Risk UK December 2013

Page 1

Cover dec13_Layout 1 02/12/2013 17:08 Page 1

December 2013

Security and Fire Management

Patients and protection Security in the healthcare sector The complexities of remote CCTV monitoring Tampering and brand reputation By-products and public health risks Essential news for risk mitigation professionals


045_Layout 1 28/10/2013 15:52 Page 1

SECURE, WIRELESS ACCESS CONTROL LONG RANGE Long-range wireless technology, with up to 32 locks per hub. LONG BATTERY LIFE Up to 3 years battery life or up to 200,000 operationss of the lock. SAFE EGRESS Always allows free-egress from the protected side off the door. KEY OVERRIDE Available with or without key override for doors of 35mm-60mm 5mm-60mm in width. CARD TECHNOLOGY Compatible with a wide range of card technologies.

CONTACT US TODAY TO FIND YOUR NEAREST ACT CERTIFIED INSTALLER

Unit C1, South City Business Centre

UK Lo call: 0845 300 5204

Tallaght, Dublin 24, Ireland

Email: info@accesscontrol.ie

Tel: +353 (0)1 466 2570

www.accesscontrol.ie


EDIT comment dec13_riskuk_dec13 03/12/2013 17:24 Page 2

Comment

Festive Fears Christmas time, mistletoe and crime? Hopefully not...

t this time of year the thoughts of many are dominated by what Christmas presents to get for family members and how they are going to afford tablet PCs, smartphones and other luxury items that have become the norm for Xmas gifts - long gone are the days of giving someone an annual. This year it will be the battle of games consoles with the Playstation 4 going up against the Microsoft Xbox One (both costing around £400 each). With the stores feeling the strain of so many stressed out shoppers, plus the introduction of pre-Xmas sale events such as Black Friday, retailers are moving a lot of money around, the safety of which falls to the security officer on cash-and-valuables-in-transit (CVIT) duty. Over the years of covering this subject in Risk UK we have seen a number of guards being confronted with robbers willing to take lengthy steps in order to get the contents of the boxes being protected. Often these guards face a weapon and potentially a Christmas in hospital – if they are lucky. So it was good to hear from Donal Keane of Loomis UK that criminals are being warned that strong measures were being put in place to prevent cash-in-transit robberies in the run up to Christmas this year. Across the UK, as CVIT security became the focus of police forces, with deliveries of cash to banks and businesses increasing in line with demands placed by the spending public, forces were working with the British Security Industry Association (BSIA), SaferCash and other partner agencies to prevent cash and valuable deliveries being targeted by criminals during the festive season. According to Donal, a number of tactics are being employed to prevent these robberies, including overt and covert CCTV monitoring; patrol cars following cash-handling vehicles; and of course, all cash containers include a dye or taggant, which will be released if they are forcefully opened. In just one initiative, West Mercia Police and Warwickshire Police have launched their annual

A

“Follow That Van” campaign to highlight work being done by officers to protect security vehicles carrying cash across Worcestershire, Shropshire, Herefordshire, Telford & Wrekin and Warwickshire. The officers themselves use both highvisibility and covert patrols on the ground and in some cases will escort security vehicles as they carry out their normal deliveries. Detective Inspector Pete Funnell of the Intelligence Bureau for the two forces, said: “Cash in transit robberies remain rare and the forces do all they can to keep it that way. The offence is still taken extremely seriously, which is why we have launched the Follow That Van campaign this month, a campaign we have run for several years in West Mercia and are now rolling out across the alliance.” “We use a range of covert and overt police tactics, including officers in uncommitted patrol cars, who follow these vehicles to ensure safe deliveries, reassure drivers and act as a clear deterrent to any potential criminals,” he said. While the numbers of CVIT attacks have been shown to be on the decline in recent years, there is still the spectre of the recent recession hanging over the country and with the average price of desired Xmas gifts going up, alongside rising fuel and food costs, there are going to be people who need cash and are willing to try anything to get it. We have long been a supporter of the guarding sector and recognise the bravery of those officers that take on the cash-in-transit work, which is why we hope that this year there is another drop in the number of attacks on guards, continuing the trend of the last few years. As businesses you could always look at the measures you have in place and see if there is anything you can do to help, such as staggering delivery times, clearing exits and entrances etc. After all, an officer’s life is worth more than the contents of the container he/she is carrying. I hope you all have a safe, secure festive period. Andy Clutton – Editor – Risk UK

With the stores feeling the strain of so many stressed out shoppers, plus the introduction of pre-Xmas sale events such as Black Friday, retailers are moving a lot of money around, the safety of which falls to the security officer on cash-and-valuables-in-transit (CVIT) duty. December 2012

3

www.risk-uk.com


EDIT contents_riskuk_Dec12 03/12/2013 14:19 Page 2

Evacuate everyone

Sonos Pulse EN54-23 Fire Beacons In a fire, everyone matters. Sonos Pulse fire beacons and sounder beacons ensure that all personnel are notified of fire emergencies. With Pulse Alert Technology, buildings are evacuated quicker, evacuation requirements are unambiguous and everyone is made to feel safe and secure. Visit our new dedicated fire website for more information: www.klaxonsignals.com/fire

Signalling Solutions


EDIT contents_riskuk_Dec12 03/12/2013 14:19 Page 3

December 2013 Signalling Solutions

Sonos Pulse Ceiling EN54-23 Coverage: C-3-15

Contents 3 Comment This time of year thoughts turn to Christmas presents, parties and time off work, however for some this is the time of year that presents a big risk. For those brave souls doing the cash-intransit routes this can be an especially dangerous period.

6 News News stories for risk management professionals.

13 By-products and public health Any manufacturing process will, as well as hopefully producing the desired end result, also inevitably produce by-products and waste.

Sonos Pulse Wall EN54-23 Coverage: W-3.1-11.3

16 Tampering with assets In the current environment companies cannot simply sit back and let a product move from design to end-consumer without taking steps to ensure the product is tamper free.

19 Security when you really need it Geny Caloisi looks at security solutions in the healthcare sector.

22 On your watch Adam Bernstein looks at the options for remote CCTV monitoring; outsourcing or going-it alone.

28 A fresh look at protection A security rethink is required to tackle emerging threats, says Martin Baldock.

30 Cyber and data news FEATURING:

News of interest to data security professionals.

33 Products and applications A look at some recent applications and product launches.

39 Risk UK Directory ŕ EN54-23 compliant beacon technology ŕ Wall and ceiling mount light orientations ŕ Wide coverage pattern - one device can protect most rooms ŕ 20mA beacon current @ 0.5Hz flash rate

ISSN 1740-3480 Risk UK is published 12 times a year and is aimed at risk management, loss prevention and business continuity professionals within the UK’s largest commercial organisations. © Pro-Activ Publications Ltd, 2013 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without the written permission of the publisher. The views expressed in Risk UK are not necessarily those of the publishers.

Risk UK is currently available for an annual subscription rate of £78.00 (UK only)

Managing Editor Andy Clutton Tel: 0208 295 8308 E-mail: andy.clutton@risk-uk.com Contributing Editor Geny Caloisi E-mail: geny.riskuk@gmail.com Design & Production Matt Jarvis Tel: 0208 295 8310 Fax: 0870 4292015 E-mail: matt.jarvis@proactivpubs.co.uk Advertisement Director Paul Amura Tel: 0208 295 8307 Fax: 0208 295 1919 E-mail: paul.amura@proactivpubs.co.uk Administration Tracey Beale Tel: 0208 295 8306 Fax: 0208 295 1919 E-mail: tracey.beale@proactivpubs.co.uk Managing Director Mark Quittenton

RISK UK PO Box 332, Dartford DA1 9FF

Tel: +44 (0)1706 233879 www.klaxonsignals.com/fire

Chairman Larry O’Leary

Editorial: 0208 295 8308 Advertising: 0208 295 8307

5 www.risk-uk.com


EDIT news dec13_riskuk_dec13 03/12/2013 17:25 Page 2

News

News IP and PSIM in council upgrade

Insurance & Security Liaison Forum report This year, InSec was hosted by the Insafe Private Client Services team in the Old Library within the modern Lloyds of London building. The event is designed to support the insurance industry by bringing together high net worth insurers, brokers and underwriters with the best in security. The forum allowed all the attendees a chance to network and discuss their fields with each other in what are often seen as separate industries. With a full capacity, the event hosted by Jenny Cooper from Insafe International, had some interesting and informative key speakers offering expertise and knowledge from their various sectors including insurance, risk and security. The Association of Insurance Surveyors, the body of individual risk control and reduction experts discussed risk engineering and protection against insurable risks. And, to compliment the afternoon two members of the Metropolitan Police Service Flying Squad finished up by presenting the Forum with the latest crime trends, figures, helpful Q&As and insights into the criminal mind. The Forum gave everyone attending a chance to further discuss business at an evening event held in the “Vault” (an old converted bank vault; its walls lined with safety deposit boxes and an original strongroom door well over two feet thick). The evening also held a charity auction hosted by an ex-Sotheby’s auctioneer. The lucky bidders found their winnings stashed away in the safety deposit boxes around the Vault. Well over £500 was raised for the Insafe Foundation which donates funds to UK and overseas charities nominated by employees, customers, suppliers and friends of Insafe. Jenny Cooper said: “All of us at Insafe hope InSec supports the insurance industry and helps it to become stronger against crime. We’re looking forward to InSec 2014!”

6

www.risk-uk.com

Boston Networks is to deliver turnkey a public space CCTV surveillance system and fully integrated, control room for Renfrewshire Council and its community safety partners. The control room will encompass IP technologies including Video Management Software (VMS) and a Physical Security Information Management system (PSIM) to provide 24/7 surveillance and monitoring. Boston Networks will upgrade and add to the existing public space CCTV cameras and a new communications network will be designed for the dedicated transmission of high capacity data to integrate with the control room. The second phase of the project will see Boston work with Renfrewshire to deliver a cohesive security solution and 24/7 centralised monitoring facility.

UK retail theft cost £3.4bn in 2012 Shoplifting, employee or supplier fraud, organised retail crime and administrative errors cost the UK high street more than £3.4 billion last year and represented 1.2 per cent of retail sales on average, according to the 2012-2013 Global Retail Theft Barometer. The report, underwritten by an independent grant from Checkpoint Systems and undertaken by Euromonitor International in 2013, reveals that the cost of these losses to UK shoppers averaged £124.60 per household. Shoplifting represented the biggest problem to UK retailers, accounting for 36% of total loss. However, theft by employees was also a major concern, making-up 33% of the overall figure. Admin or non-crime losses and supplier fraud were estimated at 25% and 6% of the total amount respectively. In the UK, food theft was reported to have increased in the last 12 months, owing to the weak economy. Products such as mature cheddar cheese, fresh meat including gammon joints and coffee were among the top stolen items.


Project1_Layout 1 03/12/2013 18:58 Page 1

A WINNING HAND!

Add our Ace in the pack - Rialto, and hey presto you have world leading video surveillance analytics on your existing CCTV system or new installation. Ideal solution to retrofit existing systems Can be used on analogue, IP, HD or thermal cameras Analytics cost per channel significantly reduced

Mobile app available Up to 2TB of onboard storage Reliable and accurate analytics Up to 16 cameras per unit Simple installation

Self calibrating (no manual tuning) VideoIQ Rialto A4

Tel: +44 (0) 161 624 0153 www.videoiq-uk.com/resources/rialto-a


EDIT news dec13_riskuk_dec13 03/12/2013 17:26 Page 4

News

2014 independent UPS technical guide launched Uninterruptible Power Supplies (UPS), a Kohler company, has launched the fourth edition of ‘The UPS Handbook.’ The handbook is an independent guide to modern UPS and critical power protection solutions. The latest edition, which has been updated for 2014, details current and future UPS technology and topology and sets the scene for the power protection industry over the next five years. “Since the third edition of The UPS Handbook was produced in 2007, a great deal has changed in the UPS industry, and in society at large,” says Kenny Green, coeditor of The UPS Handbook. “The growth of big data, the increasing requirement for businesses to closely manage their energy efficiency and consumers’ demand for 24/7 availability of services are all impacting the need for power protection solutions.” The handbook outlines optimum configurations for implementing the most reliable systems, using the latest space and energy saving technology.

Ward Security approved for CSAS Ward Security has been accredited by the Association of Chief Police Officers (ACPO) to join the Community Safety Accreditation Scheme (CSAS). The CSAS is a Home Office initiative that was introduced in 2002 to enable chief constables to designate certain limited but targeted police powers to employees of non-police organisations who contribute towards community safety and security. The scheme creates a framework for public and private bodies to work in partnership with the police, providing an additional uniformed presence in local communities. Ward Security received the accreditation after a vetting procedure. The company’s application for the scheme was strengthened by its membership of the Security Industry Authority’s (SIA) Approved Contractor Scheme. CSAS accreditation means that Ward Security can put forward employees to the ACPO to become Accredited Persons (APs), who can be identified by a special, CSAS issued badge. AP status allows a person to deal with nuisances such as littering, dog fouling, cycling on the pavement and disorder offences such as anti-social behaviour.

Simply Brilliant Setting new standards for Access Control, Security and Automation SCALABLE True Enterprise solution delivering 1000's of controllers, 1000's doors and 1000's of zones POWERFUL State of the art electronics designed to give many years of seamless operation RESILIENT Designed with high level of self-protection EFFORTLESS Simple "Plug & Play" system expansion

ARRANGE A DEMO Call the Integriti team on 0845 470 5000 or email integriti@innerrange.co.uk

FLEXIBLE Range of Controllers & LAN modules designed to meet simple or complex access control, intruder detection and automation specifications FAST Streamlined installation and commissioning

“Integriti is a true Enterprise solution controlling thousands of doors and zones across multicontroller IP networks”


Project1_Layout 1 03/12/2013 18:52 Page 1

CERTIFYING

SECURITY

The leading certification body for Guarding Services. Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001 and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guarding and Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuables in Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.

