courses

Door Supervision – Training Information Centre

250+vat

Door Supervision

Awarded by Education Development International (EDI). Under the Security Industry Act 2001 anyone working as a door supervisor in licensed premises must be licensed by the Security Industry Authority. To apply for a licence as a door supervisor you must have a recognised qualification.

The Level 2 Award in Door Supervision satisfies this legal requirement.

Gain an approved SIA qualification to allow you to pursue a career as a door supervisor.

Course Summary:

Four day course that covers the basic tasks, objectives and the legal and social responsibilities of a door supervisor.

Who should take this qualification?

You need a licence if you are responsible for security, protection, screening the suitability of people entering premises or dealing with conflict in pubs, clubs and other licensed premises open to the public.

Who should take this qualification:

  • If you work as a door supervisor under contract for a client, or if you work in-house , you will need a non front-line licence.
  • If you are a supervisor, manager, director or partner, or a sole trader providing door supervision staff, you will need a non front-line licence.
  • If you are a manager or supervisor under contract who manages door supervisors who are also under contract you will need a non front-line licence.

Course Objectives:

The qualification consists of two mandatory units: The Roles and Responsibilities of a Door Supervisor and Communication Skills and Conflict Management.

Upon completion of the course, learners will be have a clear knowledge and understanding in the following areas:

  • Introduction to the role and the leisure and security industries
  • Standards of behaviour
  • Civil and criminal law
  • Searching
  • Arrest
  • Drugs awareness
  • Recording incidents and crime scene preservation
  • Licensing law
  • Equal opportunities
  • Health and safety at work act
  • Emergency procedures
  • Introduction to communication skills and conflict management
  • Application of communication skills and conflict management

Assessment:

Multiple-choice question examination

Duration:

4 days

CSL appoints Didier Faure as new CFO

New hires CSL has announced the appointment of Didier Faure as chief financial officer (CFO). Faure joins CSL from private equity firm AlixPartners LLP, where he was EMEA CFO. Before that, he had a stint as EMEA CFO of Grey Healthcare Group, a communication agency specialising in the healthcare sector.

In addition to expertise in the finance function, Didier brings a wealth of experience in business consulting and strategy which will be invaluable to CSL as we look to support our customers more effectively, said CSL CEO Ed Heale. CSL made another big appointment recently, bringing in Andy Fyvie as head of European customer development. The market leader in secure connectivity for M2M/IoT devices has also launched the smallest radio communicator in the fire and security monitoring market and acquired Emizon Networks to accelerate international expansion. Free Download: The key to mitigating cybersecurity risks Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today s security landscape. This report will help you to see why third parties should adhere to secure by design principles and why the necessary convergence of IT and security departments demands a holistic approach .

Download now

Top Shelf Storage Inc., Palm Coast, FL providing a secure …

Top Shelf Storage Inc., Palm Coast, FL Providing A Secure ...

Top Shelf Storage Inc., Palm Coast, FL Providing A Secure ...

Top Shelf Storage Inc , committed to providing a secure self storage facility for the Palm Coast Community, holding itself to the highest standard of excellence in customer service.

Maintaining it’s facility like an exclusive gated community is what Top Shelf Storage will strive for.

Our Facility located within Palm Coast Industrial Park off Route 1, near Palm Coast Parkway.

Top Shelf Storage Inc., Palm Coast, FL Providing A Secure ...Phone (386) 446-7990


Technology – securing
the facility with the latest
in electronic surveilance.
Top Shelf Storage Inc., Palm Coast, FL Providing A Secure ... Chateau Locks, individual cylinder locks provide the most secure system to secure your items.
Top Shelf Storage Inc., Palm Coast, FL Providing A Secure ... climate controlled & standard units
sizes from 35 sq ft to 400 sq ft
outdoor spaces
24 hour video surveilance
secure key code access
commercial & residential spaces
senior discounts
Top Shelf Storage Inc., Palm Coast, FL Providing A Secure ...

Keyholding – South East Security

What is Key Holding?

Keyholding is where another company has a duplicate set of your premises keys and alarm codes and is able to attend to your security or fire alarm activations out of hours and check your premises for intruders or other dangerous situations on your behalf. Many companies offer a keyholding service only, which means that they have to wait for your AUTHORISED alarm company to also attend, which will cost you even more. Arena Security, in partnership with South East Security offer a single turnkey solution within a rapid time frame to ensure your premises are restored to a secure level or to liaise with the Police should their presence be required, giving you peace of mind and saving you money.

