Why tethered drones are a boon for surveillance of crowded public events

Why Tethered Drones Are A Boon For Surveillance Of Crowded Public Events

At the end of June last year the Federal Aviation Administration (FAA) implemented significant changes to the regulations and rules governing use in the US of unmanned aircraft systems (UAS), more commonly referred to as drones . This regulatory review was of particular interest to Oncam as we explore the opportunities to provide 360-degree cameras to drone manufacturers so they can offer additional security measures during large events. Commercial drone operations, such as the use of tethered drones, promote safety and security by allowing aerial coverage of high-attendance events such as sporting events, marathons, protests, parades and festivals.

Tethered drones use a small wire extending up to 500 feet that connects the drone to the ground. Tethered drones versus wireless drones The advantages of a tethered drone as opposed to a wireless drone is a constant connection to a power source, providing no limitations on the length of time the drone can stay in the air. This type of tethering technology can also provide greater bandwidth and, with that, much better video quality compared to wireless drones. Previous regulations burdened commercial drone users with strict restrictions on use and operability. Section 333 of the FAA Modernization and Reform Act of 2012 required special authority to operate UAS. New rules introduced in June under Part 107 enable the use of commercial drones without having to apply for a 333 exemption, thus streamlining the waiver process. Under Part 107, requirements for commercial drone flights are greatly reduced. Operators must now pass an aeronautical knowledge test and a background check to earn a remote pilot certificate. Although the FAA is demonstrating increased flexibility than traditional safety rules, with an influx of waiver requests, the agency will be forced to explore and define safety issues.

Many in the industry still criticize the lack of changes to the beyond-visual-line-of-sight drone regulations, voicing their discontent for ineffective restrictions on long-distance usage. The FAA remains concerned by risks posed by weather conditions, airspace and manned aircrafts, and location of people. With the drone industry booming, the future is sure to see further changes in regulations as the authorities scramble to keep pace with technological changes. Many security manufacturers are embracing advancements in drone surveillance capabilities as a means to grow situational awareness and safety for events, offering safe city applications for police departments and security personnel. IFSEC International is launching Borders and Infrastructure Expo, which will include the Drone Zone, for its 2017 edition.

Find out more about this new show within a show dedicated to the protection of borders and critical national infrastructure Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Applying deep learning to cyber security: Q&A with Deep Instinct CEO Guy Caspi

Applying Deep Learning To Cyber Security: Q&A With Deep Instinct CEO Guy Caspi

Deep Instinct is the first company to apply deep learning to cyber security. Guy Caspi, the Israel-founded company s CEO, spoke to SecuritySolutionsWatch.com about the complexities of deep learning and how Deep Instinct spotted a gap in the ballooning market for combating cyber security threats. This interview was originally published on SecuritySolutionsWatch.com.

SecuritySolutionsWatch.com: Before discussing today s cyber security threat environment and Deep Instinct solutions in greater detail, please tell us about your background and company history? Guy Caspi: I ve utilised my advanced degrees in Mathematics, Machine Learning and Business to apply mathematics and machine learning in a technology elite unit of the Israel Defense Forces (IDF), as well as in financial institutions and intelligence organizations around the world. Over the past two decades, I ve led some of the largest government cyber and big data projects in Israel and other countries. Founded in 2014, and out of stealth mode since November 2015, Deep Instinct is the first company to apply deep learning to cyber security. With offices in Tel Aviv, Israel and in North America, we now have 65 employees. Our company has a winning combination of people who have the academic knowledge and credentials, paired with unique experiences in cyber security gained through years in the intelligence and elite units that focused on cyber- attacks. We adopt the mindset of hackers in order to be prepared for all vulnerabilities. In addition, Deep Instinct s dedicated deep learning research group is headed by one of the leading researchers in the field of computational intelligence. Moreover, the company has a highly-experienced management team that leverages its cyber security and academic backgrounds to carry out a successful product that offers an effective solution to address a critical need in the industry.

SecuritySolutionsWatch.com: Your site claims that Deep Instinct is The first company to apply deep learning to cyber security . Please give us an overview of how Deep Instinct works. GC: Deep Instinct s core technology is deep learning, which is an advanced branch of artificial intelligence (AI). Deep learning is inspired by the brain s ability to learn: once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. Deep learning has exhibited groundbreaking results when applied to computer vision, speech, and text understanding and we are the first company to apply it to the cyber security domain. In cyber security, there a big need for solutions that can protect against brand new (zero-day) threats in real-time a critical issue that causes great vulnerabilities to almost every business. Deep learning is complex and its application has a very high barrier entry because the neural networks are comprised of tens of hundreds of layers and the mathematics required to create such layers is extremely difficult. Even once this hurdle is passed, the implementation of running massive data sets using GPUs (Graphic User Interface) is not an easy feat.