Telephone : 0191 296 3242 www.ssaib.org

SSAIB


EDIT news dec13_riskuk_dec13 03/12/2013 17:26 Page 6

News

SyI appoints new Board Directors

Winsted collects second Queen’s Award Winsted recently welcomed Lord Lieutenant Patrick Holcroft, the Queen’s representative in Worcestershire, for the official presentation of The Queen’s Award for Enterprise 2013 for the company’s achievement in International Trade. The presentation at Winsted’s’ Droitwich factory was followed by a reception in celebration of the occasion. Those attending included Droitwich Spa Town Mayor Mr Tom Noyes, Deputy Town Mayor Bob Brookes, Councillor Anne Taft, and representatives from the UKTI including Paul Noon UKTI Regional Director. This accolade marks the second consecutive year Winsted has been recognised in the Queen’s Awards for Enterprise, having won its first in 2012. Accomplishments considered by the judging panel when bestowing this accolade on Winsted include growing its export sales over the last three years, and increased overseas distribution. General Manager Terry Shough commented: “I am thrilled to see our recent success recognised in this manner. To win the award once was a great achievement, but a second time in succession is an amazing result, and it is a testament to the hard work, commitment and professionalism of all our staff, distributors and suppliers,”

Contract to operate Ashford International station Mitie has been awarded a contract with High Speed 1 (HS1), the owner of the high speed railway between St Pancras in London and the Channel Tunnel. Mitie will be responsible for operating Ashford International station for the next five years, including station management, maintenance, cleaning and security. The contract is valued at £1m per annum. Peter Mosley, MD of Mitie’s Technical Facilities Management business, says, “This is an important contract award for Mitie, and an opportunity to expand our services beyond traditional facilities management. We are excited about working with HS1.” Kevin Beauchamp, engineering and assets director for HS1 explains, “In their current

10

www.risk-uk.com

The Security Institute has appointed Lisa Sharkey and Nick Hymans CSyP as Directors of the Main Board. Lisa (pictured) is a partner of Popplestone Allen Solicitors, specialising in licensing and entertainment law. She has particular interest in security (and regulation) owing to her professional involvement with the leisure industry, particularly the complex matters surrounding late-night licensing. She will be responsible for legal, governance, risk for the Board. Sharkey says, “I look forward to helping the Institute grow from strength to strength and to support it in its goal to achieve Chartered status.” Nick Hymans works for the Security Services department at Credit Suisse in London. He has previously worked with Control Risks, ArmorGroup and Group 4Falck after a successful career in the Army. He is heavily involved in resettlement of military leavers and with his extensive overseas experience, will provide useful support to our International Development. He will be responsible for the Register of Chartered Security Professionals. Nick says that one of his objectives is, “To try and place the CSyP qualification into a defined, attainable and easily understandable career path for current and future security professionals.” Security Institute Chairman Emma Shaw said of the appointments: “I am delighted to welcome our Directors to the Security Institute Board. They bring with them a wealth of experience which will bring benefits to all members”. contract, Mitie has combined an innovative approach to facilities management with cost efficiencies in the running of Ashford International. This makes the station more attractive to current and future train operators alike, and helps to maintain a high quality service for our customers.” HS1 holds the concession to operate the route and stations which connect London to the Channel Tunnel and the international high speed routes to Paris and Brussels. The line also provides commuter services between London and Kent.


Project1_Layout 1 03/12/2013 18:47 Page 1

OxyReduct® fir fire e pr prevention evention

REMOVING THE T H R E AT O F F I R E .

The new Library of Birmingham has chosen OxyReduct® to protect its valuable archives, the same as over 700 other businesses and organisations around Europe. No matter how good your fire detection, extinguishing or suppression system is, a fire has to start for it to work – so some damage is inevitable. In mission critical applications where any business interruption is unacceptable or where warehouse stock or archives are invaluable, a different approach to fire prevention is needed. OxyReduct® employs innovative technology that continuously reduces the oxygen level in a room by adding nitrogen to the air. The oxygen is reduced to a level in which combustibles do not inflame and an open fire is impossible. Importantly y, people can e enter the area of risk. Visit our in-house demonstration facility and experience a fire-free environment at first hand.

www.wagner-uk.com www .wagner-uk.com


Project1_Layout 1 03/12/2013 18:33 Page 1

Luminite wireless PIR detectors LGIPMT434

Exceptional detection ranges and simple set-up make Genesis the perfect CCTV activation system Now with IP connectivity for even easier integration. Plug and play with DM, IMMIX, HeiTel, Panasonic, Vista and many more. Luminite detectors provide the versatility of wireless whilst meeting and surpassing the requirements of the BS8418 standard. x

NEW from Luminite Genesis2, a stylish new PIR detector designed to complement modern architecture and buildings. High performance black optical mirrors with adaptive focal length zoom optics ensure superior white light rejection and accurate detection of human bodies regardless of distance.

IR and White light range of LED lamps, designed for CCTV monitored systems to produce clear night vision with low power consumption.

Designed and Manufactured in the UK

Call us today on 020 8368 7887 or visit our website www.luminite.co.uk for more information


EDIT article 2 dec13_riskuk_dec13 03/12/2013 17:27 Page 3

Public health

By-products and public health ny manufacturing process will, as well as hopefully producing the desired end result, also inevitably produce by-products and waste. Depending on the nature of the inputs and outputs, and the processes undertaken, these by-products could range from the harmful and toxic substances and waste, to valuable raw material to the seemingly innocuous.

A

Gain an understanding For an organisation to effectively manage its byproducts first it need to understand them. A simple risk assessment can be useful to start trying to understand the by-products and how best to manage them. Companies should try to break their activities down into individual tasks; your company’s quality management system may have already done this for you, but for each task consider the following: List the by-products and emissions – what substances are you producing, what quantities, are they gaseous, liquid or solid? Identify the risks – what are the hazards, who might be harmed and how, consider the staff in the area, visitors to site, the general public and the environment, are there any legal considerations? Estimate the risks – what’s the likelihood the hazardous event will happen and what might the consequences be? Evaluate the risks – what action do you need to take to deal with the risk? Record your findings and implement them – what do you need to note and have you done it? Review your findings – when do you need to revisit your assessment?

What are your by-products? Process flow diagrams can be a very helpful way of trying to understand where you generate byproducts and what they might be. To understand the potential issues that they might cause you will need to think about their physical state, solid, liquid or gaseous. You will have to understand the potential hazards associated with them - are they known to have toxic or harmful properties to either human health or the environment? You will also have to think about how much of the substance are you producing and in what concentration.

Identify the risks A useful way to look at the risks posed by substances is to think about the source, pathway and receptor. So, where is the by-product formed, how does it move through the

environment and who or what will it affect. Take the example of a dust. It is formed during a finishing process on site, it then moves through the workshop and the receptor is finally the worker who breathes the dust in. This process gives a simple picture of who and what might be affected by the by products but not yet the whole picture. With the dust example we now need to know whether the constituent parts of the dust have any harmful properties, dusts can be detrimental to breathing, they can in some cases be carcinogenic. So we need to understand the size and make up of our by-product to understand properly the risk that it poses. Receptors can also come in all sorts of shapes and sizes so consider your workforce, visitors and the general public. Wider than the impact on human health, you will also need to think about the potential impact on the environment, are there any sensitive receptors close to where your processes are carried out. If you are unsure about what is around you try www.Magic.gov.uk. The MAGIC website provides geographic information about the natural environment from including rural, urban, coastal and marine environments across Great Britain. It is presented in an interactive map which can be explored using various mapping tools. You may find that you have a site of special scientific interest (SSSI) or other sensitive environment close to your site.

Dan Wellington and Stuart Ponting consider the additional substances generated during processing and the risks they pose

Estimate the risk Now you know what you are producing, in what from and in what quantity you can begin to try to quantify the risk associated with it. There are a number of ways to try to quantity risk, from very basic matrices through to incredibly complicated quantitative risk assessment and modelling. Risk itself is the combination of severity and likelihood; so all means of quantifying risk are about trying to estimate these two factors. Going back to the source, pathway and receptor model should help you to identify the potential for harm to occur and for your byproducts to reach potentially sensitive receptors, and allow you to make estimations as to the sensitivity of your receptors to the substances in question. Consider here

13

www.risk-uk.com


EDIT article 2 dec13_riskuk_dec13 03/12/2013 17:27 Page 4

that risks may not just be risks to human health or the environment but may also be reputational risks for your organisation. Risk perception can be a difficult and not always logical area and what may be an innocuous risk to you may raise many concerns with your business’s stakeholders, these could be neighbours, visitors or even shareholders of the organisation.

Evaluate the risks Once we have an understanding of the risks that by-products pose it is now time to think about what to do next. Are any of the risks you have identified unacceptable? If so you will want to reduce the risks associated with those particular activities and by products. All companies will have their own views on what is and is not acceptable but there are probably some circumstances that are unacceptable to all, for example areas where you are not compliant with the law or circumstances that pose a high level of risk to health and well-being. There are a number of areas where the law will set out very clear requirements with respect to exposure to and management of by-products. For example, there are clear exposure limits for many substances set down within legislation – by following the previous stages you should now have a clear idea as to whether or not you are in breach of these limits. Similarly, if you have determined that legally your by-product is classified as waste, there are a whole raft of legal requirements that you are now obligated to comply with in order to manage that waste stream within the constraints of the law.

Risk itself is the combination of severity and likelihood; so all means of quantifying risk are about trying to estimate these two factors 14

www.risk-uk.com

If your by-product is a waste stream, there are some simple rules to follow, this is known as you duty of care you must: Keep your waste securely so that it cannot escape or otherwise cause pollution – think about the container you store your waste in. Is it suitable to contain it? Will it react with your waste materials? Is it correctly labelled and marked up to ensure proper segregation? Does the waste need to be kept separate from other waste streams? If you give your waste to someone else, for example a waste contractor, you must check the person is authorised to take it. Anyone transporting waste should have a waste carriers licence. Ask your contractor to produce evidence that they are authorised to carry waste. You must ensure that the person taking your waste is taking it to an appropriate facility - you should seek evidence that the end point for your waste is licensed or exempt from the need for a licence. Any transfer of waste should be accompanied by the correct waste transfer documentation – this will take the form of either a transfer note or a consignment note depending on the type of waste you are transferring. The documentation must include a description of the waste and be signed by the transferor and transferee. Keep copies of your transfer notes for a minimum of two years and consignment notes for a minimum of three years. Since the 28 September 2011 a declaration is signed on the transfer note to indicate that the waste management hierarchy of options has been applied, see below. Defra has produced statutory guidance for the Duty of Care - this guidance is planned to be consulted upon during 2013 and amendments to the guidance will be made following consultation. There is an accepted hierarchy that is generally applied when looking at how to control risk, the following options should be explored in order. Elimination – can the job be redesigned or a material changed so the hazard is eliminated? Substitution – replace the material or process with a less hazardous alternative. Engineering controls – using plant and or equipment to control the risk. Administrative controls – putting in place procedures to manage and reduce the risk. Personal protective equipment – only once the other options have been tried and proven ineffective should this option be used. There are similar hierarchies for looking at waste by-products and how to manage them that consider the minimisation of environmental


EDIT article 2 dec13_riskuk_dec13 03/12/2013 17:28 Page 5

Public health

impact. The Waste (England and Wales) Regulations 2011 require that virtually all businesses who produce or dispose of waste must take reasonable measures to apply the waste hierarchy. In fact most businesses now regularly sign a declaration (on waste transfer documentation) that states they have considered the waste hierarchy.

Record and implement Once you’ve been through the steps above it is important to ensure that the findings are documented and that any required steps are properly implanted. Documentation is vital so that you can show interested parties; staff, regulators, insurers, the steps that you have taken to identify and manage the risks from your processes. It is also essential that key stakeholders are provided with information and training on how to minimise and control risks and good documented risk assessments will help with this process. Implementation, especially during tough times, can be more difficult. You must try to prioritise and your risk assessments should help you to do this effectively. Make a plan of action and try to deal with the most important issues first. Good plans will prioritise solutions for those risks where you are out of compliance, these may be areas where the risks are most likely to cause accidents and ill health and will generally concentrate on those risk with the greatest consequence. You may also want to prioritise cheap and easy improvements that can be undertaken quickly – not all measure need be expensive, difficult and time consuming. A good management system will help you to build a framework for effective management of risks be they environmental or health and safety risks. ISO 14001 and OHSAS 18001 are internationally recognised management systems standards for environmental and health and safety management systems respectively and attainment of these standards will improve your risk control and also demonstrate a level of good management for your stakeholders.

Review your findings The final stage is to start the process all over again! Risk management is a dynamic process and there are a whole host of reasons why your systems and analysis should be regularly reviewed. As a business, over time, your systems and processes may change, you may use new raw materials, or scientific knowledge around your exiting materials may change and develop. You should develop, a part of a management

Businesses should ask themselves, do we have a crisis management plan and does it cover the foreseeable risks that might arise? systems regular intervals where your risk assessments are reviewed. Go back to the start of this process, are your process and activities still the same? Are their additional legislative controls in place? The landscape of management of risk from chemicals is a rapidly changing area and most business are likely to be affected in the next few years by changes to the law, for example REACH regulations and changes to labelling and classification brought in under CLP regulations. Have your source, pathways and receptors changed? Changing land use around your company, for example, may suddenly introduce potentially sensitive receptors such as domestic properties that may be sensitive to odourous or dusty by products you produce. Do not wait until it is too late to change your risk assessments, again a good management system should help you here by implementing change management procedures that flag up risk assessment as a necessary part of planning any change. This should help you as a business avoid any potentially expensive or high risk changes to your processes and activities.

