<br />
CALL FOR A<br />
FREE DEMO<br />
COST EFFECTIVE<br />
PAY-AS-YOU-GO<br />
SERVICE.<br />
CANCEL AT ANY TIME.<br />
LOW-COST - ADVANCED CLOUD-BASED ALARM PLATFORM<br />
Use the management function<br />
of webeyeCMS to easily control<br />
and monitor all your alarms<br />
PATENTED SYSTEM<br />
FOR RELIABLE<br />
ALARM DELIVERY<br />
FULL<br />
AUDIT<br />
TRAIL<br />
VIDEO<br />
CLIPS TO<br />
PHONE/BROWSER<br />
FREE<br />
TRAINING<br />
PROVIDED*<br />
FREE UK BASED<br />
TECH SUPPORT*<br />
8.00AM-10.30PM<br />
GIVING INSTALLERS THE POWER TO IMPROVE EFFICIENCY & SAFETY<br />
Part of webeyeCMS is a web-based portal operating on any internet-connected device and is<br />
<br />
<br />
<br />
Delivery in seconds for immediate response<br />
<br />
worker safety<br />
Won many awards for reliable alarm delivery<br />
<br />
Browser version can be white labelled with<br />
your own logo<br />
<br />
Call 0115 714 9990 for a FREE demonstration<br />
*Availavle on products and services supplied by Webeye Limited.
x<br />
RISKXtra<br />
As one of its stated<br />
strategic initiatives,<br />
ASIS International has<br />
been actively involved<br />
in promoting the<br />
adoption of Enterprise<br />
Security Risk<br />
Management (ESRM).<br />
ESRM is a strategic<br />
security programme<br />
management<br />
approach that ties an<br />
organisation’s<br />
security practice to its<br />
mission and business<br />
goals using globally<br />
established and<br />
accepted risk<br />
management<br />
principles. Rachelle<br />
Loyear, Mike Hurst,<br />
Michael Gips, Tim<br />
McCreight and Tim<br />
Wenzel delve into the<br />
fine detail for the<br />
benefit of practising<br />
security managers<br />
Rachelle Loyear CISM MBCP:<br />
Vice-President of Integrated<br />
Security Solutions at G4S (US),<br />
ESRM: A Security Programme<br />
Maturity Model<br />
ESRM recognises that security<br />
responsibilities are shared by both security<br />
and business leadership, but that all final<br />
security decision-making is the preserve of<br />
business leaders. The role of the security leader<br />
in ESRM is to manage security vulnerabilities to<br />
enterprise assets in a risk decision-making<br />
partnership forged with the organisation’s<br />
leaders in charge of those assets.<br />
When ESRM is applied, ‘Security’ changes its<br />
primary driver in the overall organisation from<br />
being a group that performs a set of tasks to a<br />
role: a role of managing holistic security risk,<br />
partnering with the business leaders of the<br />
organisation to mitigate that risk in line with<br />
business tolerances and enabling the<br />
organisation to continue to fulfil its primary<br />
business mission as assets are protected in line<br />
with their business value.<br />
‘Security’ is no longer just about checking IDs<br />
at entrance gates, installing anti-virus software<br />
or trying to keep retail store employees from<br />
stealing. Those are tasks. Under ESRM, security<br />
is more about ensuring that all of those tasks<br />
are carried out within an agreed-upon business<br />
model that weighs security risk against<br />
tolerable business impact and manages<br />
security risk mitigation within that model.<br />
That doesn’t mean those tasks are not<br />
important anymore. However, it does mean<br />
that, when they’re performed, they’re<br />
performed for a reason.<br />
ESRM means security decisions are made by<br />
the right person, with the right authority and<br />
accountability and for the right reasons.<br />
Reasons based on defined risk principles.<br />
ESRM in practice<br />
What does all of this mean in practice, then? In<br />
its simplest terms, it means that instead of just<br />
‘doing security’ the way we always have, we<br />
first ask ourselves some fundamental – and<br />
fundamentally important – questions. Here are<br />
a few of the most basic: What’s the asset we<br />
need to protect? What’s the risk associated with<br />
that asset? Who’s responsible for that risk?<br />
These questions, when presented in the<br />
forthcoming ASIS ESRM Guidelines document<br />
(to be published later on this year) align to the<br />
formal ESRM life-cycle as follows:<br />
• Identifying, understanding and prioritising the<br />
assets of an organisation that need protection<br />
• Identifying and prioritising risks: identifying,<br />
understanding and prioritising the security<br />
threats the enterprise and its assets face – both<br />
existing and emerging – and, critically, the risks<br />
associated with those threats<br />
• Mitigating prioritised risks: taking the<br />
necessary, appropriate and realistic steps<br />
necessary to protect against the most serious<br />
security threats and risks<br />
• Improving and advancing: conducting incident<br />
monitoring, incident response and postincident<br />
review – learning from both successes<br />
and failures – and applying the lessons therein<br />
to advance the programme<br />
Implementing an ESRM programme is a<br />
process that must take into account all of the<br />
phases of the life-cycle. Transitioning from a<br />
traditional security approach to an ESRM<br />
programme isn’t an overnight event, but rather<br />
a journey towards a mature, risk-focused<br />
programme that takes time and commitment<br />
from the security leader, the team and those<br />
business leaders in the enterprise organisation.<br />
Beginning the process means stepping back<br />
from our day-to-day operations and<br />
determining how well we’re already managing<br />
with an ESRM approach, and how far we have<br />
to go in order to meet the ESRM goals of the<br />
organisation. Continuing it requires an<br />
identified target to which the organisation<br />
agrees and outlining a path towards it.<br />
Path towards optimised ESRM<br />
An iterative improvement model for ESRM<br />
focuses on first embracing the ideas of ESRM<br />
and rolling the approach into the security<br />
approach from ad hoc to optimised over time.<br />
Accessing and using the ASIS ESRM Maturity<br />
Model is the first step towards understanding<br />
where you are on the path and how you can go<br />
about reaching the point where you want to be.<br />
A mature ESRM programme encompasses all<br />
aspects of security risk mitigation practices:<br />
physical security, cyber security, information<br />
security, loss prevention, asset management,<br />
threat management, organisational resilience,<br />
workplace violence, fraud, brand protection,<br />
travel safety and all other practices undertaken<br />
to prevent security risk impacts.<br />
Set against that backdrop, ASIS International<br />
has developed a tool to allow security leaders<br />
to see where they stand in six aspects of their<br />
security programme in order to determine<br />
where they want to be in the future. They can<br />
46<br />
In the Spotlight: ASIS International UK Chapter<br />
then begin to identify the gaps and develop a<br />
path towards closing them.<br />
How does it work? The model defines the<br />
maturity steps organisations can benchmark<br />
against to evaluate themselves on a continuum<br />
between low and high ESRM maturity. Survey<br />
takers answer a series of questions using the<br />
one-to-five rating in the following essential<br />
areas: Programme Strategy, Programme<br />
Governance, Organisational Understanding and<br />
Awareness, Programme Implementation and<br />
Application, Programme Management and<br />
Advancement and the Alignment of Security<br />
Risk Mitigation Activity.<br />
These maturity levels are defined between<br />
Level 1 and Level 5 on a continuum where Level<br />
1 represents approximately the tenth percentile<br />
of maturity and Level 5 approximately the 90th<br />
percentile of practice. Instructions in the tool<br />
help survey takers understand how to answer<br />
the questions and reach appropriate ratings,<br />
which range from ad hoc to optimised:<br />
• Ad Hoc Processes at this level are (typically)<br />
undocumented and in a state of dynamic<br />
change, tending to be driven in an ad hoc,<br />
uncontrolled and reactive manner by users or<br />
events. Risk knowledge is limited to a few key<br />
personnel, with no cross-training between<br />
security teams/groups and departments. This<br />
provides a somewhat chaotic or unstable<br />
environment for the processes<br />
• Repeatable Processes are repeatable,<br />
possibly with consistent results. Process<br />
discipline is unlikely to be rigorous, but where<br />
it exists it may help to ensure that existing<br />
