FrontCover October2016_001 12/10/2016 12:51 Page 1
October 2016
www.risk-uk.com
Security and Fire Management
Big Data and Value Creation Protection Regimes for Information and Personnel Resilient Business: Confronting Power Supply Continuity Body-Worn Cameras: ‘Black Boxes’ or Beneficial Systems? Security Services: Best Practice Casebook on Recruitment Vertical Focus: Risk Mitigation in the Healthcare Sector
Project1_Layout 1 10/10/2016 14:40 Page 1
www.coie.uk.com
Cortech Open Innovation Event The Crystal, Royal Victoria Dock, London, 9 November 2016
The Mitigation of Risk for Workplace Safety, High Security and Building Efficiency The Cortech Open Innovation Event [COIE] is a showcase for some of the latest advances in security, fire and building control technology and a platform for demonstrating how smarter interoperability between these systems can reduce cost and risk, improve operational efficiency and provide greater situation awareness. The event aims to challenge us all to think about the way we manage infrastructures and buildings with a view to safety, security, interoperability and sustainability. Facilitated through the use of software and manufacturers’ equipment, a live demonstration will provide an educational and thought-provoking insight into the risks and challenges faced when managing multiple technologies across multiple sites centring on prioritisation, escalation, accountability, verification, efficiency and return on investment. The audience will discover how easy it is to remotely monitor and control technology from thousands of miles away.
Attending Partners
Cortech Developments
Media Partner
Contents October2016_riskuk_Dec12 12/10/2016 11:37 Page 3
October 2016
Contents 41 Fire Safety Management and Installation
Cyber Risk Management (pp68-69)
Risk UK has once again partnered with sister title PSI and the Fire Industry Association (FIA) on a dedicated Fire Safety Supplement. Contributors include the FIA’s Kevin Stearns talking about third party certification (pp42-43) and Apollo Fire Detectors’ Karl Westhead examining false fire alarms (p44)
57 Risk UK Product Test for End Users 5 Editorial Comment 6 News Update Government action on modern slavery. Sir Bernard Hogan-Howe QPM to retire as Met Commissioner. SRI report on cyber security
8 News Analysis: University of Cambridge Study
In the first of an occasional Product Test series, Risk UK takes a look at Hikvision’s DS-2CD4A26FWD-IZHS Bullet Camera from the perspective of the end user
58 The Security Institute’s View 61 In the Spotlight: ASIS International UK Chapter
Brian Sims reports on the University of Cambridge Institute of Criminology’s study around body-worn cameras’ effectiveness
64 FIA Technical Briefing
10 News Special: Cortech Open Innovation Events Brian Sims previews next month’s COIE taking place in London
Recruitment has always been a difficult challenge for private security companies. David Mundell explains why
13 News Special: BCI World Conference 2016
68 Cyber Security: End User Risk Management
Brian Sims looks ahead to the 2016 BCI World Conference
14 Opinion: Resilience in the Supply Chain
With organisations potentially increasing the number of entry points on their networks vulnerable to attack, Francis Lachance and Simon Cook consider several risk-focused solutions
When demand outstrips manageable and available supply, what next for our societies? Phillip Wood searches for some answers
70 Training and Career Development
16 Opinion: Security’s VERTEX Voice
Ken Livingstone outlines a new MSc course devised by the Perpetuity Academy and the University of South Wales
Peter Webster examines how the ‘Lone Wolf’ terrorist creates a unique set of issues for security professionals to confront
72 Risk in Action
19 BSIA Briefing
74 Technology in Focus
James Kelly explores some of the measures that should be put in place in order to ensure the security of personal information
77 Appointments
22 Power Supply in Continuity Power supply continuity plans investigated by Tony Makosinski
66 Security Services: Best Practice Casebook
People moves within the security and fire business sectors
80 The Risk UK Directory
25 Security Solutions for the Healthcare Sector Risk UK’s Vertical Focus discusses security solutions for the healthcare sector. Brian Sims on the NAHS Annual Conference (p27). Gareth O’Hara reviews access control solutions (p28). Maggie Wilkinson tackles secure communications (p30) while Mark Thomas takes stock of interoperable systems (p32). Chantel Smith observes integration planning (p33) and Paul Sheeran centres on end user interfaces (p34). Also, Adam Binns brings perimeter protection regimes to the fore (p35) and James Brown outlines numerous techniques for theft prevention (p36)
38 Body-Worn Cameras Under The Microscope What next for body-worn cameras? Mark Patrick has the outlook
ISSN 1740-3480 Risk UK is published monthly by Pro-Activ Publications Ltd and specifically aimed at security and risk management, loss prevention, business continuity and fire safety professionals operating within the UK’s largest commercial organisations © Pro-Activ Publications Ltd 2016 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means electronic or mechanical (including photocopying, recording or any information storage and retrieval system) without the prior written permission of the publisher The views expressed in Risk UK are not necessarily those of the publisher Risk UK is currently available for an annual subscription rate of £78.00 (UK only) www.risk-uk.com