Are you prepared for the worst? Hopefully a properly considered and implemented environmental management system will ward off potential crises and disasters but businesses should always ensure they have a crisis management plan to ensure they are properly prepared should the worst occur. Businesses should ask themselves, do we have a crisis management plan and does it cover the foreseeable risks that might arise from a failure in our environmental management system? Who is going to manage the crisis do we have a team identified? Are we trained and experienced enough or do we need to undertake a crisis simulation? Have we thought about business continuity and disaster recovery? How will we handle press, customers and suppliers? And ultimately, are we confident we can handle a crisis? If not, now is the time to act, don’t wait until it is too late.

Authors: Dan Wellington is principal environmental consultant at health and safety consultants, Peak HSE. Stuart Ponting is a legal director at law firm DLA Piper UK LLP and handles some of the UK’s largest corporate crime investigations.

15

www.risk-uk.com


EDIT article 1 dec13_riskuk_nov13 03/12/2013 17:28 Page 2

Tampering with assets Tim Richards looks at the need for tamper protection and the damage that can result from inadequate security measures

strong company reputation is hard to build but easy to lose. Exceptional customer service or a strong, identifiable brand identity can create a stellar reputation. Most would agree though, that a good quality product is critical. In the current environment, a company cannot simply sit back and let a product move from design to end-consumer without taking steps to ensure the product is tamper free.

A

By definition Tampering is generally referred to as the deliberate altering of a product – either subtle alteration of the contents or even the outright theft of the internal product, usually with the packaging left intact. Network packages and systems are not immune from tampering. Reliance on ever sophisticated technology has become the norm, but does your company really have watertight systems in place to ensure that it is tamper proof? Losses can have a heavy burden on finances and many technologies are embedded in products which would be extremely costly to replace. There is no single solution to ensuring that assets are tamper-proof. The issue of security – really useful, complex security (a step far beyond a burglar alarm and a key) – often features low on a company’s agenda. It is important to undertake a full review of the product and systems to assess where vulnerabilities may lie. It is just as important to have a frank discussion to identify who the potential tamperer might be. For example, are you at risk from hackers, external interferers or the company’s own employees? Each potential tamperer will have a different level of information and knowledge of the risk-asset, and will have a different level of sophistication. It is common knowledge that

Protecting assets is not simply a one-stop shop. There are many means a tamperer can use to cause significant damage to a company 16

www.risk-uk.com

hackers are getting far more adroit and complex in their methods and yet there is still is little information in the public domain about utilising appropriate security. As well as identifying potential tamperers, it is also important to identify all means of access to the asset. For employees, this may be evident, but not so easy to identify the access from an external threat.

Good security Having faith in your employees is not a replacement for having adequate internal security mechanisms. You must assess the scope of your employees’ exposure to the company’s assets. For example, do they have unfettered access to all technology and documents? If they do, it would be prudent to control and limit their access to technology and sensitive information. A Global Fraud Report (undertaken by Kroll) reported that 60% of fraud affecting companies in 2011/12 was carried out by employees. When recruiting, make sure all new staff are vetted. Tampering activity can be very hard to spot and you may find the full financial repercussions are evident when it is too late. It is legal to carry out credit, national insurance and criminal record checks, and all information given to you by an employee should be verified. This won’t reveal whether or not your employee is likely to tamper, but at least the relationship can begin with full disclosure. The repercussions of employee tampering can be devastating. An employee at a supermarket in Michigan injected 1700 pounds of packaged beef burgers with insecticide in an attempt to get his supervisor into trouble. Fortunately there were no fatalities, but over a hundred people became very ill. The employee was given a nine year custodial sentence, but the company’s reputation was ruined. One of the easiest steps to take is to scope tamper-evident product packaging. This is not a new phenomenon. Even relatively recently, legal documents were bound with a wax seal to show that no other person had interfered with the content. It was commonplace until the 18th Century for tamperers to replace flour with chalk and sugar with sand and resell the surplus. Sadly, this is still common practice in developing countries. Product packaging has a big job to do. It has to contain and protect the product, as well as sell the brand, communicate and inform the consumer and be convenient. It must ensure that the product is received sterile with no alterations in consistency or chemical balance. When balancing all these characteristics, perhaps it’s no surprise that being tamper-proof is not at the forefront of package design. Security labels are often used, designed to


EDIT article 1 dec13_riskuk_nov13 03/12/2013 17:29 Page 3

Asset protection

leave no visible residue on the surface. Some labels can indicate evidence through supported technology of any attempt to remove the label. This can alert a company to potential tampering and enable them to make investigations before any major losses have occurred. Some tamperevident labels are suitable for internal use, which have embedded technology to bring up data such as the repair and service history of the product, as well as any unlawful interference. Plastic seals are often used for food and drink, but it may be worth investigating more sophisticated asset protection for your product. Tampering can be an impulsive action; therefore, the longer it takes and the harder it is for a tamperer to access a product (or a system), the more likely that they will give up and move on. The Chicago Tylenol case in 1982 is a prime example of when tampering has dramatic effects. Seven people lost their lives as a result of tamperers replacing Tylenol (one of the leading-brand paracetamol products in the US) with potassium cyanide before the end-sale. The case is still unsolved, but resulted in tough legislation tackling tampering in the US. The Pharmaceutical Association of Great Britain followed suit, issuing Guidelines on Security Packaging. The packaging of medicine is now contained in the Human Medicine Regulations 2012, which contains detailed requirements for pharmaceutical packaging. End consumers are becoming more aware of the issue of tampering and have been subtly educated to look out for warning signs. Most customers know that they should not purchase a glass jar where the lid depression has popped. Food packaging must be compliant with the guidelines set out by the Food Standard Agency and with the many European regulations. It is important to ensure that your products comply as, if evidence of tampering is found, it may be necessary to recall all your stock, a measure that can only result in financial loss and a damaged reputation.

Delivery risk Assets are extremely vulnerable during any delivery process. Attacks are becoming increasingly common as organised criminal gangs are targeting lorries carrying high value assets. Vehicles parked in unlit lay-bys and trucks parked with their fuel tanks facing away from the road are key targets. Recent figures indicate that theft of goods in transit is costing businesses in Europe in excess of £6.6bn a year. There are a variety of safeguards which companies should consider implementing in order to avoid the significant financial implications of tampering during transit. When

contracting a specialist haulage company, it is important to carry out full background checks on the haulage company. Well established, reputable haulage companies are likely to understand the importance of handling valuable goods with care and precision. Companies should beware of people tipping off or bribing security officers and drivers and so it is important to carry out verification checks on the haulage company’s employees, for example by checking licences and references of the drivers. Technology can be an issue Security of technology can be complex and costly, but there are simple steps a company can take to ensure their systems remain tamper free. Within the office, you should ensure that all network cabling is visible (perhaps by use of clear conduits) and all switches and sockets are displayed in a glass fronted cabinet. This will deter a tamperer from attaching any unusual device to the network and any signs of interference will be evident. Computers holding sensitive information can be housed in glass cases, which keep a record of when the case was last opened. It is also possible to set such a case with a radio controlled alarm, which transmits a silent alarm when the case has been opened unlawfully. Cryptographic technology can also be used to create a tamper-evident layer of protection to documents (also known as an electronic signature). Most companies embrace the opportunity to share information in cyberspace and many are heavily reliant on this means of promotion. However, companies are hugely vulnerable when utilising the internet. It opens up a company’s system to hackers and tamperers who could infiltrate their systems and alter or steal their intellectual property. Hacking is widespread, usually free and very simple to learn. A tamperer can happily interfere with your systems with very low effort in the comfort of their own home, but their actions can have a huge effect. The threat of hacking can be internal as well as external; therefore it is important to put in place internal security measures. The tools of cyber criminals are developing in sophistication and security measures must step up to meet this risk head-on. Protecting assets is not simply a one-stop shop. There are many means a tamperer can use to cause significant damage to a company, and therefore, different measures must be taken to meet those risks. A company must carry out a thorough risk assessment and talk seriously about how to tackle any identifiable vulnerabilities. Not only will this ensure the protection of a company’s assets, but also a commitment to security will impress endconsumers and suppliers.

Author: Tim Richards is a commercial disputes partner at Michelmores Solicitors. He heads the firm’s Manufacturing Sector Group. He was assisted with this article by Lola Becker.

17

www.risk-uk.com


Project1_Layout 1 28/10/2013 11:45 Page 1

FUTURE PROOF YOUR BUSINESS

...AND SAVE MONEY WITH OUR WISENETIII IP SOLUTION At Samsung we understand that the decision for when and how you migrate to an IP security solution is a complex one, influenced by many factors. Our new range of WiseNetIII network cameras have both an analogue and IP output, as well as onboard SD card recording. This gives you complete control and flexibility to make the right decision to suit your business. Integrate WiseNetIII onto an existing analogue system, whilst recording Full HD onto the SD card, or take advantage of the dual output and record locally to your analogue recorder whilst simultaneously viewing remotely utilising the IP output. You don’t have to throw away the investment you made in your existing equipment – helping to improve Total Cost of Ownership!

Contact us for further information

E stesecurity@samsung.com

W www.samsungsecurity.co.uk/WiseNetIII


EDIT article 3 dec13_riskuk_dec13 03/12/2013 17:29 Page 3

Healthcare security

Security when needed the most he safety and security requirements in healthcare are unique. Hospitals are dynamic, stressful environments, where there is a high volume of people circulating, staff trying to do their jobs and expensive equipment that needs to be in the right place at the right time. In common with any other public space, you will find CCTV cameras, fire alarms and voice alarms as well as access control systems. What differs is that the design and location of security and safety measures have to be carefully tailored to the needs of the hospital. Jean-Paul Frenett, Marketing Executive at Access Control Technology (ACT) comments, “Access control has become absolutely essential in most healthcare environments, to both protect precious assets and to ensure only qualified or suitable staff enter certain areas. Modern access control software will also provide you with a full log of events on your system, so you can review who has accessed various areas and when. This can be linked to your CCTV system, so if you wanted to review the CCTV at a certain door during an event, such as someone forcing open a door, the information is at your fingertips. For the security team in any secure facility, the ability for the access control system to give live alerts and updates is essential, allowing staff to react to any incident as quickly as possible.” Indeed, Johan Åkesson Business Development Manager at Axis, says that there is a growing trend to link all security cameras to IP networks to allow for remote access. He explains, “Conversion is happening all over the world. In projects where there are already many analogue cameras installed, we provide convertor encoders that allow the cameras to be linked to the IP network. Although you cannot expect an improved resolution on the image captured by these analogue cameras, at least you can access them and adding cameras to the IP network is simple and cost effective.” Video encoders, such as the Axis M7014 and the P7214 - four-channel video encoders and the P7216, which offers 16-channels, can simplify migration to network video without upgrading existing camera systems. These products provide edge storage through microSDHC memory cards slots and support all types of analogue cameras including PTZ (pan/tilt/zoom) and PTZ domes.

T

Digitisation is the way forward. IP cameras and networks allow for video analytics and this can be used in the healthcare sector to find patterns, visitors’ flows and improve the whole environment. Also, the use of digital video recorders (DVR), cloud storage and IP HD cameras, is on the up in the healthcare sector. Pauline Norstrom, COO at Dedicated Micros says, “We see our NVR Media Server and SmartVu HD cameras being used in this sector. These are suited to healthcare because they have the ability to show high definition images for identification of people.” Dedicated Micros servers and cameras, as well as all its NetVu Connected products, can integrate video servers, cameras and domes, management systems, mobile viewing devices and video walls together without the costly impact of significant integration time. Pauline adds, “A shared user interface helps minimise operator training whilst powerful features such as direct configuration of PTZ cameras and domes from connected DVRs helps reduce installation time providing benefits to both end user and installerintegrator. For larger projects we offer a Cloud NVR architecture for a ‘fail-safe,’ secure IP video solution.” On the prevention of fire, Dedicated Micros has its FireVu for video smoke detection. Clym Brown, Marketing Director at Texecom explains that the Klaxon fire evacuation signalling equipment is widely used in healthcare. Brown explains, “In public access areas, effective fire evacuation systems assume no knowledge or training with regards to fire evacuation messages, so any messages need to be clear and unambiguous. One type of product that we do see being used in hospitals is our voice evacuation sounders. These products complement a fire evacuation tone with preprogrammable voice messages, clearly notifying visitors and staff of the type of

Geny Caloisi looks at security solutions in the healthcare sector

Security and safety measures have to be carefully tailored to the needs of the hospital 19

www.risk-uk.com


EDIT article 3 dec13_riskuk_dec13 03/12/2013 17:30 Page 4

Healthcare security

emergency in order to provide safe evacuation of the building.” Texecom brand electronic security equipment is used in hospitals for the protection of sensitive areas such as IT server rooms, medical supply areas and panic alarms for members of staff security measures play an essential role in preventing staff assaults. “Given that hospitals are permanently occupied, most areas do not require alarm systems but there are often requirements for access control,” says Brown and adds, “Our security control systems have integration capabilities with access control providers, noticeably TDSi, which allows personnel to use their ID badges for both access and setting / un-setting of alarmed areas.”

