Risk UK September 2013

Page 1

Cover sep13_Layout 1 30/08/2013 16:14 Page 1

September 2013

Risk management, loss prevention and business continuity

Are you prepared for a pandemic? Thermal imaging for high risk applications Intelligent video in airports, ports and border sites Essential news for risk mitigation professionals


Project1_Layout 1 03/09/2013 10:46 Page 1

What are you looking for? See it — and every detail of it.

All images are conceptual. For product information and actual footage from Axis cameras, visit www.axis.com

At larger cargo and logistics centers, it is necessary to keep an extra eye on the valuable goods passing by every day. This is a time consuming and difficult task and several transportation companies have chosen Axis network video solutions to achieve a cost-efficient solution for their needs. As a result, they benefit from high-quality live and recorded video from: perimeters, entrances and exits, loading

docks, warehouses and cargo areas, rail yards and truck depots. In case of damage or loss, Axis network video solutions make it easy to find out what happened and when. Get the Axis picture. Stay one step ahead. Visit www.axis.com/cargo or for more information about our transport solutions send an email to: David Thomasson at david.thomasson@axis.com

Axis network cameras with HDTV performance deliver true color representation and high quality images. An appealing solution when every detail matters.


comment_riskuk_Dec12 02/09/2013 13:53 Page 1

Comment

Editorial Comment he first point to make here is that climatic issues can be viewed in two very different ways. Taking a longer term view, climate change is expected to have an impact across the globe, and despite some Governments attempting to introduce regulations that slow the rate of change, the reality is that the exact impact – both in terms of timescales and scope of change – is very much open to interpretation. Whilst compliance with the various aims or goals of Governments is on the radar of many risk management professionals, mitigating the results of climate change isn’t just yet! A threat that is more immediate, and much closer to home, is that of extremes of weather in the UK. There have always been regions with a higher risk of localised flooding, or more likely to bear the brunt of winter snowfall. However, recent years have seen climatic problems affecting wider areas of the UK, and whilst some point to possible reasons for this, the fact remains that experience has shown that many organisations simply were not prepared for the disruption that followed. Weather conditions as witnessed in the past two years are not unique to the UK. Some experts point out that such trends tend to be cyclical, and have identified a number of periods in the past when the effects of the weather have been as, or more, disruptive. If their estimates are correct, and if the trends are set to repeat themselves, the reality is that the UK could face more regular spells of climate-based disruption. It is interesting that despite problems with flooding seemingly occuring over prolonged periods of time, the weather conditions are often not as unseasonable as we might think. Often a relatively short period of extreme weather with have a longer term impact, meaning even average levels of rainfall lead to contined flooding as the ground is already saturated. Whilst the past few years might have been more extreme than future winters are projected to be, they did highlight that even with the best

T

Many people point towards climate change when extremes of weather in the UK are mentioned. However, putting aside any impact that such change might have, the past few years have seen conditions that have impacted upon businesses across the country. Some experts believe that such events are cyclical, and going on past records the UK could be in for more of the same in the next few years! risk prevention startegies in the world, there are events that will happen and which cannot be changed. It is at times like this that risk management professionals must employ their skills to manage the risk and recovery, and to ensure continuity is preserved as best it can be. No amount of preventative effort will stop the climatic conditions from being extreme, no matter how much we’d like them too. We are now heading into another winter, and whilst it hasn’t been the best summer in recent memory, conditions have pretty much stabilised. However, it is vital that businesses and organisation don’t view recent winters as ‘freak’ events. The costs to UK industry and commerce due to the recent winters were significant, and for many businesses it wasn’t just those that were directly affected by the weather that experienced problems. Logistics were hard hit, as were transportation services. Businesses reliant upon consumer spending also saw a fall in revenues. Whilst many cited the economic uncertainty, some reports identified the longer and colder end to winter as being a significant factor. Climatic conditions are beyond our control. However, it is vital that those elements which can be managed – the supply chain, customer service, human resources, contingency planning, disaster recovery – are done so with a degree of preparedness for extremes of weather. If businesses do not have effective plans in place, they only have themselves to blame! Pete Conway Editor – Risk UK

It is vital that those elements which can be managed – the supply chain, customer service, human resources, contingency planning, disaster recovery – are done so with a degree of preparedness for extremes of weather. December 2012

3

www.risk-uk.com


contents_riskuk_Dec12 02/09/2013 15:29 Page 2

Evacuate everyone

Sonos Pulse EN54-23 Fire Beacons In a fire, everyone matters. Sonos Pulse fire beacons and sounder beacons ensure that all personnel are notified of fire emergencies. With Pulse Alert Technology, buildings are evacuated quicker, evacuation requirements are unambiguous and everyone is made to feel safe and secure. Visit our new dedicated fire website for more information: www.klaxonsignals.com/fire

Signalling Solutions


contents_riskuk_Dec12 02/09/2013 15:30 Page 3

September 2013 Signalling Solutions

Sonos Pulse Ceiling EN54-23 Coverage: C-3-15

Contents 3 Comment As the nights start drawing in, businesses and organisations must ensure that they are prepared for potential disruption from climatic conditions during the winter months.

6 News News stories relevant to risk management professionals.

12 Pandemic Planning Most business continuity planning revolves around the systems and technologies that businesses use for operations; the difference with pandemic planning is that issues revolve around those who operate the systems.

Sonos Pulse Wall EN54-23 Coverage: W-3.1-11.3

20 An Encompassing View Network video technology offers high levels of protection, flexibility and artificial intelligence to security teams at airports, ports and border crossings.

22 Thermal Signature Thermography is a powerful tool when protecting large open sites with critical perimeters.

24 Scanning Flow Manager passenger flow through terminals is a vital process in terms of security, safety and customer experience; can biometric scanning offer assistance?

28 The Hacktivist Threat Hacktivism sees a move away from traditional crime, but still represents a significant threat to targeted businesses.

FEATURING:

35 Cyber and Data News News of interest to data security professionals

38 Next Issue Risk UK looks ahead to the October 2013 issue

39 Risk UK Directory ŕ EN54-23 compliant beacon technology

ISSN 1740-3480

ŕ Wall and ceiling mount light orientations

Risk UK is published 12 times a year and is aimed at risk management, loss prevention and business continuity professionals within the UK’s largest commercial organisations.

ŕ Wide coverage pattern - one device can protect most rooms

© Pro-Activ Publications Ltd, 2013 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without the written permission of the publisher.

ŕ 20mA beacon current @ 0.5Hz flash rate

The views expressed in Risk UK are not necessarily those of the publishers.

Risk UK is currently available for an annual subscription rate of £78.00 (UK only)

Editor Pete Conway Tel: 0208 295 8303 E-mail: pete.conway@risk-uk.com Design & Production Matt Jarvis Tel: 0208 295 8310 Fax: 0870 4292015 E-mail: matt.jarvis@proactivpubs.co.uk Advertisement Director Paul Amura Tel: 0208 295 8307 Fax: 0208 295 1919 E-mail: paul.amura@proactivpubs.co.uk Administration Tracey Beale Tel: 0208 295 8306 Fax: 0208 295 1919 E-mail: tracey.beale@proactivpubs.co.uk Managing Director Mark Quittenton

RISK UK PO Box 332, Dartford DA1 9FF

Tel: +44 (0)1706 233879 www.klaxonsignals.com/fire

Chairman Larry O’Leary

Editorial: 0208 295 8303 Advertising: 0208 295 8307

5 www.risk-uk.com


news sep13_riskuk_sep13 02/09/2013 16:10 Page 2

Sepura appoints business development manager Sepura has announced that Chris Lister has joined the company in the role of UK business development manager. He joins Sepura from control room and applications company APD Communications, where he was senior account manager. He also has experience of the UK public safety and commercial market-place, having previously worked in a senior sales role at Airwave Solutions. Commenting on Lister’s appointment, Jonathan Hamill, Regional Director for UK and Ireland at Sepura, stated, ‘I am really pleased to have Chris on board. He understands the market and is well respected. Our continued investment is at an exciting time, as we look towards the longer term evolution of public safety communications and the development of our presence in commercial markets.’ Of his appointment, Lister said, ‘This is an exciting time to be joining Sepura. The company has not only seen a number of new contract and refresh wins recently, but has also completed two key acquisitions in just over a year. The Tetra infrastructure from 3T Communications and the applications expertise from Portalify mean that Sepura is able to offer a complete end-to-end critical communications solution to its customers.’

Criminal records checking company acquired Mitie Group has acquired UKCRBs Ltd, the criminal records checking service, from its management team. UKCRBs is a provider of online criminal records checking services in the UK and gives Mitie’s business a scalable platform to compete in the rapidly growing screening and vetting market. UKCRBs will be integrated into the company’s existing employee screening offering. The acquisition will enhance criminal record checking capabilities, improve turn-around times, and expand the technology platform. UKCRBs customers will also benefit from access to a wider range of services and greater flexibility. The combined businesses have over 600 customers in health, financial services, education, communications and local authority sectors. Ruby McGregor-Smith, Mitie’s chief executive, stated, ‘I am delighted that UKCRBs has become part of our rapidly growing screening and vetting business. This acquisition will significantly enhance the services that we offer to our customers, and offers synergies with our existing security business and will allow us to bid for larger scale screening and vetting contracts.’

6

www.risk-uk.com

News Transformational growth claimed A strategy to focus on specialist technologies for markets where security is a business critical issue has been implemented by Reliance HighTech. New IT-centric solutions have stimulated growth across integrated IP, physical security information management (PSIM) and networked digital interviewing markets, according to the integrator. The strategy has yielded a diversity of new customers including Pfizer, Newell Rubbermaid and Loughborough University, and resulted in major projects with EDF Energy and a new deep-sea container port and logistics park in the Thames Estuary. This success is coupled to new long-term frameworks with Western Power Distribution and the National Health Service, amongst others, and consolidates Reliance’s position across criminal justice, utilities, education and healthcare sectors. Terry Sallas, Managing Director of Reliance High-Tech, stated, ‘We recognise that issues such as IT convergence, disruptive technologies and evolving security threats will increasingly coexist with traditional security needs. Through blending security and IT expertise and collaborating with specialist partners, we are providing solutions that improve security and address complex technical issues pragmatically and efficiently; this approach has increased the proximity to our customers and created new opportunities.’ The company will continue to embrace new technology shifts and grow its capabilities in security-based software, data mining and analytics.


news sep13_riskuk_sep13 02/09/2013 16:10 Page 3

News

Further licensing breaches revealed An unlicensed door supervisor was found working illegally without a Security Industry Authority licence during checks in Maidenhead last month. In a joint operation, Thames Valley Police, SIA investigators and licensing officers from the Royal Borough of Windsor and Maidenhead Council conducted checks in the town centre. In total, 20 security operatives were checked across seven venues including pubs and offlicences. Whilst the majority of those inspected were correctly SIA-licensed, a small number of offences were found. These included a door supervisor working in a pub with a revoked SIA licence, and a bar owner who did not hold the correct SIA licence. A warning was issued to a door supervisor for failing to notify a change of his address, which is a breach of licensing conditions. Further checks in Leeds city centre found a door supervisor working illegally. The checks at licensed premises were carried out by West Yorkshire Police with support from Security Industry Authority investigators and officers from Leeds City Council Licensing Team. In total, 12 licensed premises and 21 door supervisors were checked. One individual was found working with an expired SIA licence. A further warning was issued to a door supervisor for not properly displaying his licence. Additional intelligence was gathered on a door supervisor working without a valid SIA licence; an investigation is pending. Additionally, at Luton Crown Court, a Bedfordshire security director was sentenced to 27 months imprisonment after pleading guilty to offences under the Proceeds of Crime Act 2002. Thomas John Rice ran Paragon Security Services, a vehicle clamping and removal business based in Bedfordshire. Rice did not hold an SIA licence, and his company employed staff without frontline vehicle immobiliser licences, or whose licences had expired. Paragon Security ran from October 2005 to 2011. It is estimated that during that time

Fragile roof warning With nearly three quarters of all fatal injuries occurring from falls though fragile roofs or roof lights during refurbishment or maintenance, businesses are being warned to check the status of their roof access provision. Currently it is a busy time for roof maintenance, including repairing leaks and

£500,000 was taken from parking services. When the SIA became aware of Paragon Security, Rice provided false names to the SIA and employed licensed staff for a few weeks to give the appearance of a responsible company. Rice was not charged with offences under the Private Security Industry Act 2001, but was instead charged with offences under the Proceeds of Crime Act 2002. The charge was of acquiring criminal property related to proceeds of crime made from providing parking services (clamping) without the appropriate SIA licence. Additionally, two door supervisors pleaded guilty to working illegally at a Manchester city centre bar. The case followed SIA investigators working with Greater Manchester Police in an operation to check that security operatives were properly licensed in Manchester City Centre. During the operation the two individuals were found working unlicensed and were arrested, interviewed and later charged by the police. Each was fined £335 and ordered to pay costs of £118. In February 2013, the SIA launched an investigation into G&S Protection Services and its role in providing security guards to a construction site in Teesside. A formal request for information was made by the SIA; however, owner Gary Armstrong failed to provide the necessary documentation and when interviewed under caution his responses were proven to be false by witnesses. He was subsequently fined £1,500 and ordered to pay costs of £5,757.60. Security Industry Authority investigators joined a Dyfed Powys Police-led operation to check door supervisors across Ceredigion. In total, 44 premises were visited including holiday parks, music festivals and pubs and clubs. Of the 49 security operatives checked, 5 individuals were found to be working without an SIA licence. Enquiries are on-going and will be taken forward by the police and the SIA.

cleaning roof-lights. The key is ensuring that work is carried out with safety as a main concern. Latchways has claimed that businesses must ensure they provide safe and solid walkways, fall-proof covers and roof-light covers, enabling safe foot traffic access for all roof types, even fragile ones.