Moreover, creating a deep learning-based technology that can run as an on-device client requires great expertise that raises the bar even higher. The few companies that have demonstrated these capabilities have mostly been acquired by giants, such as Google, Facebook and Salesforce. Furthermore, Deep Instinct does not use open source deep learning libraries but instead, has created its own. SecuritySolutionsWatch.com: What are the major benefits with respect to detection, prevention, accuracy, ease of deployment and other features. Guy Caspi: Deep Instinct offers a unique solution of prevention, which includes blocking malware before it is activated and can cause harm. Many new solutions on the market can only offer detection and prevention once the business has been infected, but we can detect and prevent before any damage occurs. By way of analogy, if a business were a person and the malicious attack were poison, other cyber security vendors need the person to first touch the poisonous object to then they can act and prevent the poison from spreading throughout the body. From Deep Instinct s perspective, we can tell the person not to touch the poisonous object in the first place because we immediately identified it as harmful. Moreover, Deep Instinct focuses on unknown threats and APT (Advanced Persistent Threat) attacks whether they are in a file-less manner or already existing in the system.

Instead of waiting for the next unexpected attack, the next unknown attack is identified and blocked in real-time before any harm can occur. The ability to offer immediate prevention extends beyond a network or Internet connection by covering the device even when it is not connected to them. Furthermore, our detection rates are substantially higher that existing solutions on the market. This unprecedented accuracy in predicting unknown cyber threats is enabled by the application of proprietary deep learning algorithms. Deep learning s capabilities of identifying malware from any data source results in comprehensive protection on any device, platform, and operating system, filling in gaps by providing complete solutions. Finally, deployment is fast and seamless and the solution s operations do not affect the user experience. Click here to read the full interview on SecuritySolutionsWatch.com Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

HM Prison Norwich – Official Site

HM Prison Norwich - Official Site

HMP Norwich predominantly serves the Courts of Norfolk and Suffolk. The prison has occupied its current site overlooking the city of Norwich since 1887. The site consists of ten wings and a Special Care Unit:

A: Induction unit, First Night Centre, IDTS stabilisation and maintenance;
B&C: Local prison housing remand and trial prisoners plus Rule 45 Vulnerable prisoners;
D: Resettlement Unit housing Cat D prisoners (also known as Britannia House);
E: Older prisoners unit, providing a mature enviroment for Norwich prisoners prior to onward transfer.
F&G: Local Discharge Unit (LDU) housing low-risk Cat C prisoners, local to the East of England, serving 24 months or less;
H: Type 3 Healthcare unit (also serving HMP Wayland & HMP Blundeston);
L: Elderly Lifer Unit.
M: Cat C prisoners serving 24 months or less.
U: Special Care & Segregation Unit (also known as Kett’s Unit). Address:
The Governor
Knox Road
Norwich
Norfolk
NR1 4LU Tel: 01603 708 600
Fax: 01603 708 601

Governor: Will Styles Accommodation: HMP Norwich has a majority of single cells, with shared accommodation available across the establishment. Operational Capacity: 769 as of 26th July 2013

Reception Criteria: Normal reception arrangements.

HMP Norwich accepts male prisoners (Adult men & Young Offenders) whether convicted (Cat B, C or D) or on remand.

Internet of things bubble will burst in 2017, predicts Wired Magazine

Internet Of Things Bubble Will Burst In 2017, Predicts Wired Magazine

IoT trends Wired magazine has prophesied the demise of the internet of things (IoT) in 2017. As predictions go it s pretty bold given sales of internet-connected devices already number 12 billion worldwide and are projected to grow to about 30 billion by 2020. On the face of it, the tech bible has really stuck its neck out on this one.