Who are you? We are unique individuals and, when it comes to healthcare, matching the right records with the right patient, or allowing in the right personnel to the correct area, can be a matter of life and death. To identify the individual, there are in the market several automatic identification and data capture (AIDC) technologies including: barcodes, biometrics, iris recognition, RFID and the latest vein scanner. Vein Scanner is a Fujitsu product for biometric identification using the veins of the person’s hand. Chetan Vasudev, Director Security Systems Technology, explains, “The sensor is non-intrusive. The person only needs to hover the hand over the scanner, so no need to touch it thus avoiding hygiene issues. The device is small enough to be mounted on laptops and can be used for access to patient identification, singing in for staff and to stop fraud.” Having the right people in the right areas will also help ensuring that equipment is correctly handled and doesn’t get lost. ACT’s Frenett says, “Securing equipment can be controlled in two stages. Firstly, access to areas with such equipment should be limited to trained or permitted staff only using control on entry doors. For more extreme situations, passive or active RFID tags can be used to broadcast the

“Given that hospitals are permanently occupied, most areas do not require alarm systems but there are often requirements for access control” 20

www.risk-uk.com

location of an asset.”

Care from the cradle to old age Two demographic groups are in greater need of special care: babies and the elderly. The use of security technology can provide peace of mind and allow caring relatives to be ‘virtually’ there. In the case of premature babies, cameras are being used to keep an eye on the child when the parent can’t be physically present. An example is the use of the Axis 210 camera at the Salvator-St. Ursula hospital in Hasselt, Belgium. These cameras provide superior quality in comparison to webcams and there is no need for using a PC locally, as you would with a webcam. At the other end of the scale are the elderly. According to research by the International Longevity Centre, in 1950, male life expectancy at 65 was 11 years. In the last sixty years this figure has doubled to 22, and by 2050 it will have risen to 26. People living longer than ever before, means that new measures have to be put in place to cater for them. Some seniors might have special needs or restricted mobility, but they might still want to keep their independence. This is where telehealth and telecare can be appropriate solutions. IP networks are essential in these cases allowing not only cameras but also other household appliances to be integrated into the network. Kenton Madge, Commercial Director UK & Ireland, Stanley Healthcare says, “In hospitals, we provide solutions for fall monitoring for the elderly. We also provide real time location solutions for tracking people and assets.” According to our experts, the key to ensure a safe and secure healthcare environment, resides in the integration of security technologies, whether it’s access control, AIDC or object tracking. With an expanding population and new needs, this integration has to go beyond the hospital walls and empower people to live their lives independently for longer while still feeling secure and cared for.


Project1_Layout 1 03/12/2013 12:06 Page 1

!


EDIT article 4 dec13_riskuk_dec13 03/12/2013 17:30 Page 2

Monitoring options

On your watch Adam Bernstein looks at the options for remote CCTV monitoring; outsourcing or going-it alone

he rapid advance of technology has not bypassed the world of monitoring services and what was once the stuff of science fiction is now a reality that all – individuals and businesses - can now afford to employ. So consider the growth of IP and mobile telephony technologies. These two alone have radicalised the way that protection and monitoring is undertaken. While detection and deterrence is something can now be run independently and watched on a smartphone by householders and small businesses, larger operations still need the professionals. The question for anyone new to the concept is though, how should they set up a monitoring system?

T

Monitoring Monitoring is the raison d’être of any system, and it can be done in house according to Steve Kimber, managing director or Southern Monitoring. However, Kimber doesn’t recommend it “unless you’re on an ego trip,” noting that “you will never have the professional infrastructure or knowledge to support the service and you will always get better value for money by going to a professional.” He adds that self-monitoring

Self-monitoring only really works where a firm is selfinsured and does not require a police response 22

www.risk-uk.com

only really works where a firm is self-insured and does not require a police response. “Insurers,” says Kimber, “insist on a BS5979 Cat2 alarm receiving centre (ARC) and/or remote video response centre and policy from the Association of Chief Police Officers insists that systems are installed and maintained by a SSAIB or NSI certificated installer [that follow this standard].” Kimber says that when choosing a monitoring service clients should ensure that they are certificated by NSI or SSAIB, be certificated for Fire, CCTV and BS8418 detector activated CCTV, employ SIA licensed operators be certificated for high integrity monitoring (that means no interruption to service) and be a Quality Assured. But there is something else that Kimber is keen to stress: “[The monitoring company] should be a service that operates two or more monitoring centres concurrently, that are geographically opposed, with a virtual alarm and telephony infrastructure.” The idea, of course, is to build in redundancy so that continual service is maintained. Kimber says this means the integrated use of dual path signalling devices that signal an alarm to two centres linked by a four way, separately routed, multi-layer network infrastructure. The principle being that they can operate independently or as one, four way alarm handling server with two phone systems so that neither centre can ever be offline with either alarms or telephony. The applications for remote monitoring can be as long as a piece of string and Kimber sees uses in a huge range of scenarios that have “an output that require a remote response such as lone worker, fire, security, access control, CCTV, industrial, environmental, counter surveillance, retail footfall, levels, pressure, depth, tracking, fridges, lifts, health, social alarms, hardware failure, open and close time violations, asset tagging, guard tours, traffic, vending, social media websites and so on.” Looking to the future, Kimber believes that technology will have an ever greater role to play in monitoring. He expects more data integration from sites with extended format signalling in conjunction with images and Voice over the Internet Protocol (VoIP); live 4G imaging from attendees - cars and people; smart dispatch of data to attendees; and greater and enhanced use of telehealth and telecare applications.

Connectivity Simon Banks, group managing director of CSL DualCom Group, is also of the view that firms are better off not self-monitoring saying:


dycon ad risk nov13_Layout 1 06/11/2013 14:01 Page 1

D15xx & D24xx SERIES DIN-rail Mounted 1-3A Power Supplies

• No fixing screws required, clips directly onto an NS32 (‘G-Section’) or an N35/7.5 ‘Top Hat-section’ DIN-rail • Efficiency higher than 90% at full rated output • 230vAC -12vDC, 230vAC–24vDC, 1–3 A output versions • 110vAC–12vDC version for construction sites • With or without battery backup

Dycon POWER SOLUTIONS


EDIT article 4 dec13_riskuk_dec13 03/12/2013 17:30 Page 4

Monitoring options

“monitoring stations offer a guaranteed standard of network infrastructure and as most of them have multiple centres they remove the risk of a single point of failure.” Choosing a supplier is critical and Banks says the pedigree of the product and proven track record of a company is a good place to start. However, the lifespan of a product should also be considered. “This,” says Banks, “is particularly the case for CCTV where mobile network 4G streaming will take CCTV to another level, increasing the rates at which live footage can be streamed and enabling portable solutions.” He says that a 4G SIM on the right network allows service providers to offer reliable high speed wireless connectivity with higher capacity and faster network services. Insurers have a hand in the choice of supplier though. Banks says that in the security signalling sector there are only two signalling providers that insurers specify by brand, CSL DualCom and BT Redcare, and he notes that: “choosing a product endorsed by an insurer provides the peace of mind in that it has been pre-qualified for its intended use.” But whichever supplier is chosen, reliability is crucial and this is why Banks says that a product backed by a managed network is essential. “This ensures that the critical connectivity required by the product to deliver its signal remains under scrutiny for its entire journey.” He says that the DualCom Gemini Managed Network offers customers “ground-

Choosing a product endorsed by an insurer provides the peace of mind in that it has been pre-qualified for its intended use 24

www.risk-uk.com

breaking line fault reduction technology by utilising intelligent filtration and data management within the managed network… [which combined with] a clever web portal called Gemini Insight means that installers and ARCs can search their entire signalling base by grade, postcode, chip number or status.” There are standards for the sector says Banks. Systems installers need accreditation from either the NSI or SSAIB to install monitored systems; PD6662:2010 applies the European standards for intrusion and hold-up alarm systems and installers must adhere to this; and signalling providers and manufacturers should follow EN50136. Overall, it’s the technologies used in monitoring that grant the key to success. In the past where radio coverage was poor Banks says the only option was to utilise a single path monitored alarm that used a telephone line, but as dual signalling is the preference of insurers and the police this is not ideal. CSL DualCom’s WorldSIM helps combat this - “The WorldSIM is able to utilise all UK mobile networks and will transfer to the best available network if signal strength falls below the recommendation, so no line fault is sent to the ARC,” says Banks.

Displays A monitoring system without a good screen is pointless and cutting corners can be a very dangerous game to play. So when buying monitors Jack Yu, sales and marketing director of AG Neovo EMEA, says firms should seriously consider carefully their purchases and take account of compatibility: “Buyers not only have to consider the size of the display and resolution, but also if it is compatible with the other devices.” Yu points out that if, for example, a buyer is using an HD camera they not only need to use high-resolution monitors, but also require high-quality connectors. Yu says that buyers tend to overlook the importance of environment specific features when choosing the right monitor. “To be specific, security and surveillance centres need equipment that meet the complex requirements of modern security systems, as well as to stand up to the rigours of operating 24 hours a day, 7 days a week.” Yu outlines how monitors that are installed in rough environments need a hard glass and metal casing to protect it from being damaged – “this should be a critical feature for decision makers and buyers should look for monitors that fulfil the requirements of their specific environment.” While firms can buy an off-the-shelf monitor, a professional product will fit the need better. Says Yu: “We believe that professional displays


Project1_Layout 1 06/08/2013 12:13 Page 1

Security solutions for today’s challenging times

Consultancy Operational Consultancy Manned Guarding Training Information and Intelligence Communications Support Technical Systems Equipment

Global economic pressures are forcing organisations to review expenditure across the board. But, the security issues remain the same. So, do you cut your security? Pilgrims offers a complete and complementary range of security, communications and support services, backed by an unmatched commitment to the highest level of quality, efficiency and client care, to reduce costs not cover. Our expertise and global experience allow us to deliver robust, practical solutions for today’s challenging financial climate.

For more than ten years, Pilgrims has been supporting clients across the globe, protecting and enabling their businesses to continue in spite of threats from terrorism, serious organised crime and natural disasters. Our personnel are handpicked for their experience, skills, training and personality to match the requirements of our clients. This, combined with our continual exposure to the world’s hot spots and difficult regions, makes Pilgrims the ideal choice for advice and support. Pilgrims provides a global service, with local knowledge through our employment of local personnel, quality control, continual ongoing training and our relationships with specialists and local partners.

We can help you find the right solution. Call Pilgrims on: +44 (0)1483 228 786 www.pilgrimsgroup.com


EDIT article 4 dec13_riskuk_dec13 03/12/2013 17:31 Page 6

Monitoring options

should be much more than desktop monitors they require features to match the requirements of the environment.” Monitors are run for extended periods of time and need to be built to cope accordingly. Yu notes how AG Neovo’s Anti-Burn-in technology tackles burnt-in ‘ghost images’. Burnt-in images occur when fixed screen images are displayed for long periods of time resulting in the polarisation of the liquid crystal material contained within the TFT LCD panel. As noted earlier, monitors need to be hardy and the firm’s NeoV Optical Glass is designed for displays that are installed in tougher environments. The product is an example of a specially formulated, hardened optical glass – with proprietary multilayer coating that enhances image quality, and protects the screen from any incidental damage incurred in high-volume environments. In specifying monitors for purchase, Yu says that performance and scalability are the main criterion for buyers. “A system should meet the buyers’ requirement for performance and it should be scalable for future expansion.” It’s because of this that AG Neovo designs its products to support signals of multiple aspect ratios and different video inputs. And of the future? Yu thinks that the security and surveillance industry is increasingly shifting to software that allows user-friendly touch navigation in place of mouse/stick control: “We see great potential for touch monitors in the future in the security and surveillance environments.” Understandably the company offers a series of multi-touch touch displays for this use.

The control room Every monitoring solution needs a station to house it. Claire Brown, marketing manager at monitoring station vendor Winsted, believes that regardless of the health and safety or efficiency arguments, ergonomics is always a financial concern, particularly in highly technical industries where control rooms require a much greater investment. “A welldesigned control room balances efficiency with ergonomics by fitting the surroundings and demands of the job to the capability of the operators,” says Brown, adding, “a [major] aspect of any successful ergonomic room is the

Choosing a modular solution for your control room furniture can future-proof any furniture purchased as extra modules can be added-on 26

www.risk-uk.com

console – it is the piece of the puzzle that connects the operator to the technology and therefore has a significant impact.” And this is what EU Directive 89/654/EEC partly picks up upon, in Annex II, where it covers “freedom of movement at the workstation.” For Brown, there is little question that ergonomic environments result in greater comfort and improve the performance of operators monitoring very complex systems. However, she says that the management is likely to judge these benefits by their financial return on investment than their direct effect on operators. An international standard - ISO 11064 - is the backbone of ergonomic design of control rooms and Brown sums the essence of its approach as “user-centred design.” “Before any purchase can be made users need to spell out the goals of the control centre in various situations,” says Brown. This includes normal, off-normal, emergency, outage, and start-up conditions. She adds: “Determine what systems are required to accommodate these conditions and then list the functions best undertaken by machines (repetitive tasks), followed by those functions at which human operators are superior (coping with unexpected situations).” The result, says Brown, will define system specifications for computers as well as those tasks to be conducted by human operators. Clearly cost is an issue for every installation and Brown says costs can be greatly controlled and reduced by getting a control room properly designed from the outset. “Choosing a modular solution for your control room furniture can future-proof any furniture purchased as extra modules can be added-on should an expansion be required,” Brown notes. Of course custom or off-the-shelf will have price differences. Winsted, for example, have a stock custom offering as well as a range of standard off-the-shelf products ready to ship and install immediately. The company also offers the option to customise consoles or totally bespoke solutions. “The solution would obviously affect the project cost,” says Brown. “We have installed in modern purpose-built rooms where an off-the-shelf system is ideally suited.” So whatever part of a monitoring system is being considered, firms have much to think about. The message though, seems to be that self-monitoring is not for the faint of heart; it requires much investment and time and realistically will be undertaken more successfully by the professionals.