For more information, click here1

References

  1. ^ Arena Security (www.arenasecurity.co.uk)

MOBOTIX completes Mx6 6MP camera series with new indoor models

product launch MOBOTIX has added new indoor models c26, i26, p26 and v26 to the Mx6 6MP camera line. The German surveillance brand says it marks the completion of the Mx6 series, which it launched earlier in the year. The Mx6 series is a major departure for MOBOTIX as it accommodates the video compression industry standard H.264 for the first time.

Features (across all four models) Processor delivers up to twice as many images per second, at the same resolution, as previous models Video data simultaneously offered in three formats (MxPEG, MJPEG and H.264), as well as a range of resolutions RTSP/multicast enhances flexibility Intelligent motion detection within camera affords spare capacity for additional software applications Available with more powerful CPU H.264 encoder New processor architecture has boosted frame rate and capacity to capture rapid movement Video stream can be displayed on multiple clients simultaneously without compromising frame rate H.264 compression standard format available on MOBOTIX cameras for the first time Users can toggle between high image quality with MxPEG and where video transmission and camera integration is problematic the lower quality industry standard Basic ONVIF functions offered 6-megapixel moonlight sensors Low light performance of > 1 Lux How the models compare c26 is the smallest and lightest MOBOTIX 360 camera yet: 12cm diameter and 200 grams weight. Therefore effective for rapid ceiling mounting in suspended ceilings i26 is also compact and discrete, so suited to corresponding wall mounting. Tilt angle of 15 means the camera can get the kind of complete coverage that would otherwise need four cameras p26 offers flexibility during installation thanks to manual swivel and tilt functions. And 90 lens means total room coverage can be achieved from a corner position v26 is the first vandalism-proof indoor camera to offer all MOBOTIX functions. On-wall audio set and vandalism sets provide robust protection. Mobotix says We will continue to remain true to our decentralized concept storing maximum intelligence in a camera and thereby offer solutions that go above and beyond traditional applications, said MOBOTIX CTO Dr Oliver Gabel. At the same time, we are open to generally used technologies such as H.264 and participation in standard forums such as ONVIF. We do not consider these two parts of our approach to be in conflict with each other; instead, they help our range prepare for the future and stay solution-oriented. About MOBOTIX MOBOTIX was founded in Germany in 1999.

The German IP camera and software specialists has made a name for itself developing the first decentralised IP camera and supplying the Mount Everest webcam. Contrary to popular perception as a hardware provider, the company sees itself as a software specialist with in-house hardware development of digital, high-resolution and network-based video security. It produces complete systems using a single source. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

FIA officially launches new fire engineering qualifications

FIREX 2017 The Fire Industry Association (FIA) officially launched their new qualifications in fire detection and alarms at FIREX 2017. FIA general manager Martin Duggan delivered three presentations about the new qualifications, one on each day of the three-day exhibition. The seminars were very well attended and it was a great opportunity to answer questions directly from visitors at the show, he said.

These qualifications have taken years of development and we are really excited to share with the industry exactly what shape the qualifications will take. We ve taken on new staff and had a small shake-up of the FIA team in preparation for the launch of the qualifications in order to answer all those initial questions and to ensure that the booking process goes smoothly. The FIA said the new courses met with a positive response from attendees working in all areas of the supply chain, as well as interest from beyond the UK. There are four new qualifications: designer, installer, maintainer, and commissioner, explained Duggan. They are equivalent to a level 3 in the UK, so that is the same as an A-Level, but in Europe it is the same as a level 4 qualification on the European qualifications framework. FIA general manager Martin Duggan delivers FIREX 2017 seminar The FIA handed out course prospectuses as well as snacks and drinks on its stand the FIA Lounge which was designed to resemble a pub. The FIA Lounge was very successful, said Kat Schabowska, marketing communications executive at the FIA. We had back-to-back enquiries at the information desk and the bar area was full every day of the expo. We are delighted to be able to say that this year s footfall on our stand was even better than last year.