Except Wired hasn t actually forecast the demise of internet-connected devices per se ; rather, it s the IoT term itself it believes is on borrowed time, along with an assumption associated with it: that no object, however mundane, cannot be improved with a computer chip. The Internet of Things was a made-up term to begin with, says the article in question. And now this bit of marketing nonsense carries a sheen of ineptitude, danger, and other shit. The upshot: the term will die in 2017, kinda like Big Data before it. Visitors to CES 2017 in Las Vegas test out some VR headsets The success of a Twitter account called the Internet of Shit, which tweets disparagingly about the myriad IoT devices being launched to more than 100,000 followers, augurs ill for the IoT, says Wired. To test out just how widely the IoT concept was being applied to everyday things , I drew up a list of the most mundane objects I could think of and Googled them with the prefix smart . Of the seven I Googled, four had already been enhanced with a computer chip and Wi-Fi connection (in the IoT camp: toilet roll holder, duvet cover, cushion and mirror; still stuck in the analogue age are sofas, breadbins and shoehorns). Yeah baby shove my smartphone in a 20lb bottle of water with a speaker or whatever #CES2017 pic.twitter.com/4yjkvXPPR6 Internet of Shit (@internetofshit) January 7, 2017 The other problem and one exacerbated by the sheer volume and range of IoT products is the cyber threat. If the media has played its part in hyping up the IoT, then it will also play a key role in facilitating its decline thanks to the slew of stories about the security risks posed by connecting your home.

Long focusing their fire on corporations albeit it s consumer data that is usually stolen tech writers and security experts are now warning of a frightening new spectre: that criminals will turn their attention to smart homes that lack the enterprise-grade security enjoyed by Fortune 500 companies (which is still shown to be lacking in so many cases). Wired noted that in September, nearly 1.5 million IoT devices (mostly surveillance cameras) were hijacked and that the following month, the same piece of malware rendered large swaths of the internet inaccessible to many people. The IoT has also been damaged by bricked devices, irritating outages, bankrupt startups, an international emissions testing scandal, and a viral story about a Brit who spent 11 hours trying make tea with a needlessly high-tech kettle. Aware of this perception the IoT industry has been scrambling to remedy vulnerabilities such as the widespread use of default usernames and passwords that hackers can easily find by trawling Google. At CES 2017 Symantec Norton unveiled what it claims is the most secure router in the world and is certainly one of the most aesthetically interesting. A geodesic orb, it looks like it could be an object of portentous power in a sci-fi fantasy film. Symantec Norton s Core Router Securifi, meanwhile, launched a mobile app that highlights vulnerabilities like easy to guess passwords or open ports and shows users how to remedy them. The next-generation of Bitdefender BOX was launched in Las Vegas too. Bitdefender s IoT security hardware protects against malware, hackers, ransomware, phishing and other online threats with data anonymization, malware scanning, machine-learning algorithms and network intrusion prevention technology.

Clearly, the IoT has been on the well-worn path followed by so many tech crazes. First, there s a lot of hype, but also considerable teething troubles where products malfunction or work less effectively than promised. Developers don t yet know what customers want from the tech, so there s a lot of trial and error and dud technology (that people later mock with the benefit of hindsight). Eventually, issues around usability and compatibility and cyber security will be remedied to a large degree and a clearer picture will emerge of what the IoT or whatever it is called by that time is for and what kinds of things can really benefit from internet connectivity. As Wired writes: The Internet of Things or whatever you want to call it has the potential to save precious resources, spot and fight pollution, and help people lead healthier, safer lives. But adding internet remote control to every single product on the market won t necessarily help us get there. What we need are thoughtful, affordable, durable devices that actually, y know, make our lives better. A new name, and a renewed sense of purpose, could be just what the Internet of Things needs. Click here to read the original feature in Wired, which also makes another four tech predictions for 2017.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

BAFE scheme revamp on fire extinguisher maintenance now open to consultation

BAFE invited feedback on proposed changes to the SP101/ST104 scheme, which pertains to the competence of technicians who maintain fire extinguishers. In April 2016, after a lengthy consultation period and with the agreement of its board and council, BAFE launched a major review of the scheme (full title: Contract Maintenance of Portable Fire Extinguishers incorporating Registered Fire Extinguisher Service Technicians). Emerging from the review is SP101:2017 (Competency of Portable Fire Extinguisher Organisations and Technicians), a ground up revision of the SP101/ST104 scheme.

