private security

CEDIA advises on smart wiring

Due to today s ever growing reliance on digital and smart appliances, security professionals are facing greater pressure to install complex cabling infrastructures needed to support smart home technology. Simon Buddle, Education Director at CEDIA EMEA, highlights the importance of installing an efficient and secure residential cabling system. He explains how professionals can provide clients with the right cabling requirements for the modern home of today and tomorrow.

Wiring in the evolving smart home Technology is increasingly infiltrating the home. With virtually all household technologies part of the home network, a simple phone line and TV antenna is no longer adequate to support the technology that is now available to homeowners. As a result, many require comprehensive wiring infrastructures and data network systems that are suitable for the modern smart home. In order to prevent opportunists from doing it themselves , it s crucial for security professionals to offer a a service that benefits homeowners. A correctly wired infrastructure at the very first stage of building or renovating is fundamental to homeowners who want technology. A common phrase heard among the home technology industry is the most expensive cable you have to install is the one that did not get installed in the first place . The basis of a smart home is the infrastructure, the cables. Not all properties require technology at this stage. But it is crucial for the correct wiring to be in place so that it is ready for the future.

A wired infrastructure can set up the home for future applications, whilst still preserving the d cor of the home and adding value. The rise of smart wiring presents a great opportunity for security professionals. The home technology sector presents a lucrative opportunity for these professionals to expand their reach and create new business. By offering a more complete service for the home, including specialist services, such as fitting reliable cabling infrastructure, security professionals can guarantee their businesses will be more resilient. It could help them through tough times as they pick up more work from new and existing customers. CEDIA s smart wiring education To make sure security professionals are up-to-date with the latest skills and knowledge, CEDIA has best practice advice for wiring smart homes. CEDIA has a number of courses for those who want to extend their cabling knowledge. One of their most popular education programmes is its one day Smart Home Wiring course. Attendees learn how to plan and install a wireless infrastructure that can withstand and integrate a range of modern technological demands.

Based on the Smart Home Infrastructure Recommended Guidelines , it promises to leave attendees with a clear understanding of how a modern home should be cabled for new technologies, and future flexibility. CEDIA s the Smart Home Infrastructure Recommended Guidelines is perfect for security professionals looking to move into the home technology market or gain a wider understanding of the subject. The document aims to help security professionals understand the comprehensive cabling infrastructure required for the modern home. It sets out a plan for a far more integrated and modern approach to wiring homes. CEDIA at IFSEC CEDIA is hosting a number of training sessions at IFSEC International 2017. The 90 minute training sessions will take place in South Gallery Suite 8 at ExCeL on 20 th and 21 st of June: 20th June: Introduction To Smart Home Technology IP Networking for the Smarthome WiFi Tips & Tricks For The Modern Home Intro to Audio, Video & Home Entertainment 21st June: Introduction To Smart Home Technology Building A Business In The Smart Home Marketplace Panel Discussion Lighting Control For The Secure Home Wiring Infrastructure For The Modern Home For more information on what advice, courses and literature CEDIA can offer security professionals, please visit www.cedia.co.uk Be smart come to IFSEC International 2017 The Internet of Things (IoT) is becoming an ever important element of various technology solutions for the smart home. The ability to connect, communicate with, and remotely manage a vast number of networked, automated devices via the internet is now inescapable.

This June, the latest smart products are on hand to test and trial throughout the exhibition as well as a dedicated smart seminar theatre, and training sessions on the show floor.

To avoid missing out register here

Private Investigators License

Overview of the UK S.I.A Private Investigators licence In the Private Security Industry various sectors have already been licenced such as: Manned guards, Door supervisors, Close protection operatives, Public space surveillance (CCTV) operators and Security guards by the Security Industry Authority. The S.I.A is the organisation responsible for this regulation and reports to the Home Secretary.
Private Investigators License

The Security Industry Authority1 has a series of objectives which cover these professions and the Private Investigator sector, such as: “Providing services and standards to their customers”, “Delivering regulatory activities effectively and efficiently”, “Delivering a development programme that continues effective regulation of the private security industry” and “To be recognised internally and externally as a model of good practice”.

