Security Stories

Library Reference – Security News And Views – Security Stories

S2 Security launches S2 Magic Monitor version 5

Unified security management S2 Security has launched version 5 of S2 Magic Monitor, which brings access control and video surveillance together with forensics, digital signage and real-time data feeds into a unified interface. New features Dynamic cells. Customise Magic Monitor to meet specific operational requirements and program with dynamic content such as interactive floor plans.

Follow events on screen by navigating through between and through various cameras. Supports touch screen-capable, responsive digital signage for general use throughout the enterprise in public areas such as lobbies and cafeterias Enhanced S2 NetBox access control and event monitoring system integration . Userw can view S2 NetBox systems and portals, drag and drop portals into Magic Monitor cells to view access history with photo identification and momentary unlock directly from the portal cell Extra third-party video management system support Now supports video management systems from Avigilon (Control Center 5 and 6), Milestone (2014, 2016 and 2017) and Tyco (exacqVision) S2 Security says Version 5 brings more advances than ever, allowing users to create maps, floor plans and command panels with amazing ease, says John L Moss, CEO of S2 Security. New support for Avigilon and Milestone 2017 video servers makes Magic Monitor a truly universal user interface for video surveillance applications. Availability S2 Security-certified integrators can already download version 5 via S2 Support Central. Visit the website to find out more. About S2 Security S2 Security Corporation specialises in IP-based access control, video management and mobile security management systems.

Products, which include S2 NetBox Series, S2 NetVR Series, S2 Magic Monitor, S2 Global and S2 Mobile Security Officer, are pitched to premises and businesses of all sizes, from small offices to global corporations with multiple sites.

S2 solutions operate on an open platform and support access control, video surveillance, alarm monitoring, temperature monitoring, intercom and digital signage.

Botched software update disables unlocking function on hundreds of smart locks

LockState The demise of the humble mechanical lock and key might be some way off yet. For all the possibilities they open up, so-called smart locks can readily become dumb in several scenarios. Hundreds of people recently discovered that they were unable to open their doors by their usual means when their smart locks were disabled digitally, at least by a botched software update.

Earlier this month LockState issued an update to its 6000i series smart locks that was designed for its later-generation 7000i models. The 6000i locks were subsequently unable to reconnect to the company s web service. As well as the remote locking and unlocking function, the mistake cost users access to remote access, status alerts and keypad entry code-management. The company couldn t even remedy the situation with a remote fix, meaning customers have to return part of the lock for repair turnaround time one week or wait three weeks or longer for delivery of a replacement lock. In a statement, the company attempted some damage limitation by giving owners one free year of access to connected services. Roughly 500 locks have been affected, says LockState. Users had to resort to the time-honoured method of inserting a metal key. Anyone using the locks for Airbnb hosting may be more inconvenienced still. Users of the peer-to-peer accommodation portal can make letting out property easier in theory by recruiting the services of LockState through the Host Assist program.

Around 200 Airbnb hosts are reported to have been affected. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

How evolving terror tactics have driven advances in perimeter security

Many urban threats used to be seen, at least in the eyes of the public, as things that happened on other shores. However, an increase in urban attacks of late has put pressure on security services to come up with innovative solutions that allow business to continue as normal and the public to enjoy some peace of mind. Amid these new threats, coupled with geopolitical fears and the ongoing refugee crisis in Europe, governments are attempting to make borders more secure and event venues and stewards of high-risk public areas are following suit.

With terrorists now using vehicles as weapons, many existing security solutions need reassessing as they are inadequate at preventing vehicular attack. This month marks the anniversary of the Nice attack and similar incidents have occurred since in Berlin, Stockholm and London. The change in tactics has rendered current security provisions outdated. A proactive, preventative approach is now required if security personnel are to put a stop to such incidents. Mitigating risk While no guarantee can be made about the safety of those attending events or conducting their daily lives in high-risk, crowded public areas, perimeter security does provide an increased level of protection and has seen advancements designed to mitigate the risk and impact associated with today s urban threats. Previously seen on military bases, oil and gas fields and other important infrastructure, perimeter security products have become popular for those looking to secure their event and put public safety firmly back on the agenda. Threats are, of course, unpredictable. However, providing a readily-available solution for areas deemed high-risk due to large volumes of the public passing through, including stadiums or other event spaces, can help deter or reduce the impact of vehicular and some other attacks. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany While video cameras and security guards are two of the most common security measures that organisations have in place, they aren t always the most effective.

