business

Key Holding | IQ Fire & Security

IQ Fire & Security Keyholding provides a professional Keyholding and Alarm Response service, giving our clients the peace of mind that their home and business properties are safe wherever they may be. As well as responding to emergency alarm activations, our experienced Key Guards can visit the property on request and stay on site for as long as necessary.

Locked out? IQ can access you to your property and even arrange replacement locks or cylinders to be fitted should they be required. Our services include (but are not limited to) response to:

  • Burglar Alarm and Fire Alarm activations
  • Gas leaks, floods, electricity problems
  • Security Presence
  • Locked out, Keys Lost, Forgotten or Stolen
  • Pet feeding/plant watering while you re away
  • Key duplication

Affordable peace of mind

With IQ Keyholding complete peace of mind is surprisingly affordable. Professional keyholding services are often seen as an optional luxury with a price tag to match. Our philosophy is the exact opposite!

Our clients agree that our services are an invaluable necessity for everyday living but come at everyday prices. As an added bonus, we offer discounts for multiple sites and a variety of price packages to suit your required level of cover. Contact us for more information about our price packages and how we can help secure your business or residential property.

Corps Security is a provider of manned guarding services

Our professional guards are all Security Industry Authority (SIA) licensed and have completed extensive in-house manned guarding training to the highest industry standards. This means that customers receive a level of service that always meets their exact requirements. With the sole objective of protecting people, property, assets and general business interests in the most effective manner possible, we value our people and the skills they offer an ethos that means we enjoy industry leading staff retention rates.

We also deploy highly experienced duty managers who are capable of directing effective operational delivery on a 24/7 basis.

Just as importantly, every one of our teams is backed-up by appropriately trained reservists, ensuring that service standards are fully maintained during any periods of holiday or sickness.

These principles are enshrined in our Customer Charter, which is based around the acronym PRIDE proactivity, reliability, integrity, delivery and enthusiasm.

It details how we will regularly review and improve our service; be enthusiastic, trustworthy, honest and ethical; and conduct our business in a way that is as transparent as possible.

By appointing Corps Security, you will be entrusting the most important aspect of your security operation to the world s most experienced and well-respected manned guarding services provider.

The value of cyber risk assessments and how to reinforce your soft underbelly: your employees

Headlines revealing the latest cyber-attack have cropped up with concerning regularity in 2017. It will therefore come as little surprise to learn that the latest institutions to be found wanting in the cybersecurity department are universities, as reported recently in The Times . Following a Freedom of Information request, the paper discovered that the number of attacks experienced by leading universities has almost doubled in the past two years, with advances in military and energy technology being particularly targeted.

The director of cybersecurity research at the University of Warwick was reported as saying that lax cybersecurity was a problem at many universities. Another security expert claimed this was due to their use of open networks, insufficient investment in both software and staff to monitor security, and the difficulty of managing a range of different networks. While universities are an obvious target for cyber-attacks (many of which appear to be sponsored by nation states) due to their rich seam of research data and inadequate defences, every business should be aware of the damage cybercriminals can inflict by disrupting their operations. The ransomware attack on a range of organisations (including the NHS) demonstrated this only too clearly earlier this year. Protecting your networks from cyber-attacks Cybercriminals are always looking for the chink in the armour so every business must take cybersecurity seriously to avoid becoming a victim. The first step is to carry out a risk assessment to establish what personal data and other confidential data the company holds and how it is used, transmitted and stored. Once you have identified any weak spots where cybercrime poses a particular risk, the next step is to implement security measures to protect your networks from cyber-attacks. Employees are a weak spot It is right to acknowledge that one of your major weak spots is likely to be your employees. You need to put clear procedures in place, encapsulated in a company policy, to deal with the risk of cybercrime.

And all staff should be trained on what steps they can/should take to prevent it. You can insist that any memory sticks, tablets or mobile phones used by employees outside the workplace must be scanned before using them on company network systems. Indeed, you might even consider whether every employee should have permission to use portable media. Companies should bear in mind the reputational damage it might suffer if found to be excessively monitoring employees You can consider taking out insurance or engaging a third party to manage your cybersecurity where the risk of attack is high or the implications particularly severe. Employees use of social media can also compromise your cybersecurity unless you have a clear social media policy that sets out limits to social media use in the workplace. This is particularly relevant where employees work with, or have access to, sensitive information. Individuals right to privacy versus security Naturally, there are implications for companies which need to monitor and store employee information or data. Any such monitoring must be proportionate and carried out in accordance with the Data Protection Act 1998. Individuals rights regarding their data will be further strengthened by the introduction of the General Data Protection Regulation (GDPR) in May 2018.