processes are maintained during times of<br />
stress. Cross-functional teams are mostly in<br />
place and roles/responsibilities regarding risk<br />
knowledge are generally understood<br />
• Defined Processes at this level are defined<br />
and documented and subject to some degree of<br />
improvement over time. These standard<br />
processes are in place and used to establish<br />
consistency of process performance across the<br />
organisation. Cross-functional teams are in<br />
place, ESRM knowledge is transferred between<br />
teams and roles/responsibilities regarding risk<br />
knowledge are well defined<br />
• Managed Using process metrics, management<br />
can effectively control the process. In particular,<br />
management can identify ways in which to<br />
adjust and adapt the process to particular<br />
projects without measurable losses of quality<br />
or deviations from specifications.<br />
Cross-functional teams are adequately<br />
staffed for ESRM, performance for these teams<br />
is measured and ESRM development/training<br />
programmes are in place for teams operating<br />
across the organisation<br />
• Optimised At this level, the focus is very much<br />
on continually improving programme<br />
performance through both incremental and<br />
innovative changes and improvements. ESRM<br />
performance metrics are measured and<br />
optimised and drive team actions<br />
What are the results? The tool provides the<br />
end user with a set of graphs showing their<br />
current state versus their desired future state.<br />
These results will help security leaders<br />
understand what aspects of their ESRM<br />
programme need attention and to seek out<br />
standards, guidelines, colleagues, teams,<br />
education, articles and other careerdevelopment<br />
tools that can help themselves,<br />
their departments and their organisations<br />
better manage their overall security risk.<br />
Next steps for the model<br />
When deciding from whom to seek responses,<br />
ASIS International started with a qualitative<br />
survey of senior corporate security<br />
professionals drawn from the ASIS global<br />
membership of 34,000. Once an initial pilot was<br />
completed, ASIS opened the tool to the entire<br />
global membership, allowing anyone who’s an<br />
ASIS member to participate and gain results to<br />
deepen their understanding of where they are<br />
in their own ESRM journey.<br />
It’s worth noting that the data collected by<br />
ASIS in this tool is anonymous and not directly<br />
tied to the participating organisations.<br />
Mike Hurst CPP MSyI FIRP:<br />
Vice-Chairman of ASIS UK<br />
Michael Gips CPP CSyP is Chief<br />
Global Knowledge Officer at ASIS<br />
International, Tim McCreight CPP<br />
is Corporate Security Manager<br />
(Cyber) in the City of Calgary and<br />
Tim Wenzel CPP CISSP is a<br />
Specialist in ESRM<br />
“Transitioning from a traditional security approach to an<br />
ESRM programme isn’t an overnight event, but rather a<br />
journey towards a mature, risk-focused programme”<br />
47<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
What’s In The Pipeline?<br />
The use of incorrectly<br />
rated pipe and fittings<br />
can lead to the failure<br />
of fire extinguishing<br />
systems on discharge,<br />
with the risk of injury,<br />
collateral damage and<br />
the loss of<br />
extinguishant<br />
potentially resulting in<br />
a fire not being put<br />
out. The selection of<br />
the correct pipe<br />
materials is, therefore,<br />
essential. Here, Clark<br />
Priestley identifies the<br />
necessary detail<br />
Fixed gaseous fire extinguishing systems<br />
contain stored pressure which is released<br />
on discharge. There are British Standards<br />
which prescribe how these systems are<br />
designed, installed, commissioned and<br />
maintained and regulations – specifically the<br />
Pressure Equipment (Safety) Regulations and<br />
the Pressure Systems Safety Regulations –<br />
which govern and ensure their safe use.<br />
Pipework forms a significant part of any fixed<br />
fire extinguishing system, yet only BS 5306 Part<br />
4 (CO2 systems) specifies the pipe and fitting<br />
grades required. For clean agent systems<br />
covered by BS EN 15004, no specific grades are<br />
detailed. The selection of the grade of pipe for<br />
clean agent systems is left open to the<br />
designer, the only publication of use on the<br />
selection of pipes and fittings for these systems<br />
being the Fire Industry Association’s (FIA) Pipe<br />
Guidance Document.<br />
Regularly, there are images posted on social<br />
media of systems purporting quality, but where<br />
it’s clear that inappropriate fittings have been<br />
used, the grade of which is determined from<br />
their external appearance.<br />
The pipe and fitting grades used in a clean<br />
agent pipe network must be suitable for the<br />
maximum working pressure, which is the<br />
developed pressure of the extinguishant (and<br />
super-pressurisation, if applicable) at the<br />
maximum working temperature of the system<br />
(normally 50°C). It’s never based on the<br />
nominal system pressure. The maximum<br />
developed pressure for a 25 bar system as an<br />
example is given by the relevant agent part of<br />
BS EN 15004 and, for this example, would<br />
typically be circa 36 bar.<br />
The release of a fixed extinguishing system<br />
imparts a shock load to the pipework from the<br />
sudden egress of extinguishant. Shock loading<br />
significantly reduces the load that a component<br />
can carry. All material properties are stated<br />
under steady, non-shock conditions.<br />
In addition, the expansion of the working<br />
fluid draws heat from its surroundings, as can<br />
be seen by the formation of ice on the<br />
pipework, which also subjects that pipework to<br />
thermal stresses. Steels in particular are prone<br />
to low temperature embrittlement, thereby<br />
reducing the effective strength.<br />
Including safety factors<br />
The inclusion of safety factors is essential to<br />
make provision for the stresses induced during<br />
discharge and other factors such as corrosion,<br />
material defects or other variable conditions.<br />
So, where a fitting may have a stated test<br />
pressure of 150 bar, its rated working pressure<br />
will be significantly less.<br />
Focusing on steel pipe where sections of pipe<br />
are connected by means of threading, welding<br />
or rolled groove connections (as opposed to<br />
thin wall tube joined with compression fittings),<br />
for any given size of pipe and whatever<br />
specification with which it complies (eg BS EN<br />
10255, ASTM, API, etc), the outside diameter is<br />
always the same. Pipe is intended to be<br />
threaded externally as a means of joining<br />
sections together. Taper threads are used such<br />
as BSP or NPT. To screw a two-inch BSP thread<br />
on to a piece of DN 50 (two-inch) pipe, the<br />
outside diameter of the pipe has to correspond<br />
to that for the thread.<br />
Variations in pipe material strengths come<br />
from four sources:<br />
• Grade of steel: Some standards specify higher<br />
minimum material properties than others<br />
• Method of manufacture: Pipe can be made<br />
from a piece of flat plate which is rolled into a<br />
tubular form and seam welded or may be<br />
extruded as a seamless pipe. Seamless pipe is<br />
inherently stronger than that made with a<br />
longitudinal weld, but there are also variations<br />
in seamless pipe. The extrusion process is<br />
made easier by heating the material during<br />
forming, but the resulting pipe has lower<br />
material strength properties than one which is<br />
formed at a lower temperature or is cold<br />
48<br />
FIA Technical Briefing: Fire Extinguishing Systems<br />
• Wall thickness: Since the outside diameter of<br />
any given size of pipe is constant, pipe is made<br />
with different wall thicknesses to cater for<br />
different cost/application requirements as well<br />
as associated pressure ratings<br />
• Method of joining pipe sections: Pipework<br />
using welded joints is suitable for higher<br />
pressures than screwed joints. Pipework using<br />
BSP screwed joints is suitable for higher<br />
pressures than NPT<br />
The grade of pipe selected must have the<br />
correct properties for the duty for which it will<br />
be used. How is this determined? There are<br />
several standards covering the calculation of<br />
minimum wall thicknesses for anticipated<br />
working pressure. All use the same basic hoop<br />
stress calculation and make allowances for<br />