Project1_Layout 1 03/12/2013 18:21 Page 1

airside chauffeuring

secure logistics airside bussing

passenger screening

Wilson James has had a highly positive effect on passenger’s overall experience at Luton Airport. Luton Airport

covert testing

materials screening

WJ’s performance was second p to none and our relationship is all the stronger as a result. Manchester Airports Group (MAG)

Angus Wilson, Director Aviation & Maritime Services angus.wilson@wilsonjames.co.uk

Southern Monitoring 0844 871 2223 and Northern Monitoring 0844 871 2224 BT BT Redcare Redcare CSL CSL DualCom DualCom EMIZON EMiZON ArchAngelPassivSystems Loneworker RISCO RISCO Group Group RSI RSIVideo Video Technologies Technologies WebWayOne WebWayOne

Trust the Largest Independent Supplier of Monitoring Services in the UK


EDIT article 5 dec13_riskuk_nov13 03/12/2013 17:31 Page 2

A fresh look at protection

A security rethink is required to tackle emerging threats, says Martin Baldock

he arrest recently of a significant UK cybercrime gang has highlighted the growing importance of combating cyber risks on multiple fronts. Targeting a Barclays Bank branch, a bogus service engineer had installed an ‘old school’ keyboard-video-mouse device (KVM), connected to a 3G router, which allowed access to systems to enable funds to be siphoned from customers’ accounts. It was the second such attack, following an earlier, unsuccessful, attempt at a branch of Santander. Banks remain high on criminals’ target list but cybercrime is a growing risk to all organisations, according to senior executives from a wide range of industry sectors. Even so, there is limited evidence to suggest businesses are stepping up to address such threats and, importantly, encourage greater cooperation between those responsible for IT, building and physical security. There is a clear need for a dual focus and better alignment of physical and technology security efforts. For example, research by US telecoms group Verizon has found that 10 percent of breaches involve some form of physical attack, while a further 5 percent result from “privilege misuse”. Physical tampering was ranked as the second most dangerous threat action used in single-action breaches, after the “exploitation of default or guessable credentials”.

T

There is a clear need for a dual focus and better alignment of physical and technology security efforts 28

www.risk-uk.com

Other surveys have produced similar findings, with physical theft of computers by outsiders remaining a common cause of breaches. In 2009 the US National Nuclear Security Administration (NNSA) – which is responsible for the management and security of the nation’s nuclear weapons, nuclear non-proliferation, and naval reactor programmes – criticised Los Alamos National Security (LANS), the contractor responsible for security at the Los Alamos National Laboratory, for its apparent mishandling of computer thefts from the facility’s weapons laboratory. The NNSA found that the lab “had made great strides in improving the robustness of cyber security implementation”. However, the report highlighted the risks of dealing with cyber security in isolation, where the theft of computers were treated as a stand-alone “property management issue”, which uncovered “several property management, accountability, incident reporting and cyber security concerns”. With technology convergence the risks have grown exponentially. A client recently identified a breach through an Internet-enabled heating control system. Because no one was particularly concerned that hackers might adjust the office temperature remotely, the system was poorly defended. However, since the company used the same servers to host both the heating system and primary user data, a sophisticated hacker used the entry through the control system to install software that ultimately provided access to all data on the server – including in that instance key corporate secrets. Organisations need to recognise that an IT security breach is often tied up with a general security breach. In my experience, in large percent of cases where an organisation has suffered a cyber incident, there has also been a breach of physical security that has been used to identify a technical weakness. Such failings may have seen passwords written down, simplistic or shared passwords, social engineering or direct access. To address these challenges, there must be greater interaction between IT security and physical security teams. This should start with the development of a culture where both teams share the same view of security – that a cyber breach may expose failings in the physical security of the premises, while increased cyber risk may require more restricted physical access to certain parts of the building and office equipment. Investigations into either physical or cyber breaches also need to involve


EDIT article 5 dec13_riskuk_nov13 03/12/2013 17:35 Page 3

Cybercrime

both parties, as weaknesses in one area of security can have serious repercussions for the other. Any response should, therefore, involve both sets of security expertise. Effective leadership is essential. The best people to monitor whether staff follow the integrated security approach are those at middle-management level, who will have a better understanding of the operational issues, and will see at first-hand where flaws in security – and procedure – may occur. Department heads and the board can then implement any over-arching changes that need to be made and ensure that they are communicated from the top-down. More technology is not always the right answer. If a breach has occurred – or is likely to occur – adding additional software or hardware may take days or weeks and there is no guarantee employees will install this correctly. Also, the original breach may have been caused by physical tampering or theft and would, therefore, require an investigation and response from the physical security team and, possibly, HR. Having third-party local expertise to hand as a ‘first responder’ can be useful. However, the in-house IT security and physical security teams should also be an integral part of this process. This will ensure all procedures and controls are regularly tested and further reinforced with staff security workshops. The additional benefit of involving the in-house teams ensures volatile digital evidence will be preserved or untouched

If a breach has occurred – or is likely to occur – adding additional software or hardware may take days or weeks until appropriate technical response is available. A key element in effective security management is better incident reporting but weak alignment between the IT and physical security functions could limit its effectiveness. Commonly, IT security staff will report incidents upwards to the CIO, who will then escalate it to the rest of the board. However, physical security experts will report their findings to the facilities management team, who will then report to the CFO. As a result, there can be two different sets of information and two very different paths. Worse still, the same incident could be potentially rated very differently as to the risk posed to the organisation. To address such issues, both groups of security professionals must share the same culture and view of the impact of physical security on IT systems. The unravelling of the KVM gangs proves beyond doubt that a joined-up approach to security is urgently required. Financial institutions have amassed significant experience in tackling such challenges and the time has now come to recognise that the current threat landscape requires a fresh look at managing cyber risks.

Author: Martin Baldock is a London-based managing director at Stroz Friedberg, a digital risk management and investigations company.

29

www.risk-uk.com


EDIT cyber news dec13_riskuk_dec13 03/12/2013 17:36 Page 2

Cyber Security

Cyber and Data Security News Phishing emails target Brits Bitdefender has warned that 0.5 per cent of all spam sent worldwide is targeting customers of British financial companies including PayPal, Lloyds Banking Group, HSBC Holdings and Barclays Bank. These e-mails are designed to steal critical bank-related data by tricking people into typing in sensitive identification information including banking username and password, credit card number, expiration date, name, and country. Some spam e-mails deliver fake bank forms, while others distribute the infamous Zbot Trojan hidden in attachments. Catalin Cosoi, Chief Security Strategist at Bitdefender, says: “0.5 per cent of phishing emails might sound like a small number, but phishing attacks are less random than other types of spam. Some phishers send a message for a few hours, stop to alter the content or attachment to avoid detection and then send it again.”

Spike in malicious spam targeting personal data A recent Kaspersky Lab report has warned about the growth in malicious spam targeting user logins, passwords and confidential information. While the volume of spam is down by 2.4 percentage points, the proportion of malicious spam grew more than 1.5 times, according to the study. Compared to the previous quarter, Q3 2013 saw the level of phishing emails increase threefold. Trojan-Spy.HTML.Fraud.gen topped the rating of the most popular malicious program spread by email. This malware is designed to look like an html page used as a registration form for online banking services and is used by phishers to steal financial information. The third quarter of 2013 was full of newsworthy events which grabbed public attention, such as the birth of the royal baby in the UK, the FBI hunt for Edward Snowden and the railway accident in Spain - all these stories were used by fraudsters to distribute malware. The links contained in these emails

30

www.risk-uk.com

IT needs to regain vote of confidence ‘The Global IT Trust Curve’ survey, an international research carried out by market research firm Vanson Bourne, found a startling low confidence levels in IT’s ability to avert unplanned downtime. According to the report, when it comes to security breaches and data loss, Chinese businesses place the most trust in their IT, and Japanese businesses the least. The UK scored average on almost all measures. The UK’s poor position is especially serious considering the cost of data loss and security breaches in the UK is well above the global average - £718,800 and £808,600 respectively, against a global average of £533,900 and £363,600. David Goulden, President and CEO of EMC comments, “The four big mega-trends in IT today are cloud computing, Big Data, social networking and mobile devices. Adoption and maturity of these trends must float upon a sea of trust, trust that my information is secure in the cloud, trust that my data won’t be lost or stolen, trust that my IT will be operational when it needs to be, which these days, is all the time. The more trust that can be earned and guaranteed, the bigger and faster the impact of these trends. Conversely, the less trust that is established, the more limited these trends will be. Where countries fall on the IT Trust maturity curve could affect their overall ability to compete.”

led to compromised websites which redirected users to a page with one of the most popular exploit kits, Blackhole. In October, the author of Blackhole, known as Paunch, was arrested in Russia. What this will mean for the future of the kit remains unclear, but Kaspersky Lab experts suggest it could lead to a drop in the number of malicious ‘news’ mailings.


Project1_Layout 1 01/08/2013 12:11 Page 1

Bringing together the entire security buying chain In 2014 IFSEC International, the largest and longest running security event moves to a truly international venue. With more than 40 years at the heart of the security industry, reČľecting innoYatiYe industry trends and SroYiding insight into the Oatest technoOogy to NeeS Eusinesses and goYernments secure Put the date in your diary now! www.ifsec.co.uk/add2014

IFSEC International is Sart of

PROTECTION & MANAGEMENT Week

WWW.IFSEC.CO.UK

17-19 JUNE 2014 ExCeL LONDON


EDIT cyber news dec13_riskuk_dec13 03/12/2013 17:36 Page 4

Cyber Security

COMMENT: Social media should be observed closely Social media is here to stay with some analysts predicting that by 2016 as many as 40 per cent of enterprises will use social media as a customer service channel. The power and reach of social media can affect a whole organisation. In this area is where the saying ‘It takes a lifetime to build a good reputation, but you can lose it in a minute,’ is most true. The main problem is that the communication channel is inherently disparate and very individual The instant spread of bad news or a negative incident via social media can affect companies greatly. The culprit can come from inside, outside or be the consequence of carelessness. To manage social media normal risk assessment rules apply: identify, record and mitigate. The first step is to identify potential risks, in the case of social media these include: confidential information being shared by employees or employees defaming the company through their personal accounts; loss of control or ownership of the organisation’s social media accounts; failing to respond to negative posts or responding in an inappropriate manner or neglecting to listen to the social media dialogue. A lack of attention to detail in terms of knowing how usernames and passwords are being shared means that in the event of something going wrong no-one is accountable or traceable for posting the offending content. The lack of an audit trail makes it difficult to identify who and why a damaging internal post has appeared. Likewise, is it clear who is responsible for replying to external negative

32

www.risk-uk.com

comments and in what tone? Adding fuel to the flames can make matters worse but if the source of that fuel cannot be identified steps to call a halt and correct the situation will take precious time. To record and manage potential social media risks the second step is to implement an enterprise control platform that works seamlessly across the entire organisation, from marketing to customer service and operations. A single dashboard, such as that from CrowdControlHQ, provides controlled access to an organisation’s social media profiles monitoring who is authorised to make posts and the content of those posts. Individual logins only known by administrators will maintain security while greater control of abusive comments including keyword alerts (such as swear words) means content can be quickly and automatically removed Including a wiki area in the enterprise control platform means there is an easily accessible store for training materials, policies, guidelines and procedures. These documents can be made available to all users or specific user groups and workspaces in the event of either an internal or external risk being identified to allow a fast response. Mitigation is the third step when it comes to the control of social media risk. Nothing should be done in haste. In the event of the worst happening social media channels should be kept open and readers kept informed as to what is being done to remedy the situation. Openness and clarity are essential. In the event of the crisis having been created internally, audit trails and validation will soon identify the source and allow the necessary actions to be taken. If the crisis was as a result of an external source, the right people required to respond will be alerted and the appropriate reaction documented. So while there is no doubt that social media will continue to move up the risk register, by implementing sound processes and procedures supported by an enterprise control platform risk managers should still be able to sleep soundly at night.…....


EDIT ria dec13_riskuk_dec13 03/12/2013 17:52 Page 1

Risk in Action

Circus training school improves access control measures Challenges with controlling access to one of the country’s only circus training schools have been solved by an access control solution designed and installed by Delta Security. Circus Space, the National Centre for Circus Arts, approached Delta Security to devise a solution to manage and secure access for staff, students and visitors to different areas of the building, as well as safeguarding property and staff belongings. Terry O’Dwyer, Building and Leasing Manager, said: “We have had a few incidents of people being in the building who shouldn’t be there, and wanted to create a more secure perimeter. To put the challenge into context, not only do we have more than 100 full time students and staff, but we also have around 800 professional circus artists who use our facilities to warm up or train before a performance, and attract more than 600 visitors every week who are engaging in company team-building events or taking part in adult training classes.” Delta recommended a solution centred on a Salto access control system in which cardholders can be assigned different levels of access, including temporary access for visiting staff or performers, via a RFID-enabled Mifare card. The system can be securely managed from any PC on the network computer, enabling the movements of each card to be tracked, and if a card is lost it can be cancelled, traced and re-issued. More than 500 cards are now in issue, with each card doubling as ID with a photograph included. Terry says that the new system has been well received: “All of the feedback to date has been positive, especially from our reception staff who reported a 60 percent improvement in their working conditions by no longer being constantly interrupted to answer the front door. Since the system has been installed, we have also had no further incidents of intruders being reported.”