As Licensing for Private Investigators is a government priority2 in the UK.

The following indices can be drawn from existing literature:

Although Private Investigator licences and the requirement for a business licence are still subject to Ministerial approval, the momentum is there and a whole new world of regulation, inspection and bureaucracy is coming.

A typical S.I.A Licence costs: 220.00 and lasts for 3 years. To get the S.I.A Private Investigator licence you need to pass the, “Fit and Proper person” tests and need to have successfully completed a, “Test of Competency”, such as The Association of British Investigators Training Academy: IQ Level 3 Award for Professional Investigators3 or the BTEC Professional Investigators4, costing around: 300.00 – 400.00.

Please note that that the Draft British Standard for the Provision of Investigative Services recommends that the competence necessary to complete an investigation has been demonstrated by the supplier of the services: Conducting investigations, conducting interviews, searching for information and preserving evidence, surveillance techniques, understanding and working to relevant laws and standards and the ability to report findings the syllabus of the Level three Awards5….

The rush amongst Investigation companies to gain as much kudos and credibility as possible by attaing, “Voluntary , Kite marks, such as: British Standard 1020006, has abated and “Self regulation”, is, now, the order of the day. The organisations and businesses that wish to bid for government contracts have enroled on the Approved Contractor Scheme (ACS) – involving eligibility checks, an assessement conducted by an external body and hefty annual registration fees.

Please note that in Northern Ireland some of the criteria for assessing convictions are: “Conflict related”. All applications are actually assessed on an individual basis and the decision is specific to each licence type. The SIA licensing system decision is open to appeal.

In order to apply for a licence you must have the right to work in the UK but you do not have to be a British Citizen.

With your licence you can begin your journey as an investigator, but, only experience, continual training and luck will ensure you make a successful profitable, career in the sector.

References

  1. ^ Security Industry Authority (www.sia.homeoffice.gov.uk)
  2. ^ As Licensing for Private Investigators is a government priority (private-investigator-training.org.uk)
  3. ^ IQ Level 3 Award for Professional Investigators (private-investigator-training.org.uk)
  4. ^ BTEC Professional Investigators (www.private-investigator-training.org.uk)
  5. ^ syllabus of the Level three Awards (private-investigator-training.org.uk)
  6. ^ British Standard 102000 (private-investigator-training.org.uk)

The benefits of silent evacuation procedures in care homes

Evacuating a care home has its own unique challenges. Elderly residents could be bed-bound, suffering from dementia, hard of hearing, or unable to move without assistance. Added to this is the distress that a loud fire alarm can cause to vulnerable residents.

Plans must be in place to ensure no occupant is trapped in the case of a fire, and staff need to be well trained. A loud and startling fire alarm could cause physical or mental distress for frailer residents, particularly if they need to wait for help from a member of staff. Even if the noise does not cause panic, alarms sound frequently in care homes, so it may be difficult to work out exactly what the alarm is for. When you work in a care home alarms can be quite confusing for residents, as they don t know what the alarm means whether it s a smoke alarm from burnt toast, or an alarm to call for assistance, says Barbara James, a care home manager specialising in providing care for dementia patients. This means when a fire alarm goes off, we need to work out the best way to let our elderly residents know without causing upset. embedded content The benefits of silence In Europe, a silent evacuation system is often used. In this scenario, when an alarm is activated, staff are alerted with a pre-alarm notification system either warning lights, or a messaging system that goes directly to phones. Staff then have three to five minutes to check the building for fire. If it is a false alarm, the alarm is reset and no one is disturbed.

If a fire is found, an evacuation button is pressed and staff can move occupants to safety if required, or lead a full evacuation. As no loud alarm is necessary, it minimises upset and panic. One of the benefits of a silent evacuation, is the reduction in false alarms. As residents are not initially aware of an alarm, staff can quickly assess whether or not there is a fire without residents being disturbed. Containing danger With the different challenges involved in care home fire safety, a full evacuation is not always possible. It is sometimes necessary to undertake alternative evacuation strategies in care homes horizontal and delayed evacuation. Horizontal evacuation can be suitable if there are walls and doors in place that provide at least 30 minutes of fire resistance. In this situation, staff can safely move residents to a protected area until the fire has been dealt with, or further evacuation occurs. Occasionally, delayed evacuation will be required in which residents remain in their rooms until the fire has been extinguished.