corrosion, method of joining and safety factors.<br />
First point of reference<br />
The FIA’s aforementioned Pipe Guidance<br />
Document provides an easy reference on the<br />
selection and sizing of grades of pipe for use on<br />
clean agent fixed extinguishing systems and it’s<br />
this document that should be the first port of<br />
call when selecting a pipe material.<br />
Joining sections of pipe together to create the<br />
required pipe route from the cylinder bank to<br />
the nozzles requires the use of pipe fittings –<br />
commonly elbows and tees – complete with<br />
screwed thread connections. The forming of<br />
taper pipe threads is very operator-dependent.<br />
Pipe fittings are available in a range of<br />
different grades based on different maximum<br />
working pressures. It’s essential that the<br />
correct fitting grade is used for the anticipated<br />
pressure. As these all connect to the pipe in the<br />
same way, there’s no process by which the use<br />
of an incorrectly rated fitting can be prevented.<br />
The use of the correct fitting is based on the<br />
skill and knowledge of the system installer.<br />
There have been changes in the pipe fittings<br />
covered by British Standards. Historically,<br />
screwed fittings were available as malleable<br />
iron (BS 143/1256), wrought steel (BS 1740)<br />
and forged steel (BS 3799). The former<br />
standards have been replaced by BS EN 10242<br />
and BS EN 10241 respectively.<br />
In the sizes typically used for fixed fire<br />
extinguishing systems, BS EN 10242 (malleable<br />
iron) fittings have a maximum working pressure<br />
of 25 bar, which makes them technically<br />
unsuitable for all extinguishing systems.<br />
However, BS EN 10242 allows the fittings to be<br />
type-rated for use at higher working pressures.<br />
Fittings which have been type-rated are usually<br />
physically marked with a paint or ink spot and<br />
will be supplied with the rated pressure stated<br />
on the material certification.<br />
The type rating, however, means that the<br />
fittings used are ‘specials’, so unless the<br />
installer is specifically aware that they’re<br />
installing such, the danger would be that, if<br />
additional fittings were required, non-rated<br />
types could be used. Having a fixed range of<br />
type-rated malleable iron fittings is not likely to<br />
be economical when compared to the cost of<br />
forged steel fittings which don’t need type<br />
rating. Type-rated fittings are used on fixed<br />
extinguishing installations, but when entire<br />
painting is the order of the day, the type rating<br />
markings are obliterated.<br />
In the future servicing of systems, if the<br />
service engineer is doing their job properly,<br />
they would see what appears to be a noncompliant<br />
fitting and, without the evidence to<br />
hand that they were type-rated, would be duty<br />
bound to flag this up as a potential service fail.<br />
Working pressures<br />
The maximum working pressure for BS EN<br />
10241 wrought steel fittings isn’t specifically<br />
stated in the British Standard. Only a test<br />
pressure is outlined for three collective types of<br />
fitting, ranging from 50 bar to 150 bar.<br />
The test pressure for BS EN 10242 malleable<br />
iron fittings is 100 bar (with a working pressure<br />
of 25 bar). Assuming the same test pressure-toworking<br />
pressure relationship, this would give<br />
seamless BS EN 10241 fittings a maximum<br />
working pressure of 37.5 bar (ie the highest<br />
strength rating available).<br />
The risk of using a standard which, in<br />
practice, has three strength ratings and of<br />
which the strongest is borderline for anything<br />
but 25 bar fixed extinguishing systems is<br />
somewhat questionable.<br />
Forged steel fittings to BS 3799 are available<br />
in a range of strength ratings – 3,000 lb (206<br />
bar) being commonly used on fixed<br />
extinguishing systems, although 6,000 lb<br />
fittings should be used on pipework rated for<br />
300 bar on conventional orifice plate controlled<br />
flow inert gas fixed extinguishing systems.<br />
Since there’s no ambiguity with the strength<br />
rating of BS 3799 forged steel fittings, their use<br />
on all fixed fire extinguishing systems is<br />
recommended. BS 3799 is a UK version of an<br />
American ANSI specification, so therefore<br />
states that the threads are NPT. In practice, BS<br />
3799 fittings with BSP threads (BS EN 10226 R<br />
Series) can be specified.<br />
Clark Priestley:<br />
Technical and Product Manager<br />
at DAB Fire Engineering<br />
“Pipe fittings are available in a range of different grades<br />
based on different maximum working pressures. It’s<br />
essential that the correct fitting grade is used”<br />
49<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Be Prepared and Plan for the Worst:<br />
Communicating in a Crisis<br />
Be prepared and plan<br />
for the worst. That’s<br />
the maxim for<br />
managing<br />
communications in a<br />
crisis, as indeed it is<br />
for all contingency<br />
planning. For its part,<br />
security<br />
communications<br />
planning is a strategy<br />
designed to help<br />
management make<br />
better decisions. Only<br />
preparation and<br />
practice can ensure<br />
that an incident is<br />
handled as well as<br />
possible under what<br />
will be rather difficult<br />
circumstances. With<br />
too little preparation,<br />
states Patrick Rea, the<br />
business may be<br />
forced to guess<br />
solutions when under<br />
intense pressure<br />
In an era of 24-7 digital news and viral<br />
comment on social media, how you respond<br />
to a crisis will affect the organisation’s<br />
reputation and relationships with stakeholders.<br />
If an incident is serious enough to worry<br />
customers and impact the share price, it<br />
warrants the resources necessary to explain<br />
what you will do to fix it. Crisis communications<br />
planning is what responsible companies do.<br />
Your goal should be this: to be ready with a<br />
tried-and-tested contingency framework that<br />
you can put into effect immediately if any<br />
potential crisis threatens. On the day it<br />
happens, you and your team can then quickly<br />
evaluate the scale of the problem and take<br />
effective action as necessary, with your<br />
management team able to agree goals and<br />
messages, clearly understanding their<br />
responsibilities and lines of communication.<br />
The starting point is to minimise the risk of a<br />
crisis in the first place. This requires listing and<br />
assessing relevant threats and testing for<br />
vulnerabilities, then evaluating how the<br />
organisation should respond in each case. This<br />
matters to ensure preparedness, but also if an<br />
incident occurs you want to be able to prove<br />
that, as a responsible organisation, you took all<br />
reasonable steps to avoid the risk or otherwise<br />
minimise the consequences.<br />
In essence, you require a plan and a record of<br />
the steps taken and relevant checks and<br />
accreditations. Risks will fall under a range of<br />
headings including physical security, data<br />
security, fire and financial, for example. Then<br />
it’s a case of asking questions and assessing<br />
the implications for each risk category such as:<br />
• Has an incident like this happened before?<br />
• What do we know about the current risk level?<br />
• Have we taken proportionate precautions?<br />
• Who would be impacted and how?<br />
• Who would find out about an incident and<br />
how would they do so?<br />
• Is there a team and a structure in place in<br />
order to respond effectively and efficiently?<br />
The nature and scale of risks changes over<br />
time. The most significant threat for many<br />
organisations and security teams at present is<br />
from terrorism. Many organisations have still<br />
not made use of the free schemes available<br />
from the police service to assist with<br />
preparedness. Courses include Project Griffin<br />
and Project Argus and the Passport to Good<br />
Security for Senior Executives. They cover, for<br />
example, ‘prevent’ strategies and table-top<br />
exercises where participants work through a<br />
terrorist incident, developing an understanding<br />
of current threats, the best responses and ways<br />
in which to maintain business continuity.<br />
Communications planning<br />
It’s not the plan that’s most important so much<br />
as the planning process itself. Crisis plans are<br />
not there just to specify the tactics necessary to<br />