7

www.risk-uk.com


news sep13_riskuk_sep13 02/09/2013 16:11 Page 4

News

NSI announces new chairman

Elmdene notches up 50 years Elmdene International - a subsidiary of Potter Electric Signal – was visited by Penny Mordaunt, the MP for Portsmouth North, as part of the company’s 50th anniversary celebrations. The MP was given a tour of the which serves as the company’s corporate headquarters, and the main R&D, testing and warehousing hub, for the EMEA region. During her visit, Mordaunt was briefed on the key stages in the development of Elmdene’s products and saw the testing that is undertaken on site. The facility uses a large walk-in anechoic and EMC test chamber. Mordaunt stated, ‘I was delighted to visit Elmdene on its 50th year, and even more so to discover such a thriving business. Well done to all at the company for making it such a success for Portsmouth.’ The company came from small beginnings, even operating out of an owner’s garage at one stage. The 1990s saw further growth, and at the end of the decade, Elmdene briefly split into two sites for extra capacity before moving everything to a new base. Eventually further expansion meant that it had outgrown available resources and had to relocate. It was acquired by Potter Electric Signal in 2008, and this was followed by the company moving into its current home in 2010.

8

www.risk-uk.com

NSI has announced its future chairman as Chris Hanks. He will succeed the current chair, Sir Francis Richards, with effect from November 2013. Following a detailed series of selection interviews, Hanks was selected to chair the board following a career in the insurance industry. His most recent appointment was with Allianz Insurance. Hanks began his career as an underwriter in casualty and property insurance and progressed to be UK Manager for NEM Insurance. He was also head of business units for AGF Insurance Group before he became general manager of Allianz Insurance’s commercial operations in the UK with responsibility for the profitability, growth, sales and operation of all commercial and engineering business. Prominent within the insurance market, Hanks has been an FSA Approved Person for 15 years and has held executive and representative roles in a number of market bodies (ABI, BIBA, FPA, Polaris, CII). On his appointment, Hanks stated, ‘I am delighted to be joining NSI at a time when there is so much change and opportunity in the fire and security sectors. New technology, new regulatory regimes, ever changing business models and of course new standards at national, European and International level will set challenges in every area.’ Jeff Little, CEO of NSI, said, ‘These are exciting times for the fire and security sectors and NSI is adapting to the new business reality of the 21st Century. We look forward to welcoming Chris as we move towards a more risk-based, customerfriendly NSI whilst continuing to strive for improved standards across both sectors.’


009_Layout 1 03/09/2013 15:41 Page 1

Simply Brilliant Setting new standards for Access Control, Security and Automation SCALABLE True Enterprise solution delivering 1000's of controllers, 1000's doors and 1000's of zones POWERFUL State of the art electronics designed to give many years of seamless operation RESILIENT Designed with high level of self-protection EFFORTLESS Simple "Plug & Play" system expansion

ARRANGE A DEMO Call the Integriti team on 0845 470 5000 or email integriti@innerrange.co.uk

FLEXIBLE Range of Controllers & LAN modules designed to meet simple or complex access control, intruder detection and automation specifications FAST Streamlined installation and commissioning

“Integriti is a true Enterprise solution controlling thousands of doors and zones across multicontroller IP networks”

ACTIVE IR BEAMS TAKEX infrared beams offer the ultimate in trouble-free perimeter detection up to 200m outdoor / 400m indoor.

PORT / BORDER SECURITY

PET-TOLERANT PIR Up to 12m external range at 90 or 180 degree detection area hardwired or wireless versions available.

SPEAKER SENSORS Record any voice or sound message for warning/security, health & safety, advisory or greeting applications.

RELIABILITY IS THE ‘QUAY’

MINI BEAMS Miniature beams for discreet detection across doorways and windows, for prestige or covert applications.

PB-HF-KH Series Beams are designed ZWLJPÄJHSS` MVY \ZL PU V\Y ;( :LYPLZ )LHT ;V^LYZ <UPX\L 8\HK )LHTZ HYL Z`UJOYVUPZLK [V THPU[HPU YHUNL HUK Z[HIPSP[` PU ZL]LYL ^LH[OLY ^OPSZ[ YLQLJ[PUN ºU\PZHUJL HSHYTZ» JH\ZLK I` IPYKZ HUPTHSZ VY ISV^U SP[[LY :WLJPHSS` JVH[LK JPYJ\P[ IVHYKZ WYV[LJ[ [OL LSLJ[YVUPJZ MYVT JVYYVZPVU PKLHS MVY WYV[LJ[PUN OHYZO THYPUL HUK V[OLY ZPTPSHYS` L_WVZLK LU]PYVUTLU[Z H[

REFLECTOR BEAMS

distances up to 200m.

A convenient way to monitor entrances, driveways etc. where cabling to both ends is impractical.

tel: +44 (0)1256 475555

|

fax: +44 (0)1256 466268

|

email: sales@takex.com

|

web: www.takex.com/uk


news sep13_riskuk_sep13 02/09/2013 16:12 Page 6

News

MLA Expo 2013 claimed as largest yet The UK’s exhibition for locks and locking systems is claimed to be the biggest yet, with four major sponsors and more than 70 exhibitors already signed up. Taking place between 1315 September 2013 at the International Centre in Telford, MLA Expo is organised by the Master Locksmiths Association. This year, the event - which has been running for more than 30 years - will be offering a series of training courses covering topics such as CCTV and Lock Related Standards, among many others. Over 1500 people from all over the globe are expected to attend the three day event. Previous exhibitions have seen visitors from Australia, China, continental Europe and the USA. Abloy, Mul-T-Lock, Yale and Assa Abloy have been announced as official sponsors of the event, and have booked significant floor space to showcase their very latest products. Dr Steffan George, development director for the MLA, stated, ‘This is the 17th time that the MLA has hosted the Expo. We are thrilled to see it grow year-on-year.’

Security Institute announces the knowledge centre The Security Institute has announced the introduction of the Knowledge Centre, an online resource that enables its members to access a wide range of information on a variety of industry based subjects. It has been created so that students and established industry professionals alike can find the latest research and continuing professional development (CPD) related materials. Those studying for the Certificate in Security Management and Diploma in Security Management, as well as undergraduate and postgraduate students, will benefit from the centralised facility. Angus Darroch-Warren, CSyP FSyI and director for the Knowledge Centre, stated, ‘Designed for ease of use, members can discover a plethora of

10

www.risk-uk.com

HAVS costs UK nearly £5 billion Vibration management company Reactec have estimated that the Hand Arm Vibration Syndrome (HAVS) could be costing Britain as much as £4.92 billion each year. The economic cost of HAVS is based on the Health and Safety Executive’s costs to Britain of workplace injuries and work-related ill health for 2010/11. Within this report, the total cost to society per case of ill health (of which HAVS is one) is £16,400. Given that there are around 300,000 employees who are estimated to have advanced symptoms of HAVS (according to the HSE), the total cost to society of HAVS could be around £4.92 billion. There are claimed to be around one million users of hand-held or hand-guided power tools who are at increased risk of the disease because they are exposed to HAV above the action level set by the Health and Safety Executive (HSE). These figures show that the financial consequences of poorly planned vibration monitoring are very serious for all concerned. Based on the HSE’s findings, the total cost of £4.92 billion can be broken down further to the costs for individuals, employers and government. The cost to individuals with HAVS is around £2.43 billion, which includes loss of income, compensation payments, health and rehabilitation costs and administrative costs. The cost to employers is around £1.32 billion which comprises sick pay payments, insurance premiums, production disturbance costs and administrative and legal costs. The cost to Government totals nearly £1.17 billion, which comprises costs arising from loss of earnings to the individual (benefits payments, reduction in tax and national insurance receipts), medical treatment and rehabilitation costs and administration and legal costs. information including research papers, government reports, legislation, articles, dissertations, links to external websites and other relevant resources. It will prove to be an essential tool for any of our members looking to enhance their levels of industry expertise and also offers the chance to gain valuable CPD points.’ Structured around 16 core categories that reflect the parameters and scope of contemporary practice, the Knowledge Centre will be introduced in a series of phases. Subjects such as intelligence gathering, information security, research, counter terrorism, defence, international security and risk management are all covered alongside information technology related topics such as cyber security. This initiative is part of the Security Institute’s on-going commitment to making membership as beneficial as possible.


009_Layout 1 03/09/2013 16:09 Page 1

VIMPEX Shaping Alarm Technology


pandemic sep13_riskuk_aug13 03/09/2013 14:36 Page 2

Pandemic Planning Pandemics represent a significant threat to modern businesses. They are unpredictable, out of the control of businesses and organisations, and each one typically has unique elements which require differing actions to counter the threats. Pandemics not only threaten public health; they also can impact on the supply chain, and on day-today operations of commerce and industry. The best approach is through careful planning, as Risk UK – with the help of Mark Fenning – explains. ccording to Cabinet Office guidance published in February 2013, ‘pandemic influenza is one of the most severe natural challenges likely to affect the UK.’ Pandemics are naturally occurring phenomena, and as such any attempt at prevention is futile. Indeed, they typify risk management, in that a level of preparedness ensures that a business or organisation is ready to continue to operate and display a high degree of continuity when an incident occurs. The important point to note is that the plan is for ‘when’ the event takes place. It is

A

Mark Fenning is an associate and business development manager at Stephensons Solicitors LLP. On a grand scale

Pandemics are not a by-product of the modern age. Indeed, humanity has been suffering the effects of pandemic outbreaks for more than 3,000 years! Whilst the diseases associated with the earlier pandemics have been eliminated, or at least minimalised, the way in which viruses mutate presents a constant challenge to medical science, and means that the risk of a pandemic is ever-present. In the last 100 years alone, there have been several worldwide pandemics. These had a devastating effect both on public health and on economic stability. The most often quoted is the 1918 influenza pandemic. This is estimated to have infected in excess of 500 million people, with figures of actual deaths ranging from 50 to 100 million. Often referred to as ‘Spanish Flu’ (newspapers were barred, under war-time censorship, from reporting its impact in Allied nations, but were allowed to report on cases in Spain), the strain was H1N1, which was also responsible for another epidemic later in the century. In 1958, an H2N2 strain caused a global pandemic. Commonly known as ‘Asian Flu’, the World Health Organisation estimates deaths at around the 2 million mark. A decade later, in 1968, an H3N2 pandemic occurred, known as ‘Hong Kong Flu’. This pandemic caused around 1 million deaths; some suspect that a level of influenza immunity still existed from the 1958 pandemic, hence the lower mortality rate. In 2002, the outbreak of SARS in Asia created global panic, and had a significant impact on international travel. Although sporadic cases were reported outside of Asia, the virus didn’t translate into a global pandemic. In 2009 there was a second H1N1 virus pandemic, commonly referred to as ‘Swine Flu’. Deaths attributed to this pandemic are in excess of 14,000. As with the ‘Spanish Flu’ pandemic, which was also an H1N1 strain, those affected were not predominantly the elderly and young children. Instead, healthy young adults were at greater risk.