Risk UK PO Box 332 Dartford DA1 9FF
Editor Brian Sims BA (Hons) Hon FSyI Tel: 0208 295 8304 Mob: 07500 606013 e-mail: brian.sims@risk-uk.com Design and Production Matt Jarvis Tel: 0208 295 8310 Fax: 0870 429 2015 e-mail: matt.jarvis@proactivpubs.co.uk Advertisement Director Paul Amura Tel: 0208 295 8307 Fax: 01322 292295 e-mail: paul.amura@proactivpubs.co.uk Administration Tracey Beale Tel: 0208 295 8306 Fax: 01322 292295 e-mail: tracey.beale@proactivpubs.co.uk Managing Director Mark Quittenton Chairman Larry O’Leary
Editorial: 0208 295 8304 Advertising: 0208 295 8307
3 www.risk-uk.com
EditorialComment October2016_riskuk_jul14 10/10/2016 17:17 Page 1
Carbon Monoxide Sensor with Ricochet® Mesh Technology Add additional safety to Premier Elite security systems with the Premier Elite CO-W wireless carbon monoxide sensor. Carbon monoxide is an odourless, colourless gas that, if undetected, can cause serious illness and death. According to the World Health Organization (WHO), carbon monoxide poisoning accounted for 2.2 deaths per 100,000 people in Europe, making carbon monoxide more deadly than skin cancer over the same period.*
Outstanding features include: • Continually monitoring CO sensor
• 4 year typical battery life (2 x 1.5V AA Alkaline, included)
• Compatible with Premier Elite control panels (V3.02 firmware or above)
• EN50131-1, EN50131-5-3 Grade 2 Class II • EN50291-1 Approved
• Ricochet mesh technology • 10 year sensor lifespan *Source: ‘Mortality associated with exposure to carbon monoxide in WHO European Member States’, WHO 2012.
Texecom products are designed and manufactured in the UK
EditorialComment October2016_riskuk_jul14 10/10/2016 17:18 Page 2
Editorial Comment
Additional Ricochet® enabled wireless peripherals: Premier Elite OH-W Wireless Smoke Detector
Premier External TD-W Wireless Outdoor Motion Sensor
Premier Elite PA DP-W Wireless Double Push Panic Button
On The Network embers of the British Security Industry Association’s (BSIA) dedicated CCTV Section have issued a stark warning that end users of IP-connected CCTV systems should be taking cyber security very seriously indeed. In an article recently published by The Times, Nigel Inkster (former director of operations and intelligence at MI6) raised concerns about the potential threat posed to national security through vulnerabilities in IP (Internet Protocol)-connected CCTV solutions (including components manufactured in those nations harbouring a reputation for state-sponsored espionage). While the integration of video surveillance solutions with IP networks carries significant benefits – among them the offer of potentially cheaper and easier installation, an ability to distribute video images more widely and the ease with which additional cameras may be added to the network at a later date – the end result is also potentially vulnerable to cyber attack. Unsecured cameras can become the weak link that provides hackers with an entry point to the corporate network. From that juncture, the risks to businesses may include sabotage (ie disruption of operations, potentially leading to lost productivity and revenue), stolen personal data (eg financial or health information, potentially resulting in loss of customer trust, the denigration of a brand and weakened profits) and intellectual property or trade secrets falling into the wrong hands. On top of that, marketing plans or R&D data appropriated by criminal types could result in a loss of competitive advantage. There’s also the potential for extortion, whereby the company or individuals involved have to pay a ransom to regain access to their systems or data, or perhaps regulatory action or negligence claims (such as penalties issued by a Government body). Mitigating these risks must be a key priority for each party involved in the supply chain. Manufacturers should ensure accidental design or implementation errors are kept to an absolute minimum and that systems are regularly scanned for vulnerabilities. They should be proficient in secure coding and testing procedures, and also make certain their products are capable of supporting the stringent controls necessary for secure network communication in today’s business landscape. This may include end-to-end encryption with SHA-2 and TLS, encrypted database communication, system auditing, alerting and management, DDoS protection, the restriction of ports, protocols and services, highly ‘customisable’ user access and permissions and archive, failover and high availability. Simon Adcock, chairman of the BSIA’s CCTV Section, told Risk UK: “Ultimately, end users must take responsibility for the security of their networks. When procuring an IP-connected surveillance solution, they must use the services of a reputable installer or integrator that’s fully committed to Best Practice. They should also guarantee that they have comprehensive cyber security and information security policies in place.” For their part, responsible installers need to ensure that the system they’ve put in place is protected from cyber attacks by dint of changing the manufacturer’s default system credentials.