The new incarnation says companies have an obligation to ensure technicians are skilled and remain skilled in executing competent extinguisher maintenance. Changes are also proposed to company QA requirements with a dual option of ISO9001:15 or a certificated quality management system. The revamped scheme is now open to public comment and BAFE has invited feedback on the proposed changes. Click here to find out more and download the SP101:2017 scheme document in full please visit the BAFE website. The consultation opened on 9 January and runs until 6 March 2017. Free download covering legal requirements for responsible persons under the FSO, courtesy of the IOSH, BIFM and USHA approved UK provider of health, safety and environmental information. Key features: A full breakdown of the Regulatory Reform (Fire Safety) Order 2005 The key actions when dealing with fire precautions & protection A complete guide to maintaining procedures and requirements within your organisation.

Download now

Hanwha Techwin s MD on the most powerful DSP chipset ever and exacting password standards to ward off hackers

Hanwha Techwin  S MD On The  Most Powerful DSP Chipset Ever  And Exacting Password Standards To Ward Off Hackers

Hanwha Techwin Europe MD Bob (H.Y.) Hwang Ph.D reflects on an eventful year for the company that began 2016 as Samsung Techwin, as well as setting out 2017 priorities around cyber security and upcoming product launches. IFSEC Global: Bob, what would you say is your most significant achievement during 2016? Bob Hwang: Despite fierce competition, we have continued to increase our share of the market and build on the excellent relationships we have with installers and systems integrators, as well as with our business and technology partners.

We are proud to have done so whilst at the same time rebranding our company name from Samsung Techwin to Hanwha Techwin. IG: To what would you attribute this success? BH: We ve continued to lead the market with the introduction of affordable and innovative video surveillance solutions such as our high definition open platform Samsung Wisenet-branded cameras, which are assisting installers and systems integrators to generate new business opportunities beyond the traditional security sector. The power of the DSP chipsets built into the latest generation of Samsung Wisenet branded cameras has provided opportunities to run on-board Apps which deliver additional real-life practical benefits. With these open platform cameras, end-users have the freedom and flexibility to choose edge based video analytics which best matches their individual requirements. IG: What products did you launch last year? BH: Our WiseNet HD+ camera and DVR range have been very popular with end-users who would like to benefit from being able to capture and record Full HD 1080p images, but are not yet ready to migrate from analogue to an IP network based video surveillance solution. There has also been much interest shown in our updated version of Smart Security Manager (SSM) Enterprise video management software. This powerful software platform is designed to maximise the efficiency of Wisenet IP network cameras, recording devices and servers, whilst facilitating integration with third party systems such as intruder alarms, fire detection, Access Control and ANPR (vehicle number plate recognition), to offer a fully integrated security system.

The most significant product developments for us during 2016 has been the launch of our new Wisenet Q series with Full HD 2MP and 4MP cameras, as well as Wisenet P 4K (12MP) cameras. These all feature H.265 compression and WiseStream, a complementary compression technology, unique to Hanwha Techwin, which dynamically controls encoding, balancing quality and compression according to movement in the image. When WiseStream is combined with H.265 compression, bandwidth efficiency is improved by up to 75% compared to current H.264 technology. As a result, our Wisenet P and Wisenet Q cameras are among the most bandwidth friendly cameras available. IG: Has there been any significant challenges in changing your company name, bearing in mind that the Samsung Techwin brand was so well established? BH: We appreciated the familiarity the market had with the Samsung name and the trust they placed in it, and so we knew that the transition had to be carefully managed with our customers being kept informed every step of the way. In reality, on a day-to-day basis customers will have noticed very little difference because nothing has fundamentally changed. Our products are being designed and produced by the same talented people in the same factories as they have always been. The products are being sold and technically supported by the same enthusiastic, professional pre- and post-sales teams as before.

IG: What has been the impact of having a new parent company? BH: For those of us working within the Hanwha Techwin Europe team, it has been a fantastic development. The Hanwha Group totally supports our strategy of endeavouring to stand out in an overcrowded, competitive market by having a brand that can be trusted. The Hanwha Group understands what it takes to succeed in the B2B arena and we have been re-energised by its enthusiasm for what we are trying to achieve. IG: You have mentioned trust several times. Can you explain what trust means to Hanwha Techwin? BH: Nothing is more important to us than having satisfied customers who have trust in the Samsung Wisenet brand, but this will mean something different depending on where you are within the video surveillance supply chain. We know offering Best in Class products is not enough, even if they are equipped with unique, leading edge technology and offer superb value, maximum ROI and a low total cost of ownership. We need to provide a complete package, as well as peace of mind, which comes with product reliability, the highest levels of pre and post-sales support and the benefits of working closely business and technology partners.