The Employment Practices Code contains further guidance for businesses on monitoring employees at work. You need to inform employees that they may be monitored and it may be necessary to seek employees express consent in cases where employee communications are being intercepted. Failure to do so could mean a business facing a claim for damages from the sender, recipient or intended recipient of the communication. Employees also have a right to privacy under the Human Rights Act 1998. An employee can bring a claim for unfair dismissal where they believe their dismissal was based on evidence gathered about them through their employer s monitoring equipment that interfered with their right to privacy. Companies should also bear in mind the unquantifiable reputational damage that it might suffer if it is found to be excessively monitoring its employees. All businesses can be badly affected The bottom line, as university cybersecurity chiefs will attest, is to: Carry out a risk assessment Invest in security measures to keep your networks safe Train your staff to understand the risks to the business from cybercriminals Put clear policies in place so everyone knows what they can and cannot do in relation to portable devices and social media use Although cybercrime poses a particularly virulent threat to high-tech research, development and manufacturing organisations, everyone needs to be aware that a cyber-attack can have very serious financial implications for any business. Free Download: the CyberSecurity Crashcourse Are you even aware if you have been the victim of a cybersecurity breach? This report will help you to find out and protect yourself, Eric Hansleman from 451 Research presents a rapid-fire overview of cybersecurity , because a firewall just won t do, you need multi-layered defences to truly protect your data.

Click here to download now Related Topics How to follow up sales leads following IFSEC and FIREX International How content marketing is boosting web traffic and engagement in the security industry Many engineers are far more valuable than their managers and their salaries should reflect this

Security Company Norwich

Horizon Security – Norwich Security Company

The Horizon Security Norwich Security Company is based at the Bank Plain at The Royal Building. Horizon Security possesses a reputation for excellence in security services within all areas of the security sector. Our national coverage is managed via our regional offices in Birmingham1, Bristol2, Leeds3, Maidstone4, Milton Keynes5, Newcastle6, Norwich7 and Nottingham8.

The Horizon Security national head office9 is based in Stratford, East London.

Horizon Security – Norwich Security Company Details:

Security Company Norwich
View Larger Map10

References

  1. ^ Security Company Birmingham (www.horizon-security.co.uk)
  2. ^ Security Company Bristol (www.horizon-security.co.uk)
  3. ^ Security Company Leeds (www.horizon-security.co.uk)
  4. ^ Security Company Maidstone (www.horizon-security.co.uk)
  5. ^ Security Company Milton Keynes (www.horizon-security.co.uk)
  6. ^ Security Company Newcastle (www.horizon-security.co.uk)
  7. ^ Security Company Norwich (www.horizon-security.co.uk)
  8. ^ Security Company Nottingham (www.horizon-security.co.uk)
  9. ^ Security Company London (www.horizon-security.co.uk)
  10. ^ Horizon Security – Security Company Norwich (maps.google.co.uk)

Breaking: HID Global to buy Mercury Security Products from ACRE LLC

ACQUISITION HID Global, a subsidiary of ASSA ABLOY, is on the cusp of acquiring Mercury Security Products from ACRE LLC, the group that owns Vanderbilt Industries and ComNet. Founded in 1992 Mercury Security Products supplies OEM access control hardware, with an installed base of four million control panels worldwide. HID Global, which was acquired by ASSA ABLOY in 2000, develops products, services and solutions related to the creation, management and use of secure identities .

Headquartered in Austin, Texas, the company has over 3,200 employees worldwide and operates in more than 100 countries. Subject to regulatory approval and customary closing conditions, the deal is expected to go through in the final quarter of 2017. Financial terms of the agreement are not being publicly disclosed. Houlihan Lokey Capital Inc and Raymond James & Associates Inc acted as financial advisors to ACRE and Mercury. Strategic move Divesting Mercury after many years of success since ACRE purchased the business in 2013 is a strategic move that allows ACRE to focus on its core access control, video and intrusion businesses under the Vanderbilt and ComNet brands, said ACRE CEO Joseph Grillo. HID is the perfect home to provide for the continued growth and success of Mercury, which will remain a valued technology supplier to Vanderbilt. We caught up with Grillo, who came third in our roll call of the top 10 influencers among security manufacturers/service providers 2017, at IFSEC 2017, where he emphasised that ACRE is still very much in the market for more acquisitions.