A building will need much more robust structural fire protection if this type of strategy is planned. With these evacuation strategies, removing the distress of a loud alarm for residents still on the premises can be greatly beneficial. A calmer environment will aid quicker evacuation or movement to a safer part of the building, reducing danger and distress to residents. In these circumstance it is vital that the fire is contained where possible. The European Confederation of Fire Protection Associations states in its guidelines for fire safety in care homes for the elderly: If the resident or patient is not able to exit the apartment or treatment room quickly enough and that rescue by others in time is not possible, conditions must be prevented from becoming life-threatening by fitting a system to contain the spread of fire. Fire doors are extremely valuable here. Nothing is more important in a care home than the well-being of its residents. Silent evacuation is a highly effective way of keeping occupants safe and calm in the event of a fire. Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry.

It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas.

From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

Door Supervisors | Nightclub & Venue Security

Door Supervisors | Nightclub & Venue SecurityExclusec are specialist in providing high calibre, reliable and professional SIA Door Supervisors to pubs, nightclubs and licensed premises throughout Manchester and the North West.

  • Our service includes:
  • FREE initial venue assessment.
  • FREE initial & annual venue risk assessments.
  • Experienced and hands on Management Team
  • Provision of trained, experienced, vetted & SIA licensed Door Supervisors.
  • A friendly, reliable and cost effective service from a responsible and reliable company.
  • Provision of only the best, customer focused staff so your venue and customers are safe at all times.
  • A company who provides a highly professional approach to security.
  • Fully insured service with Employers and Public Liability Insurance.

Our professional team of SIA licensed Door Supervisors are known amongst our clients for their positive attitude, flexibility, reliability, high standard of personal presentation, adherence to dress code, excellent written and verbal communication skills, and extensive experience in this customer focused role. Whether you require our Door Supervisors on an ad-hoc or on going contractual basis, we have the right solution for your venue. We understand that our service often becomes an integral part of your business activity. Our services are based on listening to your needs and giving our advice to provide a positive and long lasting business relationship.

Professional SIA Door Supervisors

Exclusec are not just another security company . We do not employ bouncers or Jacket Fillers instead we are committed to providing trained, experienced and professional staff delivering exceptional customer service to all our customers. This ethos is cascaded to staff throughout all levels. Our service is provided in accordance to BS7960 for Door Supervisors and all staff are vetted to BS7858.

We ensure that all our SIA Door Supervisors are aware of and comply with the SIA Standards of Behaviour1.

Areas Covered:
Trafford, Manchester, Bury, Bolton, MediaCity UK, Oldham, Salford, Stockport, Tameside, Wigan and Warrington.

In addition, we can deploy our services across the North West and UK.

References

  1. ^ Standards of Behaviour for Door Supervisors (www.exclusec.co.uk)

TOP-UP TRAINING FOR DOOR …

Download PDF

Door Supervision | Door Supervisior Course

Under the Private Security Industry Authority Act 2001, all individuals wishing to work in the private security industry must undertake a recognised qualification before applying for a licence1. The HABC Level 2 Award in Door Supervision has been developed to meet the requirements of the Security Industry Authority (SIA).2 It is based on the relevant SIA Specifications for Learning and Qualifications and provides the necessary skills and knowledge for learners who wish to apply for an SIA licence and work as a Door Supervisor within the private security industry. The qualification comprises 4 mandatory units:

Unit 1 – Working in the Private Security Industry

Unit 2 – Working as a Door Supervisor

Unit 3 – Conflict Management for the Private Security Industry

Unit 4 – Physical Intervention Skills for the Private Security Industry

This qualification can enable the learner to progress onto the NVQ in Providing Security Services or undertake further learning in other areas of the private security industry such as CCTV Operations.