With hostile events increasing in frequency, there has been a reliance on video surveillance to identify perpetrators and ensure that every angle is covered. However, surveillance cameras are mostly effective when the attack has already happened. There s no doubt that the increased threat level has meant that event organisers and those managing security in high-risk areas have had to look at alternative ways in which they can prevent attacks or reduce their impact. Protecting civilian areas has become a higher priority, with perimeter security generating much interest and innovation. In reaction to the London attacks, Metropolitan Police Commissioner Cressida Dick announced that vehicle barriers were to be installed across London in some form or other. Yet while such reactive measures are of course welcomed, it s imperative that everyone involved in public security should take action in the threat against urban terror. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany, who found that they would be unable to prevent similar attacks. These revelations have prompted the development of barriers that are crash-resistant up to speeds of 50mph and use an anti-climb mesh to prevent further intrusions. As the solutions are flat-packed and can be earth-filled, they are an effective option for event security, minimising installation time and the impact on the surrounding environment.

Units can also be branded, so they remain inconspicuous and in line with an organisation s existing branding. New threats are presenting themselves every day. Organisations and urban spaces are aware they can no longer be just reactive in the wake of a hostile event. Precautionary measures are becoming increasingly advanced and accessible, and where public safety is concerned, you truly cannot put a price on it. Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

West London housing provider is first organisation certified to PAS 7 FRMS standard

fire risk management system A West London housing provider has become the first organisation to have its fire risk management system (FRMS) certified to the PAS 7:2013 standard. RHP Group, which owns and manages around 10,000 homes across Richmond, Hounslow and Kingston, received a FRMS Management System Certificate from MMRA, a member of the Mott MacDonald Group, at a presentation ceremony on 8 August. Many in the fire industry may be heartened that a housing provider should be the first to meet the exacting criteria of PAS 7, given the fire safety deficiencies in social housing exposed by the recent blaze at Grenfell Tower.

MMRA Ltd is the first body to be accredited to assess the PAS 7 standard by UKAS (United Kingdom Accreditation Service) as a third-party certification body. This is a great achievement by RHP in not only having a FRMS which meets the requirements of PAS 7, but also in being the first organisation ever to be awarded this certificate and setting a standard for other organisations to follow, said Paul Bardsley, head of MMRA. Launched in June 2017, the PAS 7 certification scheme which is UKAS-accredited provides guidance that stipulates minimum standards, functions and accessibility of fire safety management information across a corporate entity or multi-site organisation.

A documented FRMS demonstrates that an organisation as taken clear steps to reduce substantially the fire risk to people and assets and to meet its regulatory obligations under the Fire Safety Order. It also provides an auditable trail to back this up. Ben Bradford, managing director at BB7, outlined the merits of PAS 7 in a 2014 article.

Paul Bardsley, head of MMRA (Third from right), presented the certificate to Sara Tutton (third from left), RHP Group Head of Health and safety at a ceremony attended by CEO David Done RHP Group (second from left)

Honeywell to showcase life-safety systems from Xtralis at European and Dubai roadshows

Honeywell is showcasing life-safety systems from Xtralis the company it acquired in 2016 during 12 roadshows across Europe as well as an instalment in Dubai throughout September and October. Xtralis specialises in early warning life safety and security solutions that afford fire and security professionals crucial extra time to mitigate risk and deal with fires and security incidents promptly. Its comprehensive suite of integrated life safety and security solutions are especially popular in challenging or dangerous environments and in the protection of high-value assets.

Register to attend the roadshows . Xtralis products include: VESDA-E The next generation of ASD innivation VESDA Very Early Warning Aspirating Smoke Detection (ASD) VESDA VLI ASD for Industrial Applications VESDA ECO ASD Gas Detection & Environmental Monitoring ICAM Flexible Aspirating Smoke Detection OSID Open-area Smoke Detection ADPRO Perimeter, Multi-site and Enterprise Security Solutions HeiTel Remote Monitoring & CMS Solutions Check out the flier above to find out when and where your nearest roadshow takes place. Register to attend the roadshows .

Turn your employees into human security sensors: Qognify launches Qognify Extend

situational awareness Qognify has launched a range of integrated mobile solutions with which organisations can enhance situational awareness by harnessing field resources and responders. Cloud-based and powered by CloudScann, Qognify Extend effectively extends the reach, coverage and effectiveness of the control room by turning personnel and their smartphones into human sensors. Qognify Extend integrates with Qognify Situator, an open platform, situation management solution, and VisionHub, Qognify s video management system.