12

www.risk-uk.com

obviously not a case of trying to eliminate the risk altogether. While there’s no point running around in a blind panic or being naïve enough to think that the pandemic risk is non-existent, it’s also important that businesses do not simply take the warnings with a pinch of salt. The pandemic alerts of the past few years should have businesses thinking about their risks and business continuity plans. Unfortunately, during inter-pandemic years, the general approach is to deal with more immediate, recognisable and tangible threats. However, such an occupation with the immediate can lead to organisations being unprepared as and when a pandemic strikes. Some pandemics have been decades apart, whilst others occur within a few years of each other. It is important that the inter-pandemic periods are used to not only implement policies, but also to test them. Current World Health Organisation (WHO) warnings observe that a potential H5N1 influenza pandemic is in the Alert phase. This is viewed as the potential start of a Pandemic phase, and is when, ‘influenza caused by a new subtype has been identified in humans’. WHO cautions that an increased level of vigilance is required, along with risk assessments designed to address the potential scope of any pandemic. These should be carried out at local, national and global levels. If the indications of these assessments are that the virus has not become a pandemic strain, then the level of warning may be reduced. It should be noted that the government’s guidance does make the point that sensible and proportionate preparation can help to mitigate the effects of a pandemic. In essence, a business should be prepared. As with any type of contingency planning, prescribed actions to tackle the issues of a


pandemic sep13_riskuk_aug13 03/09/2013 14:37 Page 3

Pandemic Planning

pandemic are unlikely to be effective unless those involved – in this case staff, suppliers and customers – support and understand the steps being implemented. A key element of any successful plan is to ensure that those involved follow any advice, and also engage in appropriate actions to manage the risk of catching or spreading the virus. Without involvement, it might be a struggle to ensure that all parties cooperate fully with any implemented strategy.

A personal level An important factor to consider with pandemic planning is that the focus should be on people as opposed to technological resources. Disaster recovery plans tend to focus predominantly upon the technology-related issues for continuity of an operation, with less emphasis placed upon the need for people to manage the business’ operations. If the systems are fully operable and functioning correctly and the applications are still up and running, but people can’t get in to work, what happens then? Pandemic planning is a strategic approach to business continuity that anticipates and prepares for a widespread, dangerous outbreak of an infectious disease that poses lifethreatening risks to employees and their families across different geographical regions at the same time. Pandemics tend to limit human resources rather than technological abilities to function. It is the human element, rather than systems and infrastructure, which can fail. A pandemic plan should have two parts. It should document how the business’ essential services will be provided in the event of significant and sustained levels of staff absenteeism. It should also outline how the business will implement and enforce nonpharmaceutical intervention. Non-pharmaceutical intervention simply means how the business will reduce contact between people to help prevent the spread of infection. It could be as simple as formally defining when employees should stay at home, or as complex as relocating certain processes to ensure continuity, or introducing a degree of process redundancy. The first step with pandemic planning is to undertake a risk assessment to determine what the most critical business processes are, which functions have an absolute need to stay fully operational, and how many people are necessary to support those critical functions. It is recommended that businesses and organisations put together a ‘skills inventory’. The role of this is to identify

which key activities staff can perform, and which can be covered by a minimal number of staff. The skills inventory can be mapped against the business processes and systems to identify which employees are key to the running of the business. Employees can then be cross-trained in all critical areas necessary for business continuity. This ensures that any essential departments can remain fully operational if some staff members are affected, directly or indirectly, by any pandemic.

Businesses should encourage and track annual influenza vaccinations for employees and possibly consider offering the vaccine to staff as an added employment benefit. 13

www.risk-uk.com


pandemic sep13_riskuk_aug13 03/09/2013 14:37 Page 4

Pandemic Planning

Once the business processes have been established and prioritised, management teams should then work with those responsible for human resources to develop policies which will outline necessary actions to be taken should an event occur. The policies should identify who will be directly responsible for crisis and emergency communications, and detail how the company will manage absenteeism due to illness or transport disruptions.

The recovery process As a part of pandemic planning, businesses and organisations should carefully review their disaster recovery and business continuity plans, ensuring that certain aspects relevant to the impact of a pandemic are considered and addressed. It is important to identify a pandemic coordinator and/or team with defined roles and responsibilities for response planning and

As with any contingency planning, prescribed actions to tackle a pandemic are unlikely to be effective unless those involved – staff, suppliers and customers – support and understand the steps being implemented. 14

www.risk-uk.com

management. The planning process should include input from all departments that may be affected when an incident occurs. At the same time, the business must identify essential employees and other critical elements that will be required to maintain business operations during a pandemic. These should be identified by location and function. The next logical steps are to cross-train and prepare any members of an ancillary workforce, determine the potential impact of a pandemic on a company’s financials using multiple possible scenarios that affect different product lines and/or production sites, and determine potential impact of a pandemic on businessrelated domestic and international travel (issues such as quarantines and border closures should be identified, as well as risk to travelling personnel). Alongside considerations for travel, it is also worth looking at the logistics of the supply chain, both upstream and downstream from the business. Organisations must ensure that they establish and follow sustainable links with up-to-date, reliable pandemic information. This data is often available from community public health, emergency management and other sources. The Department of Health is the lead department for planning for a human influenza pandemic.


009_Layout 1 03/09/2013 16:14 Page 1

CERTIFYING

SECURITY

The leading certification body for Guarding Services. Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001 and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guarding and Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuables in Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.

Telephone : 0191 296 3242 www.ssaib.org

SSAIB


pandemic sep13_riskuk_aug13 03/09/2013 14:37 Page 6

Pandemic Planning

For all businesses and organisations, it is crucial to establish an emergency communications plan, to revise this periodically, and ensure it is kept in a current condition. This plan should include identification of key contacts (with back-ups), information about the chain of communications (including suppliers and customers), and processes for tracking and communicating business and employee status. The HR team should have up-to-date contact lists for all employees, enabling them to reach people quickly. The same should apply for key supply chain members, important stakeholders and relevant suppliers. It is also necessary to determine how to communicate with suppliers, partners, customers and other employees by using links that are already available. Because of the potential impact of a pandemic, it is wise to prepare websites and social media and, if appropriate, prepare automated messages and email for mass mailings in advance. Finally, an exercise or drill to test the plan should be implemented and revised periodically.

The wider impact Looking at the direct impact of a pandemic on a business or organisation is one thing, but how

16

www.risk-uk.com

it affects suppliers and customers is another. Businesses should forecast and allow for employee absences during a pandemic due to factors such as personal illness, family member illness, community containment measures and quarantines, school and/or business closures and public transportation closures. In order to keep further contamination under control, it makes sense to establish guidelines to modify the frequency and type of face-toface contact between employees and customers or suppliers. This could even extend to issues such as hand-shaking, seating in meetings, office layout, shared workstations, etc.. Prevention is, as they say, better than cure, so businesses should encourage and track annual influenza vaccinations for employees and possibly consider offering the vaccine to staff as an added employment benefit. Employee access to, and the availability of, healthcare services during a pandemic should be evaluated with services being improved as needed. Employees and key customers with special needs should be identified and their requirements should be incorporated into the preparedness plan. Organisations will also need to establish policies for sick-leave absences unique to a


dycon ad risk sep13_Layout 1 04/09/2013 10:19 Page 1

How does your organisation try to save electricity? If used 8 hours a day, the one on the left saves 142 kWh every year. 11W

60W

Dycon 1A switched mode power supply

These can both power your security systems* 24 hours a day. But the one on the left saves 250 kWh each and every year.

1A conventional linear power supply

*including all your burglar, fire, access control, video and building management systems!

Do the sums for your organisation and then call Dycon on 01443 471060!

Dycon


pandemic sep13_riskuk_aug13 03/09/2013 14:38 Page 7

Pandemic Planning

pandemic, including policies on when a previously ill person is no longer infectious and can return to work after illness. At the same time, policies should be written for a flexible worksite (to include remote access home working) and flexible work hours (such as staggered shifts). Policies should be established for preventing influenza spread at the worksite (promoting respiratory hygiene, cough etiquette, and prompt exclusion of people with influenza symptoms). Policies also need to be written to cover employees who have been exposed to pandemic influenza, are suspected to be ill, or become ill at work – in other words, a system to identify sick employees, how to quarantine them and allow them to go home. It may also be necessary to implement policies that restrict travel to affected geographic areas, or to evacuate employees working in or near an affected area when an outbreak begins. It is also important to offer guidance to employees returning from affected areas. Businesses and organisations must plan ahead and set up authorities, triggers and procedures for activating and terminating the company’s response plan, altering business operations (such as shutting down operations in affected areas) and transferring business knowledge to key employees. An area often overlooked is the need to provide sufficient and accessible infection

18

www.risk-uk.com

control supplies, for example hand-hygiene products, in all business locations. Going further, firms need to communicate and educate employees as to the importance of good hygiene and prevention activities. A good pandemic plan will anticipate employee fear and anxiety, and will address responses to rumours and misinformation. Communications should be culturally and linguistically appropriate, and the information needs to be disseminated to employees about pandemic preparedness and the response plan. A well prepared pandemic plan is not only essential in a time of potential outbreak, but can also be adapted to deal with other situations where mass absenteeism could affect business continuity. A pandemic plan should therefore form part of an overall disaster recovery or business continuity policy.

In conclusion A business or organisation being prepared is sometimes not enough. Supply chain-related activities are a very important factor in business continuity. Therefore it is necessary to analyse key supply chains, find out what they are doing in terms of pandemic planning, and address any potential risk to the business if they might not be prepared. It is commonplace to ask for sight of a disaster recovery plan when tendering for work; it should additionally be common to seek proof of a pandemic plan. Remember that the Gervernment’s point is that preparation should be ‘sensible’ and ‘proportionate’. As with all business policies – whether it be disaster recovery, complaints handling or managing social media – flexibility and common sense are key in order not to be prohibitive and unnecessarily restrictive to the business. Employees are not going to take kindly to working from a bubble every day based on the fear that one person has a runny nose. That is not to say that staff shouldn’t be sent home if ill so as to prevent a wider spread of illness, and the subsequent level of absenteeism that would affect productivity. In an age where remote working from home is the norm, the effect of one person being ill can be managed at very little cost. If set out in a wellprepared absence management plan, employers and employees alike will know exactly where they stand. It is important to be prepared and to plan for all eventualities so that a business can survive the impact of a pandemic, but the steps planned must be cost effective and realistic, otherwise the pandemic plan is simply a work of fiction.


Project1_Layout 1 01/08/2013 12:10 Page 1

The choice just became simple...

Longer Range Longer Battery Life More Locks per Hub

Introducing the

pro eLock T: E: W:

+353 1 466 2570 sales@accesscontrol.ie accesscontrol.ie


borders sep13_riskuk_aug13 02/09/2013 16:58 Page 2

An Encompassing View The role of video surveillance in high risk sites such as airports, ports and border-related environments is well established, and presents a raft of benefits alongside vital levels of protection for such applications. However, the move towards networked solutions has introduced greater levels of flexibility, which can prove invaluable when missing incidents is simply not an option. t is understandable that for many people, their consideration of video surveillance starts and ends with post-event analysis. Many risk management, loss prevention and business continuity professionals have the technology well and truly pigeon-holed, typically based upon their experiences with it. In reality, such a view is often due to how the technology has been promoted and utilised in the past. Analogue video solutions have, for many years, offered a good level of protection to high risk and vulnerable sites. By utilising quality equipment, maximising the management of captured footage, and ensuring that policies and procedures are in place to make certain that all incidents are acted upon, the technology has not only helped to resolve many incidents, but has also proactively prevented events too. The general feeling is that video surveillance is a passive tool, only offering something once an incident has taken place. If a system is designed and specified to a low cost, if the policies and procedures surrounding its use are not well implemented and enforced, and if the system is viewed as a secondary level solution outside of the day-to-day management of a site, then this view could be accurate. However, by seeking out best-in-class solutions, implementing and managing the system correctly, and focusing upon its strengths, video surveillance has more than proved its concept in high risk applications such as ports, airports and border points. There was not a lot wrong with the use of analogue video surveillance technology implemented and operated correctly. It was stable, cost-effective, and there are many people serving long prison sentences because of the role it played in their convictions. That said, it must be accepted that it had technical limitations which impacted on overall performance. The advent of digital technology and network topologies removes many of the limitations, thereby delivering an

I

20

www.risk-uk.com

unquestionably superior solution – if implemented correctly! Many will debate whether network-based solutions are the best way forward. As with analogue technology, it is important to utilise good quality equipment, maximise the management of captured footage, and ensure that policies and procedures are in place to make certain that all incidents are acted upon. Whilst some will raise objections to the use of networked technology, claiming it has performance flaws, it is important to remember that any system which is poorly installed, integrated and operated will deliver inferior results. When networked-based video solutions first appeared, they were costly, offered low performance, and didn’t make sense when comparisons were made with established composite alternatives. However, in the decade or so since the technology first arrived, networked video has moved on in leaps and bounds. It delivers high quality images, increased flexibility, previously unachievable levels of interoperability, plus a myriad of benefits that simply cannot be realised using less advanced technologies. It does have detractors, but their objections are usually based upon commercial concerns rather than the scope of performance. For those seeking to use video surveillance in a proactive way, tackling issues at high risks sites, network-based video has something else to offer. Because the video is digital, this allows a wide and varied range of processing to be carried out. A high degree of artificial intelligence can be built into solutions, allowing a number of tasks to be automated. These can be both proactive and reactive, and can address security, site management, safety and even assist with passenger or freight management.

