RiskXtraSeptember2019

16.09.2019 Views

x www.riskxtra.com RISKXtra Security and Risk Management September 2019 Acting on Word of Mouth The Role of Voice Biometrics in Secure Authentication > Business Continuity: Losing The Working Environment Access Control: System Solutions for Corporate Offices Cyber Security: From Firewalls to Fine Grain Permissions Fire Safety Management and Installation Supplement

x<br />

www.riskxtra.com<br />

RISKXtra<br />

Security and Risk Management September 2019<br />

Acting on Word of Mouth<br />

The Role of Voice Biometrics in Secure Authentication<br />

><br />

Business Continuity: Losing The Working Environment<br />

Access Control: System Solutions for Corporate Offices<br />

Cyber Security: From Firewalls to Fine Grain Permissions<br />

Fire Safety Management and Installation Supplement


Inner Range’s Integriti<br />

High Security System is<br />

a complete Hardware/<br />

Software solution designed<br />

specifically for High Security<br />

installations.<br />

Our range includes:<br />

All Software<br />

Hardware Controllers<br />

End of Line Modules<br />

Power Supplies<br />

Keypads<br />

Enclosures<br />

Communications Devices<br />

Access Control Readers<br />

Credentials<br />

WHY TAKE CHANCES?<br />

FULL END TO END DATA ENCRYPTION EXTERNALLY CERTIFIED<br />

T: +44 845 470 5000 | E: ireurope@innerrange.co.uk innerrange.com


x<br />

RISKXtra<br />

September 2019<br />

Contents<br />

38 The Changing Face of Security Services<br />

Risk Xtra’s quarterly Security Guarding Supplement features<br />

contributions from both Securitas UK and CIS Security<br />

Best Practice Casebook (pp50-51)<br />

5 Editorial Comment<br />

6 News Update<br />

G4S half-year results, Mitie Security on acquisition trail, Riello<br />

UPS issues Blackout Report, Government on telecoms security<br />

8 News Analysis: ‘Five Eyes’ Security Summit<br />

Senior ministers from the UK, Australia, Canada, New Zealand<br />

and the US reaffirm their commitment to work with industry on<br />

tackling a wide range of security threats. Brian Sims reports<br />

10 Opinion: Security and the Brexit Process<br />

Could the use of cutting-edge security technology provide a<br />

solution that avoids a hard border between Northern Ireland and<br />

the Republic? Alistair Enser considers the issues involved<br />

12 Opinion: Evolution of the Security Manager<br />

Security managers always need to stay one step ahead of the<br />

threats posed by criminals and rogue employees on a daily<br />

basis. Angus Darroch-Warren shows them how<br />

14 BSIA Briefing<br />

Security measures to prevent petty crime must never be<br />

neglected, as Gideon Reichental duly observes<br />

16 Losing The Working Environment<br />

What does “losing the workplace” mean for a business, and<br />

what’s the best thing to do about it? Dr Sandra Bell investigates<br />

42 Meet The Security Company<br />

In association with the NSI, Risk Xtra continues its regular ‘Meet<br />

The Security Company’ series by highlighting the thoughtprovoking<br />

views of Apleona HSG Facility Management UK<br />

46 In The Spotlight: ASIS International UK Chapter<br />

Rachelle Loyear, Mike Hurst, Michael Gips, Tim McCreight and<br />

Tim Wenzel promote the adoption of the Enterprise Security Risk<br />

Management approach<br />

48 FIA Technical Briefing<br />

The use of incorrectly rated pipe and fittings on fixed gaseous<br />

fire extinguishing systems can lead to failure on discharge. Clark<br />

Priestley examines the overriding need for correct specification<br />

50 Security Services: Best Practice Casebook<br />

Be prepared and plan for the worst. That’s the maxim for<br />

managing communications in a crisis. With too little preparation,<br />

asserts Patrick Rea, the business may be forced to guess<br />

solutions when placed under intense pressure<br />

52 Cyber-Physical Security: Working in Unison<br />

Cyber crime is now so prevalent that guarding against it should<br />

be part of standard ‘business as usual’ company procedures.<br />

Tim Northwood outlines why organisations need systems in<br />

place that offer robust cyber and physical security in tandem<br />

54 Risk in Action<br />

55 Technology in Focus<br />

57 Appointments<br />

All the latest people moves in the security business sector<br />

18 Acting on Word of Mouth<br />

Piergiorgio Vittori states that weak passwords will soon be<br />

replaced by a far more secure authentication method: our voice<br />

21 Fire Safety Management and Installation<br />

The FIA, Klaxon, Vimpex and Kentec all feature in our regular<br />

Fire Safety Management and Installation Supplement<br />

33 In Full Control of Access<br />

Stephen Littlewood reviews the different access control system<br />

options available for today’s corporate office buildings<br />

36 Facilitating Means of Escape<br />

The provision of a clear and straightforward means of escape is<br />

absolutely vital for life safety. Liam Hunt elicits the fine detail<br />

59 The Risk Xtra Directory<br />

ISSN 1740-3480<br />

Risk Xtra is published quarterly by Pro-Activ Publications<br />

Ltd and specifically aimed at security and risk<br />

management, loss prevention, business continuity and<br />

fire safety professionals operating within the UK’s largest<br />

commercial organisations<br />

© Pro-Activ Publications Ltd 2019<br />

All rights reserved. No part of this publication may be<br />

reproduced or transmitted in any form or by any means<br />

electronic or mechanical (including photocopying, recording<br />

or any information storage and retrieval system) without the<br />

prior written permission of the publisher<br />

The views expressed in Risk Xtra are not necessarily those of<br />

the publisher<br />

Risk Xtra is currently available for an annual subscription rate<br />

(UK only). Telephone 0208 295 8307 for more details<br />

www.riskxtra.com<br />

Risk Xtra<br />

PO Box 332<br />

Dartford DA1 9FF<br />

Editor Brian Sims BA (Hons) Hon FSyI<br />

Tel: 0208 295 8304 Mob: 07500 606013<br />

e-mail: brian.sims@risk-uk.com<br />

Design and Production Matt Jarvis<br />

Tel: 0208 295 8310 Fax: 0870 429 2015<br />

e-mail: matt.jarvis@proactivpubs.co.uk<br />

Advertisement Director Paul Amura<br />

Tel: 0208 295 8307 Fax: 01322 292295<br />

e-mail: paul.amura@proactivpubs.co.uk<br />

Administration Tracey Beale<br />

Tel: 0208 295 8306 Fax: 01322 292295<br />

e-mail: tracey.beale@proactivpubs.co.uk<br />

Managing Director Mark Quittenton<br />

Chairman Larry O’Leary<br />

Editorial: 0208 295 8304<br />

Advertising: 0208 295 8307<br />

3<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Editorial<br />

Safety First<br />

BAFE has welcomed the publication of ‘Raising The Bar’, the<br />

interim report issued by the Working Groups established<br />

after the Hackitt Review following the Grenfell Tower fire.<br />

BAFE has contributed significantly to a number of the Working<br />

Groups and also supported the Fire Sector Federation with the<br />

deliberations of the Competence Steering Group (CSG).<br />

As outlined in the document, the need for competence and<br />

third party certification of contractors working on fire protection<br />

is an absolute priority. Commendably, BAFE will be working<br />

diligently with all relevant parties to ensure that statutory bodies<br />

develop their requirements to bring about “a significant change”<br />

in the culture of specification and procurement that “properly<br />

reflects the need” for competent providers.<br />

A radical and wide-ranging set of measures to improve the<br />

competence of those who design, construct, inspect, maintain<br />

and operate higher risk residential buildings (HRRBs) and make<br />

them safer for the public has indeed been set out by the CSG,<br />

the cross-industries group backed by Government, the Industry<br />

Safety Steering Group and Dame Judith Hackitt.<br />

The Steering Group has brought together more than 150<br />

institutions and associations across the full spectrum of<br />

construction, the built environment, fire safety and building<br />

owner/manager sectors to work towards the common purpose of<br />

raising competences and improving life safety.<br />

Within the pages of its interim report, the CSG is urging all life<br />

safety-critical disciplines working on HRRBs (including<br />

designers, engineers, building standards officers, site<br />

supervisors, fire safety enforcement officers and fire risk<br />

officials) to adopt the measures outlined.<br />

By way of example, ‘Raising The Bar’ requests a new oversight<br />

body – the Building Safety Competence Committee – to monitor<br />

assessment processes, draw up a central register of duty holders<br />

eligible to work on HRRBs and drive improvements across the<br />

sector. It goes on to suggest that all organisations carrying out<br />

the assessments and reassessments of an individual’s<br />

competence should themselves be subject to a rigorous system<br />

of oversight by a body such as UKAS or the Engineering Council.<br />

The CSG is calling on central Government to play its part by<br />

requiring that any company or individual working on a central<br />

Government construction project – including those focused on<br />

retrofits for existing HRRBs – must meet the competence<br />

frameworks set out within this report. Local authorities and the<br />

wider public and private sectors are being urged to follow suit.<br />

In launching the interim report, Graham Watts (CEO of the<br />

Construction Industry Council and the CSG’s chairman) stated:<br />

“It’s clear that industry organisations have accepted the need for<br />

change. The Working Groups are proposing to raise the bar<br />

through a more rigorous approach, including training,<br />

assessment, reassessment and third party accreditation.”<br />

The CSG feels its proposals will realise “a paradigm change”<br />

that improves competence and industry culture. It’s high time the<br />

fragmented approach to competence was banished forever.<br />

Brian Sims BA (Hons) Hon FSyI<br />

Editor<br />

5<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

4.7% revenue increase posted by<br />

G4S in 2019 half-year financials<br />

G4S has announced its financial results for the<br />

six-month period that ended on 30 June 2019.<br />

Secure Solutions revenues are up by 4.9% and<br />

those for Cash Solutions by 3.9%. The PBITA<br />

margin sits at 6.2% (2018: 6.4%). The positive<br />

impact of growth has been offset by new oneoff<br />

contract mobilisation costs (£4 million in<br />

2019) and also a one-off bullion contract profit<br />

in 2018 of £8 million.<br />

There’s an operating cash flow conversion of<br />

88% (2018: 109%) with the expectation of a fullyear<br />

conversion above 100%. Net debt to<br />

EBITDA is 2.85x (30 June 2018: 2.73x). Interim<br />

dividend is set at 3.59 pence per share (the<br />

exact same figure as per this time last year).<br />

Statutory earnings of £59 million (2018: £101<br />

million) include businesses sold, onerous<br />

contracts and exchange rate movements, £36<br />

million restructuring and separation costs and<br />

£35 million goodwill impairment relating to<br />

Brazilian businesses acquired in 2012.<br />

G4S CEO Ashley Almanza commented: “In the<br />

first half of this year, our improving sales<br />

performance in both Secure Solutions and Cash<br />

Solutions saw the Group deliver underlying<br />

revenue growth of 4.7%. This growth, together<br />

with new contract wins, supports our mediumterm<br />

revenue goal of 4% to 6% per annum.”<br />

Almanza (pictured) added: “Our revenue mix<br />

continued to improve as our technologyenabled<br />

revenues in Secure Solutions grew by<br />

14.8% across the globe and our North American<br />

cash technology revenues grew by 33%. The<br />

Group’s half-year performance, sales pipeline,<br />

revenue momentum and productivity<br />

programmes support a positive outlook.”<br />

On a structural note, Almanza stated: “Our<br />

separation review is now complete and the<br />

Board has approved the separation of Cash<br />

Solutions from the Group. As a result, we’ve set<br />

in motion plans for the de-merger of Cash<br />

Solutions in H1 2020. We believe that this will<br />

create two strong and focused businesses each<br />

with the clear potential to capitalise on marketleading<br />

positions and unlock substantial value<br />

for customers, shareholders and employees.”<br />

G4S has received a number of unsolicited<br />

expressions of interest from third parties to<br />

acquire all or parts of the Cash Solutions<br />

business. The company has actively engaged<br />

with these parties and the Board will continue<br />

to evaluate proposals for all or parts of the<br />

business alongside the implementation of the<br />

aforementioned de-merger plans. No assurance<br />

can be provided at this stage that any third<br />

party proposals will lead to a transaction.<br />

Mitie Security acquires tech specialist Global Aware International Group<br />

Mitie Security has acquired the Global Aware International Group (GAIG), the provider of niche<br />

intelligent software and security solutions, for an undisclosed sum. This move further accelerates<br />

the growth of Mitie’s premium technology-enabled and intelligence-led security solutions offer and<br />

bolsters its credentials in providing truly connected security services.<br />

GAIG’s solutions are specifically designed to support the management of building security across<br />

client estates and are now the products of choice in some of the world’s most iconic high-rise<br />

commercial structures. Mitie Security already has a long-standing partnership with the GAIG, which<br />

currently provides bespoke technology solutions to a number of Mitie’s major retail security clients.<br />

The cloud-based technology solutions designed by GAIG allow clients to manage, communicate<br />

and audit security activity across their estates online via desktops or hand-held devices. This<br />

includes everything from managing routine tasks through to dynamically creating tasks based on<br />

incidents or situation changes. The technology enables the assignment of tasks to individual users<br />

ensuring actions are completed within defined timescales or escalated to a supervisor if necessary.<br />

The technology can be used to guide companies through the management of major incidents,<br />

providing business continuity support without having to refer to operational procedures when time<br />

is critical. Key information is captured and shared with appropriate parties on a secure basis.<br />

The deal means that GAIG’s founder and CEO, David Evans, will now join Mitie Security and take a<br />

seat on its senior leadership team, bringing valuable expertise in security technology development<br />

to the fore. All GAIG staff will join the Mitie Security team.<br />

Evans commented: “The Global Aware International Group team is excited that this acquisition<br />

will further enhance our joint technical solution for clients across Mitie’s portfolio.”<br />

Jason Towse, managing director at Mitie Security, said: “Adding GAIG to the Mitie portfolio is the<br />

next evolution in providing our customers with the best tech-enabled and intelligence-led security.”<br />