IG: How do you establish trust with end-users? BH: One obvious way is to ensure their video surveillance systems are secure. We are constantly reviewing how Samsung Wisenet cameras, recording devices and software are equipped to minimise the threat from cyber attacks. Recent high profile incidents have highlighted how some manufacturers cameras can be hacked into via the back door in order to gain access to the images captured by the camera, or even as a way into an organisation s network infrastructure in order to steal confidential information or commit sabotage. The firmware of our cameras incorporate what is considered best practice in respect of the reasonable measures that can be taken to prevent unauthorised access to images and data. It is important not to be complacent and so we are constantly monitoring and testing the latest methods of hacking in field tests and our laboratories. When necessary, we release new firmware to counter new threats. In addition, whilst we appreciate that security protocols need to be flexible and easy to implement, we have introduced minimum mandatory and auto-enforced standards in respect of passwords. IG: You provide your video surveillance solutions via a distribution network; so how do you get installers and systems integrators to trust your brand?

BH: For installers and systems integrators, trust is built in many ways. Providing robust and reliable products backed with a three year warranty creates peace of mind. Trust is also established by offering an Advance Replacement service so that if a product develops a fault during in the first year of its three year warranty, a replacement will be dispatched to a specified address within 48 hours of the request. If you are part of the Hanwha Techwin STEP partnership programme, there is the additional benefit of being able to take advantage of the Advance Replacement service for up to two years of a product s three year warranty. Whenever we introduce a new camera series, consultants, system designers, specifiers, installers, systems integrators and end-users can trust Hanwha Techwin to always offer a comprehensive choice of models with the same technical specifications and performance levels. We know that many manufacturers fail to do this and it is extremely frustrating to find out that the cameras within a range, e.g.

2MP or 4MP, are not consistent in terms of their specifications and their ability to collectively offer an ideal solution for any camera location or application. IG: What does 2017 hold for Hanwha Techwin? BH: I am confident we will have a brilliantly bright and successful 2017 and beyond. We intend to have the upcoming new Wisenet X cameras and domes which are supercharged by the most powerful DSP chipset ever incorporated into a camera. The chip s all new architecture includes a high performance core that enables faster processing of video and optional on-board Applications. Most importantly, the ongoing investment in our future by the Hanwha Group means that we will be able to continue to expand our highly talented and enthusiastic pre and post sales teams in line with demand.

We are determined to excel in everything we do and we will move forward by listening, innovating and thinking outside of box. Whilst doing so and with the help of our dedicated and talented colleagues, we will look to work even more closely with our customers so that we are constantly tuned into their needs. Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

5 fire-safety innovations showcased at CES 2017

5 Fire-safety Innovations Showcased At CES 2017

A hearing aid that connects to smoke alarms via Wi-Fi (image above) and a smart oven that turns itself off to cut fire risk were among the innovations on show at the world s biggest consumer electronics event.

1. HomeKit-enabled smoke alarm can turn on lights as well as audio signal The HomeKit-compatible smart smoke alarm from Netatmo activates an 85-decibel chime when it detects smoke. Real-time smoke alert notifications are sent to paired smartphones, whether the homeowner is at home or not.

Unveiled at CES 2017 the alarm s most intriguing feature is the configuration of scenarios made possible by compatibility with HomeKit the software interface that links iPhones with smart-home appliances. Users could, for example, configure their phone to switch on all smart lights in the house as well as triggering an audio alarm. Otherwise, the alarm s features mirror those seen on competitor products from Nest, Halo and First Alert. An alert is sent when the battery is approaching the end of its lifetime but given this is supposedly a full 10 years there s a strong chance you ll have replaced the device with a more sophisticated model by then. The alarm performs regular battery and performance tests, generating self-check reports on the user s app. Netatmo s alarm is also sophisticated enough to distinguish between smoke from a fire and smoke from burnt toast or another false trigger. Using the Netatmo Security app users can silence the alarm with the Bluetooth LE hush feature and check its status on an integrated LED strip positioned on the front of the alarm. Another Netatmo product was credited with preventing tragedy following a house fire and it wasn t a smoke alarm.