M
Brian Sims BA (Hons) Hon FSyI Editor
www.texe.com Sales: +44 (0)1706 220460
December 2012
5
www.risk-uk.com
NewsUpdate October2016_riskuk_nov14 11/10/2016 15:29 Page 1
Prime Minister urges international action designed to stamp out modern slavery Within the margins of the recent UN General Assembly, Prime Minister Theresa May sought to galvanise international action on stamping out modern slavery when bringing together political leaders and representatives of numerous international organisations. The Prime Minister argued that, just as we’ve stepped up international co-operation designed to crack down on drug trafficking and other forms of organised crime, we need a similarly co-ordinated effort to eradicate modern slavery. Theresa May duly urged the group of likeminded country representatives and key practitioners to work together on developing a model national response based upon strong law enforcement action and a legislative framework, reducing vulnerability and supporting victims, tackling transparency in supply chains and ensuring effective international co-operation. It’s estimated that there are up to 45 million victims of modern slavery worldwide. A crossjurisdiction crime just like the trafficking of drugs, it’s run by criminal groups who can evade prosecution because law enforcement faces the obvious challenges brought about by criminals networking across borders either physically or via the Internet. That’s why there’s a need for world leaders to challenge their respective law enforcement agencies to join forces with others and tackle the organised crime groups in order to free the
victims of modern day slavery. This will require data and intelligence sharing in tandem with multilateral prosecutions. Increased co-operation across borders delivers results, with long sentences ensuing for the perpetrators and, for the victims, freedom with recompense by way of the seizure of criminal assets. Speaking ahead of the meeting in New York, the Prime Minister said: “Just as the criminals cross borders, so too we need a radical new approach that crosses borders – sharing intelligence and joining up investigations. This is standard in the case of drug trafficking and the trade in illegal firearms. There’s no excuse for our law enforcement authorities failing to do this when it comes to modern slavery.” One year on from the Modern Slavery Act that has set an international benchmark to which other jurisdictions now aspire, the Government is pioneering a more co-ordinated policy and operational response with a new Task Force to be chaired by the Prime Minister. That Task Force aims to do more in bringing perpetrators to justice and supporting victims domestically and overseas thanks to its focus on specific objectives. Crucially, membership of the Task Force has been designed to help drive forward the operational response with a high number of intelligence and policing experts joining Government ministers around the table.
Sir Bernard Hogan-Howe QPM set to retire from Commissioner’s role at the Metropolitan Police Service Sir Bernard Hogan-Howe QPM is to retire after five years as the Commissioner of the Metropolitan Police Service. Sir Bernard will remain in post until February next year to allow the Home Secretary, Amber Rudd, and Sadiq Khan (the Mayor of London) to appoint a successor. Sir Bernard was appointed to the role on 12 September 2011. His first significant challenge was to lead the response to the London riots, convicting the criminals responsible and making sure his officers were properly prepared such that they could be mobilised at speed to avoid losing control of the streets in the capital. The Commissioner has focused the Metropolitan Police Service on making London the safest global city, reducing knife and gun crime through a determined war on gangs. Following the terrorist attacks in Paris last year, the Commissioner ordered a significant increase in the number of firearms officers in London and stepped up the number of armed patrols operating across the capital. Public confidence in the Metropolitan Police Service has risen during Sir Bernard’s time as Commissioner. His promise of ‘Total Victim Care’ – a key pillar of his ‘Total Policing’ philosophy that worked so well during his time as chief constable at Merseyside Police – has seen a marked increase in satisfaction with the Met’s service. “I’m so proud of the remarkable men and women who serve London as police officers and staff and make this such a safe place for people to live in, work or visit,” explained the Commissioner. “I want to thank all of them for what they do on a daily basis to protect our citizens from harm.”
6 www.risk-uk.com
NewsUpdate October2016_riskuk_nov14 11/10/2016 15:30 Page 2
News Update
All-new BSI Code of Practice designed to assist organisations in safeguarding business travellers BSI, the business standards company, has published PAS 3001:2016 Travelling for Work – Responsibilities of an Organisation for Health, Safety and Security – Code of Practice. Developed in association with International SOS, the medical and travel security risk services company, this new Code of Practice advises organisations on how to best address and manage the health, safety and security risks posed to their employees who are travelling overseas for work purposes. A recent Ipsos Global Advisor study found that eight-in-ten travellers have felt their personal safety could be threatened while abroad, while 71% of senior executive travellers had experienced a medical problem while on business overseas. PAS 3001 offers firms recommendations on how to develop, implement and evaluate issues such as travel safety, health and security policy, threat and hazard identification, risk assessments, prevention strategies and incident management. Howard Kerr, CEO at the BSI, said: “Global mobility has exerted a dramatic change on the way that we work today, affording employees and organisations much greater flexibility, but
Security Research Initiative report examines private security’s role in tackling cyber criminality The latest Security Research Initiative (SRI) report highlights the crucial role that physical security suppliers and Corporate Security Departments play in tackling cyber crime, albeit that this input often goes unrecognised. In a survey of physical security specialists and cyber professionals supplemented by extensive interviews, 79% of the close on 300 respondents thought that physical security was crucial for tackling cyber, but 38% of the sample agreed that physical security solution suppliers often don’t see opportunities for contributing towards cyber security. This general point was reinforced in other findings within the report, entitled ‘Tackling Cyber Crime: The Role of Private Security’. For example, when asked whether any approach to cyber that didn’t include a physical response was a weak one, the majority of respondents agreed (52%) while only a small percentage (17%) disagreed. Over half of the sample population (55%, to be exact) agreed that people issues were more important than technology in tackling cyber
at the same time creating new risks. These risks must not go unchecked. Aside from everyday risks, there may be a significant difference between an assessed medical risk and an assessed security risk for a given location. These differences highlight the complexities organisations face when preparing workers for business travel.” An analysis of international business travel found that nearly one-in-three trips abroad are to countries with a higher medical or security risk rating than the traveller’s home nation. PAS 3001 can be used by any organisation with travellers, whether they are workers, volunteers or contractors, subcontractors or students. The Code of Practice is also applicable to those organisations that provide health, safety and security assistance and advice to other companies. PAS 3001 was developed using a collaborative consensus-based approach with input from industry experts including the Association of British Certification Bodies, the Association of Insurance and Risk Managers in Industry and Commerce, Control Risks, Falck Global Assistance, the Global Business Travel Association, the Health and Safety Executive, the Institution of Occupational Safety and Health, the Institute of Risk Management, The Security Institute, SAP SE, Mott MacDonald and the International SOS Foundation.