It also works as a standalone solution. Qognify Extend triggers incidents automatically in Situator, including textual, visual and geographic information captured by a smartphone. Features Advanced GIS capabilities display map location Video feed from surveillance cameras in area will pop-up and an adaptive response plan , based on organisation s best practices, guides operator actions Connectivity to VisionHub and Qognify s video analytics suite enhances automatic information analysis and takes effective action eg through apprehension of a suspect through Suspect Search. Qognify Extend modules SeeItSendIt: Field personnel can report into control room with their smartphones Live Video Broadcast: Personnel can broadcast live video directly to control room Dispatch : provides operators with simple Computer Aided Dispatch (CAD) functionality, including locating closest guard, suggesting best route to the incident, sending notifications and comments to guards mobile phones. Personal Safety: Personal security features include monitoring an individual s progress along a route, immediate report of distress situations via a panic button, and raising an alert for any failure to arrive safely Qognify VICC (Visual Intelligence Command Center) a desktop application that collects and aggregates information from various mobile applications, presenting it on a map Qognify and CloudScann say We re proud to partner with Qognify, the leader in Situation Management, said Dan Kerning, CEO of CloudScann, a specialist in crowdsourcing, human intelligence and data mining for the enterprise market. . extending to the field is firstly about collecting invaluable information, yet the trick is establishing the link to the control room, and providing a new layer of data and intelligence, allowing operators to act faster to resolve them. Says Moti Shabtai, CEO and president of Qognify: The ubiquitous nature of smartphones together with their range of capabilities, makes them an ideal tool to leverage for improving security, safety and operations. Bringing these into Situator and VisionHub is a no-brainer, as it s the Qognify vision is to provide as many sources of information as possible- smartly. With Qognify Extend, organisations can literally extend coverage, turning personnel and their mobile phones into smart sensors.

Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

Radiation-blocking underwear and 18 other bizarre smart things that could let hackers into your smart home (and one device to protect you)

No object, however mundane, cannot be improved with a computer chip: this seems to be the philosophy driving development of smart things in the smart home arena. It was partly this scattergun approach that prompted Wired magazine to prophesise the demise of the internet of things (IoT) at the start of 2017. Click on the icons in our infographic below to check out 19 of the most bizarre or according to IoT sceptics pointless devices that are creating new vectors of attack for cybercriminals.

Security is little more than an afterthought on too many devices, with criminals able to guess default usernames and passwords by trawling Google. We haven t chosen these 19 devices based on security some may have very rigorous security mechanisms in place. Rather, we chose the most bizarre devices, and paradoxically, in this context, bizarre also means mundane the point being: is a smart hair brush or smart fork really going to deliver benefits that warrant creating new avenues through which hackers could break into your home network? Several products designed to boost IoT security were launched at CES 2017, suggesting the industry is waking up to the threat. We ve included one of them below flagged with a red icon. Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself. Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

Watch: The LPCB Attack Testing Zone at IFSEC 2017

Security doors, perimeter fencing, shutters and covers were subjected to hammers, wire cutters and other handheld tools in the LPCB Attack Testing Zone at IFSEC 2017. The new area, which took place within Borders & Infrastructure Expo itself debuting and is expected to return again for the 2018 show, saw technicians from the LPCB put non-approved products to the test alongside LPCB-approved alternatives that have achieved a minimum of LPS 1175 SR-3 compliance. We ve put together a highlights video, below, from the Attack Testing Zone.

The LPCB Loss Prevention Certification Board was set up by certification body BRE Global. embedded content Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right.

This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

How to use a fire extinguisher safely and effectively

In many occurrences of fire, it s not always safe or practical to try to put it out yourself, so evacuation and calling the fire brigade may be the only option. This is especially the case if the fire is large or spreading, the room is filling with deadly smoke, or there is no fire escape route. But for lesser fires contained in a small space, using a fire extinguisher, if it is safe to do so, can be very effective.

Deploying a fire extinguisher correctly depends on which type it is and on what type of material is on fire. Using the wrong extinguisher is at best ineffective, and at worst could intensify the fire, so ascertain the fuel first and then ensure you have the right type of extinguisher to hand before you tackle the fire. Materials present in the area to be protected from fire in the UK can be divided into six categories of fire involving different substances: Class A , combustible carbon-based solids eg paper, wood or textiles Class B , flammable liquids eg paraffin, petrol, diesel or oil (but not cooking oil) Class C , flammable gases, eg butane, propane or methane Class D , burning metals, eg aluminium, lithium or magnesium Fires caused by electrical equipment (indicated by an electric spark symbol and not the letter E) Class F , fats and cooking oils. The following types of extinguishers can be used to quench the various types of fire: Class A water, water mist, foam, dry powder, wet chemical Class B water mist, foam, dry powder, CO2, some wet chemical Class C water mist, dry powder Class D specialist dry powder Electrical some water mist, some foam, CO2 Class F water mist, wet chemical. General safety principles Familiarise yourself with the extinguisher and how to use it before there is a fire. Most extinguishers include a handle or lever, a hose with a horn or nozzle, a safety pin and seal, a pressure gauge, and the relevant fluid, powder or gas Evacuate everyone else from the building Ascertain the location of your fire exit or escape route Make sure the flames are shorter than you and the fire is contained, eg in a wastepaper basket. Don t stay near the fire or use the extinguisher unless you feel safe to do so Inspect the extinguisher and read the instructions before using it Check it is fully charged or it won t work (the pressure gauge on top should be in the green area. If it s red, the extinguisher has expired) Check the safety pin is not bent or the nozzle clogged or damaged and remove the safety pin to break the tamper seal Use the PASS protocol Pull the pin to unlock the mechanism, Aim the hose at the base of the fire, Squeeze the lever slowly, Sweep the hose from side to side Stand so that your back is towards the nearest exit or escape route never turn your back on a fire Stand between 6 and 8 feet away from the fire, moving closer as it is gradually extinguished. Always aim at the base of the fire Always ensure all areas of the fire are completely out Leave the scene immediately once the extinguisher is discharged and call 999 if the fire isn t completely out Replace or recharge the extinguisher.