Risk in action

Leeds City Council extends use of CCTV enforcement Leeds City Council is extending the use of Videalert automated CCTV enforcement systems for bus lanes after a two-year pilot scheme that has delivered a reduction in offences of more than 74% and faster journey times for public transport users. The council has awarded a contract to roll the system out to an additional ten sites. Videalert bus lane enforcement systems were originally installed in late 2011 and cameras were initially installed to monitor bus lane offences in five city centre sites where the number of motorists illegally driving into bus lanes to avoid traffic congestion reduced by up to 90% in the first year alone. The system was rolled out to a further seven sites in 2012 including five on the A65 Quality Bus Corridor. As well as helping to speed up traffic flow and reduce bus journey times across the city, Leeds City Council is hoping that this will encourage more people to leave their cars at home and make greater use of public transport. The Videalert platform automates and streamlines the capture and video recording of vehicle contraventions and integrates with software that issues Penalty Charge Notices (PCNs) without needing additional manpower resources. This rapidly redeployable enforcement solution uses 3G to wirelessly transmit data to the council’s parking control centre allowing it to be used in any location. Leeds City Council has made cost savings as the system is compatible with existing CCTV cameras, minimising the need for investment in new hardware.

33

www.risk-uk.com


EDIT ria dec13_riskuk_dec13 03/12/2013 17:53 Page 2

Quarries extract maximum benefit from surveillance

Fire detection in new distribution centre Wagner UK’s Titanus Pro•Sens Air Sampling Smoke Detection (ASD) systems were chosen to provide advanced fire detection for Tesco’s latest 500,000 sq ft distribution centre, in Dagenham, Essex. The project was designed and installed by Leader Systems, who has completed the majority of fire alarm system installations in these latest generation Tesco distribution centres. ASD provides early smoke detection ensuring rapid response to a fire condition, protecting staff and the valuable logistics operation. A total of 24 Pro•Sens units were installed in a 1°C and a 12°C cold store and a separate recycling plant. The systems draw air samples continuously from the monitored area through a pipe system fitted with sampling holes at regular intervals. The airflow is then analysed for smoke particles and an alarm is raised if smoke is present. The Titanus ASD detection module uses a LED light source as opposed to a conventional laser, providing additional benefits including the ability to operate down to -40°C. Deep freeze areas create a demanding environment for fire detection, one that the ASD solution is well suited for, unlike traditional forms of detection. In the event of a fire, dilution of the smoke can occur because of the cooler air and increased airflow from refrigerating units. Icing can also take place when warmer air from neighbouring areas enters the cold store. Under these conditions point smoke detection may not activate. Wagner has also developed a clip for low-temperature applications that fits over the sampling holes and allows high-pressure air to be applied from the detector location to clean the pipe network.

34

www.risk-uk.com

Sabre Security Systems has installed Revader Totem PTZ cameras at eight quarries operated by Hanson who invited a number of installers to submit proposals to supply and install a video surveillance solution which would provide coverage at each of the eight quarries. Sabre Security Systems were awarded the contract based on their recommendations that Revader Totem PTZ cameras should be specified for the project. Chris Willett, Director of Sabre Security Systems said: “One of the main concerns at each of the eight quarries has been the activity that may take place at night or when the sites are closed during holiday periods. There has, for example, been a number of diesel thefts, as well as incidents of youths trespassing just to have some fun, and by doing so they have caused damage and put themselves in harm’s way by attempting to play with dangerous machinery.” The Totem PTZ is a rapid re-deployable vandal resistant camera and recording solution with a 36x optical zoom lens that can be remotely controlled to allow operators to observe close up detail of any activity and track the movement of people, machinery or vehicles. When not remotely controlled, the camera can be programmed to move to up to 128 pre-set positions. Its construction makes it ideal for harsh environments such as quarries, whilst the camera’s Day/Night functionality means that it can capture colour images when light levels are as low as 0.07 lux and monochrome images at 0.01 lux. Available with the option of Ethernet, WiFi or 3G connectivity, the Totem PTZ utilises the Linux based Wavestore video recording and management software. “Although the Totem PTZ’s are designed to be re-deployable, in this instance they have proved to be a cost-effective and robust method of monitoring the quarries compared to traditional CCTV cameras,” said Chris Willett. “The obvious additional benefit is that if required they can be quickly and easily removed and installed at another site.” A total of 13 Totem PTZ’s have been installed across the eight Hanson sites which are located in the North West of England and Wales. At night or at other times when the quarries are not operating, external intruder detection sensors trigger the transmission over 3G of live images of any activity to a call centre where an operator can verify what is occurring and if appropriate, call an authorised ‘key holder’. The recorded video of any incident can be remotely retrieved with the help of the Wavestore software.


EDIT ria dec13_riskuk_dec13 03/12/2013 17:53 Page 3

Risk in Action

Closers for Dorset complex

Football club scores with new system When Milton Keynes Wanderers FC took over residency at Kings Hill four years ago it inherited the responsibility from the local council to maintain and secure the site. But after just two years, the community football club suffered a costly break-in, putting a strain on its resources. As one of the club’s key aims is to provide a safe and secure environment for its members at all times, the management team decided that a new security system was essential. They needed a solution that would combine reliable, fault-free and rapid anti-intrusion detection with costeffectiveness. After looking at the choice of security platforms and manufacturers on the market, the management team chose UTC Fire & Security to deliver the solution. The preferred solution for the club’s premises was the new ATS Advisor Advanced intrusion detection platform. The range has evolved from the Advisor CD and Advisor Master ranges and brings together the assets from both these families and combines them in a future-proof platform. At the Club a line-up of UTC Fire & Security’s VE motion detectors is now deployed throughout the site and connected to the ATS Advisor Advanced intrusion panel. Together with the door contacts, this security solution ensures that would-be criminals can no longer enter the MK Wanderers FC premises without being immediately detected.

A £100m regeneration project at a leisure and retail complex in Dorset is using overhead transom closers from Alpro. Brewery Square in Dorchester features a multi-jet fountain, an ice rink and a bigscreen television which is used to show films and sporting events. The complex is on the site of a former Victorian brewery whose main building is set to be turned into a four-star hotel and spa. The overhead transom closers are a means of hydraulically controlling the opening and closing of aluminium doors. They are being used at main entrances to Brewery Square as well as on frontages for shops, boutiques, cafes and restaurants. The transom units can have light, medium or heavy spring strengths to suit type of usage, with a 90 degree hold-open option. Transom overhead door closers are designed to be contained within the transom header bar of the door. This concealed operation lends itself to period architecture such as the heritage sections of Brewery Square which date from the 1880s since the aesthetic appearance of doors is left uncompromised. Keith Parry, Divisional Sales Manager at Alpro, said: “Given the very wide range of applications at Brewery Square, the fact that speed of closure on our transom units can be adjusted is proving useful to the end-user. Transom closers are well suited for installation at heritage sites since alternative options such as spring hinges and floor springs present problems in terms of lack of adjustment flexibility which is crucial for a leisure destination with a wide visitor profile.”

Hotel group upgrades fire detection Reflex Systems has completed a project to upgrade the fire detection systems for the hotel group QMH UK. The contract was carried out over a four-week period, which involved upgrading the fire detection systems on 18 hotels, including twelve Holiday Inns, three Best Western hotels and three Crowne Plazas, stretching from Plymouth to Glasgow. Careful co-ordination had to be carried out by Reflex Systems to ensure that the impact of system downtime of the hotel’s systems was kept to a minimum. Reflex Systems utilised analogue addressable fire detection systems, which the company installed across the hotel group’s accommodation, leisure and conference facilities. The benefit of the new system is that it provides additional peace of mind for the hotel owners and occupiers, it also future-proofs the existing systems infrastructure so that the latest technologies and product ranges can be utilised and that they are compliant with the latest legislation which is backed up and maintained throughout the year by Reflex Systems. Paul Buttery, Fire & Security Business Manager of Reflex Systems, said: “It was a fairly complex operation to upgrade all the systems and vital that we could co-ordinate the integration of the new with the existing system infrastructure with the minimum amount of disruption to normal operations. This was carried out quickly and efficiently by our team.”

35

www.risk-uk.com


EDIT tif dec13_riskuk_dec13 03/12/2013 17:54 Page 2

Technology in Focus Remote locking and location of mobile devices Panda Security has announced the availability on Google Play of version 1.1 of Panda Mobile Security, its solution for protecting mobile devices running Android. Among other features, this new release includes geolocation and antitheft protection, allowing users to remotely locate, lock and erase the contents of their devices if lost or stolen. The main components include: Device locator, which tracks and displays on a map lost or stolen tablets or smartphones, Remote lock, which locks the device to prevent others from using it and Remote wipe which erases all data on the device, preventing access to all the information stored on it or on its SD memory cards. Additionally, the new version of Panda Mobile Security boasts an improved interface specifically optimised for Android tablets. Also, the option to send questions and suggestions to technical support has been enhanced as well. www.pandasecurity.com

Lock records access data Codelocks has launched a digital lock that enables managers to easily control and monitor door access. The CL5000AT tubular mortice latch lock records the use of individual access codes in an audit trail log. This can be useful in buildings where the protection of controlled assets or sensitive data is high on the agenda, as the lock will also register incorrect code attempts: a high number could suggest the lock is being tampered with. “Facilities and estates managers are demanding ever greater levels of control and convenience from standalone digital doors locks. The software we’ve created makes it much easier for managers to program and analyse the use of multiple digital locks under their control,” said Grant Macdonald, Managing Director of Codelocks. To find out exactly who went through the door, and when, users can download and review the door activity data using a USB memory stick and analyse the data on a computer. Each lock has a unique number, which makes it easy for users to review the door activity from many different locks using the Codelocks software supplied. www.codelocks.co.uk/page/view/cl5000at

Quick tracking solution A new ‘plug and play’ device from Enigma Telematics is aimed at businesses looking to quickly introduce a tracking capability, without the need for any invasive wiring. The SK410 works on any vehicle with an OBD-II on-board diagnostic socket and in most cases, the unit can be up and running within a few minutes of being plugged in. Installation can be carried out by the end user, rather than a specialist installer and can be up and running a few minutes after being plugged in. The SK410 provides a range of standard vehicle tracking data, including journey start and end, interval reports, speed, direction and distance, plus tamper alerting to indicate if the unit has been removed. It can also provide extra data through the OBD-II port, although this will vary depending on the type of vehicle. All data recorded by the SK410 can be accessed on Enigma’s Skyline 7.5 web platform and as well as via the standard PC web interface, users can access tracking data on the move with the Skyline app for Apple and Android tablet devices. www.enigmatelematics.com

One step application deployment and commission Xtralis has announced Xchange, a proprietary tool designed to deploy and commission applications in one step for the FastTrace 2/2X platform. Xchange simplifies and streamlines the licensing process and reduces overall installation time while ensuring quick and easy commissioning. Xtralis has sold over 26,000 channels of outside motion detection and continues to expand the application base for its customers. As announced earlier this year, IntrusionTrace is an i-LIDS approved primary detection system for operational alert use in sterile zone monitoring applications. The announcement of added thermal camera support and enhanced headlight suppression followed, and news that LoiterTrace, a detection analytic for unauthorised loitering, has been expanded to indoor and outdoor applications. www.xtralis.com

36

www.risk-uk.com


EDIT tif dec13_riskuk_dec13 03/12/2013 17:54 Page 3

Technology in Focus

360 degree camera added to range

Bollards for smaller depth applications Heald has announced the arrival of the shallow mount Fixed Raptor static bollard which offers security combined with a rapid, low cost installation. The Fixed Raptor is an evolution of the retractable Raptor, but offers a static solution with an even smaller true excavation depth of 200mm. No precasting of the pit is required, nor is any additional rebar. The bollard can be installed individually or as part of an array to secure an aperture of virtually any width. The Fixed Raptor was tested by MIRA to the new PAS68:2013 standards, with the performance classification of PAS68: 2013 V/7500(N2)/48/90:0.0/0.0. Requiring an excavation measuring only 1600mm wide x 1600mm long x 200mm deep, it is ideal for situations in which a traditional deep mount bollard is impractical or impossible - for example locations with underlying cables or ducting. www.heald.uk.com

IP camera range grows IDIS has launched a new range of cameras that grows its DirectIP line up to suit a range of customers with external and low-light requirements. The expanded line-up includes two new domes plus a bullet and zoom camera that all leverage DirectIP plug-and-play capability as well as being ONVIF compliant. All the new full-HD and 30ips models feature an array of capabilities comprising multi-streaming, two-way audio and alarm input/output, true day and night, PIR motion detection and use Power over Ethernet (PoE). The DirectIP series now includes: • Bullet (DC-T Series) – Full-HD 1080p resolution, 30ips, multiple streams, motorised focus zoom, true day and night, PIR motion detection, IR and white LED, vandal-proof,