Martin Duggan says the new courses introduce elements not hitherto available in existing FIA courses. We did a gap analysis of our current training and the new qualifications to discover how much more the new qualifications would offer. The results show us that the courses will at least double in size, explained Martin Duggan during his presentation. We ve developed some units that are completely new, plus we added extra sections that industry stakeholders and employers have asked for. Our members have very much guided us in this direction towards including more content and making the courses longer and more extensive, in order to stretch the learners knowledge further than before. Said Kat Schabowska: We recommend that if you re interested in our new qualifications or courses that you sign up to our email newsletter to find out when our booking system will go live. The new qualifications prospectus is available to download for free from the FIA website, or a hard copy can be requested by emailing [email protected]

Petya/GoldenEye: Cybersecurity experts respond to ransomware attack

The latest ransomware virus to sweep the globe started in Ukraine after users there downloaded a popular tax accounting package or visited a local news site, according to Ukrainian police and cyber experts. Called GoldenEye or Petya, the virus has affected thousands of computers, disrupting organisations in a wide range of sectors, from shipping to manufacturing. US shipping company FedEx, Danish shipping giant AP Moller-Maersk and Russian oil giant Rosneft are among those hit by the attack.

The malicious code locks machines and demands that victims pay a ransom of $300 in bitcoins or lose their data. The hackers motives are still unclear, with some experts speculating that, given the modest sums demanded, a motive other than financial gain might be driving them. A number of cybersecurity experts offered their analyses to IFSEC Global, which you can read below. Eldon Sprickerhoff, founder and chief security strategist, eSentire Attacks are becoming more widespread, are moving faster, and are harder to kill The eSentire threat intelligence team has confirmed one variant associated with this attack, however broadly there are more than 50 different flavours of ransomware variants in the wild. Of those flavours, behaviors prompt the rapid deletion of files and exfiltration of data. Recently we ve tracked a new variant which works to lock down passwords before encryption, making backup restoration particularly tricky. This attack amplifies the rapid evolution of ransomware; attacks are becoming more widespread, are moving faster, and are harder to kill. While this attack is hitting Europe harder than other countries (at the moment), it is moving quickly and businesses worldwide should treat this as the warning siren. Take this as an opportunity to ensure that offline backups and system patches are up-to-date, and tested.

Dr Jamie Graves, CEO, ZoneFox It s not just computer systems shutting down; it s energy grids losing power, ships stopping in their tracks and people not being able to access their money This is further confirmation that we now live in a world where nation-state sponsored cyber-attacks are becoming as routine as real-world incidents. This latest attack reminds us of two crucial facts regarding the current state of cyber security: that attackers now have access regardless of whether they are state-sponsored or independent to military-grade cyber weaponry, hence the fact that the attacks are so successful. Secondly, that digital data is directly linked to physical assets; it s not just computer systems shutting down, it s energy grids losing power, ships stopping in their tracks and people not being able to access their money. Despite the headlines it will create, especially in the wake of the recent WannaCry incident, this is old news. The origin of this attack looks to be a phishing email that delivers a rebranded piece of ransomware, with the only addition being the NSA EnternalBlue exploits that WannaCry used. If you don t have adequate security in place and a seriously security-conscious culture, you re going to get a free penetration test to show just how vulnerable your organisation really is. Marty P Kamden, CMO, NordVPN One way to protect yourself is to disrupt a system before it boots, as the ransomware runs on boot The latest ransomware assault seems to be particularly dangerous. One of the best protection mechanisms are patches, but they might not always work with this new version of Petya. Another way to protect yourself is to disrupt a system before it boots, as the ransomware runs on boot.

After the device gets infected with a ransomware, it will wait for about an hour until reboot. Reboot is required for a malware to encrypt the system, so in certain cases, if the device gets terminated in the encryption process, it gets disrupted and information can be saved. Generally, system administrators are still not well-prepared to protect their networks, and these attacks will only keep getting worse. Matt Kingswood, UK head, IT Specialists The best way to prepare for an attack is to back up data regularly to the cloud The news story on the new variant of the Petya ransomware dubbed PetrWrap exposes just how complex and well evolved cyber threats have become. Researchers from Kaspersky have documented that the group behind PetrWrap created a special module that patches the original Petya ransomware on the fly . While Kaspersky has a signature for this ransomware already, other AV providers are sure to follow soon. Although there are a range of best practices to reduce the risk of a ransomware infection (such as installing an antivirus scanner, utilising intrusion detection services, applying updates as soon as possible and avoiding unsolicited email attachments), there is no failsafe method for preventing ransomware. The best way to prepare for an attack is to back up data regularly to the cloud. Secure cloud-to-cloud backup solutions create another, encrypted version of your data and maintain prior versions ‘ in the case of a ransomware attack, the versions before the attack.