6<br />


News Update<br />

Blackout Report focuses on<br />

potential fall-out from electricity<br />

grid failure in UK<br />

Uninterruptible power supply solutions<br />

manufacturer Riello UPS has launched a major<br />

new publication exploring the likelihood of a<br />

nationwide electricity grid failure in the UK.<br />

Only recently, a massive power failure across<br />

virtually all of Argentina, Paraguay and<br />

Uruguay left nearly 50 million people without<br />

electricity. The results of Riello UPS’ new<br />

investigation, entitled ‘The Blackout Report’,<br />

reveal official Government risk assessments<br />

state there’s just a one-in-200 chance of the<br />

UK power grid experiencing a similar complete<br />

shutdown in the next five years.<br />

The comprehensive report explores the most<br />

likely causes of such an incident, from the<br />

increased threat of extreme weather (including<br />

flooding or gales knocking out the network<br />

infrastructure) through to terrorism, industrial<br />

accidents and geomagnetic space weather<br />

storms that play havoc with satellite systems.<br />

The document also asks whether the shift<br />

towards ‘smart’ energy grids heightens our<br />

vulnerability to cyber attacks similar to when<br />

Russian hackers shut down 30 substations in<br />

the Ukraine in December 2015, subsequently<br />

leaving no less than 250,000 individuals<br />

without their electricity supply.<br />

State-sponsored hackers (believed to be the<br />

Russian-based Dragonfly Group) are said to<br />

have infiltrated the UK grid on 8 June 2017 –<br />

the day of the General Election – while there<br />

are growing fears of an escalating ‘Cyber Cold<br />

War’ where countries insert high-grade<br />

malware inside energy networks that could be<br />

used to turn off entire electricity supplies at a<br />

moment’s notice.<br />

The Riello UPS report goes on to examine<br />

the process for ‘re-booting’ the electricity<br />

network if a complete system failure ever<br />

occurs. Known as a ‘Black Start’, worse-case<br />

contingency planning is that it could take<br />

anything up to five-to-seven days for power to<br />

be fully restored.<br />

Such an incident is highly likely to be<br />

accompanied by Rota Disconnections, which<br />

basically ration power by cutting off electricity<br />

for blocks of three hours at a time. This was<br />

last seen on a widespread basis in the UK<br />

back in the 1970s, and notably so during the<br />

infamous “Three-Day Week”.<br />

The Blackout Report also investigates the<br />

catastrophic consequences of a world without<br />

power: mobile phone coverage lost within a<br />

couple of hours, transport systems grinding to<br />

a halt, hospitals and care homes overwhelmed<br />

as electrical devices cease working and<br />

businesses crippled as electronic payment<br />

systems go offline.<br />

Government makes plans to<br />

safeguard future security of UK’s<br />

telecoms sector<br />

The Government has set out plans to improve<br />

security standards and practices across the<br />

UK’s telecoms sector, including in new 5G and<br />

full-fibre broadband networks. The<br />

Government’s proposals include new<br />

legislation to enforce stronger security<br />

requirements in the telecoms sector and<br />

protect the UK from threats.<br />

The Telecoms Supply Chain Review outlines<br />

the Government’s ambition to create a<br />

sustainable and diverse telecoms supply chain<br />

that safeguards the UK’s national security<br />

interests and builds on existing capabilities.<br />

At the Supply Chain Review’s foundation will<br />

be a series of new telecoms security<br />

requirements. Overseen by Ofcom and central<br />

Government, the telecoms operators will need<br />

to design and manage their networks to meet<br />

the new standards. They’ll also be subject to<br />

strict oversight as part of their procurement<br />

and contract management processes.<br />

Operators will need to work more closely<br />

with suppliers to ensure there’s proper<br />

assurance testing for equipment and systems.<br />

The Government has stated: “The UK’s<br />

telecoms sector must prioritise secure and<br />

safe networks for consumers and business.<br />

With the growth of our digital sector and<br />

transformative new services over 5G and fullfibre<br />

broadband in the coming years, this isn’t<br />

something where compromise is an option.<br />

People expect the telecoms sector to be a<br />

beacon of safety and this review will make<br />

sure that safety and security is at the forefront<br />

of future networks.”<br />

In response to the Telecoms Supply Chain<br />

Review’s findings, the Government will<br />

establish a new, robust security framework for<br />

the UK telecoms sector marking a significant<br />

shift from the current model. This new<br />

framework will ensure operators build and<br />

operate secure and resilient networks and<br />

manage their supply chains accordingly. They<br />

will have to assess the risks posed by vendors<br />

to network security and resilience and also<br />

ensure they manage those risks appropriately.<br />

The Telecoms Supply Chain Review has also<br />

identified a lack of diversity in the supply<br />

chain and suggests that regulations enforcing<br />

telecoms cyber security be tightened. The<br />

Government will now develop legislation and<br />

seek to provide Ofcom with stronger powers.<br />

7<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

‘Five Eyes’ Security Summit concludes with<br />

firm pledges to tackle emerging threats<br />

Photograph: Harry Metcalfe<br />

Tech companies<br />

should prioritise the<br />

protection of their<br />

users and the wider<br />

public when designing<br />

services, the UK and<br />

international security<br />

partners have warned.<br />

Senior ministers from<br />

the UK, Australia,<br />

Canada, New Zealand<br />

and the United States<br />

have reaffirmed their<br />

commitment to work<br />

together with industry<br />

to tackle a wide range<br />

of security threats.<br />

Brian Sims reports<br />

The commitment follows a two-day Security<br />

Summit, known as the Five Country<br />

Ministerial, where home affairs, interior<br />

security and immigration ministers of the ‘Five<br />

Eyes’ countries discussed current and emerging<br />

threats which could undermine national and<br />

global security. This important partnership and<br />

these issues will remain a focus for the UK now<br />

and into the post-Brexit period.<br />

During a round table discussion involving<br />

tech firms, ministers stressed that law<br />

enforcement agencies’ efforts to investigate<br />

and prosecute the most serious crimes would<br />

be hampered if the industry carries out plans to<br />

implement end-to-end encryption without the<br />

necessary safeguards. They added that<br />

encrypted services could serve to mask the full<br />

scale of harms on the Internet and put<br />

vulnerable users at risk.<br />

Home Secretary Priti Patel (pictured, right)<br />

said: “The ‘Five Eyes’ are united that tech firms<br />

should not develop their systems and services,<br />

including end-to-end encryption, in ways that<br />

empower criminals or put vulnerable people at<br />

risk. As Governments, protecting our citizens is<br />

our top priority. This is why, through the unique<br />

and binding partnership of ‘Five Eyes’, we will<br />

tackle the emerging threats together.”<br />

Also speaking at the conclusion of the twoday<br />

Security Summit, United States Attorney<br />

General William Barr stated: “The ‘Five Eyes’<br />

partnership is vital. Throughout this week, we<br />

have had substantive, frank and positive<br />

discussions surrounding our shared duty to<br />

protect public safety. Encryption presents a<br />

unique challenge. We must ensure that we<br />

don’t stand by as advances in technology create<br />

spaces where criminal activity of the most<br />

heinous kind can go undetected and<br />

unpunished. Indeed, making our virtual world<br />

more secure should not come at the expense of<br />

making us more vulnerable in the real world.<br />

We’re extremely grateful for the leadership of<br />

Home Secretary Priti Patel in facilitating these<br />

critical discussions and helping to foster a<br />

shared commitment to safety for all.”<br />

Set of voluntary principles<br />

Industry agreed to collaborate with the ‘Five<br />

Eyes’ Governments on a set of voluntary<br />

principles, to be drawn up by the end of<br />

September, on steps they will take to combat<br />

child sexual exploitation and abuse, including<br />

the growing threat of live-streaming.<br />

The theme of this year’s meeting was<br />

‘emerging threats’, with ministers also turning<br />

their attentions towards common risks posed<br />

by new technologies, including connected<br />

devices, the terrorist use of the Internet and<br />

foreign terrorist fighters.<br />

The following commitments were agreed by<br />

those ministers present at the talks:<br />

• to continue to develop and share learning on<br />

cyber threats to improve the collective response<br />

• the importance that supply chains in the 5G<br />

network should be trusted and reliable to<br />

protect it from unauthorised access or<br />

interference<br />

• to create a stronger approach to the misuse<br />

of drones, with the UK hosting an event next<br />

year to enhance co-operation<br />

• to explore enhancing cross-border<br />

information sharing<br />

• to maintain efforts designed to combat<br />

foreign interference in elections, the economy<br />

and academia<br />

The Quintet of Attorneys General from the<br />

‘Five Eyes’ countries also joined the Five<br />

Country Ministerial for meetings on online<br />

harms, encryption and foreign terrorist fighters.<br />

Attorneys General from the UK, the USA,<br />

Canada, Australia and New Zealand are also<br />

discussing a range of shared issues including<br />

cyber crime, hostile state activity and social<br />

media and data privacy issues.<br />

The next Five Country Ministerial will be<br />

hosted in 2020 by New Zealand.<br />

8<br />


News Analysis: ‘Five Eyes’ Security Summit 2019<br />

Threat level system<br />

Changes to the terrorism threat level system<br />

came into effect on Tuesday 23 July. The<br />

changes, which follow an extensive review into<br />

the country’s approach towards dealing with<br />

counter-terrorism following the attacks in 2017,<br />

mean that the system will now directly reflect<br />

the threat posed by all forms of terrorism,<br />

irrespective of ideology.<br />

There will now be a single national threat<br />

level describing the threat to the UK. The threat<br />

from Northern Ireland-related terrorism in<br />

Northern Ireland will remain separate. This<br />

means that, for the first time, the threat from<br />

extreme right-wing and left-wing terrorism will<br />

be reflected in the published threat level.<br />

In his last act as Home Secretary before<br />

being replaced in the role by Priti Patel as part<br />

of new Prime Minister Boris Johnson’s inaugural<br />

Conservative Cabinet, Sajid Javid said: “Our<br />

approach to stopping terrorists is the same,<br />

regardless of the twisted ideology that<br />

motivates them. While the Islamist threat<br />

remains, we’ve recently seen an increase in<br />

terrorist activity motivated by the extreme rightwing.<br />

It’s therefore important the public is<br />

properly informed about the threats we face,<br />

which is why we’re making these changes.”<br />

Until this move from the Conservatives, the<br />

threat level system described the threat from<br />

‘international terrorism’, which has become<br />

largely synonymous with Islamist terrorism.<br />

However, this approach is now outdated as<br />

Islamist terrorism can be home-grown, just as<br />

extreme right-wing terrorism can have an<br />

international dimension.<br />

The changes come after the joint police and<br />

MI5 Operational Improvement Review which<br />

followed the 2017 attacks. Based on<br />

recommendations made in that review, the Joint<br />

Terrorism Analysis Centre (JTAC) began<br />

assessing the threat from all forms of terrorism<br />

in November last year. Now, the published<br />

threat level will reflect JTAC’s assessment.<br />

At present, the level of threat posed hasn’t<br />

changed from SEVERE, meaning that an attack<br />

on the UK mainland is highly likely. JTAC sets<br />

the threat level independently of the<br />

Conservative Government.<br />

Terrorism threat levels give a broad indication<br />

of the likelihood of an attack. They’re an<br />

important tool for security practitioners and the<br />

police to determine what protective security is<br />

necessary. They also keep members of the<br />

general public informed of the threat the<br />

country faces at any given point in time.<br />

Additionally, the definitions of some of the<br />

threat levels are to be updated to ensure<br />

they’re clear and consistent. The definitions of<br />

the LOW, SUBSTANTIAL and CRITICAL threat<br />

levels will change.<br />

The new definitions are as follows:<br />

• CRITICAL – an attack is highly likely in the<br />

near future<br />

• SEVERE – an attack is highly likely<br />

• SUBSTANTIAL – an attack is likely<br />

• MODERATE – an attack is possible, but not<br />

likely<br />

• LOW – an attack is highly unlikely<br />

Crime prevention support<br />

The Home Office has pledged a sum of £5<br />

million to support the development of<br />

innovative technology designed to help police<br />

forces prevent crime. The West Midlands Police<br />

will receive the grant to conduct further testing<br />

on a data analysis system that analyses large<br />

volumes of police-held data to assess the risk<br />

of someone committing a crime or becoming a<br />

victim. The programme is designed to support<br />

police officers and doesn’t replace their<br />

standard decision-making procedures.<br />

During the first year of testing, the National<br />

Data Analytics Solution (NDAS) used police<br />

data on knife and gun offences and on those<br />

who have previously committed them to<br />

identify patterns and common traits among<br />

perpetrators. The programme has drawn on<br />

information held in crime reports and<br />

intelligence logs on instances of modern<br />

slavery in order to identify common indicators<br />

of victims and the networks that help enable<br />

this type of crime.<br />

The funding comes from the Home Office’s<br />

Police Transformation Fund and follows a £4.5<br />

million grant awarded in 2018-2019.<br />

Priti Patel explained: “I fully support the<br />

police service embracing innovative new<br />

technology in the fight against crime and to<br />

protect the most vulnerable victims. Anything<br />

we can do to stay one step ahead of the<br />

criminals should be welcomed as long as<br />

solutions are rigorously tested and ethically<br />

sound. I look forward to seeing the results of<br />

this West Midlands Police trial.”<br />

Once fully tested, it’s hoped that the NDAS<br />

would be made available to forces in England<br />

and Wales who want to use it to improve their<br />

performance and protect the public.<br />

The NDAS is just one programme to benefit<br />

from a total Police Transformation Fund pot of<br />

£175 million for 2019-2020, announced as part<br />

of the police funding settlement in December<br />

last year. Overseen by the Police Reform and<br />

Transformation Board, other beneficiaries of the<br />

Fund include a project transforming domestic<br />

abuse services run by Northumbria Police and<br />

the National Enabling Programme.<br />

9<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

The Final Frontier: Brexit, Security and<br />

Solving ‘The Irish Border Conundrum’<br />

Put simply, outside of the backstop there are<br />

three options: the border remains as is (which<br />

contravenes European legislation), it becomes a<br />

hard border (which is severely problematic for<br />

the UK, Ireland and their residents) or it<br />

becomes a soft border employing a mixture of<br />

openness, technology and, potentially, some<br />

strategically manned points.<br />

This third option doesn’t come without<br />

significant challenges, of course. It would<br />

require compromise, trust and an overriding<br />

willingness to manage attitudes on all sides,<br />

but it also does provide options.<br />

The border that<br />

currently separates<br />

Northern Ireland and<br />

the Republic of Ireland<br />

continues to be a<br />

fundamental sticking<br />

point in the ongoing<br />

Brexit negotiations.<br />

Could the use of<br />

cutting-edge security<br />

technology provide a<br />

workable solution that<br />

avoids a hard border?<br />

Alistair Enser<br />

examines the major<br />

issues involved<br />

Speaking in broad terms there are many<br />

technologies available which could, in<br />

principle, either support or enable a soft<br />

border. To what extent technology’s employed<br />

in this instance is a question of risk and<br />

robustness versus freedom and privacy (ie a<br />

more robust border will generally need more<br />

technology, which may or may not be more<br />

visible or more ‘intrusive’ in nature).<br />

With this in mind, a fundamental question to<br />

address is whether or not technology would be<br />

acceptable from a political, diplomatic or<br />

residential perspective? The answer is<br />

debatable. Additionally, given the complexity of<br />

a 310-mile open border, could the technology<br />

be designed, mobilised, interfaced and fully<br />

implemented before the end of October? That’s<br />

highly improbable.<br />

Where there’s general agreement (and where<br />

the subject of the backstop is often debated) is<br />

around the protection and continuation of an<br />

‘open’ or ‘frictionless’ Irish border (and how<br />

that would look in practical terms).<br />

This isn’t the time or the place to reiterate<br />

the positions of the two sides embroiled in this<br />

debate, but it’s clear that the Irish border is a<br />

matter of great political, diplomatic and<br />

security-based sensitivity. Any proposals put<br />

forward shouldn’t threaten the hard-won, 20-<br />

year peace process or jeopardise the Good<br />

Friday Agreement.<br />

When all’s said and done, there’s clearly no<br />

easy answer to this situation.<br />

Setting the scene<br />

In the event of the UK’s withdrawal from the<br />

European Union (EU), the Irish border will<br />

become the only land border between the EU<br />

and the UK. The land boundary has around 200<br />

crossing points with an estimated 177,000<br />

lorries, 208,000 commercial vehicles and 1.85<br />

million cars passing across every month, in<br />

addition to the estimated 30,000 people who<br />

move between the countries on a daily basis.<br />

Post-Brexit, under current legislation some<br />

checks and controls will need to be in place for<br />

many reasons. These include managing the<br />

flow of controlled or commercial goods for the<br />

purpose of collecting tax and duty.<br />

Additionally, the flow of people between the<br />

UK and Europe will need a degree of control for<br />

the purposes of migration and security. Let’s<br />

not forget that these borders are open today<br />

and we already manage the existing challenge<br />

of differing tax and duty rates between the<br />

North and South. However, what could change<br />

post-Brexit is the perceived increase in<br />

economic, political and security risk posed by,<br />

for example, smuggling and crime.<br />

Reinstating the ‘watch towers’ that were<br />

previously removed in 2007, or using the police<br />

or other security agencies, would certainly not<br />

be ‘frictionless’ and could well create further<br />

risk and unrest, while also impeding the<br />

freedoms of the current residents who today<br />

cross the border freely.<br />

What, then, is the alternative? One mooted<br />

solution to this issue is the use of technology.<br />

There are those for and against this option and<br />

technology’s ability to create an invisible or<br />

‘frictionless’ digital border. The opposition view<br />

is perhaps best summed up by Sadhbh<br />

10<br />


Opinion: Security’s Role in the Brexit Process<br />

McCarthy of the Centre for Irish and European<br />

Security who calls it “complete nonsense” and<br />

adds: “If you say it often enough, it starts to<br />

sound like something that could work.”<br />

Point of order<br />

Others would politely disagree with McCarthy’s<br />

view. From a hypothetical standpoint,<br />

technology certainly exists to create a ‘smart’<br />

border and there are numerous examples all<br />

over the world where this has been achieved,<br />

such as between the USA and Canada, Israel<br />

and Palestine and Norway and Sweden.<br />

It’s the latter example that points one way<br />

forward. The 1,000 miles separating Norway<br />

and Sweden represents the EU’s longest land<br />

border, yet vehicles can travel from one nation<br />

to the other through unmanned border posts<br />

equipped with cameras using ANPR software.<br />

Meanwhile, goods can be declared to customs<br />

before they leave warehouses via a computerbased<br />

‘trusted trader’ system.<br />

Where this concept meets resistance with<br />

regards to the Irish situation is due to the fact<br />

that lorries transporting goods between Norway<br />

and Sweden (and vice-versa) must still stop at a<br />

manned crossing for physical customs checks.<br />

One way of avoiding this could be to develop a<br />

global positioning system-based solution,<br />

whereby drivers’ smart phones are linked to a<br />

satellite. When trucks pass the border they’re<br />

then automatically registered. The EU remains<br />

dismissive of this suggestion, though.<br />

Another option is to combine ‘trusted<br />

traders’, ANPR and analytics, such that the<br />

system allows cars, members of the general<br />

public and trusted vehicles unimpeded access,<br />

while requiring other vehicles (by exception) to<br />

pass through a manned checkpoint. Should the<br />

analytics recognise an unregistered lorry<br />

passing the open border, the system could then<br />

create an exception alert and response, such as<br />

a police intervention.<br />

Furthermore, as the whole of Ireland is<br />

surrounded by water, it could also be possible<br />

to cross-reference through a shared database<br />

those mainland UK and mainland Europe<br />

vehicles which enter from a port and then cross<br />

the land border illegitimately.<br />

Emerging technologies such as Artificial<br />

Intelligence, social media, mobile phones, the<br />

Internet of Things and biometrics could also<br />

play a greater role in border management going<br />

forward, and particularly so when considering<br />

whether an individual has crossed the border.<br />

Most of us are already tracked on a daily basis<br />

through these mediums or sensor points.<br />

Likewise, software analytics can<br />

automatically identify trends, objects,<br />

behaviours or even people (ie through facial<br />

recognition) by matching them to known ‘watch<br />

lists’ which then triggers an event such as a<br />

camera feed for human review/intervention.<br />

That said, facial recognition technology isn’t<br />

without its detractors. For their part, civil<br />

liberties groups including Big Brother Watch are<br />

increasingly vocal in their concern that it<br />

threatens freedoms, gathers information<br />

without consent, invades privacy and has the<br />

potential to wrongly identify individuals.<br />

Issues of trust<br />

Even though facial recognition technology is<br />

under great scrutiny at the moment, it’s worth<br />

remembering that this is only one of many<br />

‘evils’ in some commentators’ eyes. People are<br />

already being monitored and recorded by a<br />

huge network of overt and covert surveillance<br />

technology. Mobile phone operators, for<br />

instance, are able to track the movements and<br />

the location of individuals at any given time.<br />

As with any of these technologies, the key is<br />

the appropriate collection and use of the data.<br />

Where possible, only exceptions should be<br />

collected and recorded, while any potential bias<br />

from software analytics should be verified by<br />

human operators before action is taken, thus<br />

allowing law abiding members of the public to<br />

go about their daily business in freedom.<br />

That said, it’s clear the use of any solution<br />

using technology and data would require not<br />

only a significant PR exercise, but also cooperation,<br />

trust and even a degree of close<br />

regulatory alignment between the EU and the<br />

UK in terms of data sharing.<br />

Freedom of movement and residence for<br />

individuals in the EU is the very cornerstone of<br />

membership and citizens of Member State<br />

nations currently have the right to live and work<br />

here in the UK. The UK Government has<br />

announced that Irish citizens will continue to<br />

have the right to enter and remain in the UK, as<br />

they do now, and will not be required to protect<br />

their status. However, recent pronouncements<br />

suggest that new Home Secretary Priti Patel is<br />

planning to impose border restrictions with the<br />

EU immediately on 31 October so this may<br />

complicate matters somewhat.<br />

The use of technology, data and intelligence –<br />

when deployed correctly – could be the very<br />

key to retaining freedoms and civil liberties.<br />

Alistair Enser:<br />

CEO at Reliance High-Tech<br />

“Emerging technologies such as Artificial Intelligence,<br />

social media, mobile phones, the Internet of Things and<br />

biometrics could also play a greater role in border<br />

management going forward”<br />

11<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Doctor or Dalek? The Evolving<br />

Space of the Security Manager<br />

crime groups through to more localised issues<br />

such as opportunistic burglaries, personal<br />

attacks and increasing terrorist threats (some<br />

sophisticated, others frightening in their<br />

simplicity). It’s now more of a challenge than<br />

ever to mitigate fast-moving threats and<br />

solutions. Like our friend The Doctor, we too<br />

must continuously develop our processes in<br />

order to meet evolving adversarial challenges.<br />

Illustration: Cameraface<br />

If you’re familiar with<br />

the long-running UK<br />

TV Sci-Fi series Doctor<br />

Who, you’ll know that<br />

the lead character<br />

(‘The Doctor’) and<br />

various adversaries<br />

have continually<br />

evolved since the<br />

show’s debut back in<br />

1963. Our hero’s<br />

villains have all<br />

adapted, becoming<br />

more resilient, more<br />

devious in their<br />

behaviour to threaten<br />

the security of various<br />

worlds and, indeed,<br />

the Galaxy as a whole.<br />

This echoes the realworld<br />

security sector,<br />

argues Angus Darroch-<br />

Warren, whereby<br />

security managers<br />

need to stay one step<br />

ahead of the threats<br />

posed by criminals<br />

Doctor Who has a classic foe, the Daleks,<br />

and Davros (their creator). What’s<br />

interesting is the evolution of the Daleks,<br />

based on geographical location around the<br />

Galaxy and their hierarchy. They now feature<br />

strategists, commanders, scientists, soldiers,<br />

reconnaissance specialists, drones and even<br />

the odd renegade.<br />

They’re no longer ‘tin cans on wheels’ and<br />

have even managed to work out how to<br />

conquer their biggest obstacle: stairs.<br />

While the Daleks pose a significant threat,<br />

The Doctor typically has the upper hand<br />

through ingenuity and exploiting their<br />

vulnerability – a reliance on pure logic.<br />

In addition to the Daleks, there’s a whole raft<br />

of classic Doctor Who adversaries whom The<br />

Doctor encounters on a regular basis, including<br />

the Cybermen. To keep the stories more<br />

realistic (if indeed they can be called that) and<br />

maintain interest, the series regularly<br />

introduces new and often radically different<br />

enemies to the traditional militaristic<br />

characters. This ensures that The Doctor and<br />

any allies are often firmly on the back foot<br />

when faced by the likes of the Emojibots or The<br />

Master (a rogue Time Lord who seeks to take<br />

over the universe and generally spread chaos<br />

and mayhem).<br />

Likewise, in the real world, security managers<br />

continuously face an ever-changing threat<br />

landscape. We live in an age of increasingly<br />

diverse and developing threats both globally,<br />

from escalating tensions in the Gulf, activism,<br />

cyber crime (pure and enabled) and organised<br />

Perception of threats<br />

Not so long ago, a security manager’s main<br />

threat was likely to be criminal intruders<br />

looking to steal equipment, property and other<br />

assets. Rarely were commercial organisations<br />

planning for, and managing, threats from<br />

heavily armed terrorists. Yet the past two<br />

decades have seen this type of scenario<br />

become a real possibility in what’s now an<br />

increasingly unstable world.<br />

This has triggered a very steep learning curve<br />

for security practitioners, suppliers, specifiers<br />

and installers along with employees and<br />

visitors to buildings who use security systems<br />

on a regular basis. By necessity, everyone (from<br />

the office cleaner to the CEO) in an organisation<br />

now needs to be security aware to ensure<br />

systems and protocols are effective and threat<br />

detection isn’t confined to a small number of<br />

people. Rather, it’s a shared responsibility.<br />

Any ‘dent in the armour’ is a potential threat<br />

to the overall security of the organisation. We<br />

live in an age of the Internet of Things – a web<br />

of interconnected technology connected by and<br />

to the Internet. Physical security is increasingly<br />

a combination of integrated systems managed<br />

by the cloud. Any weaknesses (both physical<br />

and technological) in this armour can have<br />

serious consequences for the business and<br />

those working for it. It’s our responsibility as<br />

security managers to identify these potential<br />

weaknesses and act accordingly. In this way,<br />

and unlike The Doctor, we’re not caught on the<br />

back foot when facing threats.<br />

Returning to our Doctor Who analogy, The<br />

Doctor is famed for not carrying or using<br />

weapons, but rather employing wit, ingenuity<br />

and reasoning to thwart dangerous adversaries.<br />

While it isn’t possible for a security manager to<br />

do away with physical security tools,<br />

understanding the mentality and behaviour of<br />

threat adversaries and communicating the risks<br />

is a vital part of any modern security approach.<br />

12<br />


Opinion: Security Management<br />

If you can understand the motivations and<br />

tactics of your adversary, it’s easier to develop<br />

the security regime required to deal with and<br />

mitigate potential weaknesses, building in<br />

security advantages from this analysis.<br />

For example, an intruder breaks through or<br />

bypasses a number of security layers, but fails<br />

to penetrate a restricted area and reach an<br />

asset. Evidently, a review and revised security<br />

risk assessment is required, opening up<br />

investigative opportunities from a root cause<br />

analysis perspective. The analysis will ask<br />

questions related to whom the attackers were,<br />

what was their intent and their capabilities and<br />

why the defences were ineffective. Always look<br />

to analyse, rationalise and improve.<br />

Advancing technology<br />

Another element that Doctor Who is famous for<br />

is the TARDIS, The Doctor’s vehicle for moving<br />

around in space and time which is (somewhat<br />

surreally) disguised as an old police call box.<br />

As with many other elements in the show, this<br />

too has evolved over the decades to better<br />

match the contemporary technology of the<br />

viewer. Characters can even call the TARDIS on<br />

their latest smart phone.<br />

However, the TARDIS has its vulnerabilities: it<br />

should be chameleon-like and change its<br />

appearance to match the environment. It needs<br />

a good overhaul largely because the TARDIS<br />

has been attacked by aliens, missiles, guns and<br />

other assorted weaponry. It does its job to<br />

protect The Doctor, who rather likes the<br />

familiarity of the TARDIS. It works, so why seek<br />

to change it?<br />

Technology evolution and integration have<br />

transformed the abilities and expectations of<br />

real-world security. Protective systems need to<br />

be upgraded within a defined life-cycle to<br />

mitigate potential vulnerabilities. Being able to<br />

monitor security systems and situations via a<br />

connected smart device, for example, is now<br />

commonplace. However, while technology<br />

evolution has many benefits for both security<br />

and convenience, it also presents new attack<br />

vectors for the criminal fraternity.<br />

Without a regime of upgrades, security<br />

technologies may create unforeseen<br />

vulnerabilities that can be exploited by our<br />

increasingly sophisticated adversaries. For<br />

example, if a smart device connection isn’t<br />

secure, it can be compromised. Converged<br />

systems may be hacked and security systems<br />

used to aid or enable criminal behaviour.<br />

Doctor Who has a distinct fascination with<br />

machines superseding their creators and taking<br />

control (Davros, the Daleks and the Cybermen<br />

being the embodiment of this idea). Similarly,<br />

“The manager is no longer simply responsible for ‘gates’ and<br />

‘guards’, but also for enterprise risk management, data control,<br />

the convergence of systems and linking IT with security”<br />

systems such as VMS, PSIM and ‘smart’ video<br />

analytics and sensors (supported by deep<br />

learning technologies) are gradually reducing<br />

the need for human intervention when<br />

managing incidents.<br />

Equally, the rapid development of Artificial<br />

Intelligence (AI) systems has the potential to<br />

massively boost security operations’<br />

effectiveness (for instance, taking on the role of<br />

a surveillance observer covering amounts of<br />

footage which a human attention span would<br />

completely fail to monitor) and removing the<br />

risk of human error. Yet this incredible<br />

computing power doesn’t always work in our<br />

favour and can be manipulated by<br />

sophisticated criminals to overcome<br />

unprotected security measures.<br />

Every day, AI techniques are being used to<br />

steal data through social engineering. Chatbots<br />

can impersonate real people and copywriting<br />

styles and idioms. We can see a merging of<br />

technology with the human, in turn creating a<br />

metaphorical ‘Cyberman’ of security risk.<br />

Evolution of the security manager<br />

One of the quirkiest (but also most fascinating)<br />

plot devices in Doctor Who is the ability of The<br />

Doctor to evolve (or ‘regenerate’) into a new<br />

body to continue fighting enemies. The Doctor<br />

has transformed from a crotchety old man at<br />

the outset, through quirky individuals with a<br />

penchant for jelly babies and on to impatient,<br />

insensitive and critical iterations until the latest<br />

incarnation – the first female Doctor. It has only<br />

taken some 55 years and 13 regenerations, so<br />

not dissimilar to the security profession.<br />

While I’m not suggesting a security manager<br />

should morph into another person on a regular<br />

basis, developing oneself must be a continuous<br />

process. As time moves on, new generations of<br />

security professionals will come forward and<br />

take responsibility for managing security<br />

systems and meeting the latest threats. The<br />

manager is no longer simply responsible for<br />

‘gates’ and ‘guards’, but also for enterprise risk<br />

management, data control, the convergence of<br />

systems and linking IT with security.<br />

The security industry thrives on<br />

development, and the current generation of<br />

security professionals will undoubtedly develop<br />

new tactics and technologies to deal with the<br />

threats of the future. There’s much to learn<br />

from the latest technology and new thinking.<br />

Angus Darroch-Warren BA<br />

(Hons) MSc PSP RISC CSyP<br />

FSyI: Director at the Linx<br />

International Group<br />

13<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Security: Thinking Outside of the Box<br />

infestation. Of course, the growing menace we<br />

all now face is the ongoing curse of fly-tipping.<br />

To most people in the<br />

street, ‘security’ as an<br />

issue generally means<br />

protecting individuals<br />

and property from<br />

harm or serious<br />

criminal activity, with<br />

terrorism obviously<br />

being a big focus.<br />

However, as Gideon<br />

Reichental explains,<br />

seemingly lesser or<br />

petty criminal offences<br />

still cause an immense<br />

amount of distress to<br />

the public, thereby<br />

rendering security<br />

measures to prevent<br />

such offences every bit<br />

as important<br />

These so-called lesser issues actually<br />

impact people far more widely and include,<br />

among other things, anti-social behaviour<br />

of all types and polluting or disfiguring the<br />

local environment. Indeed, concern for the<br />

environment is rising up the public agenda. As<br />

well as worrying about the planet’s oceans, rain<br />

forests and wildlife, pollution and global<br />

warming on the macro scale, somewhat closer<br />

to home – and impacting on everyone’s daily<br />

lives – are matters like graffiti, derelict or longterm<br />

empty buildings, littering and fly-tipping.<br />

One man’s graffiti is another man’s piece of<br />

art. Debate rages over this. Meaningless and<br />

indecipherable graphics and expanses of spray<br />

paint across clean walls and surfaces isn’t art<br />

for me, and certainly not a Banksy original<br />

which is a very different proposition altogether<br />

(although obviously still graffiti).<br />

Meaningless graffiti disfigures buildings and<br />

infrastructure, detracts from a given property’s<br />

value and appeal and impacts negatively on the<br />

entire location or neighbourhood. Cleaning it<br />

off takes professional expertise, time and<br />

money. It’s a process that needs to be dealt<br />

with quickly before it encourages any further<br />

acts of such ‘vandalism’.<br />

Litter and general mess proliferates so<br />

quickly and can be anything from overgrown<br />

vegetation around a vacant property to<br />

abandoned takeaway wrappers and plastic<br />

shopping bags full of rubbish, all of which<br />

simply encourage further littering and rodent<br />

Struggling with the problem<br />

At the end of last year, the Local Government<br />

Association (LGA) revealed that councils across<br />

the country are struggling to tackle the problem<br />

amid budget cuts and the lenient sentencing of<br />

perpetrators. The LGA reckons that the illegal<br />

dumping of waste across England has<br />

increased by nearly 40% in the past six years.<br />

The latest figures put incidences in England<br />

alone at just under one million, and that’s only<br />

public sector figures. With private incidences<br />

added, the total will be much, much higher.<br />

No great surprise, though, when apparently<br />

no-one has been sanctioned by the courts to<br />

the maximum penalty of a £50,000 fine or 12<br />

months in prison since tougher guidelines were<br />

issued by the Government back in 2014.<br />

Unfortunately, investigating and bringing the<br />

offenders to justice is a costly and lengthy<br />

process which councils find difficult to afford or<br />

justify. By 2020, the overall funding they’ll<br />

receive from central Government will have been<br />

cut by 60% since 2010.<br />

Added to that, with pressure on budgets, it’s<br />

no surprise the costs to dump commercial<br />

waste at local recycling centres or landfill sites<br />

are rising every year alongside that of the<br />

Landfill Tax. It’s a vicious spiral. No wonder<br />

unscrupulous operators seek to avoid paying to<br />

dump waste. Any unprotected site and vacant<br />

building with easy access and no security is an<br />

invitation to them. They have no regard to the<br />

environmental damage they’re perpetrating.<br />

Regrettably, until someone, somewhere takes<br />

a serious grip of this problem little can be done<br />

to stop this unsightly nuisance on our<br />

roadsides and quiet country lanes. In truth,<br />

simple security measures are easily installed to<br />

prevent fly-tipping on individual properties and<br />

sites. Everything from concrete barriers to<br />

secure fencing and CCTV, in fact.<br />

Even if the site is large and open, such as a<br />

construction site or car park, and there’s no<br />

mains power, temporary CCTV towers can be<br />

used that run on solar energy. These all-seeing<br />

‘eyes’ can be watching everywhere, 24 hours a<br />

day, every day of the year. When the<br />

surveillance images are relayed to an Alarm<br />

Receiving Centre, security patrols or the police<br />

can be on site rapidly to catch the<br />

troublemakers red-handed. Property owners<br />

and managers should be encouraged to call in<br />

14<br />


BSIA Briefing<br />

property security professionals. They would<br />

soon sort out measures to deter trespassers<br />

and fly-tippers.<br />

Anti-social behaviour<br />

According to the police, anti-social behaviour<br />

covers a multitude of problems. From flytipping,<br />

littering and graffiti, as already<br />

mentioned, through to everything from<br />

nuisance neighbours and street drinking and on<br />

to vandalism, prostitution and begging.<br />

However, it’s the inconsiderate or inappropriate<br />

use of vehicles that’s a relatively new craze<br />

currently causing widespread problems at many<br />

empty and open sites.<br />

‘Boy racers’ have always existed, but with the<br />

advent of films such as the ‘Fast and Furious’<br />

franchise, the glamorisation of speed and thrills<br />

from racing and spinning cars and bikes on our<br />

streets and private open spaces, such as car<br />

parks, is growing in appeal. It may seem a petty<br />

or irrelevant nuisance to some, but this growing<br />

trend is another costly annoyance. Not only is it<br />

noisy and dangerous on our city streets, but the<br />

cost of clearing up after the cars and drivers<br />

have left private property can be enormous.<br />

Take, for example, the car park at a wellknown<br />

out-of-town Shopping Centre. It’s<br />

surfaced with special paint to make it safer for<br />

visitors, but cleaning off the disfiguring rubber,<br />

oil and tyre marks also removes the protective<br />

surface and lines. The cost to re-do the car park<br />

by the management? £400,000. That’s just one<br />

car park. No doubt that cost will be passed on<br />

and, somewhere down the line, the shopping<br />

public will end up paying for it somehow.<br />

The problem was finally brought to a halt at<br />

this particular location by locating temporary<br />

mobile CCTV towers which recorded the cars<br />

and number plates of the perpetrators as they<br />

approached the relevant car parks and then<br />

while playing their ‘games’. This evidence was<br />

handed over to the police and those involved<br />

were subsequently prosecuted.<br />

Suddenly, all of the boy racers disappeared<br />

into thin air. An easy solution, then, to put an<br />

end to a costly nuisance.<br />

Vacant property security<br />

Finally, we turn to vacant property and,<br />

specifically, unprotected vacant property. It’s<br />

like a magnet for everything I’ve mentioned,<br />

especially if it has a car park and the whole<br />

spectrum of anti-social behaviour goes on<br />

there. Squatting, vandalism (including arson)<br />

and the theft of anything saleable for cash,<br />

such as copper pipes, lead off the roof and<br />

fireplaces, etc. Vacant property harbours<br />

vagrants and gangs of youths up to mischief.<br />

It’s ideal for drug dealing and use. Illegal<br />

raves can happen there if the building’s large<br />

enough, and so much more besides. All of this<br />

is a nightmare to clean and repair and many<br />

property owners forget they’re also legally<br />

liable for any mishaps that take place on the<br />

premises, even if the people involved are<br />

trespassing. Such are the vagaries of our law.<br />

Clearing up needles and drug detritus is<br />

dangerous. So is dealing with other noxious<br />

substances, not to mention human waste and<br />

controlling pests like rats. Little surprise, then,<br />

that people hate having long-term empty<br />

property in their neighbourhood. To them it<br />

simply invites and breeds trouble, inside and<br />

outside. It’s an easy situation to remedy,<br />

though, with a variety of straightforward<br />

security options ranging from in situ property<br />

guardians through to steel screens and doors<br />

and on again to CCTV. Regular site inspections<br />

can check that all is in order. Prevention is<br />

better than cure, as the old saying goes.<br />

For several years now, my crusade has been<br />

to keep our buildings secure and in good order<br />

and our environment a pleasant one in which to<br />

live and work. We, as the security industry, have<br />

to spread the word that, with modern<br />

technology, it can be so simple and costeffective<br />

to put protective measures in place to<br />

deter and prevent what is perceived as lowlevel<br />

nuisance, criminal activity and anti-social<br />

behaviour which annoys and stresses everyone.<br />

The benefits will certainly be appreciated by<br />

the wider public. Sometimes, it’s always the<br />

little things that annoy the most.<br />

Outside of the box<br />

Given the wide variety of security issues now<br />

needing to be covered by differing clients in<br />

different sectors and with differing needs,<br />

security companies sometimes need to think<br />

outside of the box. We may compete with each<br />

other on one level, but as an industry we<br />

should be pulling together.<br />

One size never fits all and we can rarely be<br />

experts in everything. Joining forces or subcontracting<br />

helps to win contracts and can offer<br />

a better and wider service to clients with<br />

special or differing needs, or perhaps one-off<br />

projects or events that demand expert input.<br />

We’re all singing from the same hymn sheet<br />

and very much want to see standards raised.<br />

Gideon Reichental:<br />

Chairman of the BSIA’s Vacant<br />

Property Protection Section<br />

“Unfortunately, investigating and bringing the offenders to<br />

justice is a costly process which councils find difficult to<br />

afford. By 2020, the overall funding they’ll receive from<br />

central Government will have been cut by 60% since 2010”<br />

15<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Losing The Working Environment<br />