Samsung Techwin has added a 360-degree high definition camera to its product range. The SNF7010 360-degree 3 megapixel camera provides users with the option of selecting from a number of display options including 360degree fisheye, single and double panorama, quad, rectangle or user selectable region. The ONVIF compliant SNF-7010, which features a digital PTZ, utilises Progressive Scan technology and supports up to six streams of videos using either H.264 and MJPEG compression formats, providing the option to simultaneously transmit images to multiple locations at various frame rates. A number of different users, if authorised, are therefore able to monitor live images at one location, record video evidence at another or view live. A built-in SD/SDHC/SDXC memory slot provides the opportunity for authorised users to remotely access and download video that has been recorded onto a memory card. Other key features include four polygonal motion detection zones, privacy masking, tamper alert and bi-directional audio. When combined with on-board video analytics, the built in microphone provides an audio detection capability. www.samsungsecurity.co.uk

heater, two-way audio and alarm I/O, PoE. • Zoom (DC-Z Series) – Full HD 1080p resolution, 30ips, multiple streams, 18x A/F optical zoon, true day and night, two-way audio and alarm I/O, PoE. • Speed Dome (DC-S Series) – Full-HD 1080p resolution, 30ips, multiple streams, 18x A/F optical zoom, true day and night, vandalproof, two-way audio and alarm I/O, PoE. • Flat Dome (DC-F Series) – FullHD 1080p resolution, 30ips, multiple streams, 56mm low profile design, true day and night, DNR, BLC, PoE www.idisglobal.com

37

www.risk-uk.com


EDIT tif dec13_riskuk_dec13 03/12/2013 17:54 Page 4

Technology in Focus

Real time door monitoring Assa Abloy Access Control has launched an Aperio sensor with integrated capability to detect and transmit door status information. Aperio is designed to upgrade mechanically locked doors and wirelessly connect them online or offline to new or existing access control systems, with minimal modification to doors and premises, offering a simple security upgrade. The new Aperio AS100 displays real time status of door access opening and closures, and notifies the control system wirelessly via the Aperio one-to-eight communication hub. Damian Marsh, Managing Director of Assa Abloy Access Control said: “Aperio AS100 sensor’s small dimensions and wireless design ensures it can blend into any environment, without affecting aesthetics.” www.assaabloy.co.uk/aperio

Rapid deployment camera with PIR ESP has added a new rapid deployment surveillance camera to its External Area Protection (EAP) portfolio. CanCam is a battery-operated, high resolution surveillance camera with integral PIR detector, SD card recording and black infra-red illumination. Suited for semi covert, instant deployment security operations and designed for external or internal use, CanCam will detect movement and instantly record images with time and date stamping, in all conditions day and night. Among the user settings the image capture type and resolution is selectable - either video with audio up to HD720P or stills up to 8MP recording directly to the 4GB SD card supplied. When the card is full, there is an overwrite option. Alternatively it is possible to use higher capacity cards up to 32GB. Recordings are taken from the removable SD card using windows media player for simple playback and transfer. Recorded footage can also be viewed directly via a PC or TV. The service life of the CanCam’s battery pack varies according to the resolution and image mode, however an optional plug-in power supply is included for more permanent use. The camera has a 6mm lens to match the detection angle of the PIR, is designed for pole or wall mounting and has an IP55 weatherproof rating. www.espuk.com

38

www.risk-uk.com

Perimeter system designed for installers Gallagher has introduced the K20 Tensioner Link System, a perimeter fence hardware solution developed to enable faster and increasingly consistent installation of the system while providing enhanced security and easier maintenance and trouble-shooting. Further key features of the system include durability, achieved through the choice of materials and coatings, and the potential to retro fit the upgraded technology to existing Gallagher electric security fences. Pivoting Mount Technology, and a range of accessories, enables the K20 platform to cope with a range of installation scenarios. The flexibility of the K20 system will continue to increase as the technology is developed and further components are added to the design. Future enhancements to the product’s basic capability include enhanced climb protection, cable management accessories, and an intermediate elevation strain insulator. www.security.gallagher.co

LED light source for security Freeway Lighting has announced a new SMD infrared sensor from Liteon for the security market. The Liteon LTE-R38386-S is an infrared LED light source that listed as ideal for all applications requiring security including CCTV. The LTE-R38386-S features high brightness (typically 300Mw/SR), a 90-degree angle, low power consumption for energy efficiency and the SMD provides ease of board mounting. Fewer components are used in this sensor for further efficiency and a reduction in weight. This product is also RoHS compliant. Richard Blackmore of Freeway Lighting Solutions commented: “The new Liteon Infrared Sensor is a great addition to the Freeway Lighting product offering, providing clients with even more choice in LEDs for all applications. Its high performance, long life and brightness means it is perfectly suited to all security applications.” www.freeway-lighting.com


nov13 dir_000_RiskUK_sep13 06/11/2013 13:18 Page 1

Best Value Security Products from Insight Security www.insight-direct.co.uk Tel: +44 (0)1273 475500 ...and lots more Computer Security

Anti-Climb Paints & Barriers

Metal Detectors (inc. Walkthru)

Security, Search & Safety Mirrors

ACCESS CONTROL

Security Screws & Fastenings

Key Control Products

Empty Property & Lone Worker Alarms

Traffic Flow & Management

see our website

ACCESS CONTROL & DOOR HARDWARE

ALPRO ARCHITECTURAL HARDWARE ACCESS CONTROL

ACT Unit c1 South city Business centre Tallaght D.24 Ireland www.accesscontrol.ie tel: 00 353 1 466 2570 UK Lo Call Number: 0845 300 5204

Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks, Waterproof Keypads, Door Closers, Deadlocks plus many more T: 01202 676262 Fax: 01202 680101 E: info@alpro.co.uk Web: www.alpro.co.uk

ACCESS CONTROL – SPEED GATES, BI-FOLD GATES

HTC PARKING AND SECURITY LIMITED

ACCESS CONTROL

APT SECURITY SYSTEMS The Power House, Chantry Place, Headstone Lane, Harrow, HA3 6NY Tel: 020 8421 2411 Email: info@aptcontrols.co.uk www.aptcontrols-group.co.uk B a r r i e r s , B l o c k e r s , B o l l a r d s , PA S 6 8

4th Floor, 33 Cavendish Square, London, W1G 0PW T: 0845 8622 080 M: 07969 650 394 F: 0845 8622 090 info@htcparkingandsecurity.co.uk www.htcparkingandsecurity.co.uk

ACCESS CONTROL

INTEGRATED DESIGN LIMITED

ACCESS CONTROL

KERI SYSTEMS UK LTD Tel: + 44 (0) 1763 273 243 Fax: + 44 (0) 1763 274 106 Email: sales@kerisystems.co.uk www.kerisystems.co.uk

Integrated Design Limited, Feltham Point, Air Park Way, Feltham, Middlesex. TW13 7EQ Tel: +44 (0) 208 890 5550 sales@idl.co.uk www.fastlane-turnstiles.com

ACCESS CONTROL

SECURE ACCESS TECHNOLOGY LIMITED

ACCESS CONTROL

COVA SECURITY GATES LTD Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68

Tel: 01293 553888 Fax: 01293 611007 Email: sales@covasecuritygates.com Web: www.covasecuritygates.com

Authorised Dealer Tel: 0845 1 300 855 Fax: 0845 1 300 866 Email: info@secure-access.co.uk Website: www.secure-access.co.uk

AUTOMATIC VEHICLE IDENTIFICATION ACCESS CONTROL MANUFACTURER

NORTECH CONTROL SYSTEMS LTD. Nortech House, William Brown Close Llantarnam Park, Cwmbran NP44 3AB Tel: 01633 485533 Email: sales@nortechcontrol.com www.nortechcontrol.com

ACCESS CONTROL - BARRIERS, BOLLARDS & ROADBLOCKERS

HEALD LTD HVM High Security Solutions "Raptor" "Viper" "Matador", Shallow & Surface Mount Solutions, Perimeter Security Solutions, Roadblockers, Automatic & Manual Bollards, Security Barriers, Traffic Flow Management, Access Control Systems

Tel: 01964 535858 Email: sales@heald.uk.com Web: www.heald.uk.com

ACCESS CONTROL – BARRIERS GATES & ROAD BLOCKERS

NEDAP AVI PO Box 103, 7140 AC Groenlo, The Netherlands Tel: +31 544 471 666 Fax: +31 544 464 255 E-mail: info-avi@nedap.com www.nedapavi.com

ACCESS CONTROL – BARRIERS, GATES, CCTV

ABSOLUTE ACCESS Aberford Road, Leeds, LS15 4EF Tel: 01132 813511 E: richard.samwell@absoluteaccess.co.uk www.absoluteaccess.co.uk Access Control, Automatic Gates, Barriers, Blockers, CCTV

ACCESS CONTROL – MANUFACTURER

FRONTIER PITTS

ROSSLARE SECURITY PRODUCTS

Crompton House, Crompton Way, Manor Royal Industrial Estate, Crawley, West Sussex RH10 9QZ Tel: 01293 548301 Fax: 01293 560650 Email: sales@frontierpitts.com Web: www.frontierpitts.com

Bletchley Park, Milton Keynes, MK3 6EB Tel: 01908-363467 Email: sales.uk@rosslaresecurity.com www.rosslaresecurity.com ISO 9001 and ISO 14001 Certification

ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES

UKB INTERNATIONAL LTD Planet Place, Newcastle upon Tyne Tyne and Wear NE12 6RD Tel: 0845 643 2122 Email: sales@ukbinternational.com Web: www.ukbinternational.com

Rosslare Security Products manufactures the Security Industry’s largest and most versatile range of Proximity and Smart Card readers.

MANUFACTURE STANDALONE ACCESS CONTROL PRODUCTS PSU’S, KEYPADS, ELECTRIC LOCKS, BREAKGLASS, EXIT BUTTONS

RGL ELECTRONICS LTD “Products to Trust – Power to Help” Pelham Works, Pelham Street, Wolverhampton WV3 0BJ Sales: +44 (0) 1902 656667 Fax: +44 (0) 1902 427394 Email: info@rgl.co www.rgl.co

www.insight-direct.co.uk Tel: +44 (0)1273 475500


nov13 dir_000_RiskUK_sep13 03/12/2013 17:58 Page 2

BUSINESS CONTINUITY BUSINESS CONTINUITY SOFTWARE & CONSULTANCY

CONTINUITY2 E232 Edinburgh House Righead Gate Glasgow G74 1LS Tel: +44 (0) 845 09 444 02 Fax : +44 (0) 845 09 444 03 info@continuity2.com

CCTV

G-TEC Gtec House, 35-37 Whitton Dene Hounslow, Middlesex TW3 2JN Tel: 0208 898 9500 www.gtecsecurity.co.uk sales@gtecsecurity.co.uk

CCTV BUSINESS CONTINUITY MANAGEMENT

CONTINUITY FORUM Creating Continuity ....... Building Resilience A not-for-profit organisation providing help and support Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845 Email: membership@continuityforum.org Web: www.continuityforum.org

PECAN Stortech Elec, Unit 2 spire green Centre Pinnacles West, Harlow, Essex CM19 5TS Tel 01279 419913 Fx 01279 419925 www.pecancctv.co.uk email sales@stortech.co.uk

CCTV / ACCESS CONTROL

PHYSICAL IT SECURITY

GENIE CCTV LTD

RITTAL LTD

CCTV HOUSE, CITY PARK, WATCHMEAD, WELWYN GARDEN CITY, HERTFORDSHIRE, AL7 1LT TEL: 01707 330541, FAX: 01707 330543 EMAIL: sales@geniecctv.com www.geniecctv.com / www.genieaccess.com

Tel: 020 8344 4716 Email: information@rittal.co.uk www.rittal.co.uk

BUSINESS CONTINUITY

CCTV/IP SOLUTIONS

4 Scotia Close Brackmills Northampton NN4 7HR 01604 769222 www.bcontinuity.com

DALLMEIER UK LTD 3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH Tel: +44 (0) 117 303 9 303 Fax: +44 (0) 117 303 9 302 Email: dallmeieruk@dallmeier.com

BUSINESS SALES BUSINESS SALES Caroline Exley FCA 01925 756970 info@abalymm.com www.abalymm.com

ABA Lymm

CCTV & IP SECURITY SOLUTIONS • • • •

Business acquisitions Disposals Valuations & advice Confidential

Specialist in buying and selling security businesses

CCTV

PANASONIC SYSTEM NETWORKS EUROPE Panasonic House, Willoughby Road Bracknell, Berkshire RG12 8FP Tel: 0844 8443888 Fax: 01344 853221 Email: system.solutions@eu.panasonic.com Web: www.panasonic.co.uk/cctv

COMMUNICATIONS & TRANSMISSION EQUIPMENT

KBC NETWORKS LTD. SURVEILLANCE / CCTV

IDIS EUROPE 1000 Great West Road, Brentford, LONDON TW8 9HH Tel : +44 (0)203 657 5678 Fax : +44 (0)203 697 9360 uksales@idisglobal.com

Barham Court, Teston, Maidstone, Kent ME18 5BZ www.kbcnetworks.com Phone: 01622 618787 Fax: 020 7100 8147 Email: emeasales@kbcnetworks.com

DIGITAL IP CAMERAS MANUFACTURERS OF A COMPLETE RANGE OF INNOVATIVE INFRA RED AND WHITE LIGHT LED LIGHTING PRODUCTS FOR PROFESSIONAL APPLICATIONS INCLUDING CCTV SCENE ILLUMINATION, ARCHITECTURAL UP-LIGHTING AND COVERT SECURITY.

ADVANCED LED TECHNOLOGY LTD

SESYS LTD Supplying digital IP camera for rapid deployment, remote site monitoring, fixed and short term installations. High resolution images available over mobile and wireless networks to any standard web browser.