help the organisation through the crisis, but<br />
also to provide a strategy to identify and avoid<br />
an incident in the first place and rehearse and<br />
prepare teams and delegate tasks.<br />
If a crisis strikes, you need flexibility to deal<br />
with an evolving situation and the<br />
communications demands as they change. This<br />
means responding to new information that<br />
emerges, to reaction and rumour on social<br />
media and any coverage and comment in the<br />
press and by analysts.<br />
Organisations are increasingly expected to be<br />
open and accessible to all interested groups<br />
when a crisis strikes. This demands good<br />
preparation such that, if necessary, you can set<br />
up consumer helplines and press hotlines and<br />
provide information updates on your website.<br />
The first question will always be: ‘What do<br />
we know?’ swiftly followed by ‘What<br />
information do we have?’ The crisis plan must<br />
be designed to assist the gathering of<br />
information on a swift basis. Managers need to<br />
know operationally what constitutes an issue<br />
50<br />
Security Services: Best Practice Casebook<br />
that demands escalation for Board or C-Suite<br />
attention. The communications team should be<br />
monitoring external issues that might impact.<br />
Your plan should set out details of the crisis<br />
team’s composition and clear lines of<br />
responsibility/contact with all stakeholders.<br />
“Communication should be two-way: daily research is<br />
invaluable in understanding trade reaction and public<br />
sentiment and therefore avoiding the risk of either<br />
underreacting or overreacting to a crisis event”<br />
Team players<br />
Depending on the scale of the crisis, the team<br />
leader will usually be the CEO, who may also be<br />
the principle spokesperson subject to the<br />
associated workload. A key position reporting<br />
to the CEO is that of the communications coordinator<br />
who’ll manage all information and<br />
organise the response and team activities.<br />
Reporting to the co-ordinator, members of<br />
the PR and marketing team can each be<br />
delegated with specialist tasks (such as fielding<br />
press enquiries, dealing with internal<br />
communications, writing messages or<br />
managing social media) in order to ensure clear<br />
lines of responsibility.<br />
During or soon after the incident, you should<br />
be ready to prepare and regularly update a<br />
formal statement containing succinct and<br />
factual information to clarify as much as<br />
possible what has happened and what’s being<br />
done about it and outline when any further<br />
information may be available.<br />
Staff communications are critical in dealing<br />
with a crisis. Messaging needs to be clear,<br />
succinct and jargon-free. It must include<br />
guidance about security standards and<br />
procedures. Any detailed procedural documents<br />
should feature at-a-glance process maps,<br />
summaries and checklists with essential points<br />
such as the actions to be followed in the event<br />
of an incident.<br />
‘Action This Day’<br />
A major incident or reputational crisis occurs…<br />
How should you respond?<br />
Ascertain the facts Identify the nature of the<br />
issue. Who’s impacted directly and indirectly by<br />
it? You cannot fix it without this data or report<br />
on progress. The scale of the problem should<br />
be quantified as the cost and logistical remedy<br />
will vary according to the scale of the incident<br />
Take control There needs to be clear lines of<br />
management responsibility and communication<br />
‘from the shop floor to the Boardroom’. It’s<br />
essential that someone is – and what’s more is<br />
seen to be – in charge and has overall control<br />
such that decisions can be made and effected<br />
quickly. The two key figures are the CEO, the<br />
principal spokesperson, and the<br />
communications co-ordinator, a Board-level<br />
director, taking advice from relevant specialists<br />
– legal, technical and PR communications<br />
Fix the problem The honest response is to fix it<br />
if you possibly can – and as soon as you can.<br />
Many companies have failed to learn from the<br />
1972 Watergate incident that if you try to simply<br />
cover up the problem it will only worsen<br />
Communicate clearly Clear lines of PR<br />
communication are essential, with a full<br />
understanding of who in your organisation – or<br />
on behalf of it – are the communications<br />
contacts dealing with Government, national and<br />
trade press, customer and other enquiries<br />
Obtain legal advice This is essential in relation<br />
to liability and other issues. The legal argument<br />
must be balanced with other considerations as<br />
well, such as the need for prompt<br />
communication and management action. The<br />
role of the lawyer is to advise on the legal case.<br />
They’re not supposed to manage the crisis or<br />
the messaging<br />
Set out your communications goals Whom do<br />
you need to inform and influence and how?<br />
What will ‘success’ look like in the real world?<br />
Plan what channels you can and should use to<br />
reach your target audiences both quickly and<br />
efficiently. You must, of course, monitor<br />
responses and replies daily, if not within the<br />
hour, according to the nature of the issue<br />
Agree the message Clear and unambiguous<br />
messages must be consistent for all<br />
stakeholders – customers, staff, shareholders<br />
and others. People first need the reassurance<br />
over any issues of safety and how they might<br />
be affected. They also want to know to whom<br />
they can go to deal with a specific problem<br />
‘Action This Day’ That’s what Sir Winston<br />
Churchill stamped in red on documents when<br />
managing a real crisis (ie World War II).<br />
Customers and the trade respect a prompt and<br />
proactive approach, but it has to be properly<br />
thought through<br />
Regain trust Trust is the essential precursor to<br />
any commercial relationship. This requires that<br />
clients are reassured and know they will receive<br />
the service and response they expect. A<br />
‘cultural’ change may be required to ensure the<br />
incident that has occurred isn’t repeated<br />
Institutionalise risk aversion Organisations<br />
need an internal audit team that identifies<br />
areas of physical, financial and reputational risk<br />
and checks the key processes and compliance<br />
issues for the business. That team should<br />
report at Board level<br />
Patrick Rea FCIM:<br />
CEO of Rea Marketing and a<br />
Member of ASIS<br />
International’s UK Chapter<br />
51<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
From Firewalls to Fine Grain Permissions<br />
Cyber crime is now so<br />
prevalent that<br />
guarding against it<br />
should be part of<br />
standard ‘business as<br />
usual’ company<br />
procedures, but many<br />
organisations have<br />
been caught out. In<br />
parallel, the spectre of<br />
physical attacks<br />
remains the same,<br />
which means that the<br />
risk manager’s role of<br />
keeping people and<br />
places safe and secure<br />
is becoming more<br />
expansive and, by<br />
extension, more<br />
complex. Tim<br />
Northwood outlines<br />
why organisations<br />
need systems and<br />
processes in place<br />
that offer robust<br />
physical security<br />
measures and keep<br />
out the cyber criminals<br />
52<br />
Cyber-Physical Security: Working in Unison<br />
attacker attempted to replace devices for<br />
others with a lesser level of performance, the<br />
system would alert operators to the<br />
unauthorised change.<br />
Ensuring that your system is ‘always on’ is<br />
another key element when it comes to<br />
reducing the risk of cyber breaches in<br />
vulnerable downtime. A security system should<br />
offer high availability with an IP network that<br />
runs multiple instances of itself – at the same<br />
time – across multiple nodes or servers at the<br />
local, national and global levels. Solutions such<br />
as database failover clustering means it will<br />
auto-connect to available nodes when<br />
necessary and ensure there’s no compromise of<br />
the system.<br />
Fine grain permissions for users<br />
Security systems that allow ‘fine grain’ tailoring<br />
for permissions and protocols offer better<br />
protection from would-be criminals. For<br />
example, systems that allow you to create<br />
completely bespoke access credentials for each<br />
member of staff and all visitors ensure they can<br />