Adding intelligence Processing of digital images can take many forms. These include video analytics, both on live streams and recorded footage. When used with live video, analytics technology looks either for exceptions to expected behaviour, or for specific actions. This could be something as simple as identifying people moving against the flow of traffic, such as entering through an exit point, turning right instead of left, or walking the wrong way down a corridor. Often rules can be created that inform the user if a specified event occurs, or does not occur! Rules can often be used in multiples, and a chain of rules can be linked to create a scenario utilising AND/OR logic. This allows fairly


borders sep13_riskuk_aug13 02/09/2013 16:59 Page 3

Networked Video

complex criteria to be established which can include variables such as direction of movement, speed of movement, time spent loitering, number of people, object appearance, object disappearance, line crossing, type of motion, right down to elements such as size, shape, colour of clothing, etc.. The same rules can be applied to replayed recorded footage, thus making an assessment of an event, or verification of circumstances surrounding an event, simple and quick to find. Analytics unquestionably work best when specific details of the exception being watched for are known. One problem with securityrelated incidents is that often you are looking for the unexpected. Because criminals will always try to conceal what they are doing, the potential variables are manifold. This creates challenges when configuring analytics, and goes some way to explaining why many who use the technology opt for the use of a sterile zone. A sterile zone consists of some form of obvious demarcation between an area that people are permitted to be in, and an area which they clearly barred from. The idea of a sterile zone is not to physically restrict access to an area – although some sterile zones do just that – but to ensure that anyone entering the zone has done so with intent rather than accidentally. Typical approaches include fencing or other barriers, signage or audiovisual devices. Artificial intelligence can also include automatic numberplate recognition – ANPR – which can read and register vehicle registration details. This not only ensures that a record is kept of all vehicles entering or exiting a secure area, but it can also check vehicle details against watch-lists, track vehicles through a site, and even automatically allow access or egress to known registered vehicles. Alternatively, the system could automatically display signage to instruct drivers of certain vehicles where to go. As digital video becomes increasingly specified, so diverse and innovative software solutions are being created to add intelligence for specific applications such as airports, ports and border areas, as well as introducing enhanced features and functions for general video management. These should easily integrate into existing network-based systems.

In summary Every site will have different requirements, but the flexibility on offer from such solutions means that there will be a networked video solution that can handle the requirements. Also, the flexibility

available is increasing all of the time, and the pace of development constantly adds new opportunities. Networked video can easily interoperate with communications devices, and as the capabilities of tablets, smartphones and networks increase, so do the possibilities of how far reaching and complex the added value available from video surveillance can be. As the possibilities are fully considered, so it becomes increasingly obvious that traditional security-centric thinking about video surveillance underplays the potential on offer. Whilst the security aspects of surveillance should never be compromised, there is an increasing depth of functionality that exists outside of traditional security principles. Indeed, whilst the security aspects are required for exceptional circumstances, the other benefits deliver value that is experienced on a daily basis. Networked video surveillance can deliver numerous benefits, but to realise their full potential requires a rethink on how events are categorised and managed. In essence, if there is a visual indication of an event of any type, then surveillance can provide proactive benefits!

Whilst some will raise objections to the use of networked technology, claiming it has performance flaws, it is important to remember that any system which is poorly installed, integrated and operated will deliver inferior results. 21

www.risk-uk.com


borders sep13_riskuk_aug13 02/09/2013 16:59 Page 4

Thermal Imaging

Increased awareness Thermal imaging devices can enhance the efficiency of patrols at border crossings and sites with large perimeters such as airports and ports. As costs for such devices decrease, so the technology makes ever more sense for those protecting high risk areas.

igh risk applications such as airports, ports and borders often make use of manned patrols, typically around the clock. Such patrols will work in conjunction with operators in a control room, using other technologies such as perimeter protection systems, video surveillance and – increasingly – thermal imaging. Patrols can be made more effective with the support of technology, and when it comes to identifying human activity in a wide range of conditions, thermal imaging – both handheld devices and fixed units – can deliver many benefits. The efficiency of manned patrols must be improved when environmental conditions are not favourable. Darkness, fog, rain and snow not only make it harder for personnel to assess what is occurring, but such conditions also present cover for those seeking to breach security. Whilst video surveillance is unquestionably a valuable tool, especially if networked solutions allow footage to be shared with patrol personnel via a mobile device, there is one significant issue. If there is insufficient light, or environmental conditions such as fog, rain or snow, then the video information might be of little use. Thermal imagers do not rely on light, as normal cameras do. Instead, they detect heat, and as such can operate effectively in darkness and poor environmental conditions. Because of the way they manage the information they gather (the units are more sensors than cameras), they can also give clear indications of any human activity – or other heat sources – over very long distances.

H

Think ‘heat’ The most obvious use of thermal imagers is to allow those in a control room or on a patrol to spot intruders. Although generated resolutions are low when considered against video footage, there will be enough information to identify any heat sources and to ascertain what they are. Therefore, a member of a security or safety team can see if people are on site, how many of them there are, and can quickly identify if movement is being caused by something more innocuous, such as an animal. Even if people conceal themselves, thermography will identify them. When considering the role of thermal imaging, it is important to stop thinking about visual information, and to start thinking about heat. For example, a vehicle that has recently

22

www.risk-uk.com

been driven will generate more heat than one which has been parked for some period of time, thus allowing identification of vehicles which have recently arrived, even if parked with a number of others. Events which have occurred previously can also leave a thermal imprint. For example, a heavy item being dragged creates friction, which in turn generates heat. The technology can be used to tackle situations that other solutions simply cannot address – concealed intruders, verification of alarm triggers during hours of darkness, target tracking, etc.. Whilst thermal imaging does not deliver sufficient detail to positively identify individuals, it does give some details that might not be expected. Many vehicles with sign-writing can be identified. This is because vinyl lettering has different thermal properties to those of the vehicle body. Many materials have differing levels of emissivity, and this difference can be seen in a thermal image. Indeed, the more you understand emissivity, the more you can appreciate the various applications for thermal imaging devices! Thermal technology delivers the ability to verify that an event has occurred (or is occurring), rather than identifying the culprit. However, care should be taken to consider operational ranges, which can be an issue given the way that thermal performance is quoted. Figures quoted for range might include claims for ‘detection’ and ‘identification’, and can cover hundreds of metres for handheld devices, or kilometres for fixed units. It is very important to realise that these figures are based upon the Johnson Criteria, which was designed for military needs, and ‘detection’ only requires two pixels! Obviously, the longer the range that the imagers are used for, the more difficult it becomes to positively recognise a human from an animal or other heat source. However, in some border applications, any breach of a perimeter could indicate an issue, such a fence being damaged, and would require action.

In summary Thermal imagers deliver value-added benefits to high risk border-related sites. They allow personnel to quickly check for human activity, over long distances, in darkness, fog, rain, snow and even if a site is engulfed in smoke, making them very useful if an incident is taking place. They also ensure that those on patrol are aware of the presence of people in an area, and can act accordingly. This makes response to events simpler, whilst also enhancing the safety of the personnel involved.


Project7_Layout 1 05/09/2013 15:27 Page 1

A formula everyone is familiar with

A formula that you should be familiar with VIQ = Less Cost VideoIQ’s analytic cameras and encoders with built in video recorder offer a cost effective and industry leading solution to perimeter protection. Simple to install and effective at greater distances our solutions provide real time threat detection and deliver instant alert notifications so you can spot potential trouble as it happens. Small remote sites such electrical substation, wind turbines, or similar outside business sites could be readily covered by a single camera.

Successfully detect people and vehicles at over 300 metres - advanced analytics significantly reduce false alarms Fewer cameras required resulting in lower project cost Reduced infrastructure means less time to install minimising site disruption Enhance existing security cameras compatible with 3rd party analogue, IP or thermal cameras

More Information

Tel: +44 (0) 161 624 0153 | www.videoiq-uk.com


borders sep13_riskuk_aug13 02/09/2013 17:00 Page 6

Passenger Scanning

Biometric Benefits For many high passenger flow sites like airports, credible auditing of throughput times and passenger flow is vital to providing an efficient and credible level of customer service. With such sites increasingly under pressure to meet strict targets, help can come from an unlikely source.

ention biometric technology to most people, and their immediate thoughts turn to access control. Over the years the technology has been used in a variety of formats for securing access and egress through controlled points. Whether the specific biometric element being used is a fingerprint, a retinal scan, vein geometry or iris recognition, the various systems use a unique identifier to generate a code, via an algorithm, which is then used to identify an individual. It is true that most biometric methods require the user to present the biometric element to a reader in order for a scan to be carried out. In access control applications, this is normal. Non-biometric methods also require some degree of user interaction: presentation of a tag or cord, entering a PIN number, etc.. One aspect of biometric identification which can, to a large extent, be considered as automatic, is facial recognition. The technology can be applied to a wide area, and the algorithms are able to detect facial characteristics within the viewed scene.

M

Anonymous data Facial recognition coupled with face detection in a scene can work together to deliver a very unobtrusive solution. Persons passing through, for example, a corridor, have no need to wait for a scan to be made. Indeed, they will often be unaware that biometric technology is being used. Given its traditional uses, the collection of biometric data on a mass scale may either seem futile, or have a tinge of ‘Big Brother’ about it. However, that data can be used without any identifying reference to the actual individuals being scanned. By tracking their progress between certain points, the airport can create metrics that identify, in real time, how traffic is flowing between certain parts of the site. This data can then be used to identify bottlenecks or to deploy additional resources, dependent upon circumstances. The system can capture biometric details of individuals and use the biometric template to create a unique code. This does not identify the individual, as the system

24

www.risk-uk.com

only works with the resultant code. At each stage when the individual is detected, the system can calculate the throughput rate based upon the time it takes for them to travel between the points. Once the person in question has completed all relevant stages of the tracked process, the code is discarded. The identity of the individual is safeguarded as the code cannot be backwards engineered to identify the person.

A case in point Edinburgh Airport has deployed a biometric system to measure passenger flow through a critical area of the airport: security screening. The system provides real-time data to reduce delays and improve the customer experience. The airport is using MFlow Journey from Human Recognition Systems to deliver the information. This enables site management to reduce security waiting times and improve throughput between the check-in and the gates, allowing better management of the security area, and delivering greater revenue return for tenants of the retail areas within the airport. The system is designed to operate without any interaction with staff or passengers, thus delivering passive but effective reporting. Graeme Agnew, Head of IT at Edinburgh Airport, stated, ‘At Edinburgh Airport we are always looking at how we can use cutting-edge technology to assist our operational planning and improve the customer experience. As the system doesn’t rely on people carrying Bluetooth or WiFi technology, we are able to collate highly accurate data on the movement of passengers through security screening and then make informed decisions about how we manage this area of the airport in the long term. Biometrics is playing an ever more important role within the aviation industry.’

In summary Whilst most biometric technology applications are designed to positively identify people, or verify their identity, facial recognition can be used to track individuals through a series of points without any need to verify or log their identity. When creating metrics that deliver accurate flow information, previous methods have required passengers to use physical devices, or labour-intensive counting and timing methods have been employed. With no required interaction from passengers or staff, automated systems deliver more accurate data, which can be used to streamline processes and enhance the overall passenger experience.