Water extinguishers (Class A) First, it is essential to check that there is no live electrical equipment in the area. Then point the hose at the base of the flames and squeeze the lever slowly to discharge the extinguisher. Keep it moving across the area of the fire or move it slowly upwards if the fire is spreading vertically. Make sure that all areas of the fire are out completely. If not, repeat the process or get help. Water mist extinguishers (Classes A, B, C, F and some electrical) The instructions are the same as for water extinguishers, except that some water mist models can be used on electrical equipment up to 1,000 Volts, such as computers and printers. Foam extinguishers (Classes A, B and some electrical) For fires involving solids (A), point the jet at the base of the flames and keep it moving across the area of the fire. For fires involving liquids (B), aim the jet at a vertical surface near the fire, not straight into the liquid, eg in a container, point the jet at the inside edge of the container or a nearby surface above the burning liquid. Allow the foam to build up and flow across the liquid to break the interaction between the flames and the fuel surface.

Dry powder extinguishers (Classes A, B, C, and some D if specialist powder) Point the jet or discharge horn at the base of the flames, driving the fire towards the far edge with a rapid sweeping motion until extinguished. Make sure the fire does not flare up again, as this type of extinguisher does not cool the fire very effectively. Also, make sure you don t inhale the toxic powder, so do not use in an enclosed space. The use of specialist powder extinguishers to tackle burning metals (D) requires a different technique from standard extinguishers. Potential users should be trained in their use. CO2 extinguishers (Class B and electrical) Switch off the power if an electrical fire, if safe to do so. Direct the discharge horn at the base of the flames. Keep the jet moving across the area of the fire until it is suffocated. Be careful your fingers do not freeze to the horn.

Watch for re-ignition of the fire. CO2 extinguishers have a very short discharge time. Wet chemical extinguishers (Class A, F, and some B) These are mainly used to extinguish chip pan fires using animal or vegetable fats. Turn off the heat source if safe to do so. Apply the wet chemical evenly at arm s length above the fire, at least one metre away from the fire, using the extended long applicator or lance in slow, gentle, circular movements, so that the burning fat or oil does not splash out. Spray until its surface changes into a foamy, soapy substance, which acts as a blanket. Use the entire extinguisher to prevent reignition. Potential users should be trained in how to use these extinguishers properly. Other extinction methods Fire blankets.

Turn off the heat source if safe to do so. Pull the tapes to release the blanket from its container. Carefully place the blanket over the fire keeping hands out of the way. Leave to cool. If a person is on fire, wrap the blanket around them. To use hose reels effectively, point the jet at the base of the flames and keep it moving across the area of the fire. Ensure that all areas of the fire are out.

The water or sand in fire buckets should be thrown at the base of the flames, ensuring that all areas of the fire are out.

Finally, if there is no fire extinguisher to hand, and the fire is very small, you could try using a wet cloth or towel or shovelling sand or dirt, if available, onto the fire.

Upcoming FIM Expo to feature BS 5839-1:2017 revisions and future of qualifications in fire detection and alarms

FIA seminars The next FIM Expo will take place on Wednesday 4 October at the Glasgow Science Centre. Organised by the Fire Industry Association (FIA), the annual free event features two fire-safety seminars and the latest life-safety products from leading fire detection and alarm manufacturers. One seminar will explore the implications of revisions to BS 5839-1:2017 ( Fire detection and fire alarm systems for buildings Code of practice for design, installation, commissioning and maintenance of systems in non-domestic premises ).

The other looks at the future of qualifications in fire detection and alarms. Both seminars are CPD-accredited and free to attend. The event is relevant to installers or maintainers of fire detection and alarm systems, anyone managing such systems in commercial premises or architects or other professionals specifying fire protection systems to be installed in buildings. We are absolutely delighted to present FIM Expo, said Kat Schabowska, the event coordinator. It s a fantastic place for like-minded individuals to meet, exchange ideas, network, and learn more about new products from a wide range of manufacturers. New products are being released onto the market all the time and this is a great way to come and see them first-hand and discuss how these new products might work for you. View the full exhibitor list here or visit the events section on the FIA website to register.