2. Hearing aids that connect to IoT smoke alarms Oticon showcased a remarkable new hearing aid in Las Vegas.

Launched in June 2016 Opn (see image at top of page) is the world s first smart hearing aid that connects directly to internet of things (IoT) devices, including smart smoke alarms. The hearing aids, which could also link to things like smart doorbells or TVs, can receive signals direct from alarms and turn down competing background sounds so the alarm is unmistakable and unignorable. Oticon s Opn connects to the web via IFTTT, which in theory makes it compatible with any IoT device. Opn, which can be customised to the person s skin tone or tastes, is particularly invaluable in noisy environments, given that hearing loss often makes it difficult to separate individual sounds and their sources from a cacophony of noise. The smart hearing aids use machine learning to recognise voices through frequency ranges and patterns and turn the volume down on other background sounds. The specific sound profile can be acutely tailored to only address the areas of hearing loss they suffer from. Oticon Opn triumphed in the 2017 CES Innovations Awards in two categories: Tech for a Better World and Wearable Technologies. A Velox sound processor powers Oticon s proprietary BrainHearing technology. embedded content 3.

Oven that prevents fires and false alarms from GE Appliances GE Appliances collaborated with Nest Protect so that the latter s smart smoke alarms can be integrated with the former s ovens. The detector, which also detects carbon monoxide, sounds an alarm and sends notifications to the user s smartphone when the oven has been deactivated. Cooking should be an enjoyable experience, but we know that sometimes there are mishaps in the kitchen, said Paul Surowiec, vice president for cooking products at GE Appliances. Our integration with Nest Protect helps us ensure that our connected oven owners are safer when cooking, especially when the oven is left unattended. Nest Protect features a split-spectrum sensor that uses two wavelengths of light to distinguish between fast- and slow-burning fires. Residents can remotely silence an alarm using the app silence function, even when not at home. From their smartphone they can also conduct safety checkups on sensors, Wi-Fi connection, horn and speaker. Find out more about this innovation.

4. Airthings Wave detects deadly radon gas Airthings Wave alerts householders to the presence of a gas which is believed to be the leading cause of lung cancer among non-smokers.

Tens of thousands of deaths globally are attributed to radon, including 21,000 Americans more than six times the number of deaths attributed annually to house fires and carbon monoxide poisoning combined. Until now tests for radon usually involve charcoal canisters, which take a snapshot of radon levels and only provide results after samples have been sent for analysis in a lab. The constant, real-time monitoring offered by Airthings Wave represents a meaningful advance given that radon levels fluctuate depending on climate, ventilation levels and time of year, among other factors. The rise of the internet of things (IoT) has emboldened Airthings to believe that radon monitoring could and should become as affordable and commonplace as smoke detection. Find out more about this innovation.

5. Norton Cure IOT router OK, so we re cheating a bit here: it s not a fire safety innovation as such. But bear with us. Anything connected to the internet can conceivably be hacked and that includes smart smoke alarms. Therefore safeguarding your Wi-Fi network and attached devices against the nefarious intrusions of cybercriminals is wise.

Of course, you could draw the conclusion that the cyber risk which you can never 100% eliminate means that you ll stick to your analogue smoke alarm thank you very much. If you do want to go smart, then you may be interested in Symantec Norton s new product, which it claims is the most secure router in the world. If that s the most relevant insight about the product if the claim stands up to scrutiny then the most fascinating one to non-technophiles at any rate is surely its appearance. A geodesic orb, it looks like it could be an object of portentous power in a sci-fi fantasy film. One might presume that the shape is purely aesthetic. Not so, according to Symantec Norton. The antenna is apparently inspired by defense and weather radars for better wireless coverage. The Core will inspect every packet of data for known malware and will automatically quarantine any device running firmware known to be a security risk. It s powerful too, boasting a 1.7GHz dual-core chip processor and 802.11ac Wi-Fi broadcasting on both 5GHz and 2.4GHz bands, with a maximum throughput of 2,500Mbps.

Free download covering legal requirements for responsible persons under the FSO, courtesy of the IOSH, BIFM and USHA approved UK provider of health, safety and environmental information.

Key features: A full breakdown of the Regulatory Reform (Fire Safety) Order 2005 The key actions when dealing with fire precautions & protection A complete guide to maintaining procedures and requirements within your organisation.

Download now

UKradon – Introduction

In this section you will find everything you need to know about radon. It covers what radon is, the health risks, maps of radon affected areas and many other topics. You can also view our 60 second overview animation about radon ‘a beginners guide to radon’.