008_Layout 1 29/05/2013 22:38 Page 1

Star performers in low-light conditions

Be wise and choose the most light-sensitive HD cameras on the market. The new DINION starlight HD 720P and FLEXIDOME starlight HD 720p RD/VR are the next real breakthrough in HD security. In poor light these amazing HD cameras deliver a clear color image where others show only black and white. And in extreme low-light they deliver a black and white image where others show no image at all! Add the Bosch Video Security app and overcome the bandwidth barrier so you can view HD images from anywhere. See video security in a new light at www.boschsecurity.com/hdsecurity


risk web__RiskUK_dec12 31/01/2013 14:47 Page 2

In an increasingly volatile world, Risk UK is essential reading for risk management, loss prevention and business continuity professionals Increasingly, businesses and organisations need to operate in a risk-conscious world. The external threats to business are manifold and diverse. Issues range from security of people and property, loss prevention, health and safety, cyber threats, environmental issues and human resources management, through to terrorism, extortion and arson. Threats develop rapidly, and must be faced. Whilst the risks faced are complex, so too are the potential solutions. These need very careful consideration if the benefits on offer are to be fully realised. Risk UK delivers essential updates, advice and guidance to ensure that modern businesses are able to take proactive steps towards mitigating risk.

Risk UK offers a full web site and regular electronic newsletter, alongside its print publication, to help those who are active in risk management to better address external threats.

@riskukmagazine

www.risk-uk.com


027_Layout 1 03/09/2013 15:37 Page 1

Solutions for a Safer World Also available HT-1

RAPTOR Patent Application Numbers: GB1006439.2, EP11716612.4 & US13/641, 831

The Raptor is a shallow mount solution with an innovative sliding motion.

HT-1

VIPER

HT-1

MATADOR The award winning surface mount Matador sliding bollard system is slowly revolutionising the perimeter security industry. Fully PAS68 2010 tested the Matador will continue operation after fully arresting a 7.5 tonne truck travelling at 48kph with zero penetration and zero dispersal.

The Viper is a shallow mount blocker offering high security with easy installation.

HT-1

COMMANDER

Patent Application Numbers: GB1214486.1 PCT/GB2012/000821 The Commander is the ultimate in security, arresting a 30 tonne truck at 80kph.

Northfield, Atwick Road, Hornsea, East Yorkshire. HU18 1EL Tel: 01964 53 58 58 www.heald.uk.com All content copyright Š Heald Ltd.


hacktivist sep13_riskuk_aug13 02/09/2013 15:31 Page 2

The ‘Hacktivist’ threat For many, the concept of cyber security is very much dependent upon preventing the theft of data. If anything, this forms the core of network security thinking, and the final goal is to prevent such crimes. However, ‘Hacktivism’ often doesn’t have the aim of stealing data or committing crime for gain; instead the attacks aim to cause disruption and reputational damage. This requires a different approach to security, as Risk UK – with the help of Dai Davis – explains. Dai Davis is a Chartered Engineer and Solicitor. He has Masters degrees in Physics and Computer Science. Having been national head of IT law at Eversheds, he is now a partner in his own law firm.

28

www.risk-uk.com

ikipedia is always a good source of definitions for technology-related issues. It defines Hacktivism as, ‘the use of computers and computer networks to promote political ends, chiefly free speech, human rights and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience’. As with any technology, hacking – and therefore Hacktivism – could be argued to be a force for good or evil. The earliest forms of political Hacktivism included activating worms or viruses against

W

businesses or organisations deemed by the attackers to be behaving in an unacceptable or aggressive manner. These included political parties, defence agencies and even governmental resources across the globe. Whilst such attacks were not then defined as Hacktivism, the term was introduced in more recent times as the profile of attacks and hacking groups have become more prominent. Indeed, it is the higher profile groups, such as Anonymous, which introduced a change in the way that Hacktivist attacks were carried out. Previously, the Hacktivist movement was seen as pushing the boundaries with regard to cyber security, and indeed when one hacking group announced a ‘cyber-war’ against China in protest at human rights violations, the other hacking groups turned against them and declared methods such as website defacement and Denial of Service attacks as contradictory to the aim of promoting free speech.

Extended fallout As the websites of large corporations and national governmental resources have become ever more secure, so those hacking them for reasons of protest have had to become more sophisticated in their methods. In recent years, many of the more high profile attacks have been carried out by groups of hackers, rather than individuals. Two of the most widely known groups are Anonymous and Lulz Security (more commonly abbreviated to LulzSec). However, in the case of LulzSec, the group has allegedly disbanded and some of the members have been arrested. Nevertheless, given the disparate structure of these organisations and the transient nature of the members of these groups, it is unlikely that all of the members have been caught. There are also a number of other less recognised hacking collectives, along with a growing number of ‘copycat’ groups ranging from hardened IT-savvy technicians down to those with tools or methods downloaded from the internet. That Hacktivism has become ‘cool’ within certain social circles has served to fuel the amateur hacking scene. Because many of the groups are geographically distributed and have no real structured leadership, attacks are sporadic, and often are contradictory. They also have consequences for others using internet services outside of the primary target of an attack. The haphazard dissemination of information – both genuine and false – via the internet can mean that some businesses or organisations are targeted because of reported links with other targeted entities.


hacktivist sep13_riskuk_aug13 02/09/2013 15:32 Page 3

Hacktivism

The range of targets of the main hacking organisations has been wide and varied. The higher profile attacks against Government departments, the police and large corporations like Sony and Paypal are obvious. However, for those entering the world of Hacktivism, smaller companies with fewer resources are often seen as softer targets. Not all attacks are what would be called ‘advanced’. One of the early targets of Anonymous was the Church of Scientology. It is an interesting example, not least because the Church is an organisation which has attracted many critics over the years. The initial attack consisted of bombarding the Church of Scientology with prank telephone calls and sending black sheets of paper by facsimile transmission. These actions were followed up with a Denial of Service attack. Whether on-line attacks are to be judged alongside a physical assault depends upon the point of view taken. Many considering participating in Hacktivism as a form of protest see their crime as victimless (if they see it as a crime at all). However, evidence has shown that often the victims of Hacktivism suffer significant consequential losses. Of course, like many protests, Hacktivist attacks can also have an extended degree of fallout. In the course of the attack against the Church of Scientology, a secondary school in Holland and unlinked individuals in the US were wrongly targeted.

Varied targets The higher profile targets of Hacktivist groups are of a more overtly political nature. InfraGard, a partnership between businesses and the Federal Bureau of Investigation in the United States, was attacked, as was the US Senate and the Central Intelligence Agency website. The actions ranged from defacing the websites to bringing down the electronic services for periods of time. As with the internet, Hacktivism has no geographical barriers. In Portugal, for example, the websites of the Bank of Portugal, the Portuguese parliament as well as the Ministry of Economy, Innovation and Development have been attacked. The attacks were claimed to be in response to perceived police brutality at public protests against austerity measures. There have also been examples of Hacktivist attacks against states. When Iranians protested unsuccessfully against perceived widespread election fraud in 2009, Anonymous set up Anonymous Iran, an information exchange website. Hacktivism can also be statesponsored.

There have been claimed large-scale statesponsored instances of Hacktivism. The first occurred over a three-year period. The attacks seemed to be targeted at United States defence contractors’ websites and were widely alleged to be the work of the Chinese military. Following disagreements between Estonia and Russia over the relocation of a statue in Tallinn, a massive cyber-attack took place. Given the complexity of this attack, it is widely believed to have been sponsored by the Russian state. Indeed, this allegation was made by at least two Estonian ministers of state. In the attack, considerable interruptions occurred to many state-related entities in Estonia including financial institutions. Another example of alleged nation-state sponsored Hacktivism includes an attack against a number of American companies and

With Hacktivism, the ability to create chaos has been placed into the hands of clumsy amateurs, and this fact alone makes risk analysis an ever more challenging task! 29

www.risk-uk.com


hacktivist sep13_riskuk_aug13 02/09/2013 15:32 Page 4

Hacktivism

federal agencies. The internet security company Mandiant published detailed evidence which it believed indicated the Chinese Army’s Unit 61398 to be the source of the hacking. Many of the world’s conflict zones are also associated with political Hacktivism. One that is often reported is the Israeli-Palestinian conflict, but others include India-Pakistan and China’s attack on pro-Tibetan Independence websites as well as on Taiwan. In addition, China has been accused of attacking Japanese sites in its continuing dispute regarding sovereignty over the Senkaku/Diaoyu islands. Chinese-based hacking has also been claimed to be partially to blame for the demise of Canadian company Nortel, which seemingly lost a large number of its corporate secrets

Whilst Hacktivism defines attacks as a form of protest, the altering of boundaries of what is seen as unacceptable and acceptable presents opportunities for criminals. 30

www.risk-uk.com

through hacking believed to have emanated from China. A game-changing event was the development and release of the Stuxnet virus. The virus was uncovered in 2010 but by that time it had been used to attack nuclear facilities in Iran, where it is claimed to have caused up to £10 million worth of damage. It targeted control systems in the facilities. While there has never been any formal acknowledgment of who perpetrated the attack, it has been suggested that Israel and the United States were behind it.

A changing landscape For businesses and organisations, Hacktivism represents a threat that is, at its core, very different from the more traditional cyber-crime attacks. That said, whilst the concept of Hacktivism defines attacks as a form of protest, more aimed at disobedience and disruption than theft or fraud, the altering of boundaries of what is seen as unacceptable and acceptable in the cyber realm presents opportunities for criminals.


031_Layout 1 04/09/2013 14:03 Page 1

PRODUCT SHOWCASE

AQUARIUS FEATURES DUAL TECHNOLOGY EXTERNAL SENSOR Utilizes microwave and infrared detection technology for high performance.

INFRARED ANTIMASKING

WATERPROOF Completely waterproof with IP65 rating for the XL model & IP61 for the XS.

RANGE

Prevents any attempts to mask the infrared signal.

Has an operating range of 12 metres for the XL model and 8 metres for the XS model

MICROWAVE ANTIMASKING

DETECTION FUNCTIONALITY

Prevents any attempts to mask the microwave signal.

Can be set up to operate either in ‘curtain’ or ‘corridor’ mode.

PET IMMUNITY

TEMPERATURE COMPENSATION

Small animal pet immunity (optional)

Special algorithms automatically optimize detection performance when outside temperature changes.

XL

XS

Height: 110mm Width:  46.5mm Depth:  44mm

Height: 110mm Width:  41.5mm Depth:  44mm

CONTACT  US  NOW  FOR  MORE  INFORMATION  ON Office +44 (0)1604 648 344 Email info@gpsperimeter.co.uk Web www.gpsperimeter.co.uk


hacktivist sep13_riskuk_aug13 02/09/2013 15:34 Page 6

Hacktivism

Businesses must question whether attacks are merely posing as protest to cover a more criminal intent, with the Hacktivist plea of protest being used to cover attempts at something more nefarious in nature? The focus with cyber security must be moved away from the mere protection of data or servers, to a level where corporations can continue to securely use networks and on-line systems, even when attacks are occurring. For many experts, the emphasis is not on preventing attacks, but on being prepared for what they describe as the ‘inevitability’ of attacks. The previous hesitance of cyber activists to use denial of service attacks is no longer relevant, and the increased level of such threats to either swamp internet resources or to target specific functions of devices is increasingly an issue. Reports show that Hacktivism features highly in the reasoning behind such attacks. While the large-scale high profile Hacktivist attacks which hit the headlines are complex and advanced, often such attacks use simple phishing methods to obtain details, which are

then used to hijack social media accounts. Where protest is the real aim, such access can be used to make a point, plus can create reputational damage for the target. This does emphasise the need for businesses and organisations to widen their cyber security approach, and to ensure that they have effective social media policies in place.

In conclusion It is often said that those involved in Hacktivism think of it as a game, because the attacks are online, and don’t subsequently cause real damage. However, for targeted businesses, the consequential losses of downtime, and the reputational damage, can carry a financial penalty. What is worrying is that because of the ‘ethical’ undercurrent of Hacktivism, tools to simplify attacks are widely available. This means that hacking is no longer the exclusive preserve of programmers. The ability to create chaos has been placed into the hands of clumsy amateurs, and this fact alone makes risk analysis an ever more challenging task!