And, of course, this second copy has the added benefit of preventing data loss via accidental deletion. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Further topics covered include: The network cameras hijack during the 2017 presidential inauguration, updates on the forthcoming EU data protection law (the GDPR), ultra-low light cameras versus thermal cameras and much more.

Click here to Download now

Watch: Fire and security apprentices and the NSI reflect on the Engineers of Tomorrow on IFSEC TV

IFseC 2017 In the video below, apprentices Craig Jude and Charlie McFarlane of fire and security installation firm EFT Systems talk about taking part in the Engineers of Tomorrow competition and how they got into the trade. IFSEC International s 19 th annual Engineers of Tomorrow contest pits more than 50 young engineers against each other in a 90-minute installation challenge taking place across three days at IFSEC 2017. Overall heat winners and their employers will be invited to the Security & Fire Excellence Awards, taking place in November.

embedded content Also speaking at IFSEC 2017 below, Richard Jenkins, CEO of the National Security Inspectorate (NSI), also championed the competition, which the NSI sponsors. embedded content Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Further topics covered include: The network cameras hijack during the 2017 presidential inauguration, updates on the forthcoming EU data protection law (the GDPR), ultra-low light cameras versus thermal cameras and much more.

Click here to Download now

Mobile Security & Key Holding Services

  1. Home1
  2. Services 2
  3. Security3
  4. Mobile Patrols and Keyholding

Mobile security patrols and security guard services

To supplement permanent security officers, or facilities where 24 hour manned guarding is not a requirement, our mobile patrols can be deployed to meet your security needs. Our team of professional, SIA licensed mobile patrol officers operate to BS7499 and deliver mobile security services as part of a dedicated 24 hour supervisory service4 via our National Support Centre. Mobile patrol teams can carry out routine or random checks at your premises to ensure your property is secure and prevent any criminal activity, and also provide key holding, lock and unlock services for commercial premises alarm response, as well as lone worker or accompanied visits services. Our National Support Centre offers remote monitoring and coordination of mobile patrol teams, to deliver an integrated security personnel and systems solution for the protection of your premises, customers and staff. The Centre is a BS 5979:2007 compliant Alarm Receiving Centre and in the event of an alarm notification, operatives can use footage from security systems in conjunction with wireless alarm solutions to identify the reason for activation, and take relevant action in accordance with Service Level Agreements. Our key holding service5 meets the agreed BS7984 standards advised by the Association of Chief Police Officers (ACPO). In the case of a suspected intrusion, the National Support Centre can despatch our 24-hour mobile patrol teams, who are trained to preserve the crime scene and notify both the police and client whilst maintaining a presence on the site until satisfied that the facility is secure.

References

  1. ^ Home (www.ocs.co.uk)
  2. ^ Services (www.ocs.co.uk)
  3. ^ Security (www.ocs.co.uk)
  4. ^ 24 hour supervisory service (www.ocs.co.uk)
  5. ^ key holding service (www.ocs.co.uk)

We need joint cyber-physical teams for cyber-physical alerts

IFSEC presentations James Willison BA, MA, MSyI is a respected specialist in security convergence and enterprise risk management. Also founder of Unified Security Ltd, Willison is speaking at IFSEC 2017 about How vendors can support ESRM and CSM strategies and What security managers need to know about cybersecurity . We caught up with James to find out a little more about these topics in advance of Europe s largest annual security show.

IFSEC International takes place between 20-22 June 2017 at London ExCeL. Get your free badge now. IFSEC Global: Hi, James, please tell us a bit about what you ll be talking about at IFSEC with Sarb Sembhi James Willison: We re going to be talking about how vendors can support enterprise security risk management. There s lots happening in the corporate strategy of bringing risk silos together and identifying cyber-physical attacks which is great. However, how can vendors help them better achieve this? Can they provide technologies which will actually calculate enterprise security risks? How can they make sure they re supplying secure software and secure technology? We ll also cover the strategic side of security management. So security managers, what do they do on their side?

How do they manage technology they re going to buy, how do they know it s good rather than bad so looking at principles really. It s high level strategy rather than technical. We won t be giving details on all the firewall stuff or what sort of software you re using. It s more about what sort of thing you should be looking for and relationships between suppliers and installers and what impressions they re giving the client. I m doing that talk with Sarb Sembhi. What we re saying to vendors is you ve got an opportunity to lead the market in identity access management because the information security guys aren t really doing it on a large scale IG: And what about your talk, alongside Steven Kenny of Axis Communications, about cybersecurity? JW: We ll be talking about what Axis are doing, which I know quite a lot about because I m working with them. Steve will cover hardening the cybersecurity of their products and systems and I will look at how these should be managed in an enterprise or smart city. And I ll be giving a strategic look at multi-disciplinary security teaming, which is what converged security really is.