only access the correct areas and systems at<br />
any given moment.<br />
Systems offering a full forensic audit trail are<br />
vital for robust cyber security. Forensic audit<br />
reports cover every single action and<br />
engagement with the access control system<br />
and can be reported at the local, national or<br />
global levels. This means security managers<br />
can see exactly who has done what to the<br />
system and when. A good audit trail system<br />
should have the ability to ‘roll-back’ changes<br />
made to system programming by any person or<br />
entity at a specific date and time. This means,<br />
for example, that any changes made by a<br />
‘rogue’ operator can be undone in one action<br />
and the system programming rolled back to<br />
exclude these changes.<br />
Documenting your cyber security processes,<br />
procedures and guidelines ensures that all<br />
security regimes across the organisation are<br />
followed routinely and exactly as they’re written<br />
down. Having the right processes in place<br />
means that sensitive data will only be accessed<br />
by authorised individuals.<br />
An information security program helps you<br />
train new security staff more easily. Guidance<br />
for general employees helps them understand<br />
how their actions can create cyber risks and,<br />
importantly, how they can mitigate them.<br />
Managing an attack episode<br />
Should the worse case scenario happen and the<br />
business suffers a cyber attack, it’s vital to have<br />
a tested disaster recovery plan in place. You<br />
will need to be able to recover lost or corrupted<br />
“Documenting your cyber security processes, procedures<br />
and guidelines ensures that all security regimes across the<br />
organisation are followed routinely and exactly as they’re<br />
written down”<br />
data and restore as quickly as possible all<br />
business-critical applications.<br />
The key point to note here is that your<br />
disaster recovery plan needs to be tested – and<br />
repeatedly so. How regularly will depend on the<br />
size of your organisation, but quarterly is<br />
probably about right for most. If you don’t test<br />
your plan and prove that it works in practice as<br />
expected, you expose the systems and your<br />
organisation to a much higher risk of failure in<br />
the event of an attack.<br />
The methods and types of cyber attacks and<br />
security risk are constantly evolving. Whatever<br />
new solution you design, someone will<br />
eventually work out how to hack it.<br />
Ransomware, malware, phishing and social<br />
engineering are the most common threats right<br />
now, but there are others on the horizon.<br />
Cryptojacking (ie the secret use of your<br />
computer to mine for cryptocurrency) is<br />
becoming more sophisticated. Criminals can<br />
mine your computer from a web browser rather<br />
than a downloaded program.<br />
There’s more state-sponsored hacking with<br />
large, long-term projects that can steal<br />
commercial information, or even hack critical<br />
infrastructure organisations in other countries.<br />
It’s estimated that there will be 30 billion<br />
devices connected to the Internet by the end of<br />
this year, including computers and laptops,<br />
tablets, mobile phones, smart watches and web<br />
cams. Smaller devices tend to be more<br />
vulnerable to cyber attack and there’s potential<br />
for criminals to cause chaos by targeting the<br />
large numbers of people who use these.<br />
The only way in which we can stay ahead of<br />
the cyber criminals, or at least mitigate their<br />
attacks if they occur, is to remain vigilant and<br />
open-minded about what they might do next.<br />
Investing in cyber security<br />
The business case for investing in cyber<br />
security is clear. Attacks can cost companies<br />
millions of pounds, cause chaos and result in<br />
severe reputational damage.<br />
There’s plenty of sophisticated kit out there<br />
to help you build a security system with robust<br />
cyber security measures, but that’s only part of<br />
the solution. Investing in our people and<br />
training more and more cyber security<br />
professionals will be just as crucial if we want<br />
to keep the cyber criminals out.<br />
Tim Northwood:<br />
General Manager of Inner<br />
Range<br />
53<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Risk in Action<br />
Risk in Action<br />
Nittan Europe helps<br />
protect iconic Bristol<br />
church from scourge<br />
of fire outbreaks<br />
Nittan Europe, the dedicated<br />
UK manufacturer of<br />
conventional and<br />
addressable fire detection<br />
products and systems, has<br />
had its Evolution analogue<br />
addressable fire detection<br />
system installed at the<br />
much-loved St Nicholas Church in Bristol. The system was supplied and<br />
commissioned by Coomber Fire and Security Systems (a Nittan Elite Partner<br />
and BAFE SP203-1 and SP101 accredited).<br />
Grade II-listed, St Nicholas Church was built in 1769, although the crypt dates<br />
back to medieval times. St Nicholas has always played an important role in<br />
Bristol, whether it be for worship, providing shelter during WWII or, more<br />
recently, as home to Bristol City Council’s tourist office and archive. The church<br />
was reopened in 2018 as a centre for worship, mission and social engagement,<br />
continuing its legacy of being a church “in the city, for the city”.<br />
To protect this building, the Nittan Evolution analogue addressable fire<br />
detection system features 51 devices including detectors and beam detectors,<br />
Call Points and high output sounder beacons.<br />
Coomber Fire and Security Systems is the largest independent fire and<br />
security installer in Somerset. The business has extensive experience in fire<br />
detection systems for churches and chose Nittan for this project based on the<br />
reliability and quality of its Evolution range combined with the increased loop<br />
voltage which allows for longer cable runs.<br />
“It’s ideal in an old church of this size,” stated Adam Pitman, senior fire<br />
systems engineer at Coomber Fire and Security Systems.<br />
Evolution is Nittan’s advanced premium fire system. It makes use of ASIC<br />
technology in the sensors and sophisticated detection algorithms, combining<br />
extremely reliable fire detection together with a very high degree of protection<br />
against unwanted false alarms.<br />
Bespoke access control solutions<br />
for end users at Pullman Place<br />
delivered by dormakaba<br />
dormakaba has supplied a selection of<br />
products for the entrance and waiting room<br />
area at Pullman Place, a specialist mental<br />
health and learning disability clinic located in<br />
the heart of Gloucestershire.<br />
Given that the property was previously used<br />
as a Call Centre, the building’s access regime<br />
needed to be improved significantly to enable<br />
visitors with mobility issues to access both the<br />
building and the 2 gether NHS Foundation<br />
Trust’s services.<br />
Appointed in September 2016 to complete<br />
the redesign of the four-storey building,<br />
Quattro Design Architects was additionally<br />
Hochiki Europe provides state-ofthe-art<br />
life safety platform for<br />
Jardine Motors Group<br />
A new £5 million car showroom in Tonbridge,<br />
Kent owned by the Jardine Motors Group is<br />
using L@titude – a bespoke fire alarm control<br />
panel produced by life safety system<br />
manufacturer Hochiki Europe.<br />
The showroom, which showcases high-value<br />
Jaguar and Land Rover vehicles, needed a stateof-the-art<br />
control and indication system which<br />
would link its various heat, flame and smoke<br />
detectors from around the space. The selected<br />
system was specified due to its reliability,<br />
flexibility, user friendliness and accessibility.<br />
The facilities management team at Jardine<br />
Motors Group has made effective use of the<br />
new addressable life safety platform to help<br />
protect two floors of high-value space at the<br />
Kent facility.<br />
As is the case with all of Hochiki Europe’s<br />
products, L@titude is fully compliant with the<br />
highest European and global safety standards,<br />
among them EN54-2, EN54-4 and EN54-13.<br />
Hochiki Europe designed the panel to<br />
maximise usability and ease of operation so<br />
maintenance teams and duty managers can<br />
instantly locate safety breaches in real-time<br />
from any location. The product employs a fullcolour<br />
touchscreen display which allows for<br />
clear and concise information on each device.<br />