crime. 81% agreed that an alert workforce was the best defence against cyber criminality. The suggestion that cyber has overtaken physical security in terms of importance to companies was not given as much support as many might have thought. 45% of interviewees believe that cyber and physical security are equally important in the companies theyre linked to, 25% reported that cyber is more important and 25% that cyber’s somewhat less important. Perpetuity Research director Professor Martin Gill CSyP, who led this SRI study alongside his colleague Charlotte Howell (research manager at Perpetuity), noted: “The findings show that, important and valuable as cyber security specialisms undoubtedly are, the roles of staff and physical security expertise – including that exhibited by security suppliers and corporate security teams – are also rated highly. When tackling the cyber threat, an holistic approach is absolutely crucial. Physical security specialists have been slow to articulate the important role they play in the whole process.” Copies of ‘Tackling Cyber Crime: The Role of Private Security’ may be downloaded from the website: www.perpetuityresearch.com
7 www.risk-uk.com
NewsAnalysisUniversityofCambridgeStudyonBodyWornCameras October2016_riskuk_mar15 11/10/2016 15:25 Page 1
Body-worn cameras see complaints against police ‘virtually vanish’ finds university study standards of police conduct (and, indeed, misconduct), these study findings would appear to suggest that the use of body-worn cameras marks a “profound sea change in modern policing”.
Turning point in policing
An extensive year-long study of almost 2,000 police officers operational across UK and US forces has shown that the introduction of wearable cameras led to a 93% drop in complaints made against the police by members of the public, in turn suggesting such cameras result in behavioural changes that ‘cool down’ potentially volatile encounters. Brian Sims reports
8 www.risk-uk.com
ody-worn cameras are fast becoming standard kit for front line law enforcers, being hailed by senior officers and even the US President Barack Obama as a technological ‘fix’ for what some see as a crisis of police legitimacy. To date, evidence of their effectiveness, however, has been somewhat limited in scope. Now, new results from one of the largest randomised-controlled experiments in the history of criminal justice research, actively led by the University of Cambridge’s Institute of Criminology, shows that the use by officers of body-worn cameras is associated with a startling 93% reduction in citizen complaints against the police. Researchers say this may be down to wearable cameras modifying behaviour through an ‘observer effect’: the awareness that encounters are recorded improves both suspect demeanour and police procedural compliance. Essentially, the ‘digital witness’ of the camera encourages cooler heads to prevail. The experiment took place across seven sites during 2014 and early 2015, including police from areas such as the Midlands here in the UK and on the Californian coast. It encompassed 1,429,868 officer hours across 4,264 shifts in jurisdictions that cover a total population of two million individuals. The findings have now been published in the Criminal Justice and Behaviour Journal. The researchers write that, if levels of complaints offer at least some guide towards
B
Dr Barak Ariel, University of Cambridge criminologist and the study’s lead author, said: “Cooling down potentially volatile police-public interactions to the point where official grievances against the police have virtually vanished may well lead to the conclusion that the use of body-worn cameras represents a turning point in policing. There can be no doubt that body-worn cameras increase the transparency of front line policing. Anything that has been recorded can be reviewed, scrutinised and submitted as evidence. Individual officers become more accountable and modify their behaviour accordingly, while the more disingenuous complaints from the public fall by the wayside once footage is likely to reveal them as frivolous.” Ariel went on to state: “The cameras create an equilibrium between the account of the officer and the account of the suspect about the same event. This increases accountability on both sides of the equation.” However, Ariel cautions that one innovation, no matter how positive, is unlikely to provide a panacea for a deeply-rooted issue such as police legitimacy. Complaints against the police are costly, both financially and in terms of public trust, say the researchers. In the US, complaints can be hugely expensive, not least through multimillion-dollar lawsuits. In the UK last year, the Independent Police Complaints Commission reported a continuous rise in complaints across the majority of forces. To conduct the extensive experiment, Ariel worked with colleagues from RAND Europe and six different police forces, including West Midlands, Cambridgeshire, the Police Service of Northern Ireland and Ventura in California. Each trial was managed by a local point of contact, either an officer or a civilian staff member – all of them graduates of the Cambridge University Police Executive Programme. Every week for a year, the researchers randomly assigned each officer shift as either being with cameras (treatment) or without (control), with all officers experiencing both conditions.