ACRE (Access Control Related Enterprises) has acquired several security businesses since it was formed in 2012 by Grillo, including Schlage SMS from Ingersoll Rand in 2012, Mercury itself in 2013, the Security Products Division of Siemens AG in 2014, and Access Control Technology (ACT) and ComNet in 2016.

Related Topics Eagle Eye Networks acquires Panasonic Cloud Management Services Europe BV Veracity acquires command and control specialist iComply FLIR Systems acquires developer behind world s smallest drone: Prox Dynamics

Security Guards in Norfolk and Suffolk

In a world that is becoming ever more connected by technology, the value of the physical presence of a security officer cannot be overstated.

We do not see ourselves as providers purely of manpower. By employing the brightest and most capable security officers, training them to the highest standards and complementing their skills and enthusiasm with leading edge technology, we will safeguard all your physical, human and corporate assets.

Skilled security officers, empowered by technology

Security officers are often the first person a visitor might encounter when they arrive at your premises. Our officers have the training, professionalism and demeanour to fit seamlessly into our client s culture. Our strategy focuses on understanding that each and every organisation faces a unique set of security threats and challenges. Everything from our recruitment policies and training programs are geared towards delivering highly skilled officers fit to represent our clients.

Our officers remain loyal and work with our clients over long periods of time, becoming part of that vital ingredient embedded within your organisation and protecting your assets through an intuitive understanding of your culture.

Door Supervision

A Door Supervisor licence is required if manned guarding activities are undertaken in relation to licensed premises. We ensure that our officers have all of the required licences and training to be able perform door supervision duties, should this be a requirement for your business.

Community Safety Accreditation Scheme (CSAS)

Dardan is an accredited provider of Community Safety Accreditation Scheme (CSAS) staff. CSAS allows a Chief Constable to accredit staff with powers to deal with anti-social behaviour, such as litter, abandoned cars and graffiti.

CSAS has proven to reduce low-level anti-social behaviour, decrease crime and nuisance and increase footfall in public environments such as shopping centres.

Other Services:

Bull Products to give Fire 360 customers detailed risk report

Construction industry Users of the Fire 360 service from Bull Products will now receive a detailed risk report that explores potential risks and hazards ahead of work on construction sites. Launched at the tail end of 2016, fire 360 is a 12-step plan designed to equip companies with an comprehensive fire strategy. The report considers the risks associated with a construction site s location, whether it s a listed building, number of storeys, and the level of overnight security.

Based on data gathered by the Fire Protection Association s Business and Property Protection Portal, the 20-page report assesses the risk of fires and floods, as well as the average costs to businesses if those risks are realised. The report also covers average response time for emergency services to arrive on site and prevalence of robberies and incidents entailing criminal damage within that particular postcode. Product guidelines are included to help businesses ensure they have the correct equipment on site. Before work is carried out on any construction site, there are a number of potential risks which can affect the health and safety of workers, and the general public, said Bradley Markham, director at Bull Products. Our risk report system will ensure companies have the right fire protection equipment in place so that they are prepared for any given situation during the construction phase.

We re delighted to have developed our Fire 360 service, which includes the risk reporting to ensure our customers have everything they need to protect their site and ensure safety remains a top priority.

IFSEC Southeast Asia 2017: Drone Zone and business-matching service to make their debuts

SECURITY EVENT The world-leading security, fire and safety event IFSEC is holding its Southeast Asia edition at the Kuala Lumpur Convention Centre (KLCC) between 6-8 September 2017. The fifth edition is a must-attend event for players in the entire industry, including architects, business owners, contractors, engineers, facilities managers, finance professionals, human resources personnel, IT professionals, procurement specialists, property developers, senior management and more. The three-day event will feature more than 350 world-leading brands showcasing cutting-edge products in access controls and biometrics, CCTV and surveillance, cybersecurity, drones, fire alarms, fire detection, fire protection, gates and doors, home automation, intelligent buildings, intruder alarms, network security, personal protection equipment, physical security, perimeter protection, x-ray equipment and many other latest technologies in security, fire and safety.