contracted to improve the front entrance<br />
lobby. The original lobby had hinged doors<br />
and wasn’t wide enough for automatic doors.<br />
Quattro specified dormakaba’s ST Flex green<br />
sliding door for the building’s main entrance.<br />
Selected due to its slender profile design, the<br />
ST Flex green sliding door is an energy<br />
efficient access solution that reduces day-today<br />
energy and heating costs thanks to its<br />
interlocking side, top and bottom seals that<br />
prevent heat from escaping the building.<br />
As the service users visiting Pullman Place<br />
have varying needs, it was decided by the<br />
2 gether NHS Foundation Trust that the<br />
reception should be split into two distinct<br />
areas. In order to achieve this separation,<br />
Quattro specified dormakaba’s Charon HSD<br />
E03 half-height swing door.<br />
54<br />
Technology in Focus<br />
Technology in Focus<br />
Wisenet super compact dome cameras developed by Hanwha<br />
Techwin for retail projects<br />
Measuring just 99 mm in diameter, the<br />
super compact 2 and 5 MP Wisenet Q<br />
mini domes developed by Hanwha<br />
Techwin are packed with features<br />
designed to ensure end users obtain<br />
maximum advantages from their video<br />
surveillance solutions.<br />
40% smaller than previous models,<br />
the new H.265 mini domes deliver reallife<br />
practical benefits to a wide range<br />
of end users and, in particular, retailers who require aesthetically attractive<br />
cameras to be installed on walls and ceilings in what could be confined spaces.<br />
License-free people counting analytics, as well as de-focus, motion and<br />
tampering detection functions are built into all four new models as standard,<br />
while a new open platform chipset also provides the opportunity for third party<br />
applications to run on-board the domes.<br />
The people counting functionality offers today’s retailers the welcome<br />
opportunity to monitor store efficiencies.<br />
www.hanwha-security.eu<br />
TrackTik’s software offers<br />
automation for security<br />
workforce management<br />
TrackTik’s mobile and webfriendly<br />
guard tour system uses<br />
automation to take the<br />
effectiveness and efficiency of an<br />
organisation’s security<br />
management operations “to the<br />
next level”.<br />
This “first-of-its-kind” system<br />
provides security managers with a custom-tailored, holistic view of their<br />
operations and security personnel on tour with the support and safety of<br />
having “a tutor in their back pocket”.<br />
From scheduling and interacting with security staff through to incident<br />
reporting, TrackTik’s software offers a complete suite of tools, including realtime<br />
checkpoint logging, incident reporting, GPS tracking, messaging, alerts<br />
and audio-video capabilities.<br />
Thanks to a variety of checkpoint options, together with GPS tracking,<br />
TrackTik’s automated guard tour system creates a real-time picture of an<br />
organisation’s guard tour operations that improves transparency and<br />
accountability. The guard tour system establishes permitted and restricted<br />
zones and can assign special protocols for specific locations.<br />
Offering immediate communication, modifications and transmission of data,<br />
TrackTik’s automated guard tour system also affords a live picture of the<br />
security environment in which security personnel are operating.<br />
The watch mode audio and video feed and recording feature informs of<br />
dangerous situations, which also helps to support the Health and Safety of<br />
security personnel dealing with potentially high-risk situations, in turn<br />
resulting in a maximised security impact to help deliver a safer environment.<br />
TrackTik’s security workforce management software helps today’s end users<br />
to seamlessly integrate on-site, mobile and back-office functions.<br />
www.tracktik.com<br />
Illustra Pro Mini Domes feature<br />
Smart Wide Dynamic Range<br />
Johnson Controls has updated its Illustra Pro<br />
camera family with a new generation of Mini<br />
Domes featuring Smart Wide Dynamic Range<br />
(WDR). Offering a choice of 2, 3, 5 and 8 MP<br />
models and a variety of lens options, the<br />
cameras are ideal for a range of deployments<br />
in both medium and large-scale facilities.<br />
The Smart WDR technology built into the<br />
cameras “greatly improves” the quality of<br />
images captured in varying lighting<br />
environments. By continuously analysing the<br />
scene, Smart WDR – without any operator<br />
intervention – automatically adjusts tone<br />
mapping intensity and optimises the quality<br />
of the captured images by enhancing<br />
darkened areas. There’s no over-saturation<br />
of brighter areas.<br />
www.illustracameras.com<br />
AlproMAX7 deadlocks secure<br />
maximum rating<br />
Alpro, the independent supplier of door access<br />
control and hardware, has launched a new<br />
range of ultra-secure mechanical mortice<br />
deadlocks designated the AlproMAX7.<br />
Independently tested under extreme<br />
physical attack by test and certification house<br />
Element Materials Technology, the AlproMAX7<br />
complies with BS EN 12209 (the most stringent<br />
British and European Standard for<br />
mechanically-operated locks, latches and<br />
locking plates).<br />
The AlproMAX7 has been tested to Grade 7<br />
(the most stringent classification for security).<br />
www.alpro.co.uk<br />
55<br />
www.riskxtra.com>
thepaper<br />
Business News for Security Professionals<br />
Pro-Activ Publications is embarking on a revolutionary<br />
launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />
latest financial and business information for<br />
professionals operating in the security sector<br />
The Paper will bring subscribers (including CEOs,<br />
managing directors and finance directors within the<br />
UK’s major security businesses) all the latest company<br />
and sector financials, details of business re-brands,<br />
market research and trends and M&A activity<br />
FOR FURTHER INFORMATION<br />
ON THE PAPER CONTACT:<br />
Brian Sims BA (Hons) Hon FSyI<br />
(Editor, The Paper and Risk UK)<br />
Telephone: 020 8295 8304<br />
e-mail: brian.sims@risk-uk.com<br />
www.thepaper.uk.com
x<br />
RISKXtra<br />
Appointments<br />
Lord Alex Carlile QC<br />
The Government has<br />
appointed Lord Alex Carlile<br />
QC as the Independent<br />
Reviewer of the Prevent<br />
programme designed to<br />
safeguard vulnerable<br />
individuals from being<br />
drawn into terrorism.<br />
Prevent is one of the four<br />
strands of the Government’s CONTEST counterterrorism<br />
strategy. Back in January, the<br />
Government announced plans for the<br />
Independent Review of Prevent as part of the<br />
Counter-Terrorism and Border Security Act.<br />
Security Minister Brandon Lewis commented:<br />
“Lord Carlile brings a wealth of experience and<br />
skills to this role. In his role as the Independent<br />
Reviewer of Terrorism Legislation he showed<br />
both independence and rigour. I’m pleased he<br />
has agreed to lead this review. Prevent is vitally<br />
important when it comes to stopping vulnerable<br />
individuals from being drawn into terrorism and<br />
has been instrumental in turning people’s lives<br />
around for the better as well as keeping our<br />
communities safe.”<br />
Lord Carlile responded: “The nature of the<br />
terrorist threat is ever-changing and<br />
Government policy must evolve in order to<br />
tackle it. I look forward to seeing Preventfocused<br />
work in action and hearing views from<br />
supporters, critics and everyone in-between<br />
about what is and isn’t working. The review will<br />
be strongly evidence-based.”<br />
In addition, Lord Carlile observed: “As the<br />
former Independent Reviewer of Terrorism<br />
Legislation, I developed a strong track record of<br />
asserting and sustaining my independence of<br />
central Government in assessing the<br />
effectiveness of current legislation. This role<br />
will be no different in that respect.”<br />
Appointments<br />
Risk Xtra keeps you up-to-date with all the latest people<br />
moves in the security, fire, IT and Government sectors<br />
Katy Bourne OBE<br />
Katy Bourne OBE, the Police and Crime<br />
Commissioner for Sussex, has been elected as<br />
the new chair of the Association of Police and<br />
Crime Commissioners at the organisation’s<br />
Annual General Meeting. Now in her second<br />
term as Police and Crime Commissioner (PCC)<br />
for Sussex, Bourne was first elected in 2012 and<br />