NewsAnalysisUniversityofCambridgeStudyonBodyWornCameras October2016_riskuk_mar15 11/10/2016 15:26 Page 2
News Analysis: University of Cambridge Study on Body-Worn Cameras
Across all seven trial sites during the 12 months preceding the study, a total of 1,539 complaints were lodged against police, amounting to 1.2 complaints per officer. By the end of the experiment, complaints had dropped to just 113 for the year across all sites – realising 0.08 complaints per officer – marking a total reduction of 93%. Surprisingly, the difference between the treatment and control groups once the experiment began was not statistically significant, nor was the variation between the different sites. Yet the before/after difference caused by the overall experimental conditions across all forces was enormous. While only around half of the police officers were wearing cameras at any one time, complaints against officers across all shifts in all participating forces almost disappeared.
“Contagious accountability” Researchers say this may be an example of “contagious accountability” with large-scale behavioural change – in officers, but also perhaps in members of the public – seeping into almost all interactions (even during camera-less control shifts), once the experiment had introduced camera protocols to participating forces. “It may be that, by dint of repeated exposure to surveillance of the cameras, officers changed their reactive behaviour on the streets – changes that proved more effective and so stuck,” said the study report’s co-author Dr Alex Sutherland of RAND Europe. “With a complaints reduction of nearly 100% across the board, we find it difficult to consider alternatives, to be honest.” Researchers say these behaviour changes rely on cameras recording entire encounters, and officers issuing an early warning that the camera is on – reminding all parties that the ‘digital witness’ is in play right from the start and duly triggering the observer effect. In fact, results from the same experiment published earlier this year suggest that police use of force and assaults on officers actually increase if a camera is switched on in the middle of an interaction, as this can be taken as an escalation of the situation by both officer and suspect. “The jolt of issuing a verbal reminder of filming at the start of an encounter pushes everyone towards thinking about their actions more consciously,” explained Dr Barak Ariel. “This might mean that officers begin encounters with more awareness of rules of conduct, and members of the public are less inclined to respond aggressively. We suspect
that this is the ‘treatment’ that body-worn cameras provide, and the mechanism behind the dramatic reduction in complaints against police we’ve observed in our research.”
Police Federation support Che Donald, spokesperson for body-worn video and cameras at the Police Federation of England and Wales, explained to Risk UK that the Federation is very supportive of officers having access to body-worn cameras. “Body-worn cameras are a vital tool for police officers that provide a valuable layer of both accountability and transparency,” urged Donald. “Body-worn cameras can assist police officers in their everyday duties, including the gathering of evidence. The footage offers an opportunity to show the professionalism, honesty and integrity of officers by offering a glimpse of law enforcement activity in an open, transparent and accountable way.” Donald said the new study’s results are both impressive and in line with comments from Federated ranks stating that employing bodyworn cameras and video is opportune around frivolous or vexatious complaints. In a 2016 Welfare Survey conducted by the Police Federation, just 18% of officers said they have regular access to body worn cameras, while a third more (33%) would welcome this. Donald urged that body-worn cameras shouldn’t be viewed as a replacement for officer discretion and professional knowledge. “Officers need to continue to have discretion to deal with situations in a way which best benefits the public,” stressed Donald. “Video is designed to complement this, not to stop officers making discretionary calls because of fear they’ll then be in trouble.”
9 www.risk-uk.com
NewsSpecialCortechOpenInnovationEvents2016 October2016_riskuk_mar15 11/10/2016 15:28 Page 1
COIE Series 2016: Looking Back on Glasgow, Looking Ahead to London that are relevant to our market. The speakers at the Workshops also provided added value in respect of education and learning. It’s this format that makes these events work. I’ve passed on the details to our teams so that they have visibility of the opportunity to learn more and ultimately benefit our customers.”