In spite of best<br />

intentions, protective<br />

measures, vigilance<br />

and forward planning,<br />

organisations will<br />

always be at risk of<br />

losing their workplace<br />

due to reasons such as<br />

fire, flooding/extreme<br />

weather conditions or<br />

structural collapse.<br />

Likewise, access may<br />

be denied due to<br />

contamination, lack of<br />

power or water or the<br />

location finding itself<br />

within a police cordon<br />

following a terrorist<br />

incident. What does<br />

“losing the<br />

workplace” actually<br />

mean for an<br />

organisation, and<br />

what’s the best thing<br />

to do about it?<br />

Dr Sandra Bell<br />

investigates<br />

Regardless of what caused the issue, the<br />

end result is the same – the loss of a<br />

normal place of work. It may well be for<br />

just a few hours in the case of a utility outage<br />

or it could be for many months – or even<br />

indefinitely – for more severe incidents.<br />

Governments, religious orders and the<br />

military have long recognised the benefits of<br />

formal places where centralised administration<br />

can take place in a controlled manner. Similarly,<br />

when large-scale mechanisation facilitated the<br />

growth of commercial enterprise, many<br />

industries followed suit by creating spaces for<br />

organised order processing, accounting and<br />

document filing in order to cope with the size<br />

and complexity of their operations.<br />

Even in times of austerity or conflict, it’s fair<br />

to say that these administrative centres have<br />

always been much more than simply functional<br />

spaces. Rather, they’re visible statements of<br />

prestige and power both to the outside world<br />

and for those individuals within them.<br />

Therefore, the true cost of losing a workplace<br />

office is always greater than the actual physical<br />

loss. There are losses associated with the<br />

immediate operational disruption caused by<br />

the fact that businesses cannot meet the<br />

physiological and security needs of their<br />

workers to enable them to transact the duties<br />

for which they’re paid. There are also losses<br />

associated with reduced efficiency. Over long<br />

periods of time, members of staff’s activity can<br />

no longer be as easily co-ordinated and<br />

managed as it would in an office environment.<br />

Without the workplace, businesses can also<br />

no longer meet the higher-level needs of<br />

employees – such as the human need to<br />

belong, contribute and grow – which can then<br />

lead to lower morale and engagement.<br />

Finally, by losing an external power symbol,<br />

businesses also signal to their clients,<br />

competitors and stakeholders a weakness,<br />

realising the potential for loss of custom and<br />

providing competitors with an opportunity to<br />

win market share.<br />

Modern technology has, in most cases,<br />

allowed information to be disconnected from<br />

place and time which means that, with a little<br />

forward planning and investment, it’s fairly<br />

straightforward to have an affected office’s<br />

occupants up-and-running at alternative<br />

locations such as home, a hotel, a rented office<br />

or a purpose-built disaster recovery facility.<br />

All that said, research shows that if the<br />

workplace is fragmented without paying<br />

attention to the management and co-ordination<br />

activity or the social and recognition needs of<br />

workers following an office disaster, the costs<br />

can be very high indeed. Likewise, an<br />

organisation that normally exudes trust and<br />

efficiency through a smart, well-organised and<br />

secure office environment is unlikely to foster<br />

the same confidence in its clients if everyone’s<br />

working from home or from local Internet cafes.<br />

Although intangible, these impacts are no<br />

less damaging than the impacts associated<br />

with the direct operational disruption. As an<br />

indicator of the cost of business disruption, the<br />

2018 Allianz Global Claims Review reports that<br />

the average insurance claim for business<br />

interruption is more than $3 million. That’s<br />

almost 40% higher than the average cost<br />

claimed for property damage. The same<br />

research also shows that the magnitude of the<br />

losses is now being driven by the indirect<br />

impacts of disruption, such as loss of<br />

confidence in the organisation, loss of<br />

customers, fines, penalties and lawsuits.<br />

In short, the threats that have the ability to<br />

prevent a workplace from operating as it should<br />

can be physical, virtual or reputational.<br />

Crucially, however, all impacts are financial.<br />

Indeed, the largest losses are now being driven<br />

by the indirect impacts rather than the direct<br />

property damage and operational disruption.<br />

As a direct result, businesses must re-think how<br />

they accommodate the workforce in the event<br />

that they cannot access their office.<br />

Reducing the impact<br />

The most effective way in which to reduce the<br />

impact of a workplace office loss is to<br />

instantaneously pick up the whole thing (ie<br />

people, information, management, personal<br />

knick-knacks, support structures, etc) and<br />

‘transplant’ it somewhere else that’s equally<br />

easy to access and has the same feel and<br />

culture as the original. However, in the real<br />

world, things are not quite so simple.<br />

Good physical security and building<br />

resilience (such as ensuring the building isn’t<br />

located on a flood plain and having more than<br />

one power and communications link, etc) are a<br />

great starting point. Likewise, the Business<br />

Continuity Institute’s Good Practice Guidelines<br />

offer four basic recommendations relating to<br />

the loss of a building and working environment<br />

to help mitigate the immediate operational<br />

disruption. On that note, it’s worth every<br />

business considering the following:<br />

16<br />


Business Continuity: Workplace Solutions<br />

• Diversification Having a separate location<br />

where activity occurs in parallel such that, if<br />

one location is lost, the work can carry on at<br />

another location – albeit with the negative<br />

consequences of an increased workload for the<br />

undamaged building occupants and loss of<br />

activity for those who normally work from the<br />

damaged location<br />

• Replication Having a separate premises that<br />

harbours all of the facilities required to<br />

undertake an activity, but it’s not currently<br />

being used<br />

• Standby A separate premises that has some<br />

of the facilities required to undertake an<br />

activity, but additional facilities will be required<br />

before the activity can be undertaken. For<br />

example, a physical premises, but where an<br />

operational copy of the IT system to support<br />

the activities of the workforce is held together<br />

with a back-up of its data that needs to be<br />

loaded and tested with manual switching in<br />

order to be made live<br />

• Post-incident acquisition Where suitable<br />

premises can be acquired which may or may<br />

not already have the facilities needed to<br />

undertake an activity<br />

Beware... There are a number of pitfalls that<br />

need to be negotiated to gain the most out of<br />

these strategies. For example, many<br />

organisations have a plan that includes relying<br />

on people being able to carry out their normal<br />

activities remotely from their home. However,<br />

unless the organisation’s in the fortunate<br />

position of being able to issue users with a<br />

second laptop that lives at their home, it can<br />

never be made sure they’ll be available at the<br />

time of the incident. Many employees are not at<br />

their desks when a crisis happens. Most of<br />

them will not take their laptops home at night.<br />

Equally, does the user have sufficient and<br />

suitable space for working from home?<br />

Likewise, is it safe? The employer still has a<br />

responsibility to ensure a safe working<br />

environment for members of staff even when<br />

they are working from home.<br />

An alternative workplace can also be<br />

troublesome. Does it have the right<br />

connectivity? Is it secure? Who else is the space<br />

shared with? Is it somewhere that client<br />

meetings could be held?<br />

Working as a team<br />

Workplace offices are not simply warehouses<br />

that provide shelter and warmth to individuals<br />

who carry out their tasks autonomously. While<br />

they all afford a rich environment for interaction<br />

and innovation and enable efficiency by<br />

specialisation, they do come in various<br />

different forms that facilitate the culture.<br />

There are collections of elegant individual<br />

offices, banks of cubicles, arrays of open plan<br />

desks, trendy meeting spaces with ping-pong<br />

tables and beanbags and networked virtual<br />

workers, etc. Each one has been meticulously<br />

designed to foster the right atmosphere and<br />

maximise efficiency, creativity or knowledge<br />

transfer and communicate the status and ethos<br />

of the company to the outside world.<br />

The myriad impacts of losing the place that<br />

facilitates the culture due to a disaster can be<br />

mitigated, but only as a direct result of people<br />

in the disrupted organisation pulling together<br />

as a team. They will only do so if there’s clear<br />

leadership and they have a temporary space<br />

that they can make their home.<br />

The environment in which organisations<br />

operate today is now characterised by<br />

uncertainty, complexity and risks involving<br />

adversaries. The magnitude and frequency of<br />

the losses is driven primarily by how an<br />

organisation as a whole responds rather than<br />

how that company mitigates the immediate<br />

operational disruption of losing its premises in<br />

the first place.<br />

Often, organisations that adopt an holistic<br />

stance and incorporate point business<br />

continuity solutions such as workplace and IT<br />

disaster recovery into a larger resilience<br />

strategy suffer fewer losses primarily because<br />

they’re readily able to address all aspects of the<br />

corporate culture. The loss of a workplace then<br />

becomes a minor operational blip as opposed<br />

to a full blown disaster.<br />

Dr Sandra Bell:<br />

Head of Resilience Consulting<br />

at Sungard Availability<br />

Services<br />

“The myriad impacts of losing the place that facilitates the<br />

culture due to a disaster can be mitigated, but only as a<br />

direct result of people in the disrupted organisation pulling<br />

together and working as a team”<br />

17<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Traditional login<br />

systems have enjoyed<br />

a remarkable<br />

longevity, writes<br />

Piergiorgio Vittori.<br />

Today, though, they’re<br />

no longer fit for<br />

purpose. The problem<br />

isn’t with the concept<br />

of the username and<br />

password<br />

combination. Rather,<br />

it’s that the system<br />

relies on the weakest<br />

element of any<br />

information security<br />

chain, namely the<br />

human being<br />

Piergiorgio Vittori:<br />

Global Development Director<br />

at Spitch<br />

Acting on Word of Mouth<br />

John Shepherd-Barron, the inventor of the<br />

ATM, famously chose four digits as the<br />

standard PIN code because his wife claimed<br />

that she couldn’t remember a longer one. The<br />

payment card/PIN combination has’t<br />

traditionally been a problem because it’s a twofactor<br />

form of authentication, requiring a token<br />

and a password.<br />

However, in the digital world, where no token<br />

is required, we tend to opt for an insecure,<br />

easy-to-crack password such as ‘123456’ or<br />

that perennial favourite ‘password1’ as we’re no<br />

longer able to remember the several dozen<br />

passwords now required at home and at work.<br />

Thankfully, weak passwords will soon be a<br />

thing of the past, replaced by a far more secure<br />

method of authentication: our voice.<br />

Biometric authentication has a long history –<br />

first in our imaginations and then in reality. In<br />

the 1968 Science Fiction epic ‘2001: A Space<br />

Odyssey’, the spaceship’s computer HAL 9000<br />

could identify humans by their “voice<br />

harmonics”. Fast forward to 1987 and<br />

‘RoboCop’ realised facial recognition. Two years<br />

later, ‘Back To The Future 2’ predicted<br />

fingerprint scanners. Fast forward to today and<br />

we’re now beginning to witness these<br />

technologies replace passwords as a secure<br />

means of authentication.<br />

Here in the UK, for example, some large<br />

organisations – among them Lloyds Bank,<br />

HBOS and Vodafone – are starting to deploy<br />

voice biometrics.<br />

Password authentication<br />

Advances in Artificial Intelligence (AI)-led voice<br />

biometrics technology now mean that it’s ready<br />

to replace traditional password authentication<br />

systems, bringing many significant advantages<br />

not just limited to logins. However, not every<br />

biometric authentication system is created<br />

equal. It’s important to recognise the differing<br />

capabilities of several authentication systems<br />

on the market today.<br />

Traditionally, we’ve tended to consider<br />

biometrics as a whole without looking at the<br />

various advantages and disadvantages of voice<br />

recognition, fingerprints and facial recognition<br />

as separate entities. It’s easy to think that each<br />

one provides the same degree of protection<br />

against hackers, but in truth each of these<br />

methods affords very different levels of<br />

accuracy and usability.<br />

Much is made, for example, of the<br />

uniqueness of human fingerprints, but this<br />

owes more to our fascination with the wonders<br />

of the human body than it does to the actual<br />

security benefits. It’s perfectly possible to<br />

‘clone’ someone’s fingerprint to break into their<br />

device, while there have been disturbing<br />

reports of people using a sleeping person’s<br />

finger to unlock their phones.<br />

IMost of the new generation smart phones do<br />

have built-in fingerprint recognition features,<br />

while some offer ‘four fingers’ authentication<br />

for greater security. The problem with these<br />

systems is that they require a smart and fairly<br />

expensive device with a built-in HD camera to<br />

capture the prints. That significantly limits the<br />

accessibility of this authentication method.<br />

When it comes to facial recognition, many<br />

security concerns have surrounded the<br />

technology itself, with San Francisco banning<br />

facial recognition outright.<br />

In light of these weaknesses, the most<br />

reliable and practical way to authenticate users<br />

could well be voice biometrics.<br />

Secure customer experience<br />

Companies are increasingly aware of the<br />

potential damage of data breaches, both from a<br />

reputational viewpoint and, of course, in terms<br />

of the hefty fines mandated under the General<br />

Data Protection Regulation, etc. At the same<br />

time, they understand full well the<br />

consequences of time-consuming and complex<br />

authentication procedures that can lead to a<br />

great deal of frustration and damage<br />

consumers’ perception of their brand.<br />

Businesses are, therefore, seeking to balance<br />

information security with protecting the<br />

customer experience. Voice biometrics<br />

technology promises one of the safest and<br />

most convenient methods of authentication<br />

available today. One of the key advantages is<br />

that there’s no need for specialist equipment to<br />

use voice biometrics. The technology is<br />

transparent and doesn’t require user or device<br />

activation, an expensive HD camera or an<br />

external application.<br />

Consumers can use a traditional telephone<br />

line, a smart phone or a web-based application,<br />

which then also enables organisations to<br />

deliver more inclusive customer services to all<br />

users irrespective of their age, income levels,<br />

proficiency with smart tech or their ability to<br />

afford a smart phone in the first place.<br />

Voice verification happens ‘live’ throughout<br />

the conversation, safeguarding against any<br />

change of circumstances – or people – on the<br />

18<br />


Biometric Security<br />

other end of the line. Another important point<br />

to note is that, with voice biometrics, there’s no<br />

need for the user to share any personal or<br />

confidential data to be authenticated. Their<br />

voice sample is all that matters.<br />

Overall, voice biometrics technology provides<br />

a much safer and universally-accessible method<br />

of securely authenticating customers. What’s<br />

more, such intelligent AI-led technology is able<br />

to pick up and recognise callers’ sentiment and<br />

intent. If you’re calling your bank and asking<br />

them to transfer a large sum of money over the<br />

phone with an undertone of frustration in your<br />

voice – let’s say that there’s a possibility you’re<br />

being held at gunpoint – the technology will<br />

give you a ‘lifeline’ by suggesting that the<br />

system’s currently down and ask you to come<br />

into one of the nearest bank brunches to<br />

process the payment.<br />

Technologies such as passive voice<br />

biometrics go even further by facilitating<br />

customer on-boarding. Instead of making the<br />

user repeat a sample phrase several times over<br />

until the system captures enough samples<br />

required for authentication during the onboarding<br />

stage, passive voice biometrics allows<br />

for the user ‘voice print’ to be created during a<br />

normal conversation.<br />

Once the user gives their consent, the agent<br />

can capture their ‘voice print’ and subsequently<br />

verify the identity of the caller. Next time the<br />

user calls the organisation, they can speak<br />

freely to authenticate themselves – all while<br />

resolving their problem and having a<br />

meaningful conversation.<br />

The technology provides a practically<br />

seamless way of passing through security: it’s<br />

quick, intuitive and secure.<br />

Harnessing the power of AI<br />

Voice biometrics technology has come a long<br />

way in the last few years, not least thanks to AI.<br />

AI-driven voice biometrics tech works by<br />

ensuring a user’s unique voice (in a natural<br />

language live interaction) is compared with the<br />

voice print stored in a database in real-time<br />

over the course of the entire conversation<br />

based on numerous parameters. The solution is<br />

therefore very difficult – if not nearly impossible<br />

– to hack. Since there’s no set of static data<br />

required in the interaction that could be<br />

recorded, it’s incredibly difficult for a fraudster<br />

to gain access to someone’s account or profile.<br />

What’s more, voice biometrics can also be<br />

used actively in the fight against the same<br />

fraudsters. If an attempted fraud is detected,<br />

it’s possible to use the audio obtained to create<br />

the fraudster’s ‘voice print’, which will then be<br />

added to a blacklist of fraudsters. The end<br />

result is that anyone who has been caught<br />

committing fraud over the phone will be<br />

reported and obviously easily detected in the<br />

system during any further attempt to do so.<br />

As a method of detecting and discouraging<br />

fraud, voice biometrics is an incredibly<br />

convincing solution for many business sectors.<br />

Above all, it’s the basis of a superior and userfriendly<br />

customer experience.<br />

Alongside these advantages, the great thing<br />

about voice biometrics is that it doesn’t rely on<br />

the user remembering a password or having a<br />

physical token to hand. The technology can<br />

recognise speech patterns and modulations<br />

that are impossible for even the best<br />

impressionist to mimic.<br />

Of course, organisations don’t have to rely on<br />

voice as their sole means of authenticating<br />

customers. It’s both possible and advisable for<br />

businesses, and in particular securityconscious<br />

industries such as banking, to<br />

combine voice with other methods of two-factor<br />

authentication such as tokens and – yes –<br />

passwords where and when appropriate.<br />

Voice biometrics technology does promise to<br />

solve one of the most pressing problems facing<br />

organisations in a range of industry sectors:<br />

how to deliver secure, yet seamless<br />

authentication for the customer base.<br />

“One of the key advantages is that there’s no need for<br />

specialist equipment to use voice biometrics. The technology<br />

is transparent and doesn’t require user or device activation”<br />

19<br />

www.riskxtra.com>


With more than 150 years’<br />

experience, we stand for security,<br />

sustainability and reliability<br />

Our comprehensive product portfolio and<br />

industry experience means we listen, we<br />

know the on-site requirements and ask the<br />

right questions to ensure that we come up<br />

with smart, secure access solutions.<br />

Entrance Systems<br />

Mobile Access<br />

Solutions<br />

Electronic Access<br />

and Data<br />

Door Hardware<br />

Interior Glass<br />

Systems<br />

Mechanical Key<br />

Systems<br />

Best In Class<br />

Service<br />

Safe Locks<br />

Lodging Systems<br />

dormakaba continues<br />

to strive to become the<br />

industry leader in innovation,<br />

providing reliable access and<br />

security solutions.<br />

dormakaba UK & Ireland<br />

T: +44 (0)1462 477600 E: info.gb@dormakaba.com<br />

www.dormakaba.co.uk


FIRE SAFETY<br />

Management & Installation<br />

Fire Protection and Prevention<br />

with Technology and Innovation<br />

Special Supplement in association with:


FIRE SAFETY<br />

Andrew Speake: National<br />

Technical Manager at Aico, a Fire<br />

Industry Association member<br />

company. Andrew works closely<br />

with a number of leading industry<br />

organisations and assists with<br />

R&D on new products<br />

Improved Protection<br />

and Clarification<br />

Andrew Speake examines the<br />

revised British Standard focused<br />

on domestic fire alarms<br />

BS 5839-6 is the Code of Practice for the<br />

design, installation, commissioning and<br />

maintenance of fire detection and fire alarm<br />

systems in domestic premises. When it was first<br />

introduced back in 1995, BS 5839-6 changed<br />

everything. Whether you were a landlord, a<br />

specifier or an installer, here at last was a clear and<br />

detailed set of standards to be observed. The<br />

contents of BS 5839-6 were quickly adopted and<br />

have been standard practice since then in both<br />

existing dwellings and new builds. The Building<br />

Regulations and other guidance documents<br />

reference this British Standard, so its importance<br />

cannot be over emphasised.<br />

BS 5839-6 was revised in 2004 and then again<br />

in 2013, both times taking into consideration<br />

technological developments and addressing Best<br />

Practice accordingly. Its been around a decade<br />

between each set of revisions so why, just six years<br />

since the last set of revisions, was a new version<br />

released this year on Tuesday 30 April?<br />

The answer isn’t to be found in new technology,<br />

but rather in the will of professionals in housing,<br />

fire and safety to improve the level of fire<br />

protection in domestic dwellings, which ultimately<br />

provides residents with a greater chance of escape<br />

unharmed from a fire in their home.<br />

While there have been a number of minor<br />

revisions within BS 5839-6:2019, plus multiple<br />

definitions that have been updated throughout, the<br />

biggest changes by far apply to the grades of<br />

alarms and the type/level of protection for each<br />

identified dwelling. The ‘Grade’ determines the<br />

type of alarm to be used and the ‘Category’ the<br />

level of protection required.<br />

Changes to Fire Alarm Grades<br />

Under BS 5839-6, fire alarms are classified into<br />

grades from A to F. Grades B and E have been<br />

removed in 2019, with Grade D being the common<br />

for domestic properties that will form the focus of<br />

this particular discourse.<br />

Under the previous standard, Grade D required<br />

one or more interlinked mains powered smoke<br />

alarms (and heat alarms if required), each with an<br />

integral back-up supply, with the back-up supply to<br />

be delivered in the form of a rechargeable lithium<br />

or alkaline battery.<br />

Under the revised BS 5839-6, Grade D has been<br />

replaced with Grades D1 and D2 which differ in<br />

terms of the back-up power supply:<br />

• Grade D1 calls for a tamper-proof standby supply<br />

consisting of a battery or batteries, with lithium<br />

being the standard battery type. These are long-life<br />

battery cells lasting the recommended lifespan of<br />

the alarm and are designed such that they cannot<br />

easily be removed by the user. Grade D1 alarms are<br />

the preferred option for social housing as they<br />

remove the risk factor<br />

• Grade D2, on the other hand, requires an integral<br />

standby supply consisting of a battery or batteries<br />

(usually 9 V PP3) which need to be replaced at<br />

regular intervals by the end user throughout the<br />

life of the alarm by<br />

Changes to these grades provide greater clarity<br />

for alarm specifiers and installers, which is very<br />

much to be welcomed.<br />

While Grade D alarms feature most heavily in<br />

BS 5839-6:2019, Grade F systems also warrant<br />

mention here due to changes in Scottish legislation<br />

earlier this year which permits their use. Grade F<br />

systems use only battery-powered alarms. As with<br />

Grade D, Grade F has now been divided into F1 and<br />

F2 in the same fashion as that noted above.<br />

Minimum levels of protection<br />

Under BS 5839-6, different classes of premises are<br />

identified and the minimum grade of fire alarm<br />

22<br />

www.riskxtra.com


system and category of fire protection provided for<br />

that specific type of property are listed. It’s here, in<br />

the 2019 revisions, that we’ve seen the biggest<br />

changes that will have a major impact on what type<br />

of fire alarms are fitted and where. In the main, this<br />

is due to an increase in the category of fire<br />

protection from LD3 where previously listed, which<br />

requires one mains-powered optical alarm in the<br />

hallway and another upstairs on the landing,<br />

interconnected together, to Category LD2. LD2<br />

involves additional alarm coverage, with a heat<br />

alarm in the kitchen and a further smoke alarm in<br />

the main living area, once again all interconnected.<br />

This upgrade in fire protection is most notable<br />

in existing rental properties and Houses in Multiple<br />

Occupation (HMOs):<br />

• Existing two and three-storey maisonettes and<br />

houses in the rental sector have now been<br />

upgraded from the low category of fire protection<br />

(LD3) to the medium category LD2 and graded D1<br />

(ie mains-powered alarm with tamper-proof battery<br />

back-up power). New build properties of this<br />

nature remain LD3 (unless a risk assessment<br />

indicates otherwise)<br />

• Existing HMOs have been set as the category of<br />

LD2 whereas before it was a mixture of LD2 and<br />

LD3 depending on the nature of the property and<br />

inhabitants. Grade D1 is now the requirement<br />

Other property types that have made an<br />

appearance in the BS 5839-6 property<br />

classification are supported housing and shortterm<br />

holiday lets. Both are allocated the highest<br />

category of protection (ie Grade D1, LD1).<br />

“BS 5839-6:2019 is a Code of Practice for fire detection and<br />

fire alarm systems in domestic premises, not a set of legal<br />

requirements. There’s no penalty if an organisation or<br />

individual chooses to ignore it and no date for ‘compliance’”<br />

Other changes of note<br />

Weekly alarm testing was previously recommended<br />

in BS 5839-6, but this has now been changed to<br />

monthly (apart from Grade A systems). Although<br />

weekly testing of alarms remains ideal, it’s not a<br />

realistic expectation, whereas monthly is far more<br />

manageable and therefore likely. The important<br />

message to note here is that end users should<br />

continue to test their alarms at regular intervals.<br />

Recommendations contained within the NFCC<br />

Specialised Housing Guide regarding all fire<br />

detection, alarm and transmission/signalling to an<br />

Alarm Receiving Centre has been incorporated into<br />

BS 5839-6:2019, which is useful and recognises<br />

that valuable document.<br />

Carbon Monoxide alarms have been<br />

acknowledged for the first time in BS 5839-6 2019<br />

as they’re increasingly been installed alongside fire<br />

alarm systems or incorporated within them. BS<br />

5839-6 states that mains-powered Carbon<br />

Monoxide alarms conforming to BS EN 50291 and<br />

installed in compliance with BS EN 50292 may also<br />

be interlinked with the fire detection and alarm<br />

system if the manufacturer of all the components<br />

makes such a recommendation.<br />

Implications for the future<br />

BS 5839-6:2019 is a Code of Practice for fire<br />

detection and fire alarm systems in domestic<br />

premises, not a set of legal requirements. There’s<br />

About the Fire Industry Association<br />

The Fire Industry Association (FIA) is a not-for-profit<br />

organisation. We’re the leading Trade Association for the fire<br />

industry in the UK. The education and training that we offer<br />

through our qualifications and industry-recognised courses<br />

exists to provide you with a high level of knowledge and<br />

understanding that will help in terms of developing your career and building your business.<br />

Our courses are delivered by experienced professionals from the industry who can not only<br />

deliver the courses, but also answer questions and provide real-life examples, in turn enabling<br />

all delegates to deliver excellent results for their organisations.<br />

Combined with our website (fia.uk.com), we aim to provide a service that contributes towards<br />

and promotes technical developments in the industry. Standards are constantly being revised<br />

and updated and it’s vital to stay up-to-date with the changes. By taking our qualifications and<br />

courses and using our extensive Resource Library on the website, you can be sure that you’ll be<br />

well informed of any recent changes as and when they happen.<br />

Our range of professional qualifications and training programmes – along with our extensive<br />

membership benefits – are all designed to support learners and their organisations to grow,<br />

develop technical knowledge and increase their professional networks.<br />

www.riskxtra.com<br />

23


FIRE SAFETY<br />

“We’ve lived by BS 5839-6 for almost a quarter of a century<br />

now and the standard has served us well. There’s no doubt<br />

that it has helped to save lives. BS 5839-6:2019 builds on the<br />

success of the original document”<br />

no penalty if an organisation or individual chooses<br />

to ignore it and no date for ‘compliance’. However,<br />

the standard is considered Best Practice and those<br />

who choose to ignore it do so at their own risk.<br />

Certainly, social housing organisations place great<br />

emphasis on it and complying with it is regarded<br />

as being essential.<br />

Many RSLs have been moving towards LD2<br />

systems over the past year in the anticipation of<br />

the revisions and we’re now witnessing a large<br />

number rewriting their alarm specifications<br />

accordingly and planning upgrade programmes as<br />

part of their overall process.<br />

With the 2019 revisions, we’ve benefited from<br />

greater clarity and, in a number of cases, an increase<br />

in the level of fire protection. Of course, with this<br />

comes a need for additional alarms per property<br />

which has an associated cost, not just in alarm units,<br />

but also in terms of installation. Some of this cost can<br />

be mitigated by using wireless alarm interconnection<br />

technology and by employing alarms that have been<br />

designed to be quick and easy to install.<br />

Control and maintenance<br />

With larger fire alarm systems come issues over<br />

control and maintenance as more alarms will need<br />

to be tested. It’s important to be able to locate the<br />

precise alarm which originally triggered. In these<br />

cases, an alarm controller should be considered<br />

(especially important if a Carbon Monoxide alarm<br />

is included in the system). These wall-mounted<br />

devices feature test, silence and locate features,<br />

subsequently adding an extremely valuable extra<br />

measure of controllability to an LD2 system.<br />

We’ve lived by BS 5839-6 for almost a quarter<br />

of a century now and there’s no doubt that the<br />

standard has served us well. There’s also no doubt<br />

that it has helped to save lives. BS 5839-6:2019<br />

builds on the success of the original document<br />

and, if adhered to in the correct manner, should<br />

always ensure greater safety and even better<br />

practice across the industry.<br />

www.fia.uk.com<br />

Takt is<br />

true integration<br />

Taktis® is Kentec’s most powerful and sophisticated analogue addressable<br />

fi re panel. Intelligent and technically robust, the next generation Taktis 16L has<br />

enhanced integration and networking capabilities designed to meet the current<br />

and future needs of larger buildings and installations. As a truly Open Protocol<br />

panel it offers installers and their customers maximum fl exibility in systems’<br />

design, site-customisation and in the third-party devices that they use.<br />

+44 (0)1322 222121 www.taktis.co.uk<br />

24<br />

www.riskxtra.com


Evacuate everyone<br />

EN54-23 Approved Fire Beacons<br />

Sonos Pulse and Nexus Pulse devices contain Pulse Alert Technology,<br />

Klaxon’s EN54-23 compliant visual notification for wall and ceiling<br />

mount devices. Pulse Alert Technology provides visual notifications that<br />

are unmissable and unmistakable, ensuring that everyone is notified of<br />

a fire evacuation emergency.<br />

Seminars<br />

Klaxon currently run a certified EN54-23 CPD seminar for Consultants, Integrators and End Users.<br />

Please contact us now to book a ‘lunch and learn’ EN54-23 CPD Seminar.<br />

Phone +44 (0)1706 212524 or visit www.klaxonsignals.com/fire<br />

EN54-3 Sonders & Beacons<br />

Nexus 105/110/120 Sounders<br />

High output sounders certified to EN54-3.<br />

Sonos Sounder Beacon<br />

Electronic sounder beacon certified to EN54-3.<br />

VISIT US: STAND FX415


FIRE SAFETY<br />

Pulse Alert Visual<br />

Alarm Devices (VADs)<br />

from Klaxon lower<br />

installation costs,<br />

making the latest fire<br />

evacuation technology<br />

affordable without<br />

compromising on<br />

system performance<br />

Klaxon achieves<br />

ISO 9001:2015<br />

ahead of deadline<br />

To ensure thet the business<br />

adheres to the high standards<br />

its customers and partners<br />

have come to expect, Klaxon<br />

Signals transitioned to the<br />

new ISO 9001:2015 standard<br />

ahead of the deadline of<br />

Friday 15 March 2019.<br />

The new standard focuses<br />

on quality management,<br />

ensuring that customers<br />

receive consistently good<br />

quality products, while at the<br />

same time suppliers are<br />

always strongly customerfocused.<br />

It reflects the new<br />

and different challenges that<br />

businesses now face.<br />

Klaxon Signals is the fire<br />

safety brand of Texecom,<br />

which has itself been ISOaccredited<br />

with the BSI since<br />

1996.<br />

To view the certificate<br />

access the QR code here:<br />

Pulse Alert Technology<br />

Fire alarm systems should be able to assist in<br />

evacuating everyone from a given building.<br />

Relying on audible fire alarm notification<br />

alone, however, disadvantages those with hearing<br />

impairments or individuals working or living in a<br />

sound-reducing environment. Even something as<br />

simple as wearing a pair of headphones could<br />

prevent someone from hearing an audible fire<br />

evacuation warning. To successfully evacuate<br />

everyone from a building, fire alarms should signal<br />

effectively using light as well as sound.<br />

Klaxon Signals’ Pulse Alert Technology is a<br />

beacon warning system which produces a light<br />

output that can protect most rooms with just a<br />

single device. Using new LED lighting technology<br />

derived from automotive applications, it disperses<br />

light evenly and efficiently, in turn maximising its<br />

effectiveness. Its patented electronic design also<br />

maximises electrical efficiency and reduces<br />

current consumption, minimising the<br />

cost of ownership and allowing<br />

more devices to be installed on<br />

a single alarm system.<br />

Pulse Alert Technology<br />

provides all the benefits that<br />

an EN54-23-compliant system<br />

can bring, while answering all<br />

of the design challenges in<br />

doing so. This means a greater<br />

coverage area with lower current<br />

consumption in tandem with greater<br />

flexibility for system designers. There’s also the<br />

benefit of reduced cost of ownership for end users<br />

with no compromise on evacuation notification<br />

performance.<br />

Pulse Alert: how it works<br />

Pulse Alert is able to provide EN54-23-compliant<br />

visual alarm signalling without any increase in<br />

power consumption because of three essential<br />

technological breakthroughs:<br />

• Intelligent Power Management Pulse Alert<br />

converts power intelligently, minimising power<br />

usage and presenting a near-perfect current source<br />

to fire alarm panels. This means the Sonos Pulse<br />

and Nexus Pulse VADs require less power than<br />

previous models, while also exceeding EN54-23<br />

light output requirements<br />

• LED Drive Pulse Alert features the latest highpower<br />

LED technology and advanced LED Drive<br />

circuitry, further improving efficiency, light output<br />

performance and long-term device reliability.<br />

Sonos Pulse and Nexus Pulse LED circuits are both<br />

designed to provide over five years of continual<br />

operation without any degradation of light output<br />

• Lens Technology The optics for both ceilingmount<br />

and wall-mount versions are optimised to<br />

produce an even light dispersion over the covered<br />

area. This minimises ‘hot spots’ and ensures that<br />

all of the available light is contributing towards<br />

alerting people of any active fire emergency<br />

Extent of coverage<br />

The simpler an evacuation system is, the more<br />

effective it’s likely to be. Sonos Pulse and Nexus<br />

Pulse fulfil evacuation requirements with just a<br />

single device for most rooms. Ceiling-mounted<br />

devices are rated at 15 metre-diameter coverage,<br />

while wall-mounted devices can cover an 11.5 x 11.5<br />

metre square room. System design<br />

requirements are therefore<br />

made easier, evacuation<br />

messages are clearer and<br />

more people are protected<br />

than ever before.<br />

Energy efficiency<br />

Pulse Alert technology<br />

ensures that Klaxon Signals’<br />

VADs notify all personnel of a<br />

fire emergency, while also reducing<br />

the power consumption of each device.<br />

Ultimately, this means that systems can be<br />

upgraded without imposing any restrictions on the<br />

number of devices used or otherwise compromising<br />

system performance in any way.<br />

Low power consumption is vital to fire system<br />

designers and installers – Sonos Pulse and Nexus<br />

Pulse ensure that all buildings can provide the very<br />

best standards of fire evacuation.<br />

Low installation costs<br />

Pulse Alert VADs lower installation costs, making<br />

the latest fire evacuation technology affordable. A<br />

wider coverage area per device reduces both the<br />

number of devices needed and expensive cabling<br />

requirements, while low current consumption<br />

removes the need for additional power supplies.<br />

With a greater coverage pattern, fewer devices<br />

are required to cover open areas. Sonos Pulse<br />

ceiling-mount units have a 15-metre coverage<br />

diameter capable of covering a 10 x 10-metre room<br />

with a single device.<br />

26<br />

www.riskxtra.com


UPGRADE<br />

TO VOICE<br />

WITH<br />

Fire-Cryer Voice Sounders<br />

• High quality speech reproduction<br />

• Single or multi-message options<br />

• Ideal for lockdown alert systems<br />

• Easy to upgrade or new install<br />

• EN 54-3 approved<br />

• Manufactured in UK by Vimpex<br />

Fire-Cryer Voice Sounders<br />

Voice Message<br />

Controllers<br />

Fire-Cryer Voice<br />

Sounders<br />

Mini Fire-Cryer Base<br />

Sounder<br />

Available with or<br />

without VIDs<br />

World class fire evacuation,<br />

signalling and building<br />

infrastructure system<br />

products.


FIRE SAFETY<br />

Lockdown Alerts: The Message is Clear<br />

A growing number of UK schools are being exposed to major<br />

incidents or threats of violence on the premises. As this<br />

trend sadly continues, it’s not just schools that need to have<br />

a robust dynamic lockdown alert system in place should an<br />

event occur: medical and healthcare facilities,<br />

manufacturing plants, offices and, indeed, any public<br />

buildings could benefit from such systems<br />

“Vimpex’s Fire-Cryer<br />

Plus offers a simple,<br />

fully-synchronised and<br />

cost-effective voice<br />

evacuation solution for<br />

end users”<br />

28<br />

Many organisations use a fire bell or a<br />

sounder to double-up for a host of alerts<br />

from school class to factory shift<br />

changes, as well as emergency situations such<br />

as evacuation and lockdown. Using the same or<br />

similar alarm sounds for a range of different<br />

alert scenarios can be confusing to building<br />

occupants. Is it the fire alarm? Is it an<br />

emergency exit alarm? Or a public safety alert?<br />

It also goes against Government<br />

recommendations for lockdown procedures. In<br />

the event of a possible violent intruder on the<br />

premises, the last thing any organisation wants<br />

is people streaming out of buildings and<br />

gathering outside at assembly points. A<br />

dynamic lockdown alert system ensures that an<br />

emergency message can be broadcast over<br />

multiple floors and even multiple buildings<br />

simultaneously, such that occupants across the<br />

whole premises are able to react instantly.<br />

While some recommend that the use of fire<br />

alarms should be avoided to reduce the chances<br />

of an incorrect response to an incident, the<br />

infrastructure of fire alarm systems can be<br />

particularly useful for the sending of secure and<br />

fully-monitored messaging.<br />

Existing cabling can be used to either<br />

support a separate lockdown system or the<br />

existing alarm devices can be retrofitted with<br />

voice sounders able to broadcast fire, class<br />

change and lockdown messages in one product.<br />

There’s also the added benefit of having a<br />

system that’s fully-monitored, battery backedup<br />

in cases of power failure and fully serviced,<br />

with sound outputs designed to existing British<br />

Standards such a BS 5839-1 for good coverage.<br />

Voice evacuation systems: The<br />

message is clear<br />

Vimpex’s Fire-Cryer Plus offers a simple, fullysynchronised<br />

and cost-effective voice<br />

evacuation solution. Whether retrofitted into an<br />

existing installation or as part of a new system<br />

design, the four unique Fire-Cryer Plus models<br />

can be fully integrated into the fire alarm system<br />

and work on a conventional two-wire bell circuit.<br />

With multiple sounder circuit<br />

synchronisation, up to seven pre-recorded<br />

messages are available in a single sounder. A<br />

fire alarm system can be expanded to include<br />

inputs for a range of alerts or announcements,<br />

including bomb alerts, terrorist threats, coded<br />

warnings, water leakage alerts, class change<br />

announcements, system tests, ‘all clear’<br />

announcements, machinery shut down<br />

warnings, Health and Safety reminders and, of<br />

course, ‘fire’ alarm messages.<br />

Vimpex’s Fire-Cryer is a very versatile<br />

product: it can be used as a drop-in replacement<br />

for basic tone sounders or as part of a<br />

sophisticated engineered solution. When<br />

specified as a multi-message system, the Fire-<br />

Cryer has been used extensively in schools (for<br />

fire, lockdown and class change), Shopping<br />

Centres, museums, on the London Underground<br />

and also for a raft of mixed-use residential,<br />

retail and commercial spaces.<br />

Established in 1994, Vimpex is an<br />

independent manufacturer and distributor of<br />

fire detection, alarm and evacuation products<br />

and accessories. The company produces and<br />

distributes a range of high quality evacuation,<br />

signalling and building infrastructure system<br />

products, both Vimpex-manufactured and<br />

supplied by its manufacturing partners<br />

www.vimpex.co.uk<br />

www.riskxtra.com


FIRE SAFETY<br />

Kentec systems help to keep Brenntag UK & Ireland safe<br />

A highly sophisticated Taktis fire alarm and control panel from Kentec is<br />

providing the highest levels of fire safety for Brenntag UK & Ireland<br />

Brenntag is a market leader in chemical<br />

distribution with a global network of more<br />

than 580 locations across 73 countries. Its<br />

North East team moved into the new site in<br />

Sunderland (one of the company’s 24 sites<br />

across the UK and Ireland) last December.<br />

Pitts Wilson, the electrical contractor, was<br />

approached by Brenntag to recommend and<br />

install a comprehensive fire safety and alarm<br />

system for the entire site. The business selected<br />

Kentec’s technology as an integral part of the<br />

installation which has since assisted Pitts<br />

Wilson to pass a BAFE/National Security<br />

Inspectorate inspection.<br />

Kentec’s Taktis panel ranges from two to 16<br />

detection loops to provide up to 144 zone<br />

indicators and can network up to 128 panels. Its<br />

enhanced integration and networking<br />

capabilities mean that it’s able to meet the<br />

current and future needs of the largest sites.<br />

Mark Ellse, fire systems manager at Pitts<br />

Wilson, commented: “The flexibility of the Taktis<br />

panel makes it very simple to install and<br />

commission, and because it’s fully open<br />

protocol it’s also fully integrated with the<br />

Hochiki systems on site.”<br />

Ellse added: “The touch-screen display is<br />

easy for the customer to use and understand,<br />

especially in an emergency. Along with providing<br />

a great system, Kentec also afforded excellent<br />

customer support throughout the project.”<br />

Kevin Swann, managing director at Kentec,<br />

believes that Taktis is the ideal solution for large<br />

and complex sites and infrastructure.<br />

Swann said: “The scalability of Taktis means<br />

that it provides a future-proofed solution able to<br />

expand and develop in line with Brenntag’s<br />

requirements. As it’s truly open protocol, it<br />

provides installers and end users alike with<br />

maximum choice in their system design.”<br />

“The scalability of<br />

Taktis means that it<br />

provides a futureproofed<br />

solution”<br />

www.kentec.co.uk<br />

Do you suffer<br />

fer<br />

from false fire<br />

alarms?<br />

Protective covers designed to reduce<br />

the threat of accidental or malicious<br />

activations causing unwanted fire<br />

alarms, evacuations and disruption<br />

More than 14,000 false fire alarms were<br />

accidentally triggered across England in<br />

2017/18 – disrupting schools and businesses,<br />

placing unnecessary strain on our emergency<br />

services and reducing the confidence the<br />

general public have in fire alarms.<br />

www.sti-emea.com<br />

info@sti-emea.com<br />

01527 520 999


Advertisement Feature: HVM<br />

Protecting Your World<br />

Frontier Pitts is the award-winning British<br />

manufacturer of security gates, automatic<br />

barriers, road blockers, rising and static<br />

bollards, pedestrian control gates and<br />

turnstiles, as well as the Anti-Terra Hostile<br />

Vehicle Mitigation (HVM) range which has been<br />

successfully IWA 14 and PAS 68 impact-tested.<br />

Here, the company explains some of the specific<br />

solutions on offer for end users<br />

From its UK headquarters in Crawley, Sussex, Frontier Pitts<br />

can provide a complete range of services for security and<br />

risk managers including design, site surveys, manufacture,<br />

installation and maintenance.<br />

Since 2004, the company has fulfilled its customers’<br />

requirements to protect their sites from acts of terrorism<br />

involving Vehicle-as-a-Weapon (VAW). Today, the company has<br />

the complete range of its impact-tested systems listed within the<br />

Centre for the Protection of National Infrastructure’s catalogue.<br />

That list includes a range of HVM solutions designed to<br />

mitigate VAW-style attacks. Frontier Pitts’ Terra gates, barriers<br />

and blockers are emboldened by a wide range of rising and static<br />

Terra bollards, all of which havel been successfully impact tested<br />

to IWA 14 and PAS 68.<br />

One of the company’s latest products is the HVM PAS 68 Terra<br />

Quantum side-folding retractable bollard solution. With a<br />

shallow foundation depth of only 450 mm required on site, the<br />

Terra Quantum bollard has been successfully PAS 68 impact<br />

tested and halts a 7.5-tonne vehicle travelling at 30 mph (48<br />

kph), resulting in zero penetration.<br />

Frontier Pitts has also designed the LPS 1175 bi-folding and<br />

sliding Platinum security gate range to Security Rating 2 and 3<br />

(which are proven to withstand forcible attack by an intruder<br />

using readily available hand tools).<br />

The Terra Diamond turnstile boasts a Security Rating of 3 and<br />

4 and has been approved for Government use. Interested parties<br />

should contact the CPNI direct (www.cpni.gov.uk).<br />

All of these products are also Secured by Design (the police<br />

service’s ‘designing out crime’ initiative) accredited.