Assessment

Unit 1 – Working in the Private Security Industry

  • 40-question multiple-choice examination paper.
  • Successful candidates must achieve a score of at least 28 out of 40.
  • Examination duration 1 hour.
  • Guided learning hours for this unit are 10 hours.

Unit 2 – Working as a Door Supervisor

  • 45-question multiple-choice examination paper.
  • Successful candidates must achieve a score of at least 31 out of 45.
  • Examination duration 1 hour 15 minutes.
  • Guided learning hours for this unit are 12 hours.

Unit 3 – Conflict Management for the Private Security Industry

  • 20-question multiple-choice examination paper.
  • Successful candidates must achieve a score of at least 14 out of 20.
  • Examination duration 30 minutes.
  • Guided learning hours for this unit are 8 hours

Unit 4 – Physical Intervention Skills for the Private Security Industry

  • Ongoing practical assessment throughout the course by the tutor.
  • A true or false question paper marked by the course tutor.
  • Guided learning hours for this unit are 15 hours

This qualification is suitable for learners over the age of 18. It is delivered over 4 days with a large amount of pre-course reading and written tasks to complete. Full details will be sent out to you.

The course is assessed by 3 multiple choice exams, a 15 question true/false exam and practical assessment.

References

  1. ^ licence (www.sia.homeoffice.gov.uk)
  2. ^ Security Industry Authority (SIA). (www.sia.homeoffice.gov.uk)

SIA Security Guarding in Wymondham

The nearest Training Centres to Wymondham for SIA Security Guarding are Norwich and Peterborough. This new three day course that was introduced on 1st January 2015, and is designed to train new Security Guards and Security Officers to be employed in industrial or commercial premises, enabling you to achieve the required accreditation to apply for an SIA Licence in Security Guarding. You should also consider the Door Supervision Course1 which qualifies you for both Security Guarding and working at Licensed Premises.

Course Length

3 days, plus 9 hours pre-course work.

Assessment

3 multiple-choice exams.

Certification

Successful candidates will receive a Level 2 Award for Working as a Security Officer within the Private Security Industry

Pricing

204

Online Price 170

Brochures

SIA Security Guarding In WymondhamDownload the SIA Security Guarding Training Brochure2

References

  1. ^ Door Supervision Course (www.trainingforsecurity.co.uk)
  2. ^ Download the SIA Security Guarding Training Brochure (www.trainingforsecurity.co.uk)

Loss-control engineering: risk analytics that deliver real gains

Loss-control Engineering: Risk Analytics That Deliver Real Gains

Three hundred and fifty years ago a great fire devastated London, destroying 10m worth of property ( 1.5bn in today s money). A nationwide charitable collection for distressed Londoners raised a derisory 0.16% of the rebuilding costs (about 2.5 million in today s money). Little wonder that the catastrophe inspired the world s first property insurance policies soon after.

Streamlined risk analytics The rise of advanced loss control engineering (LCE) has seen the objectives of these early experiments in insurance evolve into modern-day best practice. Today, insurance providers and the insured alike are committed to an open and collaborative approach to systems integration. This approach has delivered streamlined risk analytics that permit users to visualise risks and monitor the effects of risk mitigation. In a practical example, the data capture value of a web-based touchscreen system interface can boost data-driven decision-making by remote diagnostics to achieve a reduction in loss ratio and thus a greater accuracy in pricing of risk premiums. To these benefits can be added the recognisable gains of loss prevention and business continuity planning rather than the daunting complexities of loss restoration. Such channels give insurers greater insights into specific systems for technical underwriting and can ensure the mutual transparency of collective risk management to develop strategies that significantly reduce the time for risk assessment and decision-making. In turn, by incorporating such innovations into loss-control services, system integrators can create a truly distinct market differentiation. The rise to prominence of LCE must be seen in the context of a clear trend towards stricter underwriting decisions and claims management from a tougher insurance market that demands more robust processes and systems Robust systems and optimising LCE In England it took a colossal, city-destroying conflagration to get people thinking about better fire-safety measures, so today you can be sure loss control engineering services are now central to the concerns and cooperation of interested parties (both insurance brokers and in-house corporate risk management), especially in the application of LCE principles for deciding on actual, rather than perceived, qualities of a given risk. The rise to prominence of LCE must be seen in the context of a clear trend towards stricter underwriting decisions and claims management from a tougher insurance market that demands more robust processes and systems.