Collective outlook
Risk mitigation and innovation in security solutions management were very much to the fore as a host of leading organisations gathered at the Cortech Open Innovation Event (COIE) in Glasgow for an educational and thought-provoking insight into smarter interoperability and the latest technological advances in the building, fire safety and security worlds. Brian Sims reports
10
www.risk-uk.com
he Glasgow gathering at The Lighthouse on Wednesday 14 September, which ran as part of this year’s regional COIE Series (for which Risk UK is the Official Media Partner), included a range of educational Workshops, demonstrations and input from speakers. Mark Thomas, director at Cortech Developments – the risk mitigation specialist and a company that provides integrated software solutions for high security environments and Critical National Infrastructure – explained: “Our objective for the COIE Series is based on education and adding value. We bring professionals together from organisations across a wide range of vertical sectors in combination with consultants and manufacturers. Through collaboration and shared experience, we look to promote strategic thinking around Best Practice, risk mitigation and sustainable cost reduction.” Thomas added: “Risk needs to be managed strategically as organisations have to protect their reputations and brands. Hopefully, we open delegate’s eyes to the opportunities that exist, encourage a collaborative approach and empower them to think differently.” The value in each COIE is their point of difference. This is a view shared by COIE Glasgow attendee Eric Brunger, senior innovation analyst for SP Energy Networks. “The Cortech Open Innovation Event was different to any events that I had attended in the past, providing a focus around the presentation of live events and actual scenarios
T
During the Glasgow event, delegates were encouraged to adopt a collective outlook on the challenges they face when operating and managing multiple technologies, while also giving due consideration to wider market influences. Attendees were encouraged to engage in cluster groups to share experiences and interact with technology experts from a range of leading organisations including not only Cortech Developments, but also Bosch Security Systems, Harper Chalice, Intech Solutions and Stentofon-Zenitel UK. The cluster groups provided a forum for discussion on a number of topics. These included the impact of cyber security, the influence of ‘Smart Cities’ and how emergency management can be integrated into one system or application. Engagement also centred on bespoke systems versus ‘off the shelf’ solutions, reducing risk with multiple technologies across multiple sites and the monitoring of unmanned sites by dint of solar and wind power technology. These challenges and market influences were given consideration as part of the event demonstrations that involved live scenarios and managed incident response. They were also discussed as part of the ‘one to one’ engagement sessions with technology experts. The cluster groups and live demonstrations provided real value for another COIE Glasgow attendee, namely Stephen Fleming (physical security manager at The State Hospital). “I’ve been to previous Cortech events and have always found them to be of great value,” stated Fleming. “The latest event in Glasgow was no different as it was well-organised with quality partners. It’s an excellent networking opportunity where you have the chance to discuss the different challenges across the security sector. I thought the presentation focused on the mitigation of risk associated with the operation and management of multiple CCTV systems was extremely impressive.”
NewsSpecialCortechOpenInnovationEvents2016 October2016_riskuk_mar15 11/10/2016 16:11 Page 2
News Special: Cortech Open Innovation Events 2016
Similarly, fellow attendee Allan Rowan, senior building services engineer at Pick Everard, enthused: “Attending one of the Cortech Open Innovation Events is a fantastic way of keeping up-to-date with the latest thinking and developments across the field and participating in stimulating exchanges of ideas and experience. The interactive demonstration was both informative and interesting, and offered an insight into how new and old systems may be brought together under a single interface. This has particular relevance for my profession and industry, as the realisation of not only energy efficiency, but also the significant savings to be made in maintenance and the effective prioritisation of alarm activations is key.”
Collaborating manufacturers The COIE in Glasgow also provided a positive experience for the event’s collaborating manufacturers. Karl Haw, business development manager at Bosch Security Systems, informed Risk UK: “The Glasgow COIE was a great opportunity to gain direct feedback from security professionals on their main concerns and wishes. It enabled Bosch to share Best Practice advice and focus on our data security initiatives to protect CCTV systems.” Haw added: “The format of the event, involving real-time simulations, demonstrated how a fully-integrated solution featuring a combination of technologies maximises security and delivers a far greater return on investment. This approach gave the attendees plenty of food for thought and ensured a genuine return on the time they invested.” Meanwhile, Peter Booth (director at Intech Solutions) explained: “The event was very different to others in which I’ve participated. It provided a great opportunity to understand some of the challenges our industry currently faces and how organisations are addressing these challenges through innovative technology. Discussions were wide and varied, and centred on topics such as cyber security, integration and ‘Smart Cities’.” Booth also said: “The Workshops, technology experts and demonstrations offered an educational and added value focus around reducing risk for the management of buildings and security, with much focus on integration.”
Spotlight on London The 2016 COIE Series now moves on to The Crystal at the Royal Victoria Dock in London on Wednesday 9 November. Here, Cortech Developments is set to introduce a focused meetings programme promoting long-term consultant and end user engagement.
Cortech has also announced that James Willison BA MA MSyI (director of Unified Security) will be the guest speaker for the London event. Willison will be delivering a presentation around the new world of ‘Security Convergence, The Internet of Things and Smart Cities’. This will centre on the best response for businesses at risk from cyber-physical attacks. Commenting on the confirmation of Willison as guest speaker, Paul Spence (marketing and communications manager at Cortech Developments) enthused: “We’re always seeking to evolve the COIE Series with a particular emphasis on providing added value for our delegates. James is a recognised leader in the fields of security convergence and Enterprise Security Risk Management (ESRM), and an established speaker at international security conferences. His presentation will be thought-provoking and immensely beneficial for our audience of end users and consultants.” In 2011, Willison was awarded the Imbert Prize by the Association of Security Consultants for an ‘outstanding contribution to the security industry’ by dint of his diligent work on convergence with ASIS Europe and the Information Security Awareness Forum. He has more than 20 years of management experience in the physical and information security spheres gained from posts including an advisory role on convergence to the Mitie TSM Board and senior lecturer in security management at Loughborough University.