Advertisement Feature: HVM<br />

Innovation in HVM<br />

While it’s not possible to secure every single<br />

street against vehicles being used in a criminal<br />

capacity, Heald outlines precisely why it’s<br />

absolutely imperative for security professionals<br />

and town planners alike to work together on<br />

ensuring risk mitigation at key locations<br />

Deployed as a tactic by terrorists acting in a lone wolf<br />

capacity, vehicle-based attacks are also now increasingly<br />

being used for other crimes (including ram-raids) and even<br />

as a means for assault. Securing key locations not only reduces<br />

the risk of harm from potential vehicle attacks, but also plays a<br />

vital role in creating a safe haven for people gathering together<br />

for public events and encourages footfall on High Streets.<br />

The challenge of providing effective security measures which<br />

work in built environments had also been an ongoing challenge<br />

for the hostile vehicle mitigation (HVM) industry. That is until<br />

Heald launched the only sliding bollard solution, known as the<br />

Matador, which can be installed both via shallow mount and<br />

surface mount technology.<br />

Stockton-on-Tees and South Tyneside have already installed<br />

sliding bollards around key areas to provide safe High Streets<br />

and outdoor event spaces on a permanent basis having opted<br />

for shallow mount installations which take into consideration<br />

issues with underground infrastructure.<br />

Cities such as Sheffield temporarily installed the Matador, in<br />

this instance to protect the World Snooker Championships<br />

following the bollards’ installation at the 2012 London Olympics.<br />

Such high security measures often result in a high carbon<br />

footprint, but Heald has continued to innovate the Matador in a<br />

bid to minimise the product’s environmental impact. The electromechanically<br />

operated Matador requires zero oil and uses up to<br />

80% less electricity.<br />

With readily available access to vehicles, it’s unlikely that they<br />

will cease to be used for criminal purposes, which is why it’s<br />

crucial the industry continues to innovate and provide end user<br />

solutions that seamlessly fit in with their surroundings.<br />

• To discover how Heald can support your organisation’s<br />

security needs visit www.heald.uk.com<br />

INNOVATORS, MANUFACTURERS<br />

AND INSTALLERS OF PERIMETER<br />

SECURITY PRODUCTS<br />

IWA crash<br />

tested to halt<br />

a 7.2 tonne<br />

truck at<br />

50 mph!<br />

THE ONLY SLIDING BOLLARD<br />

SOLUTION IN THE WORLD<br />

THE MATADOR<br />

THE COMMANDER<br />

THE RAPTOR<br />

Image: Chapman Brown Photography<br />

UNIQUE SECURITY PRODUCTS<br />

CRASH TESTED SECURITY<br />

SOLUTIONS FOR A SAFER WORLD<br />

www.heald.uk.com<br />

+44 (0)1964 535858<br />

@healduk<br />

Heald Ltd<br />

info@heald.uk.com<br />

Heald Ltd


Annual Conference & Awards<br />

Professionalising Healthcare Security<br />

14 November 2019<br />

Powered by<br />

We would like to thank these organisations for their support of<br />

the event of the important work NAHS does<br />

Conference Sponsors<br />

Awards Sponsor<br />

Food and Drink Sponsor<br />

Networking Drinks Sponsor<br />

Networking Drinks Sponsor<br />

There’s still time to book an exhibition space at NAHS 19,<br />

please contact hello@allsecurityevents.com<br />

For more information about the services AllSecurityEvents.com offer, please contact<br />

info@allsecurityevents.com


x<br />

RISKXtra<br />

Access Control: Corporate Offices<br />

There are a range of buildings that house<br />

corporate offices – from smaller, single-use<br />

structures that accommodate one business<br />

through to large multi-story, multi-tenancy<br />

blocks. In addition, these offices could be used<br />

for a range of businesses. Some may simply<br />

play host to marketing teams and act as a<br />

home base for a company’s IT Department,<br />

whereas others could be used as data banks for<br />

large organisations that contain a wealth of<br />

sensitive personal and financial data.<br />

With so many varying needs, choosing the<br />

ideal security solution can become a daunting<br />

task. However, working closely with an<br />

experienced manufacturer of security hardware<br />

can ensure the end user’s confidence in their<br />

choice and the safety of a building’s occupants<br />

and contents. What, then, are the options?<br />

Revolving doors<br />

Often found in multi-storey office blocks, there<br />

are two types of revolving door offered by<br />

access solution manufacturers. The first is a<br />

standard revolving door, which has the<br />

preliminary purpose of keeping adverse<br />

weather outside while at the same time<br />

allowing consistent, open access to the<br />

building. As the door is never fully “open”, it<br />

keeps out noise, rain and wind, while also still<br />

allowing for a continuous flow of people traffic.<br />

These types of doors are typically used to<br />

gain access to a reception area that will have<br />

further internal security behind.<br />

The second type is a security revolving door.<br />

Equipped with card readers, sensors and other<br />

security measures, these revolving doors are<br />

specifically installed with the intention of<br />

regulating access to a building and to prevent<br />

‘tailgating’ such that only one individual will be<br />

permitted to enter at a time, with sensors<br />

detecting if a second person has tried to follow<br />

close behind. If that scenario is detected, the<br />

door will lock down and refuse admission.<br />

To further improve security, regardless of the<br />

type of revolving door installed, today’s<br />

solution manufacturers can offer these doors<br />

with attack-rated and bullet-resistant glass.<br />

To select a revolving door that’s right for your<br />

building, it’s very important to approach<br />

leading manufacturers at the early stages of the<br />

design process and inform them of how the<br />

doors will be used, the footfall they experience<br />

and also, from an aesthetic standpoint, how the<br />

door will need to look. By providing these<br />

details early on, the ideal solution can be<br />

specified on schedule and to budget without<br />

costly delays or amendments down the line.<br />

For more stringent security measures, such<br />

as in those office developments where financial<br />

In Full Control of Access<br />

With a range of security systems on offer for corporate office<br />

buildings, it can be difficult to establish which one to specify.<br />

On that basis, Stephen Littlewood explains the different<br />

system options available for practising security and risk<br />

managers and outlines where they’re commonly specified<br />

information and Data Centres are stored, an<br />

ideal solution would be a security interlock.<br />

The highest level of security available for<br />

corporate offices, this two-door system requires<br />

an individual to present their identification card<br />

or number to the scanner or keypad and the<br />

first door opens. Once inside the interlock<br />

chamber, the first door will close and lock,<br />

which then allows the second door to open and<br />

the authorised individual to enter the premises.<br />

Only allowing one person in at a time through<br />

a combination of space limitations and a range<br />

of sensors built into the system, these are highend<br />

security solutions that require minimal<br />

space and are ideal for buildings experiencing<br />

low traffic and containing sensitive information.<br />

In addition to this, manufacturers will supply<br />

these interlock solutions with attack-tested and<br />

bullet-resistant glass to ensure robust<br />

protection of a building’s occupants and the<br />

equipment contained within.<br />

Turnstiles for access<br />

Having been around since the early 20th<br />

Century, turnstiles were originally used as a<br />

means to keep livestock penned-in to areas<br />

while allowing people to freely move in and out.<br />

Since then, while they’ve developed to<br />

incorporate identification and authorisation<br />

Stephen Littlewood:<br />

Specification Team Manager at<br />

dormakaba<br />

33<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Access Control: Corporate Offices<br />

technology, the mechanics have remained<br />

essentially the same. In essence, turnstiles use<br />

fixed arms to create physical restrictions of<br />

space to prevent unauthorised entry.<br />

The most typically used type of turnstile,<br />

often seen in entrances to office car parks or<br />

through reception areas, is a waist-high<br />

turnstile. With a sensor located either inside or<br />

on top of the panel beside it, the turnstile then<br />

turns once to allow one person entry. Due to<br />

the tight space between arms, this means<br />

tailgating isn’t going to be possible.<br />

More robust alternative<br />

However, waist-high barriers do have the risk of<br />

being jumped over due to their low height.<br />

While this is unlikely to be a risk in a reception<br />

area or the area connecting an office to its car<br />

park, security and risk managers operating in<br />

corporate offices with more sensitive data or<br />

car parks that are also connected to public<br />

spaces may want something more robust to<br />

protect occupants and vehicles.<br />

In this instance, the correct turnstile to be<br />

used would be a full-height turnstile.<br />

Commonly around 2.1 metres in height, these<br />

are installed with a high fence or wall either<br />

side in order to eliminate the risk of someone<br />

being able to jump the turnstiles.<br />

Full-height turnstiles are also available in two<br />

different options – High Entrance/Exit Turnstiles<br />

(HEET) and Exit-Only. HEET turnstiles can rotate<br />

in both directions and allow two-way traffic,<br />

whereas Exit-Only turnstiles only work in one<br />

way and don’t allow re-admission subsequent<br />

to someone exiting the building.<br />

However, for office use, these will typically be<br />

HEET turnstiles to allow optimum access for<br />

authorised individuals.<br />

Speed gates<br />

Speed gates are the most commonly used form<br />

of access control solution to be found in a<br />

corporate office environment. Using glass door<br />

leaves and barrier sensors, these are often<br />

found in the reception areas of large, multistorey<br />

corporate buildings.<br />

With additional waist-high sensors in either<br />

side of the barrier, tailgating will not be<br />

possible so the gates only open for one person<br />

at a time. For extra peace of mind,<br />

manufacturers can also offer a further option of<br />

having larger sensors put in place in order to<br />

tighten the gap between individuals passing<br />

through the barriers.<br />

To know which type is most suited for a<br />

particular project, it’s best to discuss the<br />

options with a manufacturer early on in the<br />

design process. During this time, they can<br />

establish the amount of footfall the barriers will<br />

see, ascertain exactly what level of security is<br />

required for any data or items inside the<br />

building and how much space that’s available in<br />

the area concerned for installation.<br />

For example, if it’s a high traffic building<br />

which needs to allow through a frequent<br />

amount of authorised personnel, more speed<br />

gates will be required to facilitate less delays<br />

for colleagues entering the building.<br />

Another example will be the level of external<br />

security available in the area. For instance, a<br />

reception area that’s manned on a constant<br />

basis by, for example, a security officer will<br />

likely require standard height door leaves of<br />

around waist height as the chances of someone<br />

trying to jump over the barriers are slim.<br />

However, if the reception area isn’t manned<br />

by a physical presence, or the offices behind<br />

the gates contain sensitive data, it’s<br />

recommended that glass door leaves up to a<br />

height of 1.8 metres tall be deployed. At this<br />

height, and with the space in-between gates<br />

being limited by slim barriers, the chance of<br />

someone jumping over the gates is eradicated.<br />

For interior use only<br />

It’s also crucial to note that speed gates are<br />

strictly for interior use only. Due to the sensitive<br />

nature of the sensors, stray debris from rain,<br />

leaves or dirt could interfere with the barriers,<br />

thus eradicating the level of security.<br />

Corporate offices come in all shapes and<br />

sizes – from multi-tenancy buildings that house<br />

many different companies to singular offices<br />

that contain highly sensitive data and computer<br />

banks. All must have tight security in place to<br />

prevent unauthorised personnel from entering.<br />

To ensure the most appropriate system has<br />

been specified, it’s crucial for security and risk<br />

managers to engage in early discussions with<br />

leading manufacturers of access control<br />

regimes who’ll be able to supply a system<br />

solution that allows workers to enter and exit<br />

their place of work with ease and remain safe.<br />

“Speed gates are the most commonly used form of access control<br />

solution to be found in a corporate office environment. Using glass door<br />

leaves and barrier sensors, these are often found in the reception areas<br />

of large, multi-storey corporate buildings”<br />

34<br />


BENCHMARK<br />

Smart Solutions<br />

BENCHMARK<br />

Innovative and smart solutions can add value and benefits to<br />

modern systems for customers. With the technological landscape<br />

rapidly evolving, the Benchmark Smart Solutions project assesses<br />

the potential on offer from system integration, advanced<br />

connectivity and intelligent technology. Bringing together field trials<br />

and assessments, proof of concept and real-world experience of<br />

implementing smart solutions, it represents an essential resource<br />

for all involved in innovative system design.<br />

Launched in 2017, Benchmark Smart Solutions is the industry’s only real-world resource for security<br />

professionals who are intent on offering added value through the delivery of smarter solutions.<br />

@Benchmark_Smart<br />

Partner Companies<br />

www.benchmarksmart.com


x<br />

RISKXtra<br />

Facilitating Means of Escape<br />

Under Article 14 of the<br />

Regulatory Reform<br />

(Fire Safety) Order<br />

2005, the designated<br />

‘responsible person’<br />

must ensure that<br />

“routes to emergency<br />

exit from premises and<br />

the exits themselves<br />

are kept clear at all<br />

times”. The provision<br />

of a clear and<br />

straightforward means<br />

of escape is vital for<br />

life safety. As Liam<br />

Hunt points out, any<br />

failure to do so can<br />

prove to be immensely<br />

costly – in every sense<br />

of the word<br />

The importance of effective escape routes is<br />

highlighted by British engineer and civil<br />

servant Dame Judith Hackitt in her<br />

Independent Review of Building Regulations<br />

and Fire Safety. “One of the significant risks<br />

created by these emergency situations,”<br />

observes Dame Judith, “is the possibility of<br />

panic resulting in crowding in escape routes<br />

and at exits where people may be put at risk of<br />

significant harm – emphasising the importance<br />

of ensuring that routes and exits have been<br />

designed, specified and constructed with this<br />

risk in mind.”<br />

The Independent Review’s final report –<br />

published in May last year – was commissioned<br />

by central Government following the Grenfell<br />

Tower fire in June 2017 in order to make<br />

recommendations on the future regulatory<br />

system. In addition to a new regulatory system,<br />

Dame Judith also outlined the need for clear<br />

responsibilities (a lack of clarity on roles and<br />

responsibilities when it comes to buildings’<br />

safety was, according to Dame Judith, one of<br />

the circumstances that realised the Grenfell<br />

Tower disaster), more rigorous enforcement<br />

powers for monitoring building safety, more<br />

effective product testing and better<br />

procurement practices.<br />

All emergency routes and exits must lead as<br />

directly as possible to a place of safety and be<br />

adequate for everyone to escape quickly and<br />

safely, but far too frequently it appears that<br />

escape routes are becoming makeshift storage<br />

areas, while fire safety is itself becoming<br />

something of an afterthought.<br />

A disregard for the fire safety regulations can<br />

have dire consequences. Back on Tuesday 8<br />

May 1979, a fire ripped through Manchester’s<br />

flagship Woolworths’ store opposite Piccadilly<br />

Gardens. A number of fire safety failures<br />

caused the death of ten people inside the<br />

premises and left 47 individuals with injuries.<br />

It’s believed that the fire was started by a<br />

damaged electrical cable, which had furniture<br />

stacked in front of it. An inquiry showed that,<br />

although the store’s fire precautions met all<br />

legal requirements, the spread of the fire and<br />

the high number of casualties were in part due<br />

to the absence of measures such as a fire<br />

sprinkler system to stop the spread of the fire<br />

from the Furniture Department and the use of<br />

polyurethane foam in the furnishings – a<br />

material which is highly highly toxic, but cheap<br />

and (at that time) legal for use in items of<br />

furniture. This episode would have<br />

consequences for later legislation.<br />

Emergency exits were poorly marked. Some<br />

exit doors required a key, while others had<br />

been locked to prevent shoplifting. Those<br />

attempting to flee the toxic smoke were unable<br />

to escape through the very doors that were<br />

there to save them. People actually died within<br />

touching distance of the emergency exits.<br />

As we’re all well aware, tragedies involving<br />

flawed fire safety are not confined to the<br />

history books. Some 40 years later lessons<br />

have seemingly not been learned. Escape<br />

routes and exits continue to be misused.<br />

One popular High Street retailer was ordered<br />

to pay almost £70,000 after an escape route<br />

inside one of its stores was reduced to just 30<br />

cm by the ‘dumping’ of crates and stock, while<br />

a care home in Somerset was hit with a<br />

£100,000 fine after fire doors and escape<br />

routes were found to be blocked.<br />

Preventing misuse<br />

In addition to emergency lighting and dedicated<br />

signage, extra precautions can be taken to<br />

prevent misuse. Door alarms may be fitted to<br />

vulnerable emergency exit doors. The alarmed<br />

devices are a highly effective way in which to<br />

alert the management team of any<br />

unauthorised exits and entries through<br />

emergency exit doors.<br />

Text and symbols act as an additional<br />

deterrent to misuse, with the unit serving as an<br />

inexpensive security device helping to guard<br />

36<br />


Access Control: Emergency Exits and Evacuations<br />

against theft, safeguarding escape routes for<br />

real emergencies and eliminating the<br />

temptation to lock emergency exits to<br />

discourage would-be thieves.<br />

To comply with current regulations and<br />

ensure adequate means of escape, emergency<br />

egress must not rely on the operation of an<br />

access control system that requires the use of<br />

an electronic key or other means.<br />

In case of emergency<br />

In case of emergency, appropriate override<br />

arrangements must be in place to maintain a<br />

clear means of escape. This is particularly<br />

important in the case of fail-secure locks. The<br />

provision of such a device is normally found in<br />

the form of a green break glass unit. This is in<br />

accordance with BS 7273-4 which requires a<br />

green break glass point that provides a reliable<br />

override control and a secure route to safety.<br />

Even in those instances where a fail-safe lock<br />

is employed (and whereby an emergency door<br />

is wired such that, when a fire alarm sounds,<br />

the door automatically opens) it’s still Best<br />

Practice to install a break glass Call Point next<br />

to the exit in case of any failure with the fire<br />

alarm system. This is also important for<br />

emergency scenarios not related to fire.<br />

Opening an access control-monitored door<br />

through the operation of an emergency door<br />

release break glass unit will result in an alarm<br />

event. This is, of course, useful in a real<br />

emergency situation, but can create nuisance<br />

false alarms when the unit’s confused with a<br />

non-emergency switch for releasing an<br />

electronically locked door.<br />

BS 5839 and Call Points<br />

Additionally, BS 5839 recommends that fire<br />

manual Call Points should be located on all<br />

final exits. Due to this close proximity, some<br />

false alarms occur when an individual fails to<br />

distinguish the difference between the two.<br />

This was just one of the findings noted by the<br />

Building Research Establishment (BRE) in its<br />

research into the causes of false fire alarms,<br />

which cost the UK an estimated £1 billion every<br />

year. The BRE’s research project entitled ‘Live<br />

Investigations of False Fire Alarms’ revealed<br />

that: “Some false fire alarms arise from<br />

accidentally trying to use a manual Call Point to<br />

release an electronically locked door, rather<br />

than the normal control provided for this<br />

purpose, or the emergency override.”<br />

The latest Home Office figures reveal that<br />

there were a total of 14,600 false fire alarms in<br />

2018-2019 caused by a person ‘accidentally or<br />

carelessly’ activating apparatus. That’s the<br />

highest figure for over five years and<br />

“Fitted with an alarm, the tough covers can prevent<br />

malicious and accidental activation while acting as an<br />

additional pre-alarm in a real emergency scenario”<br />

demonstrates an increase of 491 on the<br />

previous year.<br />

Break glass units are particularly vulnerable<br />

to accidental activations in high volume areas<br />

such as busy corridors where a stray bag or a<br />

misguided trolley can easily knock and activate<br />

a Call Point. Call Points with a re-settable<br />

element that mimic the feel of breaking glass<br />

without the need to replace sensitive broken<br />

parts help to save both time and money.<br />

Appropriate signage<br />

BS 7273-4 recommends that, in situations<br />

where the break glass unit is likely to be used<br />

by persons other than trained staff, appropriate<br />

signage must be provided and should read: “In<br />

emergency, break glass to open door” (thus<br />

distinguishing it from a fire alarm Call Point).<br />

However, signage is often ignored or easily<br />

overlooked, meaning that the threat of<br />

accidental activation persists. In these<br />

situations a more robust approach to tackling<br />

false alarms is required. Polycarbonate covers<br />

can retrofit over a break glass Call Point, in turn<br />

preventing the emergency door release from<br />

being used in non-emergency situations.<br />

Fitted with an alarm, the tough covers can<br />

prevent accidental and malicious activation<br />

while acting as an additional pre-alarm in a real<br />

emergency scenario. Covers can even be<br />

embedded with a ‘Glow Guide’ making it easier<br />

to locate the break glass unit in unlit areas.<br />

This embellishes any emergency exit lighting.<br />

Maintaining a balance<br />

In regards to fire safety, a recent revision to BS<br />

5839-1:2017 recommends: “All manual Call<br />

Points should be fitted with a protective cover<br />

which is moved to gain access to the frangible<br />

elements.” It’s advisable that the same<br />

recommendation would be suitable for an<br />

access control application.<br />

Anchored by legislation, technical standards<br />

and research, emergency exits and escape<br />

routes are fundamental to life safety. Although<br />

maintaining a balance between security and fire<br />

safety can be difficult, green break glass units<br />

provide a solution.<br />

While the use of such apparatus can<br />

contribute to unnecessary false alarms, options<br />

are available to negate misuse, allowing for an<br />

effective partnership between access control<br />

and means of escape and helping to save lives.<br />

Liam Hunt:<br />

Marketing Executive (EMEA) at<br />

Safety Technology<br />

International (STI)<br />

37<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

The Changing Face of Security Services<br />

Better Screened, Better Trained, Better Paid<br />

for everyone and working hard to increase<br />

gender diversity in a male-dominated industry.<br />

Recruitment, selection and screening<br />

processes simply must reflect the importance<br />

and value of the role of the security officer. In<br />

an age where open source intelligence is<br />

becoming the norm, security providers<br />

increasingly use leading-edge technology to<br />

provide an enhanced level of screening.<br />

Security services is an<br />

industry where,<br />

historically, pay is low<br />

and employee<br />

turnover is high. It’s<br />

where officers regard<br />

their role as a job<br />

rather than a career.<br />

Does this sound like<br />

the professional<br />

security services<br />

industry in which we<br />

work? Craig Robb<br />

examines the<br />

importance of<br />

perception<br />


BE SMART!<br />

Read Risk Xtra<br />

Magazine on your tablet<br />

or smartphone using<br />

the FREE app<br />

x<br />

RISKXtra


x<br />

RISKXtra<br />

The Changing Face of Security Services<br />

Appealing to Generation Z<br />

from being helpful in driving valuable talent<br />

into our business sector.<br />

Now more than ever we need to provide easy<br />

access to the digital resources and<br />

opportunities available and really reach the<br />

foundations of connectivity for our future<br />

security professionals.<br />

With security playing a part in most people’s<br />

everyday lives, be it setting the house alarm,<br />

reporting a phishing e-mail or watching the<br />

latest episode of Line of Duty, we do seem to<br />

find it challenging to be a career of choice for<br />

the next generation. If we’re to become more<br />

attractive, it’s ourselves who must make the<br />

sector more appealing. Tired offices with<br />

outdated management styles and/or promotion<br />

based on length of service don’t make the cut<br />

any longer and need to be banished to the past.<br />

Four generations are<br />

now employed side by<br />

side – Baby Boomers,<br />

Generation X,<br />

Millennials and<br />

Generation Z – and<br />

each go to work with<br />

their own set of values<br />

and attitudes. Neill<br />

Catton explains why<br />

Generation Z will<br />

become increasingly<br />

important for the<br />

security sector<br />

Neill Catton:<br />

Managing Director of CIS<br />

Security<br />

With a surge of Baby Boomers gradually<br />

retiring, Generation Z are the young<br />

recruits of today and the future<br />

candidate base. To compete for these<br />

candidates now and into the future, employers<br />

in the security industry need to tune into this<br />

generation’s unique characteristics.<br />

One of the most distinctive features of<br />

Generation Z is that they’re the most technically<br />

literate and technologically ‘savvy’ generations.<br />

Having been immersed in technology and the<br />

digital world from birth, they’re continually<br />

wired and plugged-in and have finessed multitasking<br />

to the Nth degree.<br />

I recently spoke with Rick Mounfield (CEO of<br />

The Security Institute). The Institute has<br />

produced a video regarding careers in this<br />

sector. This shows a wealth of opportunities for<br />

aspiring security professionals.<br />

While the content and commitment in the<br />

video are excellent, I believe that this should be<br />

shared on a far greater stage. Rick confirmed<br />

that the video is being rolled out through Job<br />

Centres and links with the Security Industry<br />

Authority as well as the DWP. Further steps are<br />

needed to promote this good work to attract<br />

what I see as untapped talent in Generation Z<br />

(ie 15 to 25 year-olds).<br />

Generation Z’s members expect to access<br />

information differently compared to previous<br />

generations, which ultimately translates into a<br />

different perception towards future job<br />

perspectives. They’re looking for quick access<br />

and ease of use. A couple of clicks and, if it’s<br />

not there, attention could be focused on a<br />

parody security clip on YouTube which is far<br />

Employee-focused<br />

We must make our industry more employeefocused,<br />

have flexible working arrangements<br />

and invest in both technology and training and<br />

development. If we want to attract some of the<br />

best talent and empower it, we need to emulate<br />

what the best can offer. Simple touches like<br />

more welcoming facilities, more tangible<br />

performance plans, mentorship and<br />

meaningfulness in what our people do are key.<br />

Continuous appraisal processes are what the<br />

younger generations seek.<br />

This is also a call to action for all security<br />

services companies to engage with local<br />

schools. Maybe find a particular sixth form with<br />

which you can engage and offer opportunities.<br />

The desire for apprentice schemes is<br />

increasing. Although the Apprenticeship Levy is<br />

challenging, there’s scope to fund leadership<br />

training and develop the supervisors, managers<br />

and specialists of the future.<br />

We must go to the source. We face stiff<br />

competition from the ‘new tech’ and the<br />

perceived glamour that goes with this.<br />

Generation Z will become an increasingly<br />

important segment of the future of the security<br />

world so we must devise strategies to attract,<br />

train, engage and retain a motivated pool of<br />

professionals coming from such younger<br />

generations. Access the Institute’s video at<br />

https://www.youtube.com/watch?v=Fxx4wy7a<br />

FBc. Pass the link on to every contact you know<br />

who may have direct involvement with school<br />

leavers and graduates.<br />

I’m sure we’ll be able to reap the rewards<br />

coming from it in business performance and the<br />

quality of the security services provided.<br />

40<br />


Real-Time Analysis<br />

SECURITAS<br />

INTELLIGENCE UNIT<br />

In a world where businesses constantly<br />

face an ever-increasing array of risks and<br />

threats, how confident are you that your<br />

business is safe?<br />

Securitas has a global network of security<br />

risk experts ready to evaluate your current<br />

security service.<br />

Whether you need 24/7 support from our<br />

Securitas Intelligence Unit, or access to<br />

intelligence services for specific events<br />

or live incidents, our analysts provide<br />

actionable intelligence based on specific<br />

threat assessments and investigations.<br />

Get in touch today to find out how we can<br />

keep your business safe.<br />

soc.intelligence@securitas.uk.com<br />

@SecuritasUK<br />

www<br />

securitas.uk.com<br />

24/7 Reporting


x<br />

RISKXtra<br />

Meet The Security Company<br />

upwards of 30 countries, delivering the best<br />

possible service designed to meet and,<br />

ultimately, exceed the needs of our clients.<br />

This is the twenty first<br />

instalment in a series<br />

of articles for the<br />

readers of Risk Xtra<br />

where we shine the<br />

spotlight on NSIapproved<br />

businesses<br />

for the benefit of risk<br />

and security managers<br />

who purchase security<br />

guarding as well as<br />

systems-focused<br />

solutions. Answering<br />

our questions on this<br />

occasion is Jacqui<br />

Paice, managing<br />

director of Apleona<br />

HSG Facility<br />

Management UK<br />

About the National Security Inspectorate<br />

Risk Xtra: Can you briefly describe your<br />

business’ activities and what you consider to<br />

be your USP as an organisation?<br />

Jacqui Paice: Apleona HSG Facility<br />

Management, which is part of the global<br />

Apleona Group, is a UK and Ireland provider of<br />

integrated facilities management. With a client<br />

base that extends across more than 250 UK and<br />

Ireland operational sites, we employ circa 3,000<br />

members of staff to deliver service solutions<br />

that work for our clients.<br />

Our service solution is tailored to deliver<br />

facilities management and workplace services<br />

that focus through a model of self-delivery. We<br />

provide a full range of hard and soft services for<br />

private and public organisations across a range<br />

of sectors, including corporate, retail and<br />

Shopping Centres, banking, pharmaceuticals,<br />

engineering and processing, education, local<br />

and central Government and hospitals. Critical<br />

and non-critical environments are covered.<br />

Apleona in the UK and Ireland uniquely<br />

benefits from being part of a leading European<br />

real estate and facility management company.<br />

With this pan-continental support, we’re in the<br />

fortunate position of being able to work<br />

alongside more than 20,000 colleagues in<br />

The National Security Inspectorate (NSI) is a wholly-independent, not-for-profit<br />