Project1_Layout 1 05/08/2013 11:16 Page 1

Gartner Security & Risk Management Summit 2013 18 - 19 September, 2013 | London, UK | gartner.com/eu/risk

Reset Your World: CISOs and Chief Risk Officers are the new business leaders

Find out more by visiting gartner.com/eu/risk

HOT TOPICS: 4VIPSL ZLJ\YP[` *SV\K JVTW\[PUN HUK ZLJ\YP[` *`ILY ZLJ\YP[` >LI HWWSPJH[PVU ZLJ\YP[` )\ZPULZZ JVU[PU\P[` HUK KPZHZ[LY YLJV]LY` BYOD *VTWSPHUJL YLN\SH[PVU 9PZR THUHNLTLU[


Project1_Layout 1 01/08/2013 12:11 Page 1

Bringing together the entire security buying chain In 2014 IFSEC International, the largest and longest running security event moves to a truly international venue. With more than 40 years at the heart of the security industry, reČľecting innoYatiYe industry trends and SroYiding insight into the Oatest technoOogy to NeeS Eusinesses and goYernments secure Put the date in your diary now! www.ifsec.co.uk/add2014

IFSEC International is Sart of

PROTECTION & MANAGEMENT Week

WWW.IFSEC.CO.UK

17-19 JUNE 2014 ExCeL LONDON


cyber news sep13_riskuk_sep13 02/09/2013 15:30 Page 1

Cyber and Data News

Third-party patching creates demands on users GFI Software has claimed that July was a critical month for software patching and vulnerability updates, with a major update issued on Microsoft’s Patch Tuesday, plus several major patch payloads from other software vendors including Oracle, Adobe, Google, Apple and Mozilla. Oracle’s major roll-up incorporated patches for a range of updates for its enterprise applications, as well as on-going updates for Java. ‘In the last month, third-party applications – those not from Microsoft and not included in the Windows Update service – account for a substantial volume of critical updates,’ stated Sergio Galindo, global product manager at GFI Software. ‘Over the period, we’ve seen multiple updates to both Mozilla’s Firefox browser and Thunderbird email client. Google’s Chrome browser has also had patches issued while Skype, Java and QuickTime have all had at least one major patch issued to address vulnerabilities or system performance issues. This is just a small subset of the applications used in workplaces on a daily basis that have had patches issued in the last month.’ The disparate nature of third-party applications means that IT admins and end users face an on-going challenge to find, test and deploy all the updates needed to keep clients and servers up-to-date. Some companies, have a unified updater for all their products, but this still means that multiple vendor sources have to be tracked on a regular basis. Third-party patches from application providers provide the biggest challenge as well as the bulk of the patching workload. Unless an organisation takes steps to deploy patch management systems, they face having to undertake extensive work and manual intervention to keep most of the applications in use up-to-date.

Mobile malware increase reported FortiGuard Labs has claimed a 30 per cent increase in mobile malware over the last six months. It is estimated that there are more than 1,300 new samples per day, and there are currently over 300 unique Android malware families and over 250,000 unique malicious Android samples. In 2012, it was predicted that financially lucrative ransomware would make its way onto mobile phones. The malware follows the same modus operandi as PC fake antivirus software – it locks the victim’s phone and demands payment before unlocking the device. Once the phone is locked, the victim can either pay the ransom or completely erase their device, losing all their data unless they have a full back-up elsewhere.

Cyber and Data Security News Barristers implement confidential email service London Chambers 2 Hare Court and Hailsham Chambers have entered into agreements with Fresh Skies, developers of Mkryptor, as a means of ensuring confidential email communication with their clients and other stakeholders. While the Criminal Justice Secure Email System (CJSM) protects communications sent from PCs, the new implementation means that barristers can send confidential email while on the go or working remotely from mobile devices. The system also allows email to be sent securely outside the CJSM. It is claimed that some existing products are so complex that operation has been compromised, leading to businesses shunning their use. The result has been exposure to risks associated with unprotected email.

DDoS attack data shows size increase Arbor Networks has released data on DDoS attack trends for the first half of 2013. The data shows that DDoS continues to be a global threat, with a clear increase in attack size, speed and complexity. The data reveals an escalation in the size, frequency and complexity of attacks. Average bits per second (bps) attack size is up 43 per cent. Nearly half of all attacks are over 1Gbps. The proportion of attacks in the 2–10Gbps range has more than doubled, from 14.78 per cent to 29.8 per cent, and attacks over 10Gbps have increased by 41.6 per cent. Attack durations are shorter, with 86 per cent lasting less than one hour.

Data growth seen as Cloud driver Asigra has announced the results of research on the impact of data growth on back-up and recovery pricing and cost containment. The research includes findings from nearly 500 financial and IT companies. In the report, commissioned by the company itself, two out of three respondents felt some pressure to reduce IT spending and that pressure was found to increase with a corporation’s annual revenue. Those from large companies were more likely to say they felt strong pressure to reduce costs across several areas of IT. While the desire to reduce costs is high, buyers of back-up and recovery software and services expect to see an increase in purchases in this area over the next five years due to data growth rates. In summary, 75 per cent said they expect their data volumes to grow at a rate of 20 per cent or less annually. Just over half felt that a backup and recovery model which charged for the services separately would be desirable.

35

www.risk-uk.com


cyber news sep13_riskuk_sep13 02/09/2013 15:31 Page 2

Cyber and Data News

Data dumping risk highlighted Auriga Consulting claims that public and private sector organisations could resort to reclassification and ‘data dumping’ in a bid to comply with the new Government Security Classifications Policy (GSCP). Central Government and their private sector suppliers have nine months to transition from using the current six tiers of protective markings to three. Although the new system promises to simplify classification, the process could prove painful in the short term as organisations re-evaluate data, assign categories and adjust their risk management posture. The GSCP forms part of the Civil Service Reform Plan published in June 2013, which includes provisions for the simplification of security classifications and their risk-informed application. The current Government Protective Marking System (GPMS) will be superseded by GSCP, with the six tiers (top secret, secret, confidential, restricted, protect and unclassified) being replaced by three (top secret, secret and official). The move is intended to reduce the complexity of data classification for Government departments, agencies and their private sector suppliers. Finalised in December 2012 with an anticipated launch of summer 2013, the new classifications policy gives organisations less than a year to complete transition planning before the deadline of April 2014.

Threat evolution report launched Kaspersky Lab has published its IT Threat Evolution Report for Q2 2013, which analyses IT security incidents and trends. According to the report, mobile malware was the most significant statistical category for the second quarter, in both quantity and complexity. Not only are cybercriminals developing more malware targeting mobile platforms, they’re also advancing the programs’ capabilities and behaviours. In addition to mobile malware, cybercriminals focused heavily on implementing campaigns designed for illegal bitcoin mining and theft as the digital currency’s value rapidly increased during the second quarter. With mobile malware, the malicious code is modified to infect legitimate mobile applications. The common procedure for cybercriminals is to download legitimate applications and modify them by adding the malicious code. Cybercriminals then redistribute the modified – and now malicious - applications to sites where they can be downloaded by users, such as third-party app stores. Malicious code samples are being inserted into the modified applications using cloud-based technologies, heuristics and antivirus signatures. While the most prevalent mobile malware category has traditionally been SMSTrojans, this trend declined in the second quarter as Trojans designed for mobile platforms started to incorporate more capabilities and flexibility. In the second quarter, Backdoor Trojans had the largest amount of modifications added. In terms of mobile malware capabilities, cybercriminals are now adding obfuscation techniques to evade analysis while frequently compiling programs that carry multiple payloads, which can generate money using several types of illegal business models. New variants can also extract larger amounts of stolen data from users’ devices while also being able to download and install additional malware onto infected devices.

Vulnerability testing offered DOSarrest has announced that it will begin offering a website vulnerability testing and optimisation (VTO) service. The service includes a comprehensive test that will intelligently trawl a website and find any vulnerabilities in the site’s coding, as well as analyse the structure to see what can be optimised for better performance. The Vulnerability portion of the scan is able to analyse web code while it is being executed,

36

www.risk-uk.com

Endpoint monitoring launched Absolute Software Corporation has launched Absolute Insight, a web-based remote monitoring, security and management solution for managed service providers. This delivers a complete view of each IT asset in all customer deployments, including relationships and dependencies within the organisation based on information from hardware, software, active directory, HR, procurement and other data sources. Using a cloud-based console, users have the ability to remotely track, secure and manage IT environments. The service is based on two web-based reporting portals – the technician portal which gives a view of customer assets under management, and the customer portal which provides customers with visibility into the security and management of their individual environments. Along with reporting and visibility, users can provide clients with audit and compliance reports, alerting for suspicious activity, lease completion information, and expiring warranties.

Enterprises in denial regarding security Lancope recently conducted a survey which is claimed to show that many organisations are in denial when it comes to the security of their IT infrastructure. Results indicated that nearly two-thirds of organisations believe that they have not experienced any security incidents over the last 12-18 months, or are unsure whether they have or not. The company claims that such results are ‘highly unlikely’, and state, ‘Any system you connect to the internet is going to be targeted by attackers very quickly thereafter. If you’re unsure whether or not your organisation has had a security incident, the chances are very high that the answer is yes.’ The report indicated that more than 65 per cent stated they have not, or are unsure if, they have experienced any security incidents in the past 12-18 months. Over 50 per cent see BYOD as one of the risks to their organisation, with 32 per cent also considering insider threats as a top risk. even for a very large site with dynamic pages, and test with the most advanced SQL Injection and Cross Site Scripting (XSS) analysers. A report is provided at the end that details all identified security breaches and the line of code that is the culprit as well as how to fix it. A secondary Optimisation scan is executed again on all pages within a website, applying best practice rule sets which identify what elements and design structure can be optimised, and how to do it.


FINAL bm web house_001_Benchmark_jul11 08/08/2011 16:20 Page 1

www.benchmarkmagazine.com

BENCHMARK

Benchmark – dedicated to independent tests, assessments and reviews of security products and solutions

The Benchmark website is a PRODUCT TESTS All tests are fully independent, and manufacturers supplement to the monthly have no involvement in the process. Additionally, Benchmark makes no charge, financially or of any magazine, and includes a variety other kind, for inclusion in tests. All products are selected by an independent team. In short, it’s the of tests and assessments of the only way you can ascertain the truth about product latest products, as well as guides performance! to product selection, technology Tests are carried out by an independent team of experts, telling you the truth about the performance challenges and information about of a wide range of security equipment, warts and all. influential technologies in the CHECK PREVIOUS ISSUES Benchmark back issues are available on-line, in a security sector. All content fully interactive format, and can be accessed free of is taken from the published charge. If Benchmark has tested the product, then you can establish the level of performance expected editions of Benchmark, so you in the field! will not find drafts by GUIDES AND CHALLENGES The Benchmark website includes product guides, manufacturers marketing their highlighting products that have been tested, or that wares or marketing hype that is have been recommended by security installers, system integrators, specifiers and security regurgitated via so many other consultants. There are also Technology Challenges, debunking the hype by reporting real-world channels. The content is written experiences of the various technologies. in plain English, free from technobabble, and reflects STAY UP TO DATE genuine experiences with the Benchmark is always testing and assessing products and technologies. Keep up to date equipment, whether that be with the latest reports by following Benchmark on Twitter. good, bad or indifferent. The www.twitter.com/benchmarkmag website is free to view.

www.benchmarkmagazine.com


next issue_riskuk_Dec12 03/09/2013 14:45 Page 1

Next Issue

Next Issue... Data Centres

Climate and the Supply Chain

One of the most important aspects of data centre service provision is resilience. When other businesses are dependent upon a continuity of service, provision must be made to ensure that disruptions are not just minimised, but positively prevented. With modern IT systems, any risk of fire – no matter how small or brief – simply cannot be tolerated, as it could lead to loss of data and downtime. For many, the solution lies in ensuring that a fire cannot start by using modern suppression methods, along with making certain that any incident is immediately detected via aspirating detection systems. Risk UK considers both options.

Recent winters have shown the effects of harsher climatic conditions, and widespread disruption has been the result of unseasonably difficult weather. Higher than normal levels of rainfall have impacted on certain geographical regions, and much of the UK suffered disruption due to snow and ice. Whilst control of the weather falls outside the remit of risk management professionals, ensuring continuity of the supply chain does not. Risk UK assesses the problems for businesses and organisations.

Personnel Powers Manned services are commonly used for asset protection. Risk UK considers the role of contracted and in-house security and safety personnel, and considers what rights and operational powers they do and do not have with regard to arrest, restraint of suspects and self defence whilst carrying out their duties.

ADVERTISING FEATURE

Over 60% of all fines issued by the Information Commissioner’s Office (ICO) relate to the use of un-encrypted email, often being sent to the wrong recipient.