Degree of resilience
Mark Thomas: Director at Cortech Developments
*If you’re an end user, security consultant or main contractor interested in gaining a greater understanding of smarter interoperability and the mitigation of risk for workplace safety, high security and building efficiency, join Cortech Developments and its partners in London on 9 November. To register your interest in attendance visit www.coie.uk.com
In the latest SRI study by Perpetuity Research, 56% of security professionals indicated that they favour a single cyber-physical security team, while 38% prefer separate teams. “My presentation,” concluded Willison, “will look at security convergence and demonstrate how a cross-functional team and converged technologies can achieve the degree of resilience required for building management systems and ‘Smart Cities’ in a digital world.” The itinerary for COIE London is as follows: 9.45 am: Arrival and Registration 10.30 am: Welcome from Cortech Developments 10.35 am: Industry Challenges in Focus 10.50 am: Guest Speaker – James Willison 11.10 am: Software/Hardware Demonstrations 11.50 am: Luncheon 12.15 pm: ‘Meet the Manufacturers’ 2.30 pm: Closing Statements Cortech will be joined at COIE London by four collaborating manufacturers: CIAS (Perimeter Protection), FLIR Systems (Thermal Imaging), Securablinds (Security Protection Blinds) and Stentofon-Zenitel UK (Intercoms).
11 www.risk-uk.com
Project1_Layout 1 06/05/2016 13:46 Page 1
Simple & Easy Installation Integrated Security - Access Control
Inception is an integrated access control and security alarm system with a design edge that sets it apart from the pack. Featuring built in web based software, the Inception system is simple to access using a web browser on a Computer, Tablet or Smartphone. With a step by step commissioning guide and outstanding user interface, Inception is easy to install and very easy to operate.
Access Control
Automation
No Software Required
Multiple Devices
IN
Security Alarm
AU
Easy Setup with Checklist Prompting
IGNED
IA
S DE
For more information, visit www.innerrange.com/inception. There you will ďŹ nd installation guides and videos to help you get the most out of your Inception system.
STRA
L
Send IP Alarms via the Multipath-IP Network
Visit www.innerrange.com or call 0845 470 5000 for further information
NewsSpecialBCIWorldAnnualConference2016 October2016_riskuk_feb15 11/10/2016 15:27 Page 11
News Special: BCI World Annual Conference 2016
Preparing for a Changing Landscape B
CI World is the largest business continuityfocused conference and exhibition in the UK and, indeed, one of the biggest on a global scale. This year, the event – which runs across Tuesday 8 and Wednesday 9 November at the Novotel London West Hotel in Hammersmith – features a packed conference programme, an exhibition hall promoting the latest business continuity-centric products and services, a themed Gala Dinner and the BCI Global Awards Ceremony* designed to showcase innovation across the industry. The varied conference programme – themed in 2016 under the banner: ‘Preparing for a Changing Landscape’ – includes much thought leadership discussion and debates, detail on new research, practical demonstrations and Case Studies centred on the real-world application of business continuity activities. The programme is suitable for all levels of practitioners (be they new to the discipline or harbour experience) from a wide range of sectors. In years gone by, this event has been attended by heads of emergency management, business continuity managers, company directors, senior executives, business continuity and risk consultants, operational specialists and risk managers representing – but not exclusive to – the oil and gas, Government, financial, manufacturing, retail, IT, utilities and telecommunications sectors. Those with responsibility for business continuity, risk management, emergency management, crisis or incident management, disaster recovery, security, information security, Health and Safety, change management, procurement, facilities or environmental management will find much of interest. Attendees will be able to share Best Practice in business continuity and resilience with experts and improve both their own knowledge and understanding such that they might enhance professional development. It’s a golden opportunity for professionals to place themselves at the heart of global thought leadership, gain practical insights and then apply them to their organisation. They can benefit from excellent networking opportunities and view, compare and experience first-hand the very latest business continuity solutions.
Keynote Speakers in 2016 Once again, there are five Keynote Speakers this year. John Scott is Chief Risk Officer for Zurich Global Corporate. In his presentation,
The Business Continuity Institute’s BCI World Conference and Exhibition 2016 takes place at the Novotel London West Hotel in November. Risk UK is an Official Media Partner for the event, previewed here by Brian Sims
Scott will offer an overview of the long-term political, socio-economic and technical changes going on in the world and assess their impact on the overall business landscape. Scott is joined at BCI World 2016 by fellow Keynote Speakers Professor Lewis Dartnell (Astrobiology Research Fellow at the University of Westminster), Jim Montgomery (deputy chief of the City of Ottawa’s Office of Emergency Management), Michael Balboni (president and managing director of Redland Strategies and director of the Greater New York Healthcare Association) and – last but not least – Michelle Wucker, author of celebrated work ‘The Gray Rhino’. Wucker brings three decades of experience as a policy analyst, financial journalist and Think Tank executive to her distinctive and accessible style of thought leadership, combining highly original philosophies with incisive analysis.