How to become a security guard in the UK

How To Become A Security Guard In The UK

Careers The global physical security market is growing fast! According to a report by MarketsandMarkets, the sector will be worth a whopping $105.26bn ( 85.70bn) by 2020. And that means that there will be an ongoing demand for first rate security officers and guards.

But not everyone is suited to a career in security. To be an effective security officer, you must have reasonable level of physical strength and fitness, patience, strong powers of observation and the ability to make decisions quickly. Additionally, you will need a keen sense of curiosity and demonstrable nerve since, ultimately, it will be up to you to spot suspicious activity and deter or detain anyone with a criminal agenda. Skills needed Throughout their careers, security officers often find themselves working in a wide range of roles with organisations in diverse sectors. For example, at different times, you may work at an airport, a hospital or a nightclub, or you may be responsible for securely transporting valuables or protecting a VIP (bodyguarding). Because of the varied nature of the security roles, you will have to be a fast-learner and able to adapt to radically different situations quickly. That said, there are some skills that are required for every security role. These include: Confidence and ability to deal with confrontational people Initiative and the ability to make quick decisions Trustworthiness and a polite manner Basic IT skills Good verbal and written skills Teamworking and the ability to follow instructions A good understanding of people and an ability to relate to people from all walks of life The ability to learn how to use technical equipment (such as CCTV and baggage scanners) In addition, a driving license as well as first aid, self-defence and fire training will help set you apart from the crowd. If this sounds like you, the next thing you need to do is get licensed.

SIA licensing In the UK, the SIA (Security Industry Authority) is responsible for regulating the private security industry. The SIA has two main duties: to license individuals undertaking designated activities within the private security industry, and to manage the Approved Contractor Scheme which measures private security suppliers against independently assessed criteria. (I m proud to say that Churchill Security is in the top 10 present of ACS contractors). An SIA licence confirms that you are a fit and proper person capable of fulfilling a security role, and is usually awarded within 25 working days of applying. To attain an SIA license, you ll need to be aged 18 or above and able to pass identity and criminal record checks. However, if you have a criminal record, you re not automatically disqualified from security guard work. The SIA will decide whether an offence should or shouldn t prohibit someone from entering the industry. You can use the SIA s free criminal record indicator to see whether you re likely to pass the criminality criteria. Career path and progression Once you land your first role, you can start working toward other security qualifications, such as: NVQ in Providing Security Services, City & Guilds Certificate for Security Guards or Security Practitioners, or the Skills for Security training course. These make it possible to advance to more senior and supervisory roles, such as security team leader and chief security officer.

With further qualifications, you will also be able to go into security training or management. Once you have enough experience under your belt, you may choose to apply your skills as a police officer, in a logistics role or in fraud prevention. Alternatively, you may decide to set up your own security company and specialise in providing your favourite security service (for example security dogs or access control). Security officers live exciting and varied lives, and there are an increasing number of opportunities at all levels for security professionals working in the UK. To see the positions we re currently hiring for, visit Churchill Security s jobs page.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

The smart buildings report 2017: installed base, benefits and challenges, cyber threat and barriers to adoption

The Smart Buildings Report 2017: Installed Base, Benefits And Challenges, Cyber Threat And Barriers To Adoption

IFSEC Global recently polled hundreds of professionals involved in the building supply chain and management of commercial premises to understand the changing smart building landscape. You can now discover the fascinating results by downloading this report. Simply complete the short form and the report will download automatically.

The report yields insights like: Half of those surveyed said they classified their building systems as smart Of those who did not regard their building systems as smart , 46% said that they expected smart functionality to be introduced within the next 12-24 months Of those who did classify their building as smart, 70% felt that there was room for improvement Solving issues related to data privacy, security and interoperability of devices with wireless protocols is the key to surpassing the smart building industry s IoT expectations. Frost & Sullivan With the internet of thing gaining traction by the day, remarkable advances are being made in the world of building control. Truly smart buildings and defining what that actually means accounts for one of the report s chapter can now make a measurable difference to a company s culture, environmental footprint and bottom line. The smart buildings report 2017 includes the following chapters: What exactly is the difference between intelligent and smart ? It s all about data and analytics Installed based and perceived benefits Challenges/barriers to adoption Cyber security Conclusion To download the The smart buildings report 2017 , simply complete the short form and a PDF will download automatically.