But basically I ll be saying that people have talked about convergence quite a lot in the last few years, all over the world. But what we need is united cyber-physical teams working in tandem on cyber-physical alerts. Barclays recently merged their physical and cybersecurity teams into one big security team with technology that is cyber-physical and responding in real time. The highest level of achievement in this area would be them, Deutsche Telekom and BT. Some corporations are doing this converged security management but others are doing enterprise security, which is looking at all security risks but their teams are still siloed. So they re looking at all security risks but separately. What we re advocating is that even if you can t form one big department because of organisational problems, you form a separate team that includes both information and physical security people not just one or the other. CISOs tend not to think physical security systems providers really have the capability to offer cyber-physical security solutions IG: At least it makes sure they re talking to each other JW: Yes. I know these teams exist, but they re quite rare.

In our talk we consider how these teams can use converged technologies to respond to attacks on their physical security systems. We look at important actions to take in this area and this will be of particular relevance for security professionals working in the smart cities of the future. Out of interest, South Korea, a leader in smart cities, had an InfoSec type show recently and they had 15-20,000 information security people there, with 28,000 physical. So that was interesting as they discussed cyber-physical security, convergence, IoT and new technologies. Something to watch IG: Why do you think there is so little take up of cyber-physical security offerings from physical security vendors? JW: I think because the people looking after that would usually be the chief information security officer, and they don t think physical security systems providers really have the capability to offer cyber-physical security solutions. These vendors have specialised in physical up until now and to get into that market is quite hard because there are a lot of information security type access systems, obviously for IT, but identity access management is a big part of that. I think some of that will converge. I ve been to conferences where they talk about identity access management all day because it s on the network.

Then there are loads of products around that and some will include a physical element. What we re saying in our talk is you ve got an opportunity to lead the market because the information security guys aren t really doing it on a large scale. It s a growth area. And the internet of things obviously will impact all this. IG: Could you just clarify the kind of security professionals who will benefit from the talk? JW: We have a three-pronged approach. What you should be doing in your organisation to converge or have multi-disciplinary teams and how you can do that. You can take the initiative by going to HR and saying you want to form one, can you help me, because maybe I m not getting help from the IT people. So that shows initiative, to see what they say back before they come back and make you do it anyway.

HR might just realise they can form one department to save money. They no longer need two security functions. That s been an issue in the past. Someone tells them they need only one person to run the whole security department to include every area of security. There s this fear that all the chief information security guys are going to take over physical security. A lot of jobs are now advertised in this area, when you dig deep into them they re looking for chief information security officers. The IT companies don t see the point of siloing off. They tend to be more digitalised and, well, you need to know about IT anyway. But if you don t know about it, what are you doing here?

IG: As ever, it sounds like the technology is evolving faster than the corporate culture can keep up with. Is there anything else you want to mention? JW: Just that we re publishing a white paper with Axis on this subject, called Supporting Enterprise Security Risk Management, How vendors can support ESRM and CSM strategies . We are delighted to announce that this will be launched at IFSEC and available as a PDF on the Axis website (click here) or if you contact me at [email protected] We hope to have some printed copies for those who attend our presentation! So please come and get a copy! James Willison is speaking twice at IFSEC 2017: 20 June / 14:00-14:40 / Supporting Enterprise Security Management How vendors can support ESRM and CSM strategies / James Willison and S arb Sembhi, CTO & CISO, Virtually Informed / Borders & Infrastructure Theatre 21 June / 13:30-13:55 / What security managers need to know about cybersecurity / James Willison and Steven Kenny, Axis Communications / Security Management Theatre View the full conference agenda here IFSEC International takes place between 20-22 June 2017 at London ExCeL. Get your free badge now. Visit Europe s only large-scale security event in 2017 IFSEC International is taking place at Excel London, 20 22 June 2017, here are 5 reasons you should attend: Exclusive hands-on access to over 10,000 brand new security solutions Network with over 27,000 security professionals Discounts of up to 30% exclusively for IFSEC 150 hours of seminars, workshops and keynote speeches A 1-2-1 meetings service to pre-book face to face meetings.

Time is running out, register now to avoid missing out