And there is no doubt that one of the upside benefits of LCE is the real value that can be created by optimising predictive risk monitoring by means of smarter remote troubleshooting of systems, enabled by liberating interoperability between intelligent systems whose full potential is so often neglected. Programmed remote diagnostics that interrogate an AFD can, for example, cut out the need for excessively scheduled maintenance intervals In particular, in relation to risk management, this predictive technology can apply equally to an AFD (automatic fire detection and fire alarm system), to the significant benefit of both service providers and end users. As to identifiable value, programmed remote diagnostics that interrogate an AFD can, for example, cut out the need for excessively scheduled maintenance intervals, a measured approach to risk management that harnesses the interconnected intelligence of versatile addressable field devices for a sharp reduction of on-site maintenance costs while delivering a primary LCE objective: the provision of improved protection. Interconnected intelligence for hazard classification In general, insurers specify loss control engineering services to conduct on-site surveys to confirm hazard classification and management controls before an underwriting decision. Following confirmation of insurance cover, LCE services work with the insured s risk management team to assist in controlling and reducing loss costs. Achieving these critical commercial objectives amid the transformation of traditional insurance models due to the revolution in digital technologies, including remote analytics and telematics will require a rethink in the optimisation of loss control information to gain a competitive edge. According to a recent report from a global leader in business process management, the reconfiguration of core loss control processes by eliminating non-core activities (conservatively estimated at 25% of the cost burden), supported by the robust integration of loss control applications ( interface platforms for automated management, including handheld field devices for interpretation of live data in real time) will deliver additional top-line and bottom-line impact to add positive value. Loss control and fire protection As more than three centuries of regulatory developments indicate, protecting domestic and commercial structures from fire has been a central issue in property safeguarding. Fire poses grave risks in terms of safety to occupants, building integrity, business interruption and the economic health of a community.

Consequently, reduction in fire risk has been a priority for society, achieved through our continually improving understanding of all the factors that contribute to fire risk. Insurance companies, too, can no longer expect to insure a facility for an extended time, and thus have less incentive to make an investment in providing ongoing loss control services Foremost, designing and building structures in compliance with building and fire code requirements, and insurance industry guidelines, contributes significantly to the reduction of fire losses, a positive effect confirmed by the downward trend in the number of fire incidents in the UK over more than a decade. Together, loss control engineering and fire protection engineering have their roots in the insurance industry and its specialised actuarial science whose influence on fire systems specifications and safeguards continues to prevail, employing statistics and probability theory to approximate the rate of future claims based on a given risk. On many projects, especially large facilities and industrial buildings, insurance companies would often provide fire protection specifications to the design team early in the process, be involved throughout the design and construction of a building, and provide additional inspection services after the building was occupied and in use. All part of loss control engineering, these activities were viewed by insurance companies as a sound investment. It was considered to be in the insurer s direct interest to protect the building, operations and the insured s business continuity from loss. However, over the last 20 to 25 years the insurance industry s involvement in fire-protection design has decreased. This shift is due, in part, to the modern business environment where both insurance companies and business corporations are continually reorganising. Insurance companies, too, can no longer expect to insure a facility for an extended time, and thus have less incentive to make an investment in providing ongoing loss control services.

So, as insurers cut back on LCE services, it is more important than ever that design professionals recognise the value of the specialised field of fire protection engineering. By working directly with owners, or as an integral part of a design team, fire protection engineers and building code consultants have a greater opportunity to influence a project, to ensure appropriate fire protection features are included at the crucial preliminary design stage, avoiding costly changes or additions later in the construction process. Preventing fire losses has always been comparatively more important to the insured than to the insurer. Although a particular fire loss may not be statistically significant to an insurance company, to the building owner it is not only a financial issue but also impacts on employee morale, access to suppliers and the economic confidence of the community. Over time, an increased understanding of the many factors that contribute to the risk of fire has led to positive developments in the fire protection of commercial structures. Improvements in public fire protection systems and services, as well as increased private use of active or passive systems through fire protection and loss control engineering, has heralded an overall decrease in the cost of fire losses. New intelligent fire systems can deliver significant cost savings and performance An independent study reveals that intelligent fire systems the platform for successful LCE functionality when integrated with BAS (Building Automation Systems) can yield cost savings of up to 25% with, post-installation, continuing savings during the life-cycle of a building s purpose and operation. Increasingly sophisticated predictive monitoring and servicing of fire alarm systems allows potential problems to be resolved before they arise. Access to information from internet-enabled panels at regular intervals or as events occur can also deliver real benefits to both building managers and insurers.