company limited by guarantee and operates as a UKAS-accredited certification<br />

body specialising in the security and fire safety sectors.<br />

For over 40 years, the NSI has served to protect businesses, homeowners<br />

and the general public alike, raising standards by providing robust and high<br />

quality audits of both security and fire safety service providers.<br />

Risk Xtra: What do your clients value most<br />

about the services you deliver?<br />

Jacqui Paice: As a trusted service provider, our<br />

clients value how we optimise their workspace<br />

and our quality assured self-delivery capability,<br />

which is strengthened by smart technology.<br />

In addition, our open and honest approach<br />

towards business and the reassurance that our<br />

service delivery is underpinned by one of<br />

Europe’s leading estates and facilities<br />

management companies is highly significant.<br />

Risk Xtra: How do you feel accreditations<br />

have assisted your company?<br />

Jacqui Paice: The accreditations that Apleona<br />

has for the services we provide, for example<br />

Approved Contractor Scheme (ACS)<br />

accreditation with the Security Industry<br />

Authority (SIA) and NSI Gold for security, are an<br />

indication to potential clients that we provide a<br />

high standard of customer service and<br />

compliance with security legislation.<br />

In addition, the high marks achieved in the<br />

external auditing of the company, placing the<br />

business in the Top 5% of all ACS-accredited<br />

companies, absolutely demonstrates the<br />

importance that Apleona as an organisation<br />

places on achieving and maintaining a high<br />

level of customer service.<br />

Risk Xtra: Specifically, what value does ACS<br />

registration and NSI Guarding Gold approval<br />

bring to your business and its clients?<br />

Jacqui Paice: SIA ACS approval is not only a<br />

source of confidence for buyers of security<br />

services as they seek to select a trusted<br />

provider, but it also offers an excellent<br />

framework for setting, improving and<br />

monitoring our own standards.<br />

Additionally, it has key links to our certified<br />

9001 Quality Management System.<br />

SIA ACS approval is voluntary and positions<br />

our company as having been independently<br />

assessed to meet a recognised level of<br />

performance. Being approved to SIA ACS<br />

demonstrates our committment to customer<br />

service and compulsory employee licensing.<br />

42<br />


Meet The Security Company: Apleona HSG Facility Management UK<br />

In association with the<br />

Risk Xtra: In practice, what are the main<br />

differences between ACS registration and NSI<br />

Guarding Gold approval?<br />

Jacqui Paice: The SIA introduced the ACS to<br />

raise performance standards within the security<br />

industry. The ACS is the quality benchmark<br />

within security, and sets out criteria that<br />

companies must adhere to in order to be SIA<br />

ACS registered. This is referred to as the<br />

Standard approval.<br />

Apleona is further accredited to NSI Guarding<br />

Gold that enables the company to apply for the<br />

ACS accreditation via the passport scheme,<br />

which is officially defined as follows. Under<br />

Routes to Approval on its website, the SIA<br />

explains: “An accredited ACS passport scheme<br />

is an alternative to the standard route to<br />

approval via a scheme managed entirely by an<br />

assessing body. A passport scheme has<br />

additional requirements and benefits and adds<br />

value to private security industry businesses.<br />

Assessment bodies (of which the NSI is one of<br />

only four) are able to certificate businesses<br />

against a variety of standards independently to<br />

us. Some relate specifically to the security<br />

industry, while others are more general<br />

business or quality standards. A passport<br />

scheme will specify the standards required and<br />

any other criteria required to be met in order to<br />

achieve certification. These are often called<br />

approval criteria.”<br />

The definition continues: “The assessment<br />

body will compare its passport scheme<br />

requirements to those of the ACS. Where there<br />

are gaps, it must address these. The<br />

assessment body will do this by specifying<br />

additional requirements. These are often<br />

referred to in a separate document called a<br />

passport specification. A range of standards,<br />

together with the assessment body’s other<br />

criteria and passport specification, make up<br />

their ACS passport scheme. This is the passport<br />

scheme we have accredited as being equivalent<br />

to or better than the ACS standard route. Where<br />

the assessment body has assessed a business<br />

against its passport scheme, and the business<br />

has met the passport scheme requirements, the<br />

assessing body will then issue a passport<br />

certificate. This certificate can then be<br />

submitted to us as part of an ACS application.”<br />

It should be noted that NSI Gold<br />

accreditation is recognised as the most<br />

stringent accreditation to obtain in the security<br />

industry. In addition, NSI Gold approval<br />

signifies that, as well as complying with<br />

industry-specific standards, a company<br />

operates a Quality Management System (no<br />

written QMS is required under the ACS, only<br />

that an organisation will have to demonstrate<br />

to an assessor how its chosen methods are<br />

effective in delivering high levels of customer<br />

satisfaction and a sustainable business) and is<br />

compliant with BS EN 9001.<br />

Risk Xtra: How do you feel technology has<br />

changed the industry over the last couple of<br />

years and what do you believe will be the<br />

direction of travel in the future?<br />

Jacqui Paice: Technology has provided a<br />

potentially safer working environment for<br />

security personnel, a good example of which is<br />

the radio-based ‘Man Down’ system used<br />

primarily by lone workers. ‘Man Down’ uses a<br />

tilt-switch (special motion sensors) in the radio<br />

which can detect and alarm in the following<br />

circumstances: when the user isn’t moving,<br />

when the user is moving more than what’s<br />

considered to be normal and when the radio is<br />

positioned in a different angle than usual for a<br />

defined period of time.<br />

Another good example of technology<br />

bringing about positive change is through<br />

body-worn video cameras whereby the wearer<br />

activates the system when they feel they’re<br />

entering into potential conflict situations. This<br />

system not only records what’s seen, but also<br />

what’s said and ensures that the wearer acts in<br />

a correct and proper manner while also<br />

providing vital evidence to the police service<br />

and wider authorities should this be required.<br />

Security innovations in the future will<br />

concentrate on the cyber realm, access control<br />

systems to include intruder alarm security,<br />

enhancements to CCTV systems – for example,<br />

facial recognition that’s 100% accurate –<br />

counter-terrorism measures and a form of<br />

technology that could potentially remove the<br />

need for a physical security presence on site in<br />

its entirety.<br />

Risk Xtra: When it comes to negotiating<br />

contracts and responding to tender requests,<br />

what aspects are of most value to customers<br />

and how are these changing?<br />

Jacqui Paice: For many customers, it must be<br />

said that price, value for money and the quality<br />

of service being delivered by competent and<br />

skilled staff remain the most important aspects.<br />

However, innovation – often through the<br />

introduction of new technologies as part of a<br />

security programme – is now increasingly<br />

important to many of our customers.<br />

In order to ensure that we deliver the best<br />

possible bespoke service to our clients,<br />

Apleona continuously looks to fully understand<br />

the culture, vision, values and unique<br />

circumstances of each potential partner<br />

organisation. The simple fact is there’s no ‘off-<br />

Jacqui Paice:<br />

Managing Director of Apleona<br />

HSG Facility Management UK<br />

43<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Meet The Security Company: Apleona HSG FM UK<br />

Name<br />

Jacqui Paice<br />

Job title<br />

Managing Director<br />

Time in security business<br />

sector<br />

Occupied senior FM roles<br />

within the business for more<br />

than eight years. Promoted to<br />

managing director for UK FM,<br />

a Board position, in June 2019<br />

Location of the business<br />

UK and Ireland-wide with<br />

head offices in London and<br />

Dublin<br />

Areas of expertise<br />

Apleona employs trained and<br />

qualified security officers who<br />

patrol car parks, monitor<br />

Control Rooms, deliver key<br />

holding services, manage<br />

loading bays, security-check<br />

visitors and provide access<br />

control solutions<br />

Accreditations<br />

NSI Guarding Gold, SIA<br />

Approved Contractor,<br />

SafeContractor, OHSAS 18001,<br />

CHAS, ISO 14001, ISO 9001,<br />

Investors in People, Member<br />

of the International<br />

Professional Security<br />

Association, Member of the<br />

Institute of Workplace and<br />

Facilities Management<br />

the-shelf’ solution for any client and this is<br />

precisely why we wouldn’t offer one.<br />

Apleona aims to be the best in everything<br />

that we do and we continuously look to<br />

develop innovative approaches to enhance our<br />

service provision, such as our award-winning<br />

Ops 9 system hand-held technology solution<br />

employed on behalf of UK clients including<br />

Shopping Centres.<br />

Risk Xtra: How has Government legislation<br />

(eg the National Minimum Wage, the<br />

National Living Wage and changes to holiday<br />

pay) affected your business? Do you believe<br />

such legislation is a good thing?<br />

Jacqui Paice: The National Minimum Wage, the<br />

National Living Wage and changes to holiday<br />

pay have most certainly affected the business<br />

in respect of placing additional pressures upon<br />

the ongoing challenge of supporting clients for<br />

whom cost control remains an increasingly<br />

high priority.<br />

As an organisation that places the people<br />

delivering our services at the heart of<br />

everything we do, Apleona supports legislation<br />

that ensures those who work for us are<br />

rewarded with fair rates of pay rising in line<br />

with inflation. Indeed, Apleona has worked<br />

with its clients to go further than the required<br />

legislation and, for example, looks to pay the<br />

Living Wage to our employees.<br />

Risk Xtra: What are the most important<br />

attributes you look for in your security<br />

officers and staff members in general?<br />

Jacqui Paice: Apleona firmly believes that our<br />

teams and individuals are the face of our<br />

company. They’re responsible for the delivery<br />

of our services day in, day-out and are the<br />

most obvious touch point for our clients.<br />

With this very firmly in mind, we look to<br />

recruit the appropriate talent for all of our roles<br />

and, as well as the absolute core competencies<br />

of being professional, honest, having integrity,<br />

possessing good communication skills and<br />

being adaptable to challenging situations, our<br />

‘Apleona Values’ help to identify what might be<br />

termed the additional ‘X-Factor’ that makes for<br />

a special employee.<br />

Thanks to the ‘Apleona Values’ we target<br />

three key areas: ‘Attitude’, ‘Performance’ and<br />

‘Style’. Through these, ‘We Champion<br />

Individuality’, ‘We Create Real Impact’ and ‘We<br />

Strive To Inspire’.<br />

By way of our internal awards programme,<br />

designated the ‘Apleona All-Stars’, we<br />

continually recognise and reward those who<br />

best demonstrate these key attributes. This<br />

helps to ensure that our teams and individuals<br />

always embody exactly what Apleona stands<br />

for as an organisation.<br />

Risk Xtra: How can the SIA, the NSI and<br />

industry standards best serve the sector in<br />

addition to the needs of your company’s<br />

clients and the wider public interest? Will<br />

the planned introduction of business<br />

licensing be a positive step?<br />

Jacqui Paice: This can be achieved by the<br />

Regulator and the Inspectorate engaging in<br />

regular dialogue and consultation with those<br />

involved in the provision of security services.<br />

Through this, the SIA and the NSI will be in a<br />

position to listen to the concerns of such<br />

organisations, while at the same time keeping<br />

up-to-date in regards to changes in technology<br />

that may affect the legislation. The Regulator<br />

can also learn about some of the restrictions<br />

encountered by companies in complying with<br />

that legislation.<br />

As yet, there’s still no date set as to when<br />

business licensing will come into effect.<br />

However, when it does we believe that it will be<br />

a positive step. The requirement for all security<br />

services providers to demonstrate that they’re<br />

‘fit and proper’ to adequately supply such<br />

services for clients can only be positive for the<br />

quality and reputation of the industry and will<br />

prove to be further progress beyond the<br />

present system of ‘badges’ for security officers,<br />

CCTV operators, door supervisors and the<br />

voluntary ACS.<br />

Among the factors regarding whether or not<br />

a business will gain a licence is ‘integrity’, a<br />

word which (as the advice document sets out)<br />

covers not only facts such as SIA ‘compliance<br />

actions’ against a firm or going insolvent, but<br />

matters of opinion such as ‘any significant<br />

complaints against the business’.<br />

To gain a licence, any business and its<br />

‘controlling minds’ will also have to show<br />

‘financial probity’ and pass criminal record<br />

checks ‘in relation to all controlling minds’<br />

even if individuals have already been subject to<br />

such checks for individual SIA licences. It can<br />

be expected that business licensing would<br />

provide a further degree of comfort to clients.<br />

44<br />


for a safer world 0115 714 9990<br />

CALL FOR A<br />

FREE DEMO<br />

COST EFFECTIVE<br />

PAY-AS-YOU-GO<br />

SERVICE.<br />

CANCEL AT ANY TIME.<br />

LOW-COST - ADVANCED CLOUD-BASED ALARM PLATFORM<br />

Use the management function<br />

of webeyeCMS to easily control<br />

and monitor all your alarms<br />

PATENTED SYSTEM<br />

FOR RELIABLE<br />

ALARM DELIVERY<br />

FULL<br />

AUDIT<br />

TRAIL<br />

VIDEO<br />

CLIPS TO<br />

PHONE/BROWSER<br />

FREE<br />

TRAINING<br />

PROVIDED*<br />

FREE UK BASED<br />

TECH SUPPORT*<br />

8.00AM-10.30PM<br />

GIVING INSTALLERS THE POWER TO IMPROVE EFFICIENCY & SAFETY<br />

Part of webeyeCMS is a web-based portal operating on any internet-connected device and is<br />

<br />

<br />

<br />

Delivery in seconds for immediate response<br />

<br />

worker safety<br />

Won many awards for reliable alarm delivery<br />

<br />

Browser version can be white labelled with<br />

your own logo<br />

<br />

Call 0115 714 9990 for a FREE demonstration<br />

*Availavle on products and services supplied by Webeye Limited.