The business-matching service will match visitors to the solutions or products that best meet their specific needs This is the best opportunity for visitors to meet directly with experts representing global brands such as Entrypass, Seagate, Dahua, Comnet, Nemtek, Nocturna, Hikvision, BFT, Falcon Safe, FAAC, Alarms and Automation, Golmar, Entrasys, Magnetic Control, Mobotix, MicroEngine, Propel Network, Senzo, Smartstripe, Ozak, Stratel, Union Light, Videx and many more. IFSEC Southeast Asia received strong support from Malaysia s Ministry of Home Affairs, Royal Malaysia Police, CyberSecurity Malaysia, Asian Professional Security Association (APSA) Malaysia Chapter, British Security Industry Association (BSIA) and ASIS International (Malaysia Chapter). New features For the fifth edition, IFSEC Southeast Asia will include a few new features on the show floor, which will attract more than 10,000 visitors. For the first time, there will be a Drone Zone, where drone companies and operators will wow visitors with airborne displays of cutting-edge security drones. Another new feature is the business-matching service, which visitors could select their preferred product to source. This service was created to help visitors find the best solutions or products for their needs, directly with the manufacturers or distributors. The Malaysia s Ministry of Home Affairs (MOHA), PPKKM, APSA and IFSEC Southeast Asia is organising Conference Perdana, where the conference will feature a panel discussion, dialogues with MOHA and a keynote address from the invited guest of honour, YAB Dato Seri Dr. Ahmad Zahid Hamidi, Deputy Prime Minister of Malaysia. We expect more than 2,000 security companies to join Conference Perdana, the first-ever conference specific for the security industry players and operators, said Dato Seri Haji Mustapa Bin Haji Ali, President of APSA (Malaysia Chapter) .

The conference is set to be the best platform for the industry players to gather and obtain the latest information and gain new knowledge that will benefit their businesses. IFSEC Southeast Asia 2017 is organising a three-day seminar on the show floor, where there will be more than 10 hot topics presented by experts. The seminar is free for all visitors. IFSEC Southeast Asia 2017 is a free-to-attend exhibition and seminar for all industry players and visitors. It takes place 6-7 September between 10:00am-5:30pm and on 8 September between 10:00am-4:00pm. For more information on IFSEC Southeast Asia, please log on to www.ifsecsea.com or contact the organiser at +60321768788. Free Download: The security drones report 2017 The global security drones market will be worth $10.5bn ( 8bn) by 2020 . This report commissioned by Aviat Drones examines the prevalence, growth prospects , applications and regulatory challenges of drones and anti-drone tech in the global security market. Find out how you can benefit from this lucrative market .

Click here to download now

Online security threats you need to protect your business from

Cyber criminals are continually coming up with newer more sophisticated ways of attacking businesses, which can make it hard to stay protected from the latest threats. The role of the web in running a business is also increasing, giving criminals more potential targets. According to 2017 s Cyber Security Breaches survey, 85% of businesses now have websites, 59% have social media pages and 61% hold personal customer data electronically.

The survey found that nearly half of all UK businesses were hit by a cyber attack in the past year. The consequences of such attacks ranged from websites being taken down and software being corrupted, to loss of access to third party systems the businesses relied on. The data held by retailers is making them a prime target for hackers and the number reporting data breaches has doubled in the past year. While there are numerous types of online attacks, the following are some of the most common ones your business needs to be protected from. Fraudulent emails are the most common type of attack experienced by businesses in the UK Ransomware The cyber attack on the NHS in May brought ransomware to the attention of many people, who may previously never have heard of it. Such attacks either completely lock users out of their computers, or encrypt their information, and demand payment in order to restore access. For the attackers to gain access to your system, someone usually needs to download an infected attachment, or click on a link. How to protect yourself To begin with, employees need to be taught to be wary about emails from senders they don t recognise. It s impossible to guarantee you ll never fall victim to such an attack, so you also need to back up your data.

This means you won t have to experience significant downtime, which can affect your business operations. Phishing Phishing attacks send out emails designed to trick the sender into revealing sensitive information, such as passwords or personal details. Criminals then use these details for further crimes, like identity theft. Fraudulent emails are the most common type of attack experienced by businesses in the UK. How to protect yourself Employees need to be educated about the risk of sharing sensitive information online. Rather than calling the phone number given in such emails, or clicking the web address, it is best to find out such information yourself to ensure it is legitimate. CEO fraud/whaling Unlike other attacks which target users en masse, whaling or CEO fraud is designed to hit specific companies. The attackers spend time researching their victim and gathering information they can easily find online. Employees also need to learn to look out for telltale signs an email may not be genuine, such as a slight alteration in the format of the email address They use the information to impersonate senior executives at companies and send out emails in their name.

They ll then ask for large sums of money, or sensitive information. How to protect yourself Intelligent email security can be used to check if emails are from a genuine source. Employees also need to learn to look out for telltale signs an email may not be genuine, such as a slight alteration in the format of the email address. Hackers sometimes simply add an extra symbol or letter to the real email address. Sensitive requests should also be verified via another channel before they are authorised. Simply calling the email s sender to confirm the request is enough to identify such attacks and prevent huge losses to your business. Malware Malware is an umbrella term for several types of attacks including viruses, worms and trojans. Viruses can be sent via emails, or automatically downloaded when you visit an unsecure website. They replicate themselves and spread through computer networks where they cause damage to files, or even allow criminals to access your computer.