U

www.cryptshare.com/riskuk

32

www.risk-uk.com

n-encrypted e-mail can be viewed a bit like a postcard where the content is immediately available to anyone who can see it - including the postman or nosey neighbour, or the wrong recipient! Insecure email is also about to get a lot more expensive with the European Data Protection Framework (EDPF), which is expected to come into force in 2014, carrying penalties of up to 2% of annual turnover for those found not to have taken the necessary action to prevent the data loss by establishing the necessary procedures and technical infrastructure. A further issue that results in data loss is

that email does not handle large attachments at all well, causing users to send large files, those carrying the most data, via ever more insecure, and often much more expensive methods such as couriers, USB, consumer grade cloud services and USB sticks or DVDs. But how can we operate without e-mail. It’s our favorite tool, we’re all used to it, it’s universally available and it’s easy to use. We can even receive it on our mobile devices so we have access to it wherever we are. Solve the security and file attachment problems and e-mail is an effective tool rather than a major vulnerability. Cryptshare enables users to exchange fully encrypted emails and file attachments of unlimited size with anyone and from within existing email solutions such as MS Outlook and IBM Notes. Furthermore Cryptshare complies with all existing ICO requirements. Simply put, in addressing both issues, Cryptshare makes e-mail better. To find our more or start a free trial go to www.cryptshare.com and click Risk UK


sep13 dir_000_RiskUK_sep13 04/09/2013 13:14 Page 1

Best Value Security Products from Insight Security www.insight-direct.co.uk Tel: +44 (0)1273 475500 ...and lots more Computer Security

Anti-Climb Paints & Barriers

Metal Detectors (inc. Walkthru)

Security, Search & Safety Mirrors

ACCESS CONTROL

Security Screws & Fastenings

Key Control Products

Empty Property & Lone Worker Alarms

Traffic Flow & Management

see our website

ACCESS CONTROL & DOOR HARDWARE

ALPRO ARCHITECTURAL HARDWARE ACCESS CONTROL

ACT Unit c1 South city Business centre Tallaght D.24 Ireland www.accesscontrol.ie tel: 00 353 1 466 2570 UK Lo Call Number: 0845 300 5204

Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks, Waterproof Keypads, Door Closers, Deadlocks plus many more T: 01202 676262 Fax: 01202 680101 E: info@alpro.co.uk Web: www.alpro.co.uk

ACCESS CONTROL, CCTV & INTRUSION DETECTION SPECIALISTS

SIEMENS SECURITY PRODUCTS

ACCESS CONTROL

APT SECURITY SYSTEMS The Power House, Chantry Place, Headstone Lane, Harrow, HA3 6NY Tel: 020 8421 2411 Email: info@aptcontrols.co.uk www.aptcontrols-group.co.uk B a r r i e r s , B l o c k e r s , B o l l a r d s , PA S 6 8

Suite 7, Castlegate Business Park Caldicot, South Wales NP26 5AD UK Main: +44 (0) 1291 437920 Fax: +44 (0) 1291 437943 email: securityproducts.sbt.uk@siemens.com web: www.siemens.co.uk/securityproducts

ACCESS CONTROL – SPECIALIST PRODUCT DISTRIBUTOR

MIRAS SECURITY SOLUTIONS LTD

ACCESS CONTROL

KERI SYSTEMS UK LTD Tel: + 44 (0) 1763 273 243 Fax: + 44 (0) 1763 274 106 Email: sales@kerisystems.co.uk www.kerisystems.co.uk

Speed Gates, Loop Detectors, LED Traffic Lights, Bi-Fold Gates, LED Traffic Signs, Turnstiles, Access Control, Bollards, Biometrics, Pay-on-Foot Solutions, Turnstile Hire, AVI Vehicle Tagging. Tel: 01633 420439 Mob: 07870 504 288 E: info@mirassecurity.co.uk W: www.mirassecurity.co.uk securitysolutions solutions security

miras

ACCESS CONTROL – SPEED GATES, BI-FOLD GATES ACCESS CONTROL

HTC PARKING AND SECURITY LIMITED

COVA SECURITY GATES LTD

4th Floor, 33 Cavendish Square, London, W1G 0PW T: 0845 8622 080 M: 07969 650 394 F: 0845 8622 090 info@htcparkingandsecurity.co.uk www.htcparkingandsecurity.co.uk

Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68

Tel: 01293 553888 Fax: 01293 611007 Email: sales@covasecuritygates.com Web: www.covasecuritygates.com

ACCESS CONTROL ACCESS CONTROL MANUFACTURER

NORTECH CONTROL SYSTEMS LTD. Nortech House, William Brown Close Llantarnam Park, Cwmbran NP44 3AB Tel: 01633 485533 Email: sales@nortechcontrol.com www.nortechcontrol.com

ACCESS CONTROL - BARRIERS, BOLLARDS & ROADBLOCKERS

HEALD LTD HVM High Security Solutions "Raptor" "Viper" "Matador", Shallow & Surface Mount Solutions, Perimeter Security Solutions, Roadblockers, Automatic & Manual Bollards, Security Barriers, Traffic Flow Management, Access Control Systems

Tel: 01964 535858 Email: sales@heald.uk.com Web: www.heald.uk.com

ACCESS CONTROL – BARRIERS GATES & ROAD BLOCKERS

FRONTIER PITTS

INTEGRATED DESIGN LIMITED Integrated Design Limited, Feltham Point, Air Park Way, Feltham, Middlesex. TW13 7EQ Tel: +44 (0) 208 890 5550 sales@idl.co.uk www.fastlane-turnstiles.com

ACCESS CONTROL

SECURE ACCESS TECHNOLOGY LIMITED Authorised Dealer Tel: 0845 1 300 855 Fax: 0845 1 300 866 Email: info@secure-access.co.uk Website: www.secure-access.co.uk

AUTOMATIC VEHICLE IDENTIFICATION

NEDAP AVI

Crompton House, Crompton Way, Manor Royal Industrial Estate, Crawley, West Sussex RH10 9QZ Tel: 01293 548301 Fax: 01293 560650 Email: sales@frontierpitts.com Web: www.frontierpitts.com

PO Box 103, 7140 AC Groenlo, The Netherlands Tel: +31 544 471 666 Fax: +31 544 464 255 E-mail: info-avi@nedap.com www.nedapavi.com

ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES

ACCESS CONTROL – BARRIERS, GATES, CCTV

UKB INTERNATIONAL LTD

ABSOLUTE ACCESS

Planet Place, Newcastle upon Tyne Tyne and Wear NE12 6RD Tel: 0845 643 2122 Email: sales@ukbinternational.com Web: www.ukbinternational.com

Aberford Road, Leeds, LS15 4EF Tel: 01132 813511 E: richard.samwell@absoluteaccess.co.uk www.absoluteaccess.co.uk Access Control, Automatic Gates, Barriers, Blockers, CCTV

www.insight-direct.co.uk Tel: +44 (0)1273 475500


sep13 dir_000_RiskUK_sep13 04/09/2013 13:14 Page 2

ACCESS CONTROL – MANUFACTURER

CCTV

ROSSLARE SECURITY PRODUCTS

G-TEC

Rosslare Security Products manufactures the Security Industry’s largest and most versatile range of Proximity and Smart Card readers.

Gtec House, 35-37 Whitton Dene Hounslow, Middlesex TW3 2JN Tel: 0208 898 9500 www.gtecsecurity.co.uk sales@gtecsecurity.co.uk

Bletchley Park, Milton Keynes, MK3 6EB Tel: 01908-363467 Email: sales.uk@rosslaresecurity.com www.rosslaresecurity.com ISO 9001 and ISO 14001 Certification

BUSINESS CONTINUITY BUSINESS CONTINUITY SOFTWARE & CONSULTANCY

CONTINUITY2 E232 Edinburgh House Righead Gate Glasgow G74 1LS Tel: +44 (0) 845 09 444 02 Fax : +44 (0) 845 09 444 03 info@continuity2.com

CCTV

PECAN Stortech Elec, Unit 2 spire green Centre Pinnacles West, Harlow, Essex CM19 5TS Tel 01279 419913 Fx 01279 419925 www.pecancctv.co.uk email sales@stortech.co.uk

CCTV / ACCESS CONTROL

GENIE CCTV LTD BUSINESS CONTINUITY MANAGEMENT

CONTINUITY FORUM Creating Continuity ....... Building Resilience A not-for-profit organisation providing help and support Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845 Email: membership@continuityforum.org Web: www.continuityforum.org

CCTV HOUSE, CITY PARK, WATCHMEAD, WELWYN GARDEN CITY, HERTFORDSHIRE, AL7 1LT TEL: 01707 330541, FAX: 01707 330543 EMAIL: sales@geniecctv.com www.geniecctv.com / www.genieaccess.com

CCTV/IP SOLUTIONS

DALLMEIER UK LTD 3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH Tel: +44 (0) 117 303 9 303 Fax: +44 (0) 117 303 9 302 Email: dallmeieruk@dallmeier.com

PHYSICAL IT SECURITY

RITTAL LTD Tel: 020 8344 4716 Email: information@rittal.co.uk www.rittal.co.uk

CCTV AND IP SECURITY SOLUTIONS

JVC PROFESSIONAL EUROPE LTD. 12 Priestley Way London NW2 7BA T: +44 (0)20 8208 6205 www.jvcpro.co.uk

BUSINESS CONTINUITY 4 Scotia Close Brackmills Northampton NN4 7HR 01604 769222 www.bcontinuity.com

CCTV & IP SECURITY SOLUTIONS

PANASONIC SYSTEM NETWORKS EUROPE

BUSINESS SALES BUSINESS SALES Caroline Exley FCA 01925 756970 info@abalymm.com www.abalymm.com

ABA Lymm

• • • •

Business acquisitions Disposals Valuations & advice Confidential

Specialist in buying and selling security businesses

CCTV

Panasonic House, Willoughby Road Bracknell, Berkshire RG12 8FP Tel: 0844 8443888 Fax: 01344 853221 Email: system.solutions@eu.panasonic.com Web: www.panasonic.co.uk/cctv

COMMUNICATIONS & TRANSMISSION EQUIPMENT

KBC NETWORKS LTD. Barham Court, Teston, Maidstone, Kent ME18 5BZ www.kbcnetworks.com Phone: 01622 618787 Fax: 020 7100 8147 Email: emeasales@kbcnetworks.com

MANUFACTURERS OF A COMPLETE RANGE OF INNOVATIVE INFRA RED AND WHITE LIGHT LED LIGHTING PRODUCTS FOR PROFESSIONAL APPLICATIONS INCLUDING CCTV SCENE ILLUMINATION, ARCHITECTURAL UP-LIGHTING AND COVERT SECURITY.

DIGITAL IP CAMERAS

ADVANCED LED TECHNOLOGY LTD

Supplying digital IP camera for rapid deployment, remote site monitoring, fixed and short term installations. High resolution images available over mobile and wireless networks to any standard web browser.

Sales: +44 (0) 1706 363 998 Technical: +44 (0) 191 270 5148 Email: info@advanced-led-technology.com www.advanced-led-technology.com

SESYS LTD 1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333 Email: info@sesys.co.uk www.sesys.co.uk

CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS

END TO END CCTV SOLUTIONS/RECORDERS, CAMERAS, NETWORK PRODUCTS

ALTRON COMMUNICATIONS EQUIPMENT LTD

DEDICATED MICROS

Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ Tel: +44 (0) 1269 831431 Email: comms@altron.co.uk Web: www.altron.co.uk

1200 Daresbury Park, Daresbury, Warrington, WA4 4HS, UK Tel: +44 (0) 845 600 9500 Fax: +44 (0) 845 600 9504 Email: customerservices@dmicros.com www.dmicros.com

www.insight-direct.co.uk Tel: +44 (0)1273 475500


sep13 dir_000_RiskUK_sep13 04/09/2013 13:14 Page 3

INFRA-RED AND WHITE-LIGHT CCTV LIGHTING AND ANPR

DISTRIBUTOR

RAYTEC

FASTFLEX

Unit 3 Wansbeck Business Park, Rotary Parkway, Ashington, Northumberland. NE638QW Tel: 01670 520 055 Email: sales@rayteccctv.com Web: www.rayteccctv.com

2A Woodham Lane, New Haw, Addlestone, Surrey, KT15 3NA Contact: Chris Hobbs on 0845 276 1111 sales@fastflex.co.uk www.fastflex.co.uk

CCTV SPECIALISTS

WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS, PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.

PLETTAC SECURITY LTD Unit 39 Sir Frank Whittle Business Centre, Great Central Way, Rugby, Warwickshire CV21 3XH Tel: 0844 800 1725 Fax: 01788 544 549 Email: sales@plettac.co.uk www.plettac.co.uk

MAYFLEX Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ

Tel: 0800 881 5199 Email: securitysales@mayflex.com Web: www.mayflex.com

CCTV & IP SOLUTIONS, POS & CASH REGISTER INTERFACE, EPOS FRAUD DETECTION

AMERICAN VIDEO EQUIPMENT Endeavour House, Coopers End Road, Stansted, Essex CM24 1SJ Tel : +44 (0)845 600 9323 Fax : +44 (0)845 600 9363 E-mail: avesales@ave-uk.com

CONTROL ROOM & MONITORING SERVICES ADVANCED MONITORING SERVICES

EUROTECH MONITORING SERVICES LTD.

Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring • Vehicle Tracking • Message Handling • Help Desk Facilities • Keyholding/Alarm Response Tel: 0208 889 0475 Fax: 0208 889 6679 E-MAIL eurotech@eurotechmonitoring.com Web: www.eurotechmonitoring.com

DISTRIBUTORS

EUROPE’S MOST SUCCESSFUL DISTRIBUTOR OF CCTV, IP VIDEO, ACCESS CONTROL AND INTRUDER DETECTION SOLUTIONS

NORBAIN SD LTD 210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP Tel: 0118 912 5000 Fax: 0118 912 5001 www.norbain.com Email: info@norbain.com

EMERGENCY PLANNING SYSTEMS THREAT ASSESSMENT, REGULATORY COMPLIANCE, EMERGENCY PLANNING

G4S TECHNOLOGY – ONEFACILITY Integrating people, process and technology to enable organisations and the facilities they run to achieve regulatory compliance, mitigate risk and remain one step ahead.

01684 850977 onefacility@uk.g4s.com www.1f.com

EMPLOYMENT EMPLOYEE SCREENING SERVICES

THE SECURITY WATCHDOG Cross and Pillory House, Cross and Pillory Lane, Alton, Hampshire, GU34 1HL, United Kingdom www.securitywatchdog.org.uk Telephone: 01420593830

EMPLOYMENT

URGENTLY NEEDED… ADI ARE A LEADING GLOBAL DISTRIBUTOR OF SECURITY PRODUCTS OFFERING COMPLETE SOLUTIONS FOR ANY INSTALLATION.

ADI GLOBAL DISTRIBUTION Chatsworth House, Hollins Brook Park, Roach Bank Road, Bury BL9 8RN Tel: 0161 767 2900 Fax: 0161 767 2909 Email: info@adiglobal.com

National Franchise Opportunities with an established Security Company with over 4000 installs specialising in Audio Monitoring. Try before you buy scheme. Contact Graham for full prospectus graham@securahomes.co.uk TEL: 01274 631001

IDENTIFICATION

TRADE ONLY CCTV MANUFACTURER AND DISTRIBUTOR

COP SECURITY Leading European Supplier of CCTV equipment all backed up by an industry leading service and support package called Advantage Plus. COP Security, a division of Weststone Ltd, has been designing, manufacturing and distributing CCTV products for over 17 years. COP Security is the sole UK distributor for IRLAB products and the highly successful Inspire DVR range. More than just a distributor.

COP Security, Delph New Road, Dobcross, OL3 5BG Tel: +44 (0) 1457 874 999 Fax: +44 (0) 1457 829 201 sales@cop-eu.com www.cop-eu.com

www.insight-direct.co.uk Tel: +44 (0)1273 475500


sep13 dir_000_RiskUK_sep13 04/09/2013 13:14 Page 4

POWER

COMPLETE SOLUTIONS FOR IDENTIFICATION

DATABAC GROUP LIMITED 1 The Ashway Centre, Elm Crescent, Kingston upon Thames, Surrey KT2 6HH Tel: +44 (0)20 8546 9826 Fax:+44 (0)20 8547 1026 enquiries@databac.com

INDUSTRY ORGANISATIONS TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY

BRITISH SECURITY INDUSTRY ASSOCIATION Tel: 0845 389 3889 Email: info@bsia.co.uk Website: www.bsia.co.uk

STANDBY POWER SPECIALISTS; UPS, GENERATORS, SERVICE & MAINTENANCE

DALE POWER SOLUTIONS LTD Salter Road, Eastfield Industrial Estate, Scarborough, North Yorkshire YO11 3DU United Kingdom Phone: +44 1723 583511 Fax: +44 1723 581231 www.dalepowersolutions.com

POWER SUPPLIES – DC SWITCH MODE AND AC

DYCON LTD Cwm Cynon Business Park, Mountain Ash, CF45 4ER Tel: 01443 471 060 Fax: 01443 479 374 Email: marketing@dyconsecurity.com www.dyconsecurity.com The Power to Control; the Power to Communicate

THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY

SSAIB The Smoke Houses Cliffords Fort, North Shields, Tyne & Wear Tel: 0191 2963242 Web: www.ssaib.org

INTEGRATED SECURITY SOLUTIONS

STANDBY POWER

UPS SYSTEMS PLC Herongate, Hungerford, Berkshire RG17 0YU Tel: 01488 680500 sales@upssystems.co.uk www.upssystems.co.uk

UPS - UNINTERRUPTIBLE POWER SUPPLIES

ADEPT POWER SOLUTIONS LTD SECURITY PRODUCTS AND INTEGRATED SOLUTIONS

HONEYWELL SECURITY GROUP Honeywell Security Group provides innovative intrusion detection, video surveillance and access control products and solutions that monitor and protect millions of facilities, offices and homes worldwide. Honeywell integrates the latest in IP and digital technology with traditional analogue components enabling users to better control operational costs and maximise existing investments in security and surveillance equipment. Honeywell – your partner of choice in security. Tel: +44 (0) 844 8000 235 E-mail: securitysales@honeywell.com Web: www.honeywell.com/security/uk

INTEGRATED SECURITY SOLUTIONS

INNER RANGE EUROPE LTD Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead, Reading, Berkshire RG74GB, United Kingdom Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001 Email: ireurope@innerrange.co.uk www.innerrange.com

Adept House, 65 South Way, Walworth Business Park Andover, Hants SP10 5AF Tel: 01264 351415 Fax: 01264 351217 Web: www.adeptpower.co.uk E-mail: sales@adeptpower.co.uk

UPS – UNINTERUPTIBLE POWER SUPPLY

RIELLO UPS LTD Unit 50, Clywedog Road North, Wrexham LL13 9XN Tel: 0800 269394 Fax: 01978 729 290 Email: sales@riello-ups.co.uk Web: www.riello-ups.co.uk

UPS - UNINTERRUPTIBLE POWER SUPPLIES

UNINTERRUPTIBLE POWER SUPPLIES LTD Woodgate, Bartley Wood Business Park Hook, Hampshire RG27 9XA Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk www.upspower.co.uk

SECURITY

PERIMETER PROTECTION INFRARED DETECTION

CASH MANAGEMENT SOLUTIONS

GJD MANUFACTURING LTD

LOOMIS UK LIMITED

Unit 2 Birch Industrial Estate, Whittle Lane, Heywood, Lancashire, OL10 2SX Tel: + 44 (0) 1706 363998 Fax: + 44 (0) 1706 363991 Email: info@gjd.co.uk www.gjd.co.uk

1 Alder Court, Rennie Hogg Road, Nottingham, NG2 1RX T - 0845 309 6419 E - info@uk.loomis.com W - www.loomis.co.uk

PERIMETER PROTECTION

CASH & VALUABLES IN TRANSIT

GPS PERIMETER SYSTEMS LTD

CONTRACT SECURITY SERVICES LTD

14 Low Farm Place, Moulton Park Northampton, NN3 6HY UK Tel: +44(0)1604 648344 Fax: +44(0)1604 646097 E-mail: info@gpsperimeter.co.uk Web site: www.gpsperimeter.co.uk

Challenger House, 125 Gunnersbury Lane, London W3 8LH Tel: 020 8752 0160 Fax: 020 8992 9536 E: info@contractsecurity.co.uk E: sales@contractsecurity.co.uk Web: www.contractsecurity.co.uk

www.insight-direct.co.uk Tel: +44 (0)1273 475500


sep13 dir_000_RiskUK_sep13 04/09/2013 13:14 Page 5

CCTV

ONLINE SECURITY SUPERMARKET

INSIGHT SECURITY

EBUYELECTRICAL.COM

Unit 2, Cliffe Industrial Estate Lewes, East Sussex BN8 6JL Tel: 01273 475500 Email:info@insight-security.com www.insight-security.com

Lincoln House, Malcolm Street Derby DE23 8LT Tel: 0871 208 1187 www.ebuyelectrical.com

FENCING SPECIALISTS

INTRUDER ALARMS – DUAL SIGNALLING

J B CORRIE & CO LTD

WEBWAYONE LTD

Frenchmans Road Petersfield, Hampshire GU32 3AP Tel: 01730 237100 Fax: 01730 264915 email: fencing@jbcorrie.co.uk

11 Kingfisher Court, Hambridge Road, Newbury Berkshire, RG14 5SJ Tel: 01635 231500

INTRUSION DETECTION AND PERIMETER PROTECTION

LIFE SAFETY EQUIPMENT

OPTEX (EUROPE) LTD Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311 Email: sales@optex-europe.com www.optex-europe.com

Email: sales@webwayone.co.uk www.webwayone.co.uk www.twitter.com/webwayoneltd www.linkedin.com/company/webwayone

C-TEC Challenge Way, Martland Park, Wigan WN5 OLD United Kingdom Tel: +44 (0) 1942 322744 Fax: +44 (0) 1942 829867 Website: http://www.c-tec.co.uk

INTERCOM SOLUTIONS – SECURITY & COMMUNICATION

PERIMETER SECURITY

COMMEND UK LTD

TAKEX EUROPE LTD

Commend House, Unit 20, M11 Business Link, Parsonage Lane, Stansted, Essex CM24 8GF Tel: 01279 872 020 Fax: 01279 814 735 E-mail: sales@commend.co.uk Web: www.commend.co.uk

Aviary Court, Wade Road, Basingstoke Hampshire RG24 8PE Tel: +44 (0) 1256 475555 Fax: +44 (0) 1256 466268 Email: sales@takexeurope.com Web: www.takexeurope.com

INTRUDER AND FIRE PRODUCTS

SECURITY EQUIPMENT

CQR SECURITY

PYRONIX LIMITED

125 Pasture road, Moreton, Wirral UK CH46 4 TH Tel: 0151 606 1000 Fax: 0151 606 1122 Email: andyw@cqr.co.uk www.cqr.co.uk

Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY. Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042 www.facebook.com/Pyronix www.linkedin.com/company/pyronix www.twitter.com/pyronix

SECURITY SYSTEMS

BOSCH SECURITY SYSTEMS LTD PO Box 750, Uxbridge, Middlesex UB9 5ZJ Tel: 01895 878088 Fax: 01895 878089 E-mail: uk.securitysystems@bosch.com Web: www.boschsecurity.co.uk

INTRUDER ALARMS – DUAL SIGNALLING

SECURITY EQUIPMENT

CSL DUALCOM LTD

CASTLE

Salamander Quay West, Park Lane Harefield , Middlesex UB9 6NZ T: +44 (0)1895 474 474 F: +44 (0)1895 474 440 www.csldual.com

Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042

INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS

VICON INDUSTRIES LTD.

RISCO GROUP Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton, Manchester, M24 2SS Tel: 0161 655 5500 Fax: 0161 655 5501 Email: sales@riscogroup.co.uk Web: www.riscogroup.com/uk

www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity

www.twitter.com/castlesecurity

Brunel Way Fareham Hampshire, PO15 5TX United Kingdom www.vicon.com

www.insight-direct.co.uk Tel: +44 (0)1273 475500


Project1_Layout 1 05/08/2013 11:24 Page 1

Standard Rate

BCM World Conference and Exhibition 2013 Free to attend exhibition showcasing BC products and services from around the globe Conference programme with unique ‘three stream’ structure, which caters for the BC newcomer to the experienced practitioner Training at BCM World Exhibition seminar programme consisting of practitioner and vendor presentations The BCI Gala Dinner and Global Awards

MEMBER £890 + VAT NON-MEMBER £990 + VAT

Why register as a delegate?

Why visit the exhibition?

Why exhibit?

Ǧ

Ǧ ƽ ʬ ǂ

Ǧ ʬ ʭ

Ǧ

Ǧ ʬ

Ǧ Ǧ ʬ Ǧ

Ǧ ʬ

Ǧ ǂƽ ǂ Ǧ Ǧ ʬ

Ǧ

FOR SPONSORSHIP ENQUIRIES CONTACT faye.leo@thebci.org

FOR ALL OTHER ENQUIRIES CONTACT lucy.mcdonnell@thebci.org or nicky.tramaseur@thebci.org

6 – 7 ȝțȜȞ ƽ

FOR FREE

Gold sponsor

Visit www.bcm2013.com to learn more and register today!


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.