The Conference Programme The morning of Day One at conference features a session on building organisational resilience (facilitated by James Crask) and featuring input from Luke Bird MBCI (of the Clydesdale and Yorkshire Banking Group) and Dr Robert MacFarlane Hon MBCI, assistant director within the Civil Contingencies Secretariat at the Cabinet Office. There’s also a Workshop centred on ‘Megatrends’. Speaking here will be Tiffany Georghiades (senior associate in the enterprise resilience team at PwC) and Howard Kerr, chief executive of the BSI Group. From 2.00 pm-3.30 pm, the focus rests on incident response and crisis management. Two of the presenters here are Peter Power, managing director of Visor Consultants (UK), and Everbridge’s CTO Imad Mouline. Day Two on Wednesday 9 November sees a focused session on the ever-burgeoning subject of cyber security. Mark Taylor MBCI facilitates this morning session from 11.00 am-12.30 pm in which Graham McKay MBCI (regional data protection and privacy manager for the EMEA at Microsoft) reviews ‘reimagining’ awareness training such that we might create a more ‘cyber aware’ society.
*The Gala Dinner and prestigious BCI Global Awards Ceremony takes place at the Novotel London West Hotel on the evening of Tuesday 8 November **The online Registration Form for BCI World 2016 is available at http://www.bciworld 2016.com/index.php/ registration/registration-form
13
www.risk-uk.com
OpinionResilienceManagementintheSupplyChain October2016_riskuk_apr15 10/10/2016 17:23 Page 1
In the ‘New World Order’ where independence and sovereign rights mean that countries can exploit their own resources, the supply lines are beginning to become less secure, less reliable and therefore less resilient. In turn, this means that the infrastructures supporting us may be somewhat closer to breaking point than we would like. When demand outstrips manageable and available supply, what next for our societies and their structures? Phillip Wood searches for some answers
Phillip Wood MBE MSc: Head of the School for Management and Professional Studies and Head of Department for Security and Resilience at Buckinghamshire New University
14
www.risk-uk.com
Resilience: The Gossamer That Holds Us Together W
e are hyperextended. The networks and structures that have developed over time to support our activities have traditionally – and, it has to be said, fairly effectively – managed to keep pace with demand. When we needed speed, we made trains, then automobiles and then aircraft. When we needed power we had fossil fuels, then nuclear and now natural power generation – with nuclear remaining very much on the scene. When we needed food, we had fruit, grain and meat and then we began to make our own on a synthetic basis. Generally, supply has met demand. That’s certainly true in the Western World, anyway, and we’ve grown because we have been ably supported with what we need at our fingertips. How we garnered that support was mainly due to the exploitation of resources, people and materials on a global basis. The empires of the West – in ‘Old Europe’ we had the UK, France, Germany, Spain, Portugal and others, and of course the US in the 20th Century – were powered and fed by the resources they could find, growing fat on those lands conquered. In the ‘New World Order’ we have an imbalance to both address and redress. First, and primarily, we should consider that we’re absolutely reliant on the provision of resources in abundance and along established and integrated supply routes from origin to consumption. This is but one side of the equation, though. On the other, we have the fluctuations, dynamics and imposed changes that are happening now, whereby the ‘tap’ may be turned off at some juncture. Of course, the tap can be turned off by human hands or the ‘Hand of God’, whereby our supporting resources – and the lines that bring them to us – may be interdicted by a malicious intent or simply by the fact that the resource isn’t there anymore. Historically, we have gone to war in the search for resources. We often hear that Western involvement in the Middle East is because of oil. However, we cannot go to war against climate change, natural disaster or environmentally engendered resource shortages. Fuel is fuel. Food is food. The lack of either places us in a very difficult position. Moreover, we have to consider the lines of support and the infrastructures themselves,
and whether – even in times of abundance – they can work effectively to supply us with the resources we need.
Supply chain resilience Supply chain resilience is often discussed by supply chain specialists, but it’s one of those specialisms that affect us all deeply. On that basis, perhaps we should be a little more aware of the consequences of any breaks in the chain. Sometimes, the causes can combine to become catastrophic. Take, for example, the New York power blackout experienced in 2003. Old power lines, summer heat, overgrown trees, outdated equipment and human error all combined to realise one of the largest outages in history. 50 million citizens across the US and Canada were without power1. Our society is precariously supported by a challenged structure, with the relentless pull of consumption and need linked by vulnerable and expansive lines of delivery to the point of origin. When the linkages are broken, the effects upon us can be immediate – and, as is the case for the United States, we can refer to numerous examples of what happens to us here in the UK when we lose that supply. We’ve had fuel shortages due to strikes that almost caused the nation to grind to a halt. When power fails in our towns and cities, our inability to operate without traffic control becomes immediately evident. When the UK suffers from more than occasional flooding and supply chains of food and fresh water are stopped, our return to the days before technology can be both rapid and damaging. Luckily, at the moment – and primarily because we’ve so far had the ability to respond and recover within manageable timescales – any descent into mediaeval living hasn’t yet fully materialised. However, let’s imagine such a scenario. Consider a changed world where power isn’t a constant and costs are prohibitive, both to the supplier and the consumer, such that priority is given to some sectors of society or essential Critical National Infrastructure. Many of us will remember that as a constant in the non-technological 1970s, and dread to think what would happen now in a similar scenario. What about our nuclear power plants, owned and run by China and France? How would businesses communicate – in fact do business
OpinionResilienceManagementintheSupplyChain October2016_riskuk_apr15 10