Kentec Taktis A leading example of this cutting-edge technology is Kentec s Taktis Life Safety System Management, which combines the very latest hardware and software to deliver impressive capabilities, including the management of fire and security servicing inspection routines; false fire alarm interrogation and diagnosis; scheduling system maintenance call-outs; a full audit trail for traceability and regulatory compliance; sophisticated network analysis tools. Free download covering legal requirements for responsible persons under the FSO, courtesy of the IOSH, BIFM and USHA approved UK provider of health, safety and environmental information. Key features: A full breakdown of the Regulatory Reform (Fire Safety) Order 2005 The key actions when dealing with fire precautions & protection A complete guide to maintaining procedures and requirements within your organisation.

Download now

Mike Gillespie Q&A: “Our critical infrastructure is built on old platforms that aren’t necessarily security-patched”

Mike Gillespie Q&A: “Our Critical Infrastructure Is Built On Old Platforms That Aren’t Necessarily Security-patched”

We re seeing firmware vulnerabilities discovered on a daily if not hourly basis. We re trying to plug holes because the planning wasn t in place for the new cyber landscape that we ve entered. And with the internet of things, the pace of change is getting faster and faster.

Just one of many fascinating, useful or downright disturbing insights from IFSEC Global s chat with the man who ranked number 14 in our top 50 most influential people in security and fire for 2016. The founder of a consultancy Advent IM whose expertise spans both information and physical security, Mike Gillespie is well placed to survey a security landscape whose physical and digital components increasingly overlap. Gillespie is joined in a conversation which covers cyber security in the boardroom and supply chains, and for small businesses and individual citizens by Ellie Hurst, Advent IM s marketing, media and communications manager. Cyber security in the boardroom IFSEC Global: What are you doing at the moment as a company? Any interesting developments? Mike Gillespie: We re continuing our mission to drive security up the organisation, to make it a board-level agenda. As part of that we ve just written a brand new training course about security for the future and we re planning on launching a seminar session trying to get greater engagement with senior management, to get them to have ownership of security in the same way they have ownership of finance, HR, health and safety. There is a trend to almost try and shortcut security this attitude of oh well, don t bother with it, just get it done. I think our business leaders are put off engaging with security because they see it as a dark art highly technical, full of jargon IG: Who are these courses aimed at?

Ellie Hurst Ellie Hurst: Business leaders and senior level. We re trying to remove some of the mystique, because the language around cyber and information security can be quite baffling. If you ve not come up that route to the boardroom you may feel slightly disadvantaged. Legislation has just come out in America that says companies must reveal if they have a cyber expert on their board. The next logical step from there would be to make it a requirement to have one, though as yet that isn t the case. IG: Why is there such a disconnect between the boardroom and security? MG: Security professionals don t speak the language of business. And they don t develop security strategy based on supporting business objectives. I think our business leaders are put off engaging with security because they see it as a dark art highly technical, full of jargon.

In some cases may feel intimidated or not wanting to appear stupid by not understanding what they re being told. Very few security professionals drive their security strategy based on threat and harm. They re not explaining the threats and risks. And so the professionals themselves have almost isolated themselves from the business by not being business-focused. IG: So they need to learn to communicate in a more straightforward way? Speaker: Definitely. Once you get that culture right in the boardroom, you can roll out that culture throughout the business. The idea is to make things better and to do that you have to look at the way you do things, and the way you ve always done thing isn t necessarily the way to continue. Small businesses and cyber security IG: What about businesses that might not even have a boardroom level small businesses?