x<br />

RISKXtra<br />

As one of its stated<br />

strategic initiatives,<br />

ASIS International has<br />

been actively involved<br />

in promoting the<br />

adoption of Enterprise<br />

Security Risk<br />

Management (ESRM).<br />

ESRM is a strategic<br />

security programme<br />

management<br />

approach that ties an<br />

organisation’s<br />

security practice to its<br />

mission and business<br />

goals using globally<br />

established and<br />

accepted risk<br />

management<br />

principles. Rachelle<br />

Loyear, Mike Hurst,<br />

Michael Gips, Tim<br />

McCreight and Tim<br />

Wenzel delve into the<br />

fine detail for the<br />

benefit of practising<br />

security managers<br />

Rachelle Loyear CISM MBCP:<br />

Vice-President of Integrated<br />

Security Solutions at G4S (US),<br />

ESRM: A Security Programme<br />

Maturity Model<br />

ESRM recognises that security<br />

responsibilities are shared by both security<br />

and business leadership, but that all final<br />

security decision-making is the preserve of<br />

business leaders. The role of the security leader<br />

in ESRM is to manage security vulnerabilities to<br />

enterprise assets in a risk decision-making<br />

partnership forged with the organisation’s<br />

leaders in charge of those assets.<br />

When ESRM is applied, ‘Security’ changes its<br />

primary driver in the overall organisation from<br />

being a group that performs a set of tasks to a<br />

role: a role of managing holistic security risk,<br />

partnering with the business leaders of the<br />

organisation to mitigate that risk in line with<br />

business tolerances and enabling the<br />

organisation to continue to fulfil its primary<br />

business mission as assets are protected in line<br />

with their business value.<br />

‘Security’ is no longer just about checking IDs<br />

at entrance gates, installing anti-virus software<br />

or trying to keep retail store employees from<br />

stealing. Those are tasks. Under ESRM, security<br />

is more about ensuring that all of those tasks<br />

are carried out within an agreed-upon business<br />

model that weighs security risk against<br />

tolerable business impact and manages<br />

security risk mitigation within that model.<br />

That doesn’t mean those tasks are not<br />

important anymore. However, it does mean<br />

that, when they’re performed, they’re<br />

performed for a reason.<br />

ESRM means security decisions are made by<br />

the right person, with the right authority and<br />

accountability and for the right reasons.<br />

Reasons based on defined risk principles.<br />

ESRM in practice<br />

What does all of this mean in practice, then? In<br />

its simplest terms, it means that instead of just<br />

‘doing security’ the way we always have, we<br />

first ask ourselves some fundamental – and<br />

fundamentally important – questions. Here are<br />

a few of the most basic: What’s the asset we<br />

need to protect? What’s the risk associated with<br />

that asset? Who’s responsible for that risk?<br />

These questions, when presented in the<br />

forthcoming ASIS ESRM Guidelines document<br />

(to be published later on this year) align to the<br />

formal ESRM life-cycle as follows:<br />

• Identifying, understanding and prioritising the<br />

assets of an organisation that need protection<br />

• Identifying and prioritising risks: identifying,<br />

understanding and prioritising the security<br />

threats the enterprise and its assets face – both<br />

existing and emerging – and, critically, the risks<br />

associated with those threats<br />

• Mitigating prioritised risks: taking the<br />

necessary, appropriate and realistic steps<br />

necessary to protect against the most serious<br />

security threats and risks<br />

• Improving and advancing: conducting incident<br />

monitoring, incident response and postincident<br />

review – learning from both successes<br />

and failures – and applying the lessons therein<br />

to advance the programme<br />

Implementing an ESRM programme is a<br />

process that must take into account all of the<br />

phases of the life-cycle. Transitioning from a<br />

traditional security approach to an ESRM<br />

programme isn’t an overnight event, but rather<br />

a journey towards a mature, risk-focused<br />

programme that takes time and commitment<br />

from the security leader, the team and those<br />

business leaders in the enterprise organisation.<br />

Beginning the process means stepping back<br />

from our day-to-day operations and<br />

determining how well we’re already managing<br />

with an ESRM approach, and how far we have<br />

to go in order to meet the ESRM goals of the<br />

organisation. Continuing it requires an<br />

identified target to which the organisation<br />

agrees and outlining a path towards it.<br />

Path towards optimised ESRM<br />

An iterative improvement model for ESRM<br />

focuses on first embracing the ideas of ESRM<br />

and rolling the approach into the security<br />

approach from ad hoc to optimised over time.<br />

Accessing and using the ASIS ESRM Maturity<br />

Model is the first step towards understanding<br />

where you are on the path and how you can go<br />

about reaching the point where you want to be.<br />

A mature ESRM programme encompasses all<br />

aspects of security risk mitigation practices:<br />

physical security, cyber security, information<br />

security, loss prevention, asset management,<br />

threat management, organisational resilience,<br />

workplace violence, fraud, brand protection,<br />

travel safety and all other practices undertaken<br />

to prevent security risk impacts.<br />

Set against that backdrop, ASIS International<br />

has developed a tool to allow security leaders<br />

to see where they stand in six aspects of their<br />

security programme in order to determine<br />

where they want to be in the future. They can<br />

46<br />


In the Spotlight: ASIS International UK Chapter<br />

then begin to identify the gaps and develop a<br />

path towards closing them.<br />

How does it work? The model defines the<br />

maturity steps organisations can benchmark<br />

against to evaluate themselves on a continuum<br />

between low and high ESRM maturity. Survey<br />

takers answer a series of questions using the<br />

one-to-five rating in the following essential<br />

areas: Programme Strategy, Programme<br />

Governance, Organisational Understanding and<br />

Awareness, Programme Implementation and<br />

Application, Programme Management and<br />

Advancement and the Alignment of Security<br />

Risk Mitigation Activity.<br />

These maturity levels are defined between<br />

Level 1 and Level 5 on a continuum where Level<br />

1 represents approximately the tenth percentile<br />

of maturity and Level 5 approximately the 90th<br />

percentile of practice. Instructions in the tool<br />

help survey takers understand how to answer<br />

the questions and reach appropriate ratings,<br />

which range from ad hoc to optimised:<br />

• Ad Hoc Processes at this level are (typically)<br />

undocumented and in a state of dynamic<br />

change, tending to be driven in an ad hoc,<br />

uncontrolled and reactive manner by users or<br />

events. Risk knowledge is limited to a few key<br />

personnel, with no cross-training between<br />

security teams/groups and departments. This<br />

provides a somewhat chaotic or unstable<br />

environment for the processes<br />

• Repeatable Processes are repeatable,<br />

possibly with consistent results. Process<br />

discipline is unlikely to be rigorous, but where<br />

it exists it may help to ensure that existing<br />

processes are maintained during times of<br />

stress. Cross-functional teams are mostly in<br />

place and roles/responsibilities regarding risk<br />

knowledge are generally understood<br />

• Defined Processes at this level are defined<br />

and documented and subject to some degree of<br />

improvement over time. These standard<br />

processes are in place and used to establish<br />

consistency of process performance across the<br />

organisation. Cross-functional teams are in<br />

place, ESRM knowledge is transferred between<br />

teams and roles/responsibilities regarding risk<br />

knowledge are well defined<br />

• Managed Using process metrics, management<br />

can effectively control the process. In particular,<br />

management can identify ways in which to<br />

adjust and adapt the process to particular<br />

projects without measurable losses of quality<br />

or deviations from specifications.<br />

Cross-functional teams are adequately<br />

staffed for ESRM, performance for these teams<br />

is measured and ESRM development/training<br />

programmes are in place for teams operating<br />

across the organisation<br />

• Optimised At this level, the focus is very much<br />

on continually improving programme<br />

performance through both incremental and<br />

innovative changes and improvements. ESRM<br />

performance metrics are measured and<br />

optimised and drive team actions<br />

What are the results? The tool provides the<br />

end user with a set of graphs showing their<br />

current state versus their desired future state.<br />

These results will help security leaders<br />

understand what aspects of their ESRM<br />

programme need attention and to seek out<br />

standards, guidelines, colleagues, teams,<br />

education, articles and other careerdevelopment<br />

tools that can help themselves,<br />

their departments and their organisations<br />

better manage their overall security risk.<br />

Next steps for the model<br />

When deciding from whom to seek responses,<br />

ASIS International started with a qualitative<br />

survey of senior corporate security<br />

professionals drawn from the ASIS global<br />

membership of 34,000. Once an initial pilot was<br />

completed, ASIS opened the tool to the entire<br />

global membership, allowing anyone who’s an<br />

ASIS member to participate and gain results to<br />

deepen their understanding of where they are<br />

in their own ESRM journey.<br />

It’s worth noting that the data collected by<br />

ASIS in this tool is anonymous and not directly<br />

tied to the participating organisations.<br />

Mike Hurst CPP MSyI FIRP:<br />

Vice-Chairman of ASIS UK<br />

Michael Gips CPP CSyP is Chief<br />

Global Knowledge Officer at ASIS<br />

International, Tim McCreight CPP<br />

is Corporate Security Manager<br />

(Cyber) in the City of Calgary and<br />

Tim Wenzel CPP CISSP is a<br />

Specialist in ESRM<br />

“Transitioning from a traditional security approach to an<br />

ESRM programme isn’t an overnight event, but rather a<br />

journey towards a mature, risk-focused programme”<br />

47<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

What’s In The Pipeline?<br />

The use of incorrectly<br />

rated pipe and fittings<br />

can lead to the failure<br />

of fire extinguishing<br />

systems on discharge,<br />

with the risk of injury,<br />

collateral damage and<br />

the loss of<br />

extinguishant<br />

potentially resulting in<br />

a fire not being put<br />

out. The selection of<br />

the correct pipe<br />

materials is, therefore,<br />

essential. Here, Clark<br />

Priestley identifies the<br />

necessary detail<br />

Fixed gaseous fire extinguishing systems<br />

contain stored pressure which is released<br />

on discharge. There are British Standards<br />

which prescribe how these systems are<br />

designed, installed, commissioned and<br />

maintained and regulations – specifically the<br />

Pressure Equipment (Safety) Regulations and<br />

the Pressure Systems Safety Regulations –<br />

which govern and ensure their safe use.<br />

Pipework forms a significant part of any fixed<br />

fire extinguishing system, yet only BS 5306 Part<br />

4 (CO2 systems) specifies the pipe and fitting<br />

grades required. For clean agent systems<br />

covered by BS EN 15004, no specific grades are<br />

detailed. The selection of the grade of pipe for<br />

clean agent systems is left open to the<br />

designer, the only publication of use on the<br />

selection of pipes and fittings for these systems<br />

being the Fire Industry Association’s (FIA) Pipe<br />

Guidance Document.<br />

Regularly, there are images posted on social<br />

media of systems purporting quality, but where<br />

it’s clear that inappropriate fittings have been<br />

used, the grade of which is determined from<br />

their external appearance.<br />

The pipe and fitting grades used in a clean<br />

agent pipe network must be suitable for the<br />

maximum working pressure, which is the<br />

developed pressure of the extinguishant (and<br />

super-pressurisation, if applicable) at the<br />

maximum working temperature of the system<br />

(normally 50°C). It’s never based on the<br />

nominal system pressure. The maximum<br />

developed pressure for a 25 bar system as an<br />

example is given by the relevant agent part of<br />

BS EN 15004 and, for this example, would<br />

typically be circa 36 bar.<br />

The release of a fixed extinguishing system<br />

imparts a shock load to the pipework from the<br />

sudden egress of extinguishant. Shock loading<br />

significantly reduces the load that a component<br />

can carry. All material properties are stated<br />

under steady, non-shock conditions.<br />

In addition, the expansion of the working<br />

fluid draws heat from its surroundings, as can<br />

be seen by the formation of ice on the<br />

pipework, which also subjects that pipework to<br />

thermal stresses. Steels in particular are prone<br />

to low temperature embrittlement, thereby<br />

reducing the effective strength.<br />

Including safety factors<br />

The inclusion of safety factors is essential to<br />

make provision for the stresses induced during<br />

discharge and other factors such as corrosion,<br />

material defects or other variable conditions.<br />

So, where a fitting may have a stated test<br />

pressure of 150 bar, its rated working pressure<br />

will be significantly less.<br />

Focusing on steel pipe where sections of pipe<br />

are connected by means of threading, welding<br />

or rolled groove connections (as opposed to<br />

thin wall tube joined with compression fittings),<br />

for any given size of pipe and whatever<br />

specification with which it complies (eg BS EN<br />

10255, ASTM, API, etc), the outside diameter is<br />

always the same. Pipe is intended to be<br />

threaded externally as a means of joining<br />

sections together. Taper threads are used such<br />

as BSP or NPT. To screw a two-inch BSP thread<br />

on to a piece of DN 50 (two-inch) pipe, the<br />

outside diameter of the pipe has to correspond<br />

to that for the thread.<br />

Variations in pipe material strengths come<br />

from four sources:<br />

• Grade of steel: Some standards specify higher<br />

minimum material properties than others<br />

• Method of manufacture: Pipe can be made<br />

from a piece of flat plate which is rolled into a<br />

tubular form and seam welded or may be<br />

extruded as a seamless pipe. Seamless pipe is<br />

inherently stronger than that made with a<br />

longitudinal weld, but there are also variations<br />

in seamless pipe. The extrusion process is<br />

made easier by heating the material during<br />

forming, but the resulting pipe has lower<br />

material strength properties than one which is<br />

formed at a lower temperature or is cold<br />

48<br />


FIA Technical Briefing: Fire Extinguishing Systems<br />

• Wall thickness: Since the outside diameter of<br />

any given size of pipe is constant, pipe is made<br />

with different wall thicknesses to cater for<br />

different cost/application requirements as well<br />

as associated pressure ratings<br />

• Method of joining pipe sections: Pipework<br />

using welded joints is suitable for higher<br />

pressures than screwed joints. Pipework using<br />

BSP screwed joints is suitable for higher<br />

pressures than NPT<br />

The grade of pipe selected must have the<br />

correct properties for the duty for which it will<br />

be used. How is this determined? There are<br />

several standards covering the calculation of<br />

minimum wall thicknesses for anticipated<br />

working pressure. All use the same basic hoop<br />

stress calculation and make allowances for<br />

corrosion, method of joining and safety factors.<br />

First point of reference<br />

The FIA’s aforementioned Pipe Guidance<br />

Document provides an easy reference on the<br />

selection and sizing of grades of pipe for use on<br />

clean agent fixed extinguishing systems and it’s<br />

this document that should be the first port of<br />

call when selecting a pipe material.<br />

Joining sections of pipe together to create the<br />

required pipe route from the cylinder bank to<br />

the nozzles requires the use of pipe fittings –<br />

commonly elbows and tees – complete with<br />

screwed thread connections. The forming of<br />

taper pipe threads is very operator-dependent.<br />

Pipe fittings are available in a range of<br />

different grades based on different maximum<br />

working pressures. It’s essential that the<br />

correct fitting grade is used for the anticipated<br />

pressure. As these all connect to the pipe in the<br />

same way, there’s no process by which the use<br />

of an incorrectly rated fitting can be prevented.<br />

The use of the correct fitting is based on the<br />

skill and knowledge of the system installer.<br />

There have been changes in the pipe fittings<br />

covered by British Standards. Historically,<br />

screwed fittings were available as malleable<br />

iron (BS 143/1256), wrought steel (BS 1740)<br />

and forged steel (BS 3799). The former<br />

standards have been replaced by BS EN 10242<br />

and BS EN 10241 respectively.<br />

In the sizes typically used for fixed fire<br />

extinguishing systems, BS EN 10242 (malleable<br />

iron) fittings have a maximum working pressure<br />

of 25 bar, which makes them technically<br />

unsuitable for all extinguishing systems.<br />

However, BS EN 10242 allows the fittings to be<br />

type-rated for use at higher working pressures.<br />

Fittings which have been type-rated are usually<br />

physically marked with a paint or ink spot and<br />

will be supplied with the rated pressure stated<br />

on the material certification.<br />

The type rating, however, means that the<br />

fittings used are ‘specials’, so unless the<br />

installer is specifically aware that they’re<br />

installing such, the danger would be that, if<br />

additional fittings were required, non-rated<br />

types could be used. Having a fixed range of<br />

type-rated malleable iron fittings is not likely to<br />

be economical when compared to the cost of<br />

forged steel fittings which don’t need type<br />

rating. Type-rated fittings are used on fixed<br />

extinguishing installations, but when entire<br />

painting is the order of the day, the type rating<br />

markings are obliterated.<br />

In the future servicing of systems, if the<br />

service engineer is doing their job properly,<br />

they would see what appears to be a noncompliant<br />

fitting and, without the evidence to<br />

hand that they were type-rated, would be duty<br />

bound to flag this up as a potential service fail.<br />

Working pressures<br />

The maximum working pressure for BS EN<br />

10241 wrought steel fittings isn’t specifically<br />

stated in the British Standard. Only a test<br />

pressure is outlined for three collective types of<br />

fitting, ranging from 50 bar to 150 bar.<br />

The test pressure for BS EN 10242 malleable<br />

iron fittings is 100 bar (with a working pressure<br />

of 25 bar). Assuming the same test pressure-toworking<br />

pressure relationship, this would give<br />

seamless BS EN 10241 fittings a maximum<br />

working pressure of 37.5 bar (ie the highest<br />

strength rating available).<br />

The risk of using a standard which, in<br />

practice, has three strength ratings and of<br />

which the strongest is borderline for anything<br />

but 25 bar fixed extinguishing systems is<br />

somewhat questionable.<br />

Forged steel fittings to BS 3799 are available<br />

in a range of strength ratings – 3,000 lb (206<br />

bar) being commonly used on fixed<br />

extinguishing systems, although 6,000 lb<br />

fittings should be used on pipework rated for<br />

300 bar on conventional orifice plate controlled<br />

flow inert gas fixed extinguishing systems.<br />

Since there’s no ambiguity with the strength<br />

rating of BS 3799 forged steel fittings, their use<br />

on all fixed fire extinguishing systems is<br />

recommended. BS 3799 is a UK version of an<br />

American ANSI specification, so therefore<br />

states that the threads are NPT. In practice, BS<br />

3799 fittings with BSP threads (BS EN 10226 R<br />

Series) can be specified.<br />

Clark Priestley:<br />

Technical and Product Manager<br />

at DAB Fire Engineering<br />

“Pipe fittings are available in a range of different grades<br />

based on different maximum working pressures. It’s<br />

essential that the correct fitting grade is used”<br />

49<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Be Prepared and Plan for the Worst:<br />

Communicating in a Crisis<br />

Be prepared and plan<br />

for the worst. That’s<br />

the maxim for<br />

managing<br />

communications in a<br />

crisis, as indeed it is<br />

for all contingency<br />

planning. For its part,<br />

security<br />

communications<br />

planning is a strategy<br />

designed to help<br />

management make<br />

better decisions. Only<br />

preparation and<br />

practice can ensure<br />

that an incident is<br />

handled as well as<br />

possible under what<br />

will be rather difficult<br />

circumstances. With<br />

too little preparation,<br />

states Patrick Rea, the<br />

business may be<br />

forced to guess<br />

solutions when under<br />

intense pressure<br />

In an era of 24-7 digital news and viral<br />

comment on social media, how you respond<br />

to a crisis will affect the organisation’s<br />

reputation and relationships with stakeholders.<br />

If an incident is serious enough to worry<br />

customers and impact the share price, it<br />

warrants the resources necessary to explain<br />

what you will do to fix it. Crisis communications<br />

planning is what responsible companies do.<br />

Your goal should be this: to be ready with a<br />

tried-and-tested contingency framework that<br />

you can put into effect immediately if any<br />

potential crisis threatens. On the day it<br />

happens, you and your team can then quickly<br />

evaluate the scale of the problem and take<br />

effective action as necessary, with your<br />

management team able to agree goals and<br />

messages, clearly understanding their<br />

responsibilities and lines of communication.<br />

The starting point is to minimise the risk of a<br />

crisis in the first place. This requires listing and<br />

assessing relevant threats and testing for<br />

vulnerabilities, then evaluating how the<br />

organisation should respond in each case. This<br />

matters to ensure preparedness, but also if an<br />

incident occurs you want to be able to prove<br />

that, as a responsible organisation, you took all<br />

reasonable steps to avoid the risk or otherwise<br />

minimise the consequences.<br />

In essence, you require a plan and a record of<br />

the steps taken and relevant checks and<br />

accreditations. Risks will fall under a range of<br />

headings including physical security, data<br />

security, fire and financial, for example. Then<br />

it’s a case of asking questions and assessing<br />

the implications for each risk category such as:<br />

• Has an incident like this happened before?<br />

• What do we know about the current risk level?<br />

• Have we taken proportionate precautions?<br />

• Who would be impacted and how?<br />

• Who would find out about an incident and<br />

how would they do so?<br />

• Is there a team and a structure in place in<br />

order to respond effectively and efficiently?<br />

The nature and scale of risks changes over<br />

time. The most significant threat for many<br />

organisations and security teams at present is<br />

from terrorism. Many organisations have still<br />

not made use of the free schemes available<br />

from the police service to assist with<br />

preparedness. Courses include Project Griffin<br />

and Project Argus and the Passport to Good<br />

Security for Senior Executives. They cover, for<br />

example, ‘prevent’ strategies and table-top<br />

exercises where participants work through a<br />

terrorist incident, developing an understanding<br />

of current threats, the best responses and ways<br />

in which to maintain business continuity.<br />

Communications planning<br />

It’s not the plan that’s most important so much<br />

as the planning process itself. Crisis plans are<br />

not there just to specify the tactics necessary to<br />

help the organisation through the crisis, but<br />

also to provide a strategy to identify and avoid<br />

an incident in the first place and rehearse and<br />

prepare teams and delegate tasks.<br />

If a crisis strikes, you need flexibility to deal<br />

with an evolving situation and the<br />

communications demands as they change. This<br />

means responding to new information that<br />

emerges, to reaction and rumour on social<br />

media and any coverage and comment in the<br />

press and by analysts.<br />

Organisations are increasingly expected to be<br />

open and accessible to all interested groups<br />

when a crisis strikes. This demands good<br />

preparation such that, if necessary, you can set<br />

up consumer helplines and press hotlines and<br />

provide information updates on your website.<br />

The first question will always be: ‘What do<br />

we know?’ swiftly followed by ‘What<br />

information do we have?’ The crisis plan must<br />

be designed to assist the gathering of<br />

information on a swift basis. Managers need to<br />

know operationally what constitutes an issue<br />

50<br />


Security Services: Best Practice Casebook<br />

that demands escalation for Board or C-Suite<br />

attention. The communications team should be<br />

monitoring external issues that might impact.<br />

Your plan should set out details of the crisis<br />

team’s composition and clear lines of<br />

responsibility/contact with all stakeholders.<br />

“Communication should be two-way: daily research is<br />

invaluable in understanding trade reaction and public<br />

sentiment and therefore avoiding the risk of either<br />

underreacting or overreacting to a crisis event”<br />

Team players<br />

Depending on the scale of the crisis, the team<br />

leader will usually be the CEO, who may also be<br />

the principle spokesperson subject to the<br />

associated workload. A key position reporting<br />

to the CEO is that of the communications coordinator<br />

who’ll manage all information and<br />

organise the response and team activities.<br />

Reporting to the co-ordinator, members of<br />

the PR and marketing team can each be<br />

delegated with specialist tasks (such as fielding<br />

press enquiries, dealing with internal<br />

communications, writing messages or<br />

managing social media) in order to ensure clear<br />

lines of responsibility.<br />

During or soon after the incident, you should<br />

be ready to prepare and regularly update a<br />

formal statement containing succinct and<br />

factual information to clarify as much as<br />

possible what has happened and what’s being<br />

done about it and outline when any further<br />

information may be available.<br />

Staff communications are critical in dealing<br />

with a crisis. Messaging needs to be clear,<br />

succinct and jargon-free. It must include<br />

guidance about security standards and<br />

procedures. Any detailed procedural documents<br />

should feature at-a-glance process maps,<br />

summaries and checklists with essential points<br />

such as the actions to be followed in the event<br />

of an incident.<br />

‘Action This Day’<br />

A major incident or reputational crisis occurs…<br />

How should you respond?<br />

Ascertain the facts Identify the nature of the<br />

issue. Who’s impacted directly and indirectly by<br />

it? You cannot fix it without this data or report<br />

on progress. The scale of the problem should<br />

be quantified as the cost and logistical remedy<br />

will vary according to the scale of the incident<br />

Take control There needs to be clear lines of<br />

management responsibility and communication<br />

‘from the shop floor to the Boardroom’. It’s<br />

essential that someone is – and what’s more is<br />

seen to be – in charge and has overall control<br />

such that decisions can be made and effected<br />

quickly. The two key figures are the CEO, the<br />

principal spokesperson, and the<br />

communications co-ordinator, a Board-level<br />

director, taking advice from relevant specialists<br />

– legal, technical and PR communications<br />

Fix the problem The honest response is to fix it<br />

if you possibly can – and as soon as you can.<br />

Many companies have failed to learn from the<br />

1972 Watergate incident that if you try to simply<br />

cover up the problem it will only worsen<br />

Communicate clearly Clear lines of PR<br />

communication are essential, with a full<br />

understanding of who in your organisation – or<br />

on behalf of it – are the communications<br />

contacts dealing with Government, national and<br />

trade press, customer and other enquiries<br />

Obtain legal advice This is essential in relation<br />

to liability and other issues. The legal argument<br />

must be balanced with other considerations as<br />

well, such as the need for prompt<br />

communication and management action. The<br />

role of the lawyer is to advise on the legal case.<br />

They’re not supposed to manage the crisis or<br />

the messaging<br />

Set out your communications goals Whom do<br />

you need to inform and influence and how?<br />

What will ‘success’ look like in the real world?<br />

Plan what channels you can and should use to<br />

reach your target audiences both quickly and<br />

efficiently. You must, of course, monitor<br />

responses and replies daily, if not within the<br />

hour, according to the nature of the issue<br />

Agree the message Clear and unambiguous<br />

messages must be consistent for all<br />

stakeholders – customers, staff, shareholders<br />

and others. People first need the reassurance<br />

over any issues of safety and how they might<br />

be affected. They also want to know to whom<br />

they can go to deal with a specific problem<br />

‘Action This Day’ That’s what Sir Winston<br />

Churchill stamped in red on documents when<br />

managing a real crisis (ie World War II).<br />

Customers and the trade respect a prompt and<br />

proactive approach, but it has to be properly<br />

thought through<br />

Regain trust Trust is the essential precursor to<br />

any commercial relationship. This requires that<br />

clients are reassured and know they will receive<br />

the service and response they expect. A<br />

‘cultural’ change may be required to ensure the<br />

incident that has occurred isn’t repeated<br />

Institutionalise risk aversion Organisations<br />

need an internal audit team that identifies<br />

areas of physical, financial and reputational risk<br />

and checks the key processes and compliance<br />

issues for the business. That team should<br />

report at Board level<br />

Patrick Rea FCIM:<br />

CEO of Rea Marketing and a<br />

Member of ASIS<br />

International’s UK Chapter<br />

51<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

From Firewalls to Fine Grain Permissions<br />

Cyber crime is now so<br />

prevalent that<br />

guarding against it<br />

should be part of<br />

standard ‘business as<br />

usual’ company<br />

procedures, but many<br />

organisations have<br />

been caught out. In<br />

parallel, the spectre of<br />

physical attacks<br />

remains the same,<br />

which means that the<br />

risk manager’s role of<br />

keeping people and<br />

places safe and secure<br />

is becoming more<br />

expansive and, by<br />

extension, more<br />

complex. Tim<br />

Northwood outlines<br />

why organisations<br />

need systems and<br />

processes in place<br />

that offer robust<br />

physical security<br />

measures and keep<br />

out the cyber criminals<br />

52<br />


Cyber-Physical Security: Working in Unison<br />

attacker attempted to replace devices for<br />

others with a lesser level of performance, the<br />

system would alert operators to the<br />

unauthorised change.<br />

Ensuring that your system is ‘always on’ is<br />

another key element when it comes to<br />

reducing the risk of cyber breaches in<br />

vulnerable downtime. A security system should<br />

offer high availability with an IP network that<br />

runs multiple instances of itself – at the same<br />

time – across multiple nodes or servers at the<br />

local, national and global levels. Solutions such<br />

as database failover clustering means it will<br />

auto-connect to available nodes when<br />

necessary and ensure there’s no compromise of<br />

the system.<br />

Fine grain permissions for users<br />

Security systems that allow ‘fine grain’ tailoring<br />

for permissions and protocols offer better<br />

protection from would-be criminals. For<br />

example, systems that allow you to create<br />

completely bespoke access credentials for each<br />

member of staff and all visitors ensure they can<br />

only access the correct areas and systems at<br />

any given moment.<br />

Systems offering a full forensic audit trail are<br />

vital for robust cyber security. Forensic audit<br />

reports cover every single action and<br />

engagement with the access control system<br />

and can be reported at the local, national or<br />

global levels. This means security managers<br />

can see exactly who has done what to the<br />

system and when. A good audit trail system<br />

should have the ability to ‘roll-back’ changes<br />

made to system programming by any person or<br />

entity at a specific date and time. This means,<br />

for example, that any changes made by a<br />

‘rogue’ operator can be undone in one action<br />

and the system programming rolled back to<br />

exclude these changes.<br />

Documenting your cyber security processes,<br />

procedures and guidelines ensures that all<br />

security regimes across the organisation are<br />

followed routinely and exactly as they’re written<br />

down. Having the right processes in place<br />

means that sensitive data will only be accessed<br />

by authorised individuals.<br />

An information security program helps you<br />

train new security staff more easily. Guidance<br />

for general employees helps them understand<br />

how their actions can create cyber risks and,<br />

importantly, how they can mitigate them.<br />

Managing an attack episode<br />

Should the worse case scenario happen and the<br />

business suffers a cyber attack, it’s vital to have<br />

a tested disaster recovery plan in place. You<br />

will need to be able to recover lost or corrupted<br />

“Documenting your cyber security processes, procedures<br />

and guidelines ensures that all security regimes across the<br />

organisation are followed routinely and exactly as they’re<br />

written down”<br />

data and restore as quickly as possible all<br />

business-critical applications.<br />

The key point to note here is that your<br />

disaster recovery plan needs to be tested – and<br />

repeatedly so. How regularly will depend on the<br />

size of your organisation, but quarterly is<br />

probably about right for most. If you don’t test<br />

your plan and prove that it works in practice as<br />

expected, you expose the systems and your<br />

organisation to a much higher risk of failure in<br />

the event of an attack.<br />

The methods and types of cyber attacks and<br />

security risk are constantly evolving. Whatever<br />

new solution you design, someone will<br />

eventually work out how to hack it.<br />

Ransomware, malware, phishing and social<br />

engineering are the most common threats right<br />

now, but there are others on the horizon.<br />

Cryptojacking (ie the secret use of your<br />

computer to mine for cryptocurrency) is<br />

becoming more sophisticated. Criminals can<br />

mine your computer from a web browser rather<br />

than a downloaded program.<br />

There’s more state-sponsored hacking with<br />

large, long-term projects that can steal<br />

commercial information, or even hack critical<br />

infrastructure organisations in other countries.<br />

It’s estimated that there will be 30 billion<br />

devices connected to the Internet by the end of<br />

this year, including computers and laptops,<br />

tablets, mobile phones, smart watches and web<br />

cams. Smaller devices tend to be more<br />

vulnerable to cyber attack and there’s potential<br />

for criminals to cause chaos by targeting the<br />

large numbers of people who use these.<br />

The only way in which we can stay ahead of<br />

the cyber criminals, or at least mitigate their<br />

attacks if they occur, is to remain vigilant and<br />

open-minded about what they might do next.<br />

Investing in cyber security<br />

The business case for investing in cyber<br />

security is clear. Attacks can cost companies<br />

millions of pounds, cause chaos and result in<br />

severe reputational damage.<br />

There’s plenty of sophisticated kit out there<br />

to help you build a security system with robust<br />

cyber security measures, but that’s only part of<br />

the solution. Investing in our people and<br />

training more and more cyber security<br />

professionals will be just as crucial if we want<br />

to keep the cyber criminals out.<br />

Tim Northwood:<br />

General Manager of Inner<br />

Range<br />

53<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Risk in Action<br />

Risk in Action<br />

Nittan Europe helps<br />

protect iconic Bristol<br />

church from scourge<br />

of fire outbreaks<br />

Nittan Europe, the dedicated<br />

UK manufacturer of<br />

conventional and<br />

addressable fire detection<br />

products and systems, has<br />

had its Evolution analogue<br />

addressable fire detection<br />

system installed at the<br />

much-loved St Nicholas Church in Bristol. The system was supplied and<br />

commissioned by Coomber Fire and Security Systems (a Nittan Elite Partner<br />

and BAFE SP203-1 and SP101 accredited).<br />

Grade II-listed, St Nicholas Church was built in 1769, although the crypt dates<br />

back to medieval times. St Nicholas has always played an important role in<br />

Bristol, whether it be for worship, providing shelter during WWII or, more<br />

recently, as home to Bristol City Council’s tourist office and archive. The church<br />

was reopened in 2018 as a centre for worship, mission and social engagement,<br />

continuing its legacy of being a church “in the city, for the city”.<br />

To protect this building, the Nittan Evolution analogue addressable fire<br />

detection system features 51 devices including detectors and beam detectors,<br />

Call Points and high output sounder beacons.<br />

Coomber Fire and Security Systems is the largest independent fire and<br />

security installer in Somerset. The business has extensive experience in fire<br />

detection systems for churches and chose Nittan for this project based on the<br />

reliability and quality of its Evolution range combined with the increased loop<br />

voltage which allows for longer cable runs.<br />

“It’s ideal in an old church of this size,” stated Adam Pitman, senior fire<br />

systems engineer at Coomber Fire and Security Systems.<br />

Evolution is Nittan’s advanced premium fire system. It makes use of ASIC<br />

technology in the sensors and sophisticated detection algorithms, combining<br />

extremely reliable fire detection together with a very high degree of protection<br />

against unwanted false alarms.<br />

Bespoke access control solutions<br />

for end users at Pullman Place<br />

delivered by dormakaba<br />

dormakaba has supplied a selection of<br />

products for the entrance and waiting room<br />

area at Pullman Place, a specialist mental<br />

health and learning disability clinic located in<br />

the heart of Gloucestershire.<br />

Given that the property was previously used<br />

as a Call Centre, the building’s access regime<br />

needed to be improved significantly to enable<br />

visitors with mobility issues to access both the<br />

building and the 2 gether NHS Foundation<br />

Trust’s services.<br />

Appointed in September 2016 to complete<br />

the redesign of the four-storey building,<br />

Quattro Design Architects was additionally<br />

Hochiki Europe provides state-ofthe-art<br />

life safety platform for<br />

Jardine Motors Group<br />

A new £5 million car showroom in Tonbridge,<br />

Kent owned by the Jardine Motors Group is<br />

using L@titude – a bespoke fire alarm control<br />

panel produced by life safety system<br />

manufacturer Hochiki Europe.<br />

The showroom, which showcases high-value<br />

Jaguar and Land Rover vehicles, needed a stateof-the-art<br />

control and indication system which<br />

would link its various heat, flame and smoke<br />

detectors from around the space. The selected<br />

system was specified due to its reliability,<br />

flexibility, user friendliness and accessibility.<br />

The facilities management team at Jardine<br />

Motors Group has made effective use of the<br />

new addressable life safety platform to help<br />

protect two floors of high-value space at the<br />

Kent facility.<br />

As is the case with all of Hochiki Europe’s<br />

products, L@titude is fully compliant with the<br />

highest European and global safety standards,<br />

among them EN54-2, EN54-4 and EN54-13.<br />

Hochiki Europe designed the panel to<br />

maximise usability and ease of operation so<br />

maintenance teams and duty managers can<br />

instantly locate safety breaches in real-time<br />

from any location. The product employs a fullcolour<br />

touchscreen display which allows for<br />

clear and concise information on each device.<br />

contracted to improve the front entrance<br />

lobby. The original lobby had hinged doors<br />

and wasn’t wide enough for automatic doors.<br />

Quattro specified dormakaba’s ST Flex green<br />

sliding door for the building’s main entrance.<br />

Selected due to its slender profile design, the<br />

ST Flex green sliding door is an energy<br />

efficient access solution that reduces day-today<br />

energy and heating costs thanks to its<br />

interlocking side, top and bottom seals that<br />

prevent heat from escaping the building.<br />

As the service users visiting Pullman Place<br />

have varying needs, it was decided by the<br />

2 gether NHS Foundation Trust that the<br />

reception should be split into two distinct<br />

areas. In order to achieve this separation,<br />

Quattro specified dormakaba’s Charon HSD<br />

E03 half-height swing door.<br />

54<br />


Technology in Focus<br />

Technology in Focus<br />

Wisenet super compact dome cameras developed by Hanwha<br />

Techwin for retail projects<br />

Measuring just 99 mm in diameter, the<br />

super compact 2 and 5 MP Wisenet Q<br />

mini domes developed by Hanwha<br />

Techwin are packed with features<br />

designed to ensure end users obtain<br />

maximum advantages from their video<br />

surveillance solutions.<br />

40% smaller than previous models,<br />

the new H.265 mini domes deliver reallife<br />

practical benefits to a wide range<br />

of end users and, in particular, retailers who require aesthetically attractive<br />

cameras to be installed on walls and ceilings in what could be confined spaces.<br />