You may not know you ve been infected with a worm or virus until your computer begins to slow down or programs start to crash repeatedly Worms exploit security vulnerabilities in operating systems and can give attackers the ability to remotely control your computer. They can do this to several computers, which they then use to create a network to carry out further attacks like distributed denial-of-service attacks. DDOS attacks are used to overwhelm websites and cause them to crash. You may not know you ve been infected with a worm or virus until your computer begins to slow down or programs start to crash repeatedly. You can also be unwittingly infected by trojans which infect your computer by getting you to download software which appears to be legitimate. How to protect yourself Installing security updates and patches to operating systems and software is crucial to remaining protected from such attacks. Firewalls and anti-virus software can also be used to prevent criminals from infecting your computer. If you re unsure about a website, look for the HTTPS letters at the start of the URL, which indicates it meets certain security standards. It s best to have several layers of cybersecurity, which use a number of methods to protect your business Password attacks Guessing passwords is another incredibly common way attackers can gain access to your business.

Password cracking software can be used to go through all the words in the dictionary and any common combinations. It can run through thousands of combinations in seconds, which means even if you only disclose partial information you ll make their job easier. How to protect yourself Strong passwords need to make use of a combination of letters, numbers and symbols, which don t make up a word, or use an obvious date like a birthday. A good way to set a strong password you ll remember is to use the first letter of each word in a phrase. Always change the default password you get for any system and limit the number of unsuccessful login attempts someone can make. Security essentials Antiviral software, firewalls and backing up data are just some of the fundamental security measures you need in place. It s best to have several layers of cybersecurity, which use a number of methods to protect your business. In many cases, humans are the weakest link, so you can achieve a lot by training staff in cybersecurity. The Cyber Essentials scheme addresses the most common online threats, which use widely available tools and require little skill.

The government-endorsed scheme focuses on ways to protect yourself from hacking, phishing and password guessing and is a good way to ensure you have the essential security controls in place. Free Download: the CyberSecurity Crashcourse Are you even aware if you have been the victim of a cybersecurity breach? This report will help you to find out and protect yourself, Eric Hansleman from 451 Research presents a rapid-fire overview of cybersecurity , because a firewall just won t do, you need multi-layered defences to truly protect your data.

Click here to download now

National Business Crime Solution launches Associate Membership scheme for security solutions providers

NBCS The National Business Crime Solution (NBCS), a platform for sharing crime-related data between law enforcement agencies and the business community, is launching an associate membership scheme targeting security solutions providers. The scheme will kick off with a series of one-day member events that aim to promote greater understanding and collaboration between risk management providers and security professionals that protect people and assets. Daniel Hardy, the managing director of NBCS who came up with the idea, says the scheme will help NBCS become self-sustainable and make membership even more attractive to suppliers.

Our new associate membership scheme will give vendors unfettered access to senior decision-makers at some of the nation s most prestigious organisations, he said. They will get a unique opportunity to demonstrate their risk management, security, fraud and loss prevention solutions to our members at organised events that are cost-effective to attend and will eliminate the hassle normally associated with trade shows and exhibitions. This saves all parties significant time and money and makes the experience far more effective by ensuring that end users meet vendors that are directly relevant to their businesses. Available in a variety of packages, associate membership will cost between 4,000- 15,000 a year. The basic package will offer advertising and promotion to existing members, while the premium package will include consultancy from senior NBCS personnel on subjects like fraud risk, risk management, enterprise risk management and security deployment. Each event update members on NBCS strategy and news and feature a talk from a guest keynote speaker several other presentations. Members can network, ask questions and get hands-on with product demos during regular breaks throughout the day during the day. NBCS, a not-for-profit initiative, recently secured significant government funding as part of the Police Transformation Fund, a Home Office programme intended to help police leaders and police and crime commissioners respond to the changing nature of crime. We want to bring members, suppliers and all those involved in business crime risk management closer together, said Hardy.

Everyone s time is precious these days, so cutting through the noise that is usually associated with getting members of these two interdependent groups in the same room allows NBCS to offer real value to all members. It will also help cement our position as a critical friend of business, the police service and all business reduction partnerships, by furthering the use of the National Business Crime Solution model for all those affected by business crime. Suppliers can find out more about becoming NBCS Associate Members by sending an email to [email protected] Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape.

This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now