then re-elected in 2016 when she more than<br />
doubled her majority.<br />
The PCC’s role is to hold the chief constable<br />
of Sussex Police to account for the performance<br />
of the force, effectively making the police<br />
answerable to the communities for whom they<br />
serve. Bourne is tasked with setting the<br />
strategic direction and priorities for Sussex<br />
Police through the Police and Crime Plan. This<br />
includes formulating the police budget and local<br />
police precept (ie the amount residents pay for<br />
policing within their council tax).<br />
Bourne also has a statutory duty to<br />
commission support services for the victims of<br />
crime and deliver community safety initiatives<br />
(including those focused on restorative justice<br />
and crime reduction grants).<br />
Bourne was recognised for founding the<br />
award-winning Sussex Youth Commission in<br />
2013 and, subsequently, the Sussex Elders<br />
Commission in 2015.<br />
Bourne graduated from Aberystwyth<br />
University and was a successful businesswoman<br />
before entering politics (and, indeed, retains a<br />
keen interest in innovative business start-ups).<br />
Fred Lambrechts<br />
Fred Lambrechts has joined Corps Security as<br />
mobilisation and transformation manager. In<br />
this newly-created role, Lambrechts will<br />
support large mobilisations as well as use his<br />
many years of experience in the security<br />
sector to develop Corps Security’s integrated<br />
security guarding and monitoring solutions.<br />
Lambrechts previously worked as national<br />
operations manager at Interserve and has also<br />
held senior roles at companies including<br />
Knightsbridge Guarding, the Kingdom Services<br />
Group, PCL Whitehall Security and, in addition,<br />
T-Class Security.<br />
Commenting on his new role, Lambrechts<br />
told Risk Xtra: “I’m delighted to be joining<br />
Corps Security. The business is well known in<br />
the sector for its high standards of service and<br />
its self-delivery of monitoring solutions. I’m<br />
pleased to be part of an organisation which<br />
was founded back in the 1850s and yet<br />
remains one of the most forward-thinking<br />
security companies in the market.”<br />
Paul Lotter, the newly-appointed managing<br />
director of the security guarding business<br />
within Corps Security, added: “We’re in the<br />
process of mobilising a number of significant<br />
contracts so I welcome Fred to the business.<br />
His experience of large-scale mobilisations will<br />
be very welcome. Our security guarding and<br />
monitoring businesses are becoming ever<br />
closer and Fred will be instrumental in that<br />
integration going forward.”<br />
57<br />
www.riskxtra.com>
x<br />
RISKXtra<br />
Appointments<br />
Shaun Kennedy<br />
Shaun Kennedy has taken over as Country President and<br />
managing director of Securitas UK. Previous Country<br />
President Brian Riis Nielsen officially handed over the<br />
reins to Kennedy at Securitas UK’s recent annual<br />
Leadership Conference. Riis Nielsen now moves on to a<br />
new group management position within Securitas AB.<br />
Kennedy is an experienced leader with a proven track<br />
record in the security industry. After leaving the British<br />
Army in 1997, he joined Chubb Security where he spent<br />
15 years until the business was acquired by Securitas back in 2011.<br />
Since that time, Kennedy has held senior management positions including<br />
chief operating officer for the UK and, more recently, director of specialist<br />
protective services. Kennedy has also been responsible for the successful<br />
implementation of Securitas’ Fire and Safety strategy across Europe.<br />
Commenting on his new role, Kennedy told Risk Xtra: “Having spent over 20<br />
years working in the security industry, I feel privileged to be taking over<br />
responsibility of the UK business at such an exciting time. Securitas UK will<br />
continue to go from strength to strength, offering better safety and security to<br />
our clients through outstanding security officers and an innovation and datadriven<br />
approach.”<br />
Jaime de Gouveia<br />
Incentive Lynx, the<br />
specialist security arm of<br />
the Incentive FM Group,<br />
has appointed Jaime de<br />
Gouveia to the position of<br />
business development<br />
manager as the company<br />
embarks on the next stage<br />
of its growth.<br />
As part of his role, de Gouveia will be tasked<br />
with working alongside both new and existing<br />
clients to fully understand their requirements<br />
and ensure they have access to the most<br />
suitable services and solutions.<br />
de Gouveia has worked at Incentive Lynx for<br />
over eight years now, initially joining the<br />
business as a site-based security officer and<br />
later being promoted to the role of security<br />
manager. Before joining Incentive Lynx, de<br />
Gouveia held positions at Central Saint Giles<br />
and MidCity Place.<br />
de Gouveia harbours more than 16 years’<br />
solid experience of working across the sector.<br />
During that time, he has developed,<br />
implemented and delivered bespoke security<br />
solutions for multiple businesses across<br />
various sector environments.<br />
Stephen Waud, managing director of<br />
Incentive Lynx, explained to Risk Xtra: “Moving<br />
forwards, the role of business development<br />
manager will become increasingly important to<br />
our organisation as we look to further grow our<br />
client portfolio. Jaime has a fantastic<br />
understanding of the Incentive Lynx model of<br />
delivering industry-leading security services<br />
and was the perfect candidate for this role.”<br />
Priti Patel<br />
Not long after Theresa<br />
May’s final joust at Prime<br />
Minister’s Questions with<br />
Labour leader Jeremy<br />
Corbyn in the House of<br />
Commons on Wednesday<br />
24 July, the newlycrowned<br />
Prime Minister<br />
Boris Johnson began to<br />
assemble the constituent members of his<br />
Cabinet for Government.<br />
It soon emerged that Priti Patel, the<br />
Conservative MP for Witham in Essex, has been<br />
appointed to the role of Home Secretary with<br />
former incumbent at the Home Office Sajid<br />
Javid moving to become Chancellor of the<br />
Exchequer and succeed Philip Hammond.<br />
Patel served as International Development<br />
Secretary from 2016-2017 having initially been<br />
involved with the Referendum Party until<br />
switching to the Conservatives.<br />
Educated at Keele University and the<br />
University of Essex, Patel’s initial foray into the<br />
world of commerce saw her working in PR with<br />
Weber Shandwick for several years.<br />
Patel was elected as the Conservative MP for<br />
Witham at the 2010 General Election.<br />
Tom Clarke<br />
Reliance High-Tech, the<br />
independent security<br />
technology integrator,<br />
has announced the<br />
appointment of Tom<br />
Clarke to its senior<br />
management team.<br />
As the company’s<br />
sales director, Clarke<br />
will aim to grow the business and promote<br />
the advantages of Reliance High-Tech’s<br />
specialist services to organisations across<br />
the country in line with the company’s<br />
strategic growth plan.<br />
With vast experience of large-scale<br />
integration and technology migration<br />
projects within the security sector, Clarke<br />
joins Reliance High-Tech from Mitie where he<br />
was director of sales for the company’s<br />
specialist security services division. His<br />
experience also includes spells at BT and<br />
Contract Fire & Security.<br />
Clarke will now develop, strengthen and<br />
deepen relationships with existing<br />
customers, while at the same time<br />
identifying and forging new partnerships<br />
with other organisations that are ready to<br />
benefit from the value which a truly<br />
integrated security set-up can realise.<br />
58<br />
ACCESS CONTROL<br />
ACCESS CONTROL<br />
ACCESS CONTROL<br />
KERI SYSTEMS UK LTD<br />
Tel: + 44 (0) 1763 273 243<br />
Fax: + 44 (0) 1763 274 106<br />
Email: sales@kerisystems.co.uk<br />
www.kerisystems.co.uk<br />
ACCESS CONTROL MANUFACTURER<br />
INTEGRATED DESIGN LIMITED<br />
Integrated Design Limited, Feltham Point,<br />
Air Park Way, Feltham, Middlesex. TW13 7EQ<br />
Tel: +44 (0) 208 890 5550<br />
sales@idl.co.uk<br />
www.fastlane-turnstiles.com<br />
ACCESS CONTROL<br />
NORTECH CONTROL SYSTEMS LTD.<br />
Nortech House, William Brown Close<br />
Llantarnam Park, Cwmbran NP44 3AB<br />
Tel: 01633 485533<br />
Email: sales@nortechcontrol.com<br />
www.nortechcontrol.com<br />
ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />
SECURE ACCESS TECHNOLOGY LIMITED<br />
Authorised Dealer<br />
Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />
Email: info@secure-access.co.uk<br />
Website: www.secure-access.co.uk<br />
HVM<br />
HTC PARKING AND SECURITY LIMITED<br />
St. James’ Bus. Centre, Wilderspool Causeway,<br />
Warrington Cheshire WA4 6PS<br />
Tel 01925 552740 M: 07969 650 394<br />
info@htcparkingandsecurity.co.uk<br />
www.htcparkingandsecurity.co.uk<br />
FRONTIER PITTS LTD<br />
+44 (0) 1293 422800<br />
marketing@frontierpitts.com<br />
www.frontierpitts.com
CCTV & IP SECURITY SOLUTIONS<br />
PANASONIC SYSTEM<br />
COMMUNICATIONS COMPANY EUROPE<br />
Panasonic House, Willoughby Road<br />
Bracknell, Berkshire RG12 8FP UK<br />
Tel: 0207 0226530<br />
Email: info@business.panasonic.co.uk<br />
CCTV POLES, COLUMNS, TOWERS AND<br />
MOUNTING PRODUCTS<br />
ALTRON COMMUNICATIONS<br />
EQUIPMENT LTD<br />
Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />
Tel: +44 (0) 1269 831431<br />
cctvsales@altron.co.uk www.altron.co.uk<br />
CCTV<br />
CCTV<br />
MODICAM EUROPE<br />
Rapid Deployment Digital IP High Resolution CCTV40<br />
hour battery, Solar, Wind Turbine and Thermal Imaging<br />
Wired or wireless communication fixed IP. CE Certified.<br />
Modicam Europe, 5 Station Road, Shepreth,<br />
Cambridgeshire SG8 6PZ<br />
www.modicam.com sales@modicameurope.com<br />
CCTV SPECIALISTS<br />
PLETTAC SECURITY LTD<br />
Unit 39 Sir Frank Whittle Business Centre,<br />
Great Central Way, Rugby, Warwickshire CV21 3XH<br />
Tel: 01788 567811 Fax: 01788 544 549<br />
Email: jackie@plettac.co.uk www.plettac.co.uk<br />
CONTROL ROOM & MONITORING<br />
ADVANCED MONITORING SERVICES<br />
CCTV<br />
G-TEC DISTRIBUTION<br />
Gtec House, 35-37 Whitton Dene<br />
Hounslow, Middlesex TW3 2JN<br />
Tel: 0208 898 9500<br />
www.gtecsecurity.co.uk<br />
sales@gtecsecurity.co.uk<br />
EUROTECH MONITORING SERVICES LTD.<br />
Specialist in:- Outsourced Control Room Facilities •<br />
Lone Worker Monitoring • Vehicle Tracking • Message<br />
Handling • Help Desk Facilities • Keyholding/Alarm<br />
Response<br />
Tel: 0208 889 0475 Fax: 0208 889 6679<br />
E-MAIL eurotech@eurotechmonitoring.net<br />
Web: www.eurotechmonitoring.net
DISTRIBUTORS<br />
LEADING DISTRIBUTOR OF CONVERGED IP<br />
SOLUTIONS, INCLUDING CCTV AND ACCESS CONTROL<br />
ONLINE SECURITY PRODUCTS<br />
Security distributors direct to installers, property<br />
maintenance & facilities management companies<br />
MAYFLEX<br />
Our product range not only covers IP security products<br />
but also incorporates the cabling infrastructure and the<br />
Ethernet switching products necessary for a comprehensive<br />
security installation. We have a knowledgeable team<br />
of sales and technical experts that provide advice and<br />
support with system design and product choice. You can<br />
also order online up to 8pm for next day FREE delivery.<br />
Excel House, Junction 6 Industrial Park, Electric Avenue,<br />
Birmingham, B6 7JJ<br />
Tel: 0800 75 75 65 www.mayflex.com<br />
THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP,<br />
CCTV, ACCESS CONTROL AND INTRUDER DETECTION<br />
SOLUTIONS<br />
Phone 0800 880 6123<br />
Phone 0113 850 6123<br />
sales@onlinesecurityproducts.co.uk<br />
www.onlinesecurityproducts.co.uk<br />
AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />
DISTRIBUTOR OF SECURITY AND LOW VOLTAGE<br />
PRODUCTS.<br />
NORBAIN SD LTD<br />
210 Wharfedale Road, IQ Winnersh, Wokingham,<br />
Berkshire, RG41 5TP<br />
Tel: 0118 912 5000 Fax: 0118 912 5001<br />
www.norbain.com<br />
Email: info@norbain.com<br />
IDENTIFICATION<br />
ADI GLOBAL DISTRIBUTION<br />
Distributor of electronic security systems and solutions<br />
for over 250 leading manufacturers, the company also<br />
offers an internal technical support team, dedicated<br />
field support engineers along with a suite of training<br />
courses and services. ADI also offers a variety of fast,<br />
reliable delivery options, including specified time delivery,<br />
next day or collection from any one of 28 branches<br />
nationwide. Plus, with an ADI online account, installers<br />
can order up to 7pm for next day delivery.<br />
Tel: 0161 767 2990 Fax: 0161 767 2999 Email:<br />
sales.uk@adiglobal.com www.adiglobal.com/uk<br />
WWW.IDENTIFICATIONSOLUTIONS.CO.UK<br />
IDENTIFICATION SOLUTIONS<br />
Members • Staff • Visitors • Contractors • Conference<br />
• Clubs • Delegates • Corporate ID<br />
www.identificationsolutions.co.uk
COMPLETE SOLUTIONS FOR IDENTIFICATION<br />
PERIMETER PROTECTION<br />
PERIMETER PROTECTION<br />
DATABAC GROUP LIMITED<br />
1 The Ashway Centre, Elm Crescent,<br />
Kingston upon Thames, Surrey KT2 6HH<br />
Tel: +44 (0)20 8546 9826<br />
Fax:+44 (0)20 8547 1026<br />
enquiries@databac.com<br />
INDUSTRY ORGANISATIONS<br />
TRADE ASSOCIATION FOR THE PRIVATE SECURITY<br />
INDUSTRY<br />
GPS PERIMETER SYSTEMS LTD<br />
14 Low Farm Place, Moulton Park<br />
Northampton, NN3 6HY UK<br />
Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />
E-mail: info@gpsperimeter.co.uk<br />
Web site: www.gpsperimeter.co.uk<br />
POWER<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
BSIA<br />
Tel: 0845 389 3889 Email: info@bsia.co.uk<br />
Website: www.bsia.co.uk Twitter: @thebsia<br />
INTEGRATED SECURITY SOLUTIONS<br />
SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />
HONEYWELL COMMERCIAL SECURITY<br />
Tel: +44 (0) 844 8000 235<br />
E-mail: securitysales@honeywell.com<br />
ADEPT POWER SOLUTIONS LTD<br />
Adept House, 65 South Way, Walworth Business Park<br />
Andover, Hants SP10 5AF<br />
Tel: 01264 351415 Fax: 01264 351217<br />
Web: www.adeptpower.co.uk<br />
E-mail: sales@adeptpower.co.uk<br />
UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />
INTEGRATED SECURITY SOLUTIONS<br />
INNER RANGE LTD<br />
Units 10 - 11, Theale Lakes Business Park, Moulden Way,<br />
Sulhampstead, Reading, Berkshire RG74GB<br />
Tel: +44(0) 845 470 5000<br />
Fax: +44(0) 845 470 5001<br />
Email: ireurope@innerrange.co.uk<br />
www.innerrange.com<br />
UNINTERRUPTIBLE POWER SUPPLIES LTD<br />
Woodgate, Bartley Wood Business Park<br />
Hook, Hampshire RG27 9XA<br />
Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk<br />
www.upspower.co.uk
SECURITY<br />
LIFE SAFETY EQUIPMENT<br />
INTRUSION DETECTION AND PERIMETER PROTECTION<br />
OPTEX (EUROPE) LTD<br />
Redwall® infrared and laser detectors for CCTV applications<br />
and Fiber SenSys® fibre optic perimeter security<br />
solutions are owned by Optex. Platinum House, Unit<br />
32B Clivemont Road, Cordwallis Industrial Estate,<br />
Maidenhead, Berkshire, SL6 7BZ<br />
Tel: 01628 631000 Fax: 01628 636311<br />
sales@optex-europe.com www.optex-europe.com<br />
C-TEC<br />
Challenge Way, Martland Park,<br />
Wigan WN5 OLD United Kingdom<br />
Tel: +44 (0) 1942 322744<br />
Fax: +44 (0) 1942 829867<br />
Website: www.c-tec.com<br />
PERIMETER SECURITY<br />
INTRUDER AND FIRE PRODUCTS<br />
CQR SECURITY<br />
125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />
Tel: 0151 606 1000 Fax: 0151 606 1122<br />
Email: andyw@cqr.co.uk www.cqr.co.uk<br />
TAKEX EUROPE LTD<br />
Aviary Court, Wade Road, Basingstoke<br />
Hampshire RG24 8PE<br />
Tel: +44 (0) 1256 475555<br />
Fax: +44 (0) 1256 466268<br />
Email: sales@takex.com<br />
Web: www.takex.com<br />
SECURE CONNECTIVITY PROVIDERS<br />
SECURITY SYSTEMS<br />
CSL GROUP<br />
T: +44 (0)1895 474 474<br />
sales@csl-group.com<br />
@CSLDualComLtd<br />
www.csl-group.com<br />
ONLINE SECURITY SUPERMARKET<br />
BOSCH SECURITY SYSTEMS LTD<br />
PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />
Tel: 0330 1239979<br />
E-mail: uk.securitysystems@bosch.com<br />
Web: uk.boschsecurity.com<br />
EBUYELECTRICAL.COM<br />
Lincoln House, Malcolm Street, Derby DE23 8LT<br />
Tel: 0871 208 1187<br />
www.ebuyelectrical.com
Video – analyse that!<br />
Facit Data Systems is a leading data and video analytics specialist. Facit’s development<br />
team has created a suite of products that help organisations to monitor, count, analyse<br />
and manage customers, visitors and staff in high footfall locations.<br />
Install Facit Analytics over your current CCTV system. Make more of your analytics in<br />
retail, banking, transport, healthcare and the public sector<br />
PeopleCounter QueueManager HeatMap<br />
Capture intelligence for efficiency savings,<br />
competitive advantage and risk management.<br />
Call or book a demo info@facitdatasystems.com<br />
Or visit us at IfSec Stand IF1310, 18-20 June<br />
OBSERVE<br />
I ANALYSE I<br />
ACT<br />
t: +44 (0)3700 424217<br />
w:<br />
facitdatasystems.com