License-free people counting analytics, as well as de-focus, motion and<br />

tampering detection functions are built into all four new models as standard,<br />

while a new open platform chipset also provides the opportunity for third party<br />

applications to run on-board the domes.<br />

The people counting functionality offers today’s retailers the welcome<br />

opportunity to monitor store efficiencies.<br />

www.hanwha-security.eu<br />

TrackTik’s software offers<br />

automation for security<br />

workforce management<br />

TrackTik’s mobile and webfriendly<br />

guard tour system uses<br />

automation to take the<br />

effectiveness and efficiency of an<br />

organisation’s security<br />

management operations “to the<br />

next level”.<br />

This “first-of-its-kind” system<br />

provides security managers with a custom-tailored, holistic view of their<br />

operations and security personnel on tour with the support and safety of<br />

having “a tutor in their back pocket”.<br />

From scheduling and interacting with security staff through to incident<br />

reporting, TrackTik’s software offers a complete suite of tools, including realtime<br />

checkpoint logging, incident reporting, GPS tracking, messaging, alerts<br />

and audio-video capabilities.<br />

Thanks to a variety of checkpoint options, together with GPS tracking,<br />

TrackTik’s automated guard tour system creates a real-time picture of an<br />

organisation’s guard tour operations that improves transparency and<br />

accountability. The guard tour system establishes permitted and restricted<br />

zones and can assign special protocols for specific locations.<br />

Offering immediate communication, modifications and transmission of data,<br />

TrackTik’s automated guard tour system also affords a live picture of the<br />

security environment in which security personnel are operating.<br />

The watch mode audio and video feed and recording feature informs of<br />

dangerous situations, which also helps to support the Health and Safety of<br />

security personnel dealing with potentially high-risk situations, in turn<br />

resulting in a maximised security impact to help deliver a safer environment.<br />

TrackTik’s security workforce management software helps today’s end users<br />

to seamlessly integrate on-site, mobile and back-office functions.<br />

www.tracktik.com<br />

Illustra Pro Mini Domes feature<br />

Smart Wide Dynamic Range<br />

Johnson Controls has updated its Illustra Pro<br />

camera family with a new generation of Mini<br />

Domes featuring Smart Wide Dynamic Range<br />

(WDR). Offering a choice of 2, 3, 5 and 8 MP<br />

models and a variety of lens options, the<br />

cameras are ideal for a range of deployments<br />

in both medium and large-scale facilities.<br />

The Smart WDR technology built into the<br />

cameras “greatly improves” the quality of<br />

images captured in varying lighting<br />

environments. By continuously analysing the<br />

scene, Smart WDR – without any operator<br />

intervention – automatically adjusts tone<br />

mapping intensity and optimises the quality<br />

of the captured images by enhancing<br />

darkened areas. There’s no over-saturation<br />

of brighter areas.<br />

www.illustracameras.com<br />

AlproMAX7 deadlocks secure<br />

maximum rating<br />

Alpro, the independent supplier of door access<br />

control and hardware, has launched a new<br />

range of ultra-secure mechanical mortice<br />

deadlocks designated the AlproMAX7.<br />

Independently tested under extreme<br />

physical attack by test and certification house<br />

Element Materials Technology, the AlproMAX7<br />

complies with BS EN 12209 (the most stringent<br />

British and European Standard for<br />

mechanically-operated locks, latches and<br />

locking plates).<br />

The AlproMAX7 has been tested to Grade 7<br />

(the most stringent classification for security).<br />

www.alpro.co.uk<br />

55<br />

www.riskxtra.com>


thepaper<br />

Business News for Security Professionals<br />

Pro-Activ Publications is embarking on a revolutionary<br />

launch: a FORTNIGHTLY NEWSPAPER dedicated to the<br />

latest financial and business information for<br />

professionals operating in the security sector<br />

The Paper will bring subscribers (including CEOs,<br />

managing directors and finance directors within the<br />

UK’s major security businesses) all the latest company<br />

and sector financials, details of business re-brands,<br />

market research and trends and M&A activity<br />

FOR FURTHER INFORMATION<br />

ON THE PAPER CONTACT:<br />

Brian Sims BA (Hons) Hon FSyI<br />

(Editor, The Paper and Risk UK)<br />

Telephone: 020 8295 8304<br />

e-mail: brian.sims@risk-uk.com<br />

www.thepaper.uk.com


x<br />

RISKXtra<br />

Appointments<br />

Lord Alex Carlile QC<br />

The Government has<br />

appointed Lord Alex Carlile<br />

QC as the Independent<br />

Reviewer of the Prevent<br />

programme designed to<br />

safeguard vulnerable<br />

individuals from being<br />

drawn into terrorism.<br />

Prevent is one of the four<br />

strands of the Government’s CONTEST counterterrorism<br />

strategy. Back in January, the<br />

Government announced plans for the<br />

Independent Review of Prevent as part of the<br />

Counter-Terrorism and Border Security Act.<br />

Security Minister Brandon Lewis commented:<br />

“Lord Carlile brings a wealth of experience and<br />

skills to this role. In his role as the Independent<br />

Reviewer of Terrorism Legislation he showed<br />

both independence and rigour. I’m pleased he<br />

has agreed to lead this review. Prevent is vitally<br />

important when it comes to stopping vulnerable<br />

individuals from being drawn into terrorism and<br />

has been instrumental in turning people’s lives<br />

around for the better as well as keeping our<br />

communities safe.”<br />

Lord Carlile responded: “The nature of the<br />

terrorist threat is ever-changing and<br />

Government policy must evolve in order to<br />

tackle it. I look forward to seeing Preventfocused<br />

work in action and hearing views from<br />

supporters, critics and everyone in-between<br />

about what is and isn’t working. The review will<br />

be strongly evidence-based.”<br />

In addition, Lord Carlile observed: “As the<br />

former Independent Reviewer of Terrorism<br />

Legislation, I developed a strong track record of<br />

asserting and sustaining my independence of<br />

central Government in assessing the<br />

effectiveness of current legislation. This role<br />

will be no different in that respect.”<br />

Appointments<br />

Risk Xtra keeps you up-to-date with all the latest people<br />

moves in the security, fire, IT and Government sectors<br />

Katy Bourne OBE<br />

Katy Bourne OBE, the Police and Crime<br />

Commissioner for Sussex, has been elected as<br />

the new chair of the Association of Police and<br />

Crime Commissioners at the organisation’s<br />

Annual General Meeting. Now in her second<br />

term as Police and Crime Commissioner (PCC)<br />

for Sussex, Bourne was first elected in 2012 and<br />

then re-elected in 2016 when she more than<br />

doubled her majority.<br />

The PCC’s role is to hold the chief constable<br />

of Sussex Police to account for the performance<br />

of the force, effectively making the police<br />

answerable to the communities for whom they<br />

serve. Bourne is tasked with setting the<br />

strategic direction and priorities for Sussex<br />

Police through the Police and Crime Plan. This<br />

includes formulating the police budget and local<br />

police precept (ie the amount residents pay for<br />

policing within their council tax).<br />

Bourne also has a statutory duty to<br />

commission support services for the victims of<br />

crime and deliver community safety initiatives<br />

(including those focused on restorative justice<br />

and crime reduction grants).<br />

Bourne was recognised for founding the<br />

award-winning Sussex Youth Commission in<br />

2013 and, subsequently, the Sussex Elders<br />

Commission in 2015.<br />

Bourne graduated from Aberystwyth<br />

University and was a successful businesswoman<br />

before entering politics (and, indeed, retains a<br />

keen interest in innovative business start-ups).<br />

Fred Lambrechts<br />

Fred Lambrechts has joined Corps Security as<br />

mobilisation and transformation manager. In<br />

this newly-created role, Lambrechts will<br />

support large mobilisations as well as use his<br />

many years of experience in the security<br />

sector to develop Corps Security’s integrated<br />

security guarding and monitoring solutions.<br />

Lambrechts previously worked as national<br />

operations manager at Interserve and has also<br />

held senior roles at companies including<br />

Knightsbridge Guarding, the Kingdom Services<br />

Group, PCL Whitehall Security and, in addition,<br />

T-Class Security.<br />

Commenting on his new role, Lambrechts<br />

told Risk Xtra: “I’m delighted to be joining<br />

Corps Security. The business is well known in<br />

the sector for its high standards of service and<br />

its self-delivery of monitoring solutions. I’m<br />

pleased to be part of an organisation which<br />

was founded back in the 1850s and yet<br />

remains one of the most forward-thinking<br />

security companies in the market.”<br />

Paul Lotter, the newly-appointed managing<br />

director of the security guarding business<br />

within Corps Security, added: “We’re in the<br />

process of mobilising a number of significant<br />

contracts so I welcome Fred to the business.<br />

His experience of large-scale mobilisations will<br />

be very welcome. Our security guarding and<br />

monitoring businesses are becoming ever<br />

closer and Fred will be instrumental in that<br />

integration going forward.”<br />

57<br />

www.riskxtra.com>


x<br />

RISKXtra<br />

Appointments<br />

Shaun Kennedy<br />

Shaun Kennedy has taken over as Country President and<br />

managing director of Securitas UK. Previous Country<br />

President Brian Riis Nielsen officially handed over the<br />

reins to Kennedy at Securitas UK’s recent annual<br />

Leadership Conference. Riis Nielsen now moves on to a<br />

new group management position within Securitas AB.<br />

Kennedy is an experienced leader with a proven track<br />

record in the security industry. After leaving the British<br />

Army in 1997, he joined Chubb Security where he spent<br />

15 years until the business was acquired by Securitas back in 2011.<br />

Since that time, Kennedy has held senior management positions including<br />

chief operating officer for the UK and, more recently, director of specialist<br />

protective services. Kennedy has also been responsible for the successful<br />

implementation of Securitas’ Fire and Safety strategy across Europe.<br />

Commenting on his new role, Kennedy told Risk Xtra: “Having spent over 20<br />

years working in the security industry, I feel privileged to be taking over<br />

responsibility of the UK business at such an exciting time. Securitas UK will<br />

continue to go from strength to strength, offering better safety and security to<br />

our clients through outstanding security officers and an innovation and datadriven<br />

approach.”<br />

Jaime de Gouveia<br />

Incentive Lynx, the<br />

specialist security arm of<br />

the Incentive FM Group,<br />

has appointed Jaime de<br />

Gouveia to the position of<br />

business development<br />

manager as the company<br />

embarks on the next stage<br />

of its growth.<br />

As part of his role, de Gouveia will be tasked<br />

with working alongside both new and existing<br />

clients to fully understand their requirements<br />

and ensure they have access to the most<br />

suitable services and solutions.<br />

de Gouveia has worked at Incentive Lynx for<br />

over eight years now, initially joining the<br />

business as a site-based security officer and<br />

later being promoted to the role of security<br />

manager. Before joining Incentive Lynx, de<br />

Gouveia held positions at Central Saint Giles<br />

and MidCity Place.<br />

de Gouveia harbours more than 16 years’<br />

solid experience of working across the sector.<br />

During that time, he has developed,<br />

implemented and delivered bespoke security<br />

solutions for multiple businesses across<br />

various sector environments.<br />

Stephen Waud, managing director of<br />

Incentive Lynx, explained to Risk Xtra: “Moving<br />

forwards, the role of business development<br />

manager will become increasingly important to<br />

our organisation as we look to further grow our<br />

client portfolio. Jaime has a fantastic<br />

understanding of the Incentive Lynx model of<br />

delivering industry-leading security services<br />

and was the perfect candidate for this role.”<br />

Priti Patel<br />

Not long after Theresa<br />

May’s final joust at Prime<br />

Minister’s Questions with<br />

Labour leader Jeremy<br />

Corbyn in the House of<br />

Commons on Wednesday<br />

24 July, the newlycrowned<br />

Prime Minister<br />

Boris Johnson began to<br />

assemble the constituent members of his<br />

Cabinet for Government.<br />

It soon emerged that Priti Patel, the<br />

Conservative MP for Witham in Essex, has been<br />

appointed to the role of Home Secretary with<br />

former incumbent at the Home Office Sajid<br />

Javid moving to become Chancellor of the<br />

Exchequer and succeed Philip Hammond.<br />

Patel served as International Development<br />

Secretary from 2016-2017 having initially been<br />

involved with the Referendum Party until<br />

switching to the Conservatives.<br />

Educated at Keele University and the<br />

University of Essex, Patel’s initial foray into the<br />

world of commerce saw her working in PR with<br />

Weber Shandwick for several years.<br />

Patel was elected as the Conservative MP for<br />

Witham at the 2010 General Election.<br />

Tom Clarke<br />

Reliance High-Tech, the<br />

independent security<br />

technology integrator,<br />

has announced the<br />

appointment of Tom<br />

Clarke to its senior<br />

management team.<br />

As the company’s<br />

sales director, Clarke<br />

will aim to grow the business and promote<br />

the advantages of Reliance High-Tech’s<br />

specialist services to organisations across<br />

the country in line with the company’s<br />

strategic growth plan.<br />

With vast experience of large-scale<br />

integration and technology migration<br />

projects within the security sector, Clarke<br />

joins Reliance High-Tech from Mitie where he<br />

was director of sales for the company’s<br />

specialist security services division. His<br />

experience also includes spells at BT and<br />

Contract Fire & Security.<br />

Clarke will now develop, strengthen and<br />

deepen relationships with existing<br />

customers, while at the same time<br />

identifying and forging new partnerships<br />

with other organisations that are ready to<br />

benefit from the value which a truly<br />

integrated security set-up can realise.<br />

58<br />


ACCESS CONTROL<br />

ACCESS CONTROL<br />

ACCESS CONTROL<br />

KERI SYSTEMS UK LTD<br />

Tel: + 44 (0) 1763 273 243<br />

Fax: + 44 (0) 1763 274 106<br />

Email: sales@kerisystems.co.uk<br />

www.kerisystems.co.uk<br />

ACCESS CONTROL MANUFACTURER<br />

INTEGRATED DESIGN LIMITED<br />

Integrated Design Limited, Feltham Point,<br />

Air Park Way, Feltham, Middlesex. TW13 7EQ<br />

Tel: +44 (0) 208 890 5550<br />

sales@idl.co.uk<br />

www.fastlane-turnstiles.com<br />

ACCESS CONTROL<br />

NORTECH CONTROL SYSTEMS LTD.<br />

Nortech House, William Brown Close<br />

Llantarnam Park, Cwmbran NP44 3AB<br />

Tel: 01633 485533<br />

Email: sales@nortechcontrol.com<br />

www.nortechcontrol.com<br />

ACCESS CONTROL – SPEED GATES, BI-FOLD GATES<br />

SECURE ACCESS TECHNOLOGY LIMITED<br />

Authorised Dealer<br />

Tel: 0845 1 300 855 Fax: 0845 1 300 866<br />

Email: info@secure-access.co.uk<br />

Website: www.secure-access.co.uk<br />

HVM<br />

HTC PARKING AND SECURITY LIMITED<br />

St. James’ Bus. Centre, Wilderspool Causeway,<br />

Warrington Cheshire WA4 6PS<br />

Tel 01925 552740 M: 07969 650 394<br />

info@htcparkingandsecurity.co.uk<br />

www.htcparkingandsecurity.co.uk<br />

FRONTIER PITTS LTD<br />

+44 (0) 1293 422800<br />

marketing@frontierpitts.com<br />

www.frontierpitts.com


CCTV & IP SECURITY SOLUTIONS<br />

PANASONIC SYSTEM<br />

COMMUNICATIONS COMPANY EUROPE<br />

Panasonic House, Willoughby Road<br />

Bracknell, Berkshire RG12 8FP UK<br />

Tel: 0207 0226530<br />

Email: info@business.panasonic.co.uk<br />

CCTV POLES, COLUMNS, TOWERS AND<br />

MOUNTING PRODUCTS<br />

ALTRON COMMUNICATIONS<br />

EQUIPMENT LTD<br />

Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ<br />

Tel: +44 (0) 1269 831431<br />

cctvsales@altron.co.uk www.altron.co.uk<br />

CCTV<br />

CCTV<br />

MODICAM EUROPE<br />

Rapid Deployment Digital IP High Resolution CCTV40<br />

hour battery, Solar, Wind Turbine and Thermal Imaging<br />

Wired or wireless communication fixed IP. CE Certified.<br />

Modicam Europe, 5 Station Road, Shepreth,<br />

Cambridgeshire SG8 6PZ<br />

www.modicam.com sales@modicameurope.com<br />

CCTV SPECIALISTS<br />

PLETTAC SECURITY LTD<br />

Unit 39 Sir Frank Whittle Business Centre,<br />

Great Central Way, Rugby, Warwickshire CV21 3XH<br />

Tel: 01788 567811 Fax: 01788 544 549<br />

Email: jackie@plettac.co.uk www.plettac.co.uk<br />

CONTROL ROOM & MONITORING<br />

ADVANCED MONITORING SERVICES<br />

CCTV<br />

G-TEC DISTRIBUTION<br />

Gtec House, 35-37 Whitton Dene<br />

Hounslow, Middlesex TW3 2JN<br />

Tel: 0208 898 9500<br />

www.gtecsecurity.co.uk<br />

sales@gtecsecurity.co.uk<br />

EUROTECH MONITORING SERVICES LTD.<br />

Specialist in:- Outsourced Control Room Facilities •<br />

Lone Worker Monitoring • Vehicle Tracking • Message<br />

Handling • Help Desk Facilities • Keyholding/Alarm<br />

Response<br />

Tel: 0208 889 0475 Fax: 0208 889 6679<br />

E-MAIL eurotech@eurotechmonitoring.net<br />

Web: www.eurotechmonitoring.net


DISTRIBUTORS<br />

LEADING DISTRIBUTOR OF CONVERGED IP<br />

SOLUTIONS, INCLUDING CCTV AND ACCESS CONTROL<br />

ONLINE SECURITY PRODUCTS<br />

Security distributors direct to installers, property<br />

maintenance & facilities management companies<br />

MAYFLEX<br />

Our product range not only covers IP security products<br />

but also incorporates the cabling infrastructure and the<br />

Ethernet switching products necessary for a comprehensive<br />

security installation. We have a knowledgeable team<br />

of sales and technical experts that provide advice and<br />

support with system design and product choice. You can<br />

also order online up to 8pm for next day FREE delivery.<br />

Excel House, Junction 6 Industrial Park, Electric Avenue,<br />

Birmingham, B6 7JJ<br />

Tel: 0800 75 75 65 www.mayflex.com<br />

THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP,<br />

CCTV, ACCESS CONTROL AND INTRUDER DETECTION<br />

SOLUTIONS<br />

Phone 0800 880 6123<br />

Phone 0113 850 6123<br />

sales@onlinesecurityproducts.co.uk<br />

www.onlinesecurityproducts.co.uk<br />

AWARD-WINNING, LEADING GLOBAL WHOLESALE<br />

DISTRIBUTOR OF SECURITY AND LOW VOLTAGE<br />

PRODUCTS.<br />

NORBAIN SD LTD<br />

210 Wharfedale Road, IQ Winnersh, Wokingham,<br />

Berkshire, RG41 5TP<br />

Tel: 0118 912 5000 Fax: 0118 912 5001<br />

www.norbain.com<br />

Email: info@norbain.com<br />

IDENTIFICATION<br />

ADI GLOBAL DISTRIBUTION<br />

Distributor of electronic security systems and solutions<br />

for over 250 leading manufacturers, the company also<br />

offers an internal technical support team, dedicated<br />

field support engineers along with a suite of training<br />

courses and services. ADI also offers a variety of fast,<br />

reliable delivery options, including specified time delivery,<br />

next day or collection from any one of 28 branches<br />

nationwide. Plus, with an ADI online account, installers<br />

can order up to 7pm for next day delivery.<br />

Tel: 0161 767 2990 Fax: 0161 767 2999 Email:<br />

sales.uk@adiglobal.com www.adiglobal.com/uk<br />

WWW.IDENTIFICATIONSOLUTIONS.CO.UK<br />

IDENTIFICATION SOLUTIONS<br />

Members • Staff • Visitors • Contractors • Conference<br />

• Clubs • Delegates • Corporate ID<br />

www.identificationsolutions.co.uk


COMPLETE SOLUTIONS FOR IDENTIFICATION<br />

PERIMETER PROTECTION<br />

PERIMETER PROTECTION<br />

DATABAC GROUP LIMITED<br />

1 The Ashway Centre, Elm Crescent,<br />

Kingston upon Thames, Surrey KT2 6HH<br />

Tel: +44 (0)20 8546 9826<br />

Fax:+44 (0)20 8547 1026<br />

enquiries@databac.com<br />

INDUSTRY ORGANISATIONS<br />

TRADE ASSOCIATION FOR THE PRIVATE SECURITY<br />

INDUSTRY<br />

GPS PERIMETER SYSTEMS LTD<br />

14 Low Farm Place, Moulton Park<br />

Northampton, NN3 6HY UK<br />

Tel: +44(0)1604 648344 Fax: +44(0)1604 646097<br />

E-mail: info@gpsperimeter.co.uk<br />

Web site: www.gpsperimeter.co.uk<br />

POWER<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

BSIA<br />

Tel: 0845 389 3889 Email: info@bsia.co.uk<br />

Website: www.bsia.co.uk Twitter: @thebsia<br />

INTEGRATED SECURITY SOLUTIONS<br />

SECURITY PRODUCTS AND INTEGRATED SOLUTIONS<br />

HONEYWELL COMMERCIAL SECURITY<br />

Tel: +44 (0) 844 8000 235<br />

E-mail: securitysales@honeywell.com<br />

ADEPT POWER SOLUTIONS LTD<br />

Adept House, 65 South Way, Walworth Business Park<br />

Andover, Hants SP10 5AF<br />

Tel: 01264 351415 Fax: 01264 351217<br />

Web: www.adeptpower.co.uk<br />

E-mail: sales@adeptpower.co.uk<br />

UPS - UNINTERRUPTIBLE POWER SUPPLIES<br />

INTEGRATED SECURITY SOLUTIONS<br />

INNER RANGE LTD<br />

Units 10 - 11, Theale Lakes Business Park, Moulden Way,<br />

Sulhampstead, Reading, Berkshire RG74GB<br />

Tel: +44(0) 845 470 5000<br />

Fax: +44(0) 845 470 5001<br />

Email: ireurope@innerrange.co.uk<br />

www.innerrange.com<br />

UNINTERRUPTIBLE POWER SUPPLIES LTD<br />

Woodgate, Bartley Wood Business Park<br />

Hook, Hampshire RG27 9XA<br />

Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk<br />

www.upspower.co.uk


SECURITY<br />

LIFE SAFETY EQUIPMENT<br />

INTRUSION DETECTION AND PERIMETER PROTECTION<br />

OPTEX (EUROPE) LTD<br />

Redwall® infrared and laser detectors for CCTV applications<br />

and Fiber SenSys® fibre optic perimeter security<br />

solutions are owned by Optex. Platinum House, Unit<br />

32B Clivemont Road, Cordwallis Industrial Estate,<br />

Maidenhead, Berkshire, SL6 7BZ<br />

Tel: 01628 631000 Fax: 01628 636311<br />

sales@optex-europe.com www.optex-europe.com<br />

C-TEC<br />

Challenge Way, Martland Park,<br />

Wigan WN5 OLD United Kingdom<br />

Tel: +44 (0) 1942 322744<br />

Fax: +44 (0) 1942 829867<br />

Website: www.c-tec.com<br />

PERIMETER SECURITY<br />

INTRUDER AND FIRE PRODUCTS<br />

CQR SECURITY<br />

125 Pasture road, Moreton, Wirral UK CH46 4 TH<br />

Tel: 0151 606 1000 Fax: 0151 606 1122<br />

Email: andyw@cqr.co.uk www.cqr.co.uk<br />

TAKEX EUROPE LTD<br />

Aviary Court, Wade Road, Basingstoke<br />

Hampshire RG24 8PE<br />

Tel: +44 (0) 1256 475555<br />

Fax: +44 (0) 1256 466268<br />

Email: sales@takex.com<br />

Web: www.takex.com<br />

SECURE CONNECTIVITY PROVIDERS<br />

SECURITY SYSTEMS<br />

CSL GROUP<br />

T: +44 (0)1895 474 474<br />

sales@csl-group.com<br />

@CSLDualComLtd<br />

www.csl-group.com<br />

ONLINE SECURITY SUPERMARKET<br />

BOSCH SECURITY SYSTEMS LTD<br />

PO Box 750, Uxbridge, Middlesex UB9 5ZJ<br />

Tel: 0330 1239979<br />

E-mail: uk.securitysystems@bosch.com<br />

Web: uk.boschsecurity.com<br />

EBUYELECTRICAL.COM<br />

Lincoln House, Malcolm Street, Derby DE23 8LT<br />

Tel: 0871 208 1187<br />

www.ebuyelectrical.com


Video – analyse that!<br />

Facit Data Systems is a leading data and video analytics specialist. Facit’s development<br />

team has created a suite of products that help organisations to monitor, count, analyse<br />

and manage customers, visitors and staff in high footfall locations.<br />

Install Facit Analytics over your current CCTV system. Make more of your analytics in<br />

retail, banking, transport, healthcare and the public sector<br />

PeopleCounter QueueManager HeatMap<br />

Capture intelligence for efficiency savings,<br />

competitive advantage and risk management.<br />

Call or book a demo info@facitdatasystems.com<br />

Or visit us at IfSec Stand IF1310, 18-20 June<br />

OBSERVE<br />

I ANALYSE I<br />

ACT<br />

t: +44 (0)3700 424217<br />

w:<br />

facitdatasystems.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!