Sales: +44 (0) 1706 363 998 Technical: +44 (0) 191 270 5148 Email: info@advanced-led-technology.com www.advanced-led-technology.com

1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333 Email: info@sesys.co.uk www.sesys.co.uk

CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS

END TO END CCTV SOLUTIONS/RECORDERS, CAMERAS, NETWORK PRODUCTS

ALTRON COMMUNICATIONS EQUIPMENT LTD

DEDICATED MICROS

Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ Tel: +44 (0) 1269 831431 Email: comms@altron.co.uk Web: www.altron.co.uk

1200 Daresbury Park, Daresbury, Warrington, WA4 4HS, UK Tel: +44 (0) 845 600 9500 Fax: +44 (0) 845 600 9504 Email: customerservices@dmicros.com www.dmicros.com

www.insight-direct.co.uk Tel: +44 (0)1273 475500


nov13 dir_000_RiskUK_sep13 06/11/2013 13:18 Page 3

INFRA-RED AND WHITE-LIGHT CCTV LIGHTING AND ANPR

DISTRIBUTOR

RAYTEC

FASTFLEX

Unit 3 Wansbeck Business Park, Rotary Parkway, Ashington, Northumberland. NE638QW Tel: 01670 520 055 Email: sales@rayteccctv.com Web: www.rayteccctv.com

2A Woodham Lane, New Haw, Addlestone, Surrey, KT15 3NA Contact: Chris Hobbs on 0845 276 1111 sales@fastflex.co.uk www.fastflex.co.uk

CCTV SPECIALISTS

PLETTAC SECURITY LTD Unit 39 Sir Frank Whittle Business Centre, Great Central Way, Rugby, Warwickshire CV21 3XH Tel: 0844 800 1725 Fax: 01788 544 549 Email: sales@plettac.co.uk www.plettac.co.uk

WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS, PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.

MAYFLEX Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ

Tel: 0800 881 5199 Email: securitysales@mayflex.com Web: www.mayflex.com

CCTV & IP SOLUTIONS, POS & CASH REGISTER INTERFACE, EPOS FRAUD DETECTION

AMERICAN VIDEO EQUIPMENT Endeavour House, Coopers End Road, Stansted, Essex CM24 1SJ Tel : +44 (0)845 600 9323 Fax : +44 (0)845 600 9363 E-mail: avesales@ave-uk.com

CONTROL ROOM & MONITORING SERVICES ADVANCED MONITORING SERVICES

EUROTECH MONITORING SERVICES LTD.

Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring • Vehicle Tracking • Message Handling • Help Desk Facilities • Keyholding/Alarm Response Tel: 0208 889 0475 Fax: 0208 889 6679 E-MAIL eurotech@eurotechmonitoring.com Web: www.eurotechmonitoring.com

DISTRIBUTORS

THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESS CONTROL AND INTRUDER DETECTION SOLUTIONS

NORBAIN SD LTD 210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP Tel: 0118 912 5000 Fax: 0118 912 5001 www.norbain.com Email: info@norbain.com

EMERGENCY PLANNING SYSTEMS

THREAT ASSESSMENT, REGULATORY COMPLIANCE, EMERGENCY PLANNING

G4S TECHNOLOGY – ONEFACILITY Integrating people, process and technology to enable organisations and the facilities they run to achieve regulatory compliance, mitigate risk and remain one step ahead.

01684 850977 onefacility@uk.g4s.com www.1f.com

EMPLOYMENT

EMPLOYEE SCREENING SERVICES ADI ARE A LEADING GLOBAL DISTRIBUTOR OF SECURITY PRODUCTS OFFERING COMPLETE SOLUTIONS FOR ANY INSTALLATION.

ADI GLOBAL DISTRIBUTION Chatsworth House, Hollins Brook Park, Roach Bank Road, Bury BL9 8RN Tel: 0161 767 2900 Fax: 0161 767 2909 Email: info@adiglobal.com

TRADE ONLY CCTV MANUFACTURER AND DISTRIBUTOR

COP SECURITY Leading European Supplier of CCTV equipment all backed up by an industry leading service and support package called Advantage Plus. COP Security, a division of Weststone Ltd, has been designing, manufacturing and distributing CCTV products for over 17 years. COP Security is the sole UK distributor for IRLAB products and the highly successful Inspire DVR range. More than just a distributor.

COP Security, Delph New Road, Dobcross, OL3 5BG Tel: +44 (0) 1457 874 999 Fax: +44 (0) 1457 829 201 sales@cop-eu.com www.cop-eu.com

THE SECURITY WATCHDOG Cross and Pillory House, Cross and Pillory Lane, Alton, Hampshire, GU34 1HL, United Kingdom www.securitywatchdog.org.uk Telephone: 01420593830

EMPLOYMENT

URGENTLY NEEDED… National Franchise Opportunities with an established Security Company with over 4000 installs specialising in Audio Monitoring. Try before you buy scheme. Contact Graham for full prospectus graham@securahomes.co.uk TEL: 01274 631001

www.insight-direct.co.uk Tel: +44 (0)1273 475500


nov13 dir_000_RiskUK_sep13 06/11/2013 13:18 Page 4

PERIMETER PROTECTION

IDENTIFICATION

INFRARED DETECTION

GJD MANUFACTURING LTD Unit 2 Birch Industrial Estate, Whittle Lane, Heywood, Lancashire, OL10 2SX Tel: + 44 (0) 1706 363998 Fax: + 44 (0) 1706 363991 Email: info@gjd.co.uk www.gjd.co.uk

COMPLETE SOLUTIONS FOR IDENTIFICATION

DATABAC GROUP LIMITED 1 The Ashway Centre, Elm Crescent, Kingston upon Thames, Surrey KT2 6HH Tel: +44 (0)20 8546 9826 Fax:+44 (0)20 8547 1026 enquiries@databac.com

INDUSTRY ORGANISATIONS

PERIMETER PROTECTION

GPS PERIMETER SYSTEMS LTD 14 Low Farm Place, Moulton Park Northampton, NN3 6HY UK Tel: +44(0)1604 648344 Fax: +44(0)1604 646097 E-mail: info@gpsperimeter.co.uk Web site: www.gpsperimeter.co.uk

TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY

POWER

BRITISH SECURITY INDUSTRY ASSOCIATION Tel: 0845 389 3889 Email: info@bsia.co.uk Website: www.bsia.co.uk

STANDBY POWER SPECIALISTS; UPS, GENERATORS, SERVICE & MAINTENANCE

DALE POWER SOLUTIONS LTD THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY

SSAIB 7-11 Earsdon Road, West Monkseaton Whitley Bay, Tyne & Wear NE25 9SX Tel: 0191 2963242 Web: www.ssaib.org

Salter Road, Eastfield Industrial Estate, Scarborough, North Yorkshire YO11 3DU United Kingdom Phone: +44 1723 583511 Fax: +44 1723 581231 www.dalepowersolutions.com

POWER SUPPLIES – DC SWITCH MODE AND AC

INTEGRATED SECURITY SOLUTIONS SECURITY PRODUCTS AND INTEGRATED SOLUTIONS

DYCON LTD Cwm Cynon Business Park, Mountain Ash, CF45 4ER Tel: 01443 471 060 Fax: 01443 479 374 Email: marketing@dyconsecurity.com www.dyconsecurity.com The Power to Control; the Power to Communicate

HONEYWELL SECURITY GROUP Honeywell Security Group provides innovative intrusion detection, video surveillance and access control products and solutions that monitor and protect millions of facilities, offices and homes worldwide. Honeywell integrates the latest in IP and digital technology with traditional analogue components enabling users to better control operational costs and maximise existing investments in security and surveillance equipment. Honeywell – your partner of choice in security. Tel: +44 (0) 844 8000 235 E-mail: securitysales@honeywell.com Web: www.honeywell.com/security/uk

STANDBY POWER

UPS SYSTEMS PLC Herongate, Hungerford, Berkshire RG17 0YU Tel: 01488 680500 sales@upssystems.co.uk www.upssystems.co.uk

UPS - UNINTERRUPTIBLE POWER SUPPLIES INTEGRATED SECURITY SOLUTIONS

INNER RANGE EUROPE LTD Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead, Reading, Berkshire RG74GB, United Kingdom Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001 Email: ireurope@innerrange.co.uk www.innerrange.com

ADEPT POWER SOLUTIONS LTD Adept House, 65 South Way, Walworth Business Park Andover, Hants SP10 5AF Tel: 01264 351415 Fax: 01264 351217 Web: www.adeptpower.co.uk E-mail: sales@adeptpower.co.uk

SECURITY PRODUCTS AND INTEGRATED SOLUTIONS

UPS - UNINTERRUPTIBLE POWER SUPPLIES

TYCO SECURITY PRODUCTS

UNINTERRUPTIBLE POWER SUPPLIES LTD

Heathrow Boulevard 3, 282 Bath Road, Sipson, West Drayton. UB7 0DQ / UK Tel: +44 (0)20 8750 5660 www.tycosecurityproducts.com

Woodgate, Bartley Wood Business Park Hook, Hampshire RG27 9XA Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk www.upspower.co.uk

www.insight-direct.co.uk Tel: +44 (0)1273 475500


nov13 dir_000_RiskUK_sep13 06/11/2013 13:19 Page 5

SECURITY

ONLINE SECURITY SUPERMARKET

EBUYELECTRICAL.COM CASH MANAGEMENT SOLUTIONS

LOOMIS UK LIMITED 1 Alder Court, Rennie Hogg Road, Nottingham, NG2 1RX T - 0845 309 6419 E - info@uk.loomis.com W - www.loomis.co.uk

Lincoln House, Malcolm Street Derby DE23 8LT Tel: 0871 208 1187 www.ebuyelectrical.com

INTRUDER ALARMS – DUAL SIGNALLING

WEBWAYONE LTD CASH & VALUABLES IN TRANSIT

CONTRACT SECURITY SERVICES LTD Challenger House, 125 Gunnersbury Lane, London W3 8LH Tel: 020 8752 0160 Fax: 020 8992 9536 E: info@contractsecurity.co.uk E: sales@contractsecurity.co.uk Web: www.contractsecurity.co.uk

11 Kingfisher Court, Hambridge Road, Newbury Berkshire, RG14 5SJ Tel: 01635 231500 Email: sales@webwayone.co.uk www.webwayone.co.uk www.twitter.com/webwayoneltd www.linkedin.com/company/webwayone

LIFE SAFETY EQUIPMENT

C-TEC CCTV

INSIGHT SECURITY Unit 2, Cliffe Industrial Estate Lewes, East Sussex BN8 6JL Tel: 01273 475500 Email:info@insight-security.com www.insight-security.com

Challenge Way, Martland Park, Wigan WN5 OLD United Kingdom Tel: +44 (0) 1942 322744 Fax: +44 (0) 1942 829867 Website: http://www.c-tec.co.uk

PERIMETER SECURITY

TAKEX EUROPE LTD FENCING SPECIALISTS

J B CORRIE & CO LTD Frenchmans Road Petersfield, Hampshire GU32 3AP Tel: 01730 237100 Fax: 01730 264915 email: fencing@jbcorrie.co.uk

Aviary Court, Wade Road, Basingstoke Hampshire RG24 8PE Tel: +44 (0) 1256 475555 Fax: +44 (0) 1256 466268 Email: sales@takexeurope.com Web: www.takexeurope.com

SECURITY EQUIPMENT INTRUSION DETECTION AND PERIMETER PROTECTION

OPTEX (EUROPE) LTD Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311 Email: sales@optex-europe.com www.optex-europe.com

PYRONIX LIMITED Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY. Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042 www.facebook.com/Pyronix www.linkedin.com/company/pyronix www.twitter.com/pyronix

SECURITY SYSTEMS INTRUDER AND FIRE PRODUCTS

BOSCH SECURITY SYSTEMS LTD

CQR SECURITY

PO Box 750, Uxbridge, Middlesex UB9 5ZJ Tel: 01895 878088 Fax: 01895 878089 E-mail: uk.securitysystems@bosch.com Web: www.boschsecurity.co.uk

125 Pasture road, Moreton, Wirral UK CH46 4 TH Tel: 0151 606 1000 Fax: 0151 606 1122 Email: andyw@cqr.co.uk www.cqr.co.uk

INTRUDER ALARMS – DUAL SIGNALLING

CSL DUALCOM LTD Salamander Quay West, Park Lane Harefield , Middlesex UB9 6NZ T: +44 (0)1895 474 474 F: +44 (0)1895 474 440 www.csldual.com

INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS

RISCO GROUP Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton, Manchester, M24 2SS Tel: 0161 655 5500 Fax: 0161 655 5501 Email: sales@riscogroup.co.uk Web: www.riscogroup.com/uk

SECURITY EQUIPMENT

CASTLE Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042 www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity

www.twitter.com/castlesecurity

VICON INDUSTRIES LTD. Brunel Way Fareham Hampshire, PO15 5TX United Kingdom www.vicon.com

www.insight-direct.co.uk Tel: +44 (0)1273 475500


Project1_Layout 1 03/12/2013 12:06 Page 1

Healthcare surveillance. Beyond security.

A good video surveillance system brings more than just patient and staff security. It helps to improve your everyday processes – allowing you to focus your efforts where they’re needed the most. Axis network cameras enable remote patient monitoring for immediate evaluation and prioritization of patient alarms. You also benefit from remote learning capabilities, where students and staff can follow advanced operations – in HDTV quality.

Axis netw network video solutions help to improve your work processes and keep your healthcare facilities safe and secure.

Easy to install and use, an Axis IP surveillance system delivers high-quality video that takes you far beyond security. Get the Axis picture. Stay one step ahead. Visit www.axis.com/healthcare


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.