MG: A lot of SMEs don t see themselves as under threat. Organisations have to understand the value of their assets, of their information assets, and understand how attractive, how valuable, those assets are to a potential attacker. Many microenterprises have incredibly valuable information assets R&D organisations, emerging tech organisations and they are as much under threat of attack as large organisations or government departments. Supply-chain security Once you re inside a supply chain entity, it s often easier to move down networks from inside than it is to attack a fortress from the outside The other thing is understanding supply chain security. Quite often it may be the end target that is the result of the initial breach. Once you re inside a supply chain entity, it s often easier to move down networks from inside than it is to attack a fortress from the outside. Businesses need to think about what s in their supply chain up and downstream from themselves. If just one of our suppliers has cyber security, then the whole of our supply chain is potentially compromised. EH: When Target the US retailer was breached it was through their air conditioning contractor.

MG: Security strategies in general, both in the physical world and in the cyber world in fairness, are very much perimeter-based and outward-facing. So once you re inside, quite often it s very difficult a lot of organisations don t have an adequate and appropriate detective monitoring strategy in place. So once inside a network often you can move around with impunity. And this is what we see, that a lot of organisations we do see with significant data breaches, Talk Talk, Sony, Target, the attackers are inside the network for week before they re detected. The Maginot Line by Goran Tek under CC BY-SA 3.0 IG: Really? Wow. So I suppose it s a bit like the Maginot line in World War 2 . MG: Absolutely. Without wishing to sound too arrogant, we have been talking about the need for a greater understanding of cyber threats to physical systems and physical estates in general for several years now.

It s become trendy now to talk about convergence, but it s been there and very real for some years. We re seeing attacks on physical buildings, on CCTV systems, on air conditioning systems, vehicles, tram systems, train systems are all coming under attack. And sometimes for direct malicious intent with a view to causing accidents, damage, bringing down national infrastructure. If it s a weak system, a legacy system, poorly installed and poorly patched, it then allows a foothold to be gained. It s a bit like when you re breaching a port: you need that initial bridgehead. You build, consolidate, then push on to attack elsewhere in a network. Because a lot of our critical national infrastructure is in private hands, there is no common oversight of everything IG: You re only as strong a you re weakest link EH: Our critical national infrastructure things like nuclear plants, transport, all that is often built on old platforms that aren t necessarily supported or security patched anymore. Because a lot of our critical national infrastructure is in private hands, there is no common oversight of everything. And the supply chain into that infrastructure is probably from the private sector as well.

Not only do you have a threat from your supply chain, your supply chain is probably quite convoluted with different frameworks, people here there and everywhere. And the end user is probably in private hands as well. Physical systems are being managed across cyberspace that maybe weren t designed to do that. It s been kind of shoehorned in, because if it still works we still use it, you know? MG: If you ve got a CCTV system going back 10 or 15 years, how old is the security management software controlling it? We re patching IT systems on a weekly basis for Windows-based vulnerabilities. We re seeing firmware vulnerabilities discovered on a daily if not hourly basis. Yet how much of our security system is being maintained in a secure manner? We re trying to plug holes because the planning wasn t in place for the new cyber landscape that we ve entered.

And with the internet of things, the pace of change is getting faster and faster. Already we re seeing situations where we have a nice secure network, someone thinks it would be a great TV and they run Google Hangouts on it to do video conferencing. Then they put a massive door in the middle of their security solution. Cyber regulation IG: It almost feels like we ve got a good handle on traditional crimes now, which have been falling across the developed world for several decades But with cyber security it seems like criminals have a bit of an upper hand . MG: Yes, traditional crime is three-dimensional and well understood. If you get mugged in the street the location of the crime, victim and perpetrator is the street. When you get mugged online, the criminal could be in Uzbekistan, I m in Birmingham, and who knows where my bank account is? So jurisdiction is a massive thing the police are trying to get a handle on. We have no global cyber laws.

IG: It takes a long time to put this regulation in place, especially across borders, whereas the threat changes quickly . MG: The law just isn t capable of keeping up with the cyber landscape at all. EH: Criminals don t worry about legislation or privacy or any other considerations a security professional is up against. So they ll just build whatever they need, and sell that tool to other people as well. There s more criminals, and they re better equipped, and they re very fleet of foot as they don t have the same constraints. MG: It s also becoming very organised and business-like online. We re now seeing sites on the darknet where people are actually offering hacking as a service. Denial of service, as a service. They re marketing themselves.

If you want to attack a particular organisation, destroy its assets, steal its information, you can go online and hire a criminal to do it for you. The death of privacy We re sleepwalking into a constantly connected, non-private environment IG: The equivalent of hiring a hitman to bump off a rival. Wow. What vectors of attack does the Pokemon phenomenon and other augmented reality apps and games create? MG: We ve already seen the Pokemon network taken down by attackers. The CIA released a statement around the threat of using games like Pokemon. You re using a mobile device, using location services, so a service somewhere on the internet can work out where you are and serve up the right Pokemon content. You re basically walking around broadcasting where you are in the world. The fascinating thing about all of this is we appear to now have a generation of people who no longer have a concept of personal privacy.

Google maps has been mapping where we go for some time. I just think we re increasingly sleepwalking into a constantly connected, non-private environment. It s bizarre. In only 30 years we ve gone from very little technology to almost being unable to live without it. I have a daughter just coming up to 20. I look at the apps she puts on her phone and she doesn t even look at permissions, what it s asking from her. It s just something for free and that s fine by her. EH: You get people worried about being profiled by the security services, but they re being profiled by Google and Facebook without any concern. But they re very worried about GCHQ.

If the product is free, then you are the product. Organisations have completely lost sight of the fact we lend them that information. They don t own it MG: Everything we do online is generating data that is being harvested. What s more frightening is the complacency of the organisations harvesting our information, and how little respect they seem to have for our personal data. Nearly half of organisations turn round and say they re just not compliant with data protection. You think: hang on a second, you re not even compliant with the law! It s not optional, it s the law. You re not compliant with it, and you re happy to say you re not compliant with it. It s almost like people see data protection as optional.

On one hand they want to gather all this data about us our movements, shopping, habits and on the other they re saying they can t be bothered to keep it safe and secure. Organisations have completely lost sight of the fact we lend them that information. They don t own it. As data subjects we remain the subjects of our personal data. They have an obligation to look after it on our behalf. So when organisations like Talk Talk, V-Tech, Sony, say they take the protection of their customers data very seriously, I say well hang on a second, you just lost hundreds of thousands of records, how could you take it seriously? Then they say they didn t lose anything serious just name, address, date of birth, your email, possibly your name and age of your kid. What does that say culturally about how important they view us and our information? IG: Thank you, it s been fascinating.

Is there anything else you want to add? EH: I was really interested in the US idea of having a cyber expert on the board. There s very few reasons why they would want to do that, unless they wanted to place accountability in commercial organisations for serious data breaches. Where the US goes the UK normally follows. So from a best practice and security hygiene perspective, businesses need to think about this. But realistically we also know they shy away from it because of the difficulty and complexity of language. So if we can facilitate a more collaborative and inclusive attitude then it might start to make a difference.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Manned Guarding in Little-weighton

Manned Guarding Little Weighton

Are you looking for specialists in Manned Guarding in the Little Weighton area? STM provide professional, trained and SIA licensed personnel throughout the UK. All our staff hold an SIA license, even those not performing a licensable function, this provides our customers with additional confidence and reassurance that our staff are subject to all relevant checks associated with the security industry. If you need experts in Manned Guarding within the Little Weighton area, then call us today.

Security Professionals

Staff are fully uniformed with the appropriate attire for each task and selected for specific roles dependent upon their training, experience and availability. Our staff are experts when it comes to Manned Guarding, so feel free to contact us today if you live in the Little Weighton area.We have found that our clients have an increasing need for staff to support their own workforce and we do this by assisting existing teams by covering sickness, vacant positions and any last minute requests.

Contact Us

Get in touch today if you need professionals who know about Manned Guarding in the Little Weighton area, we will be more than happy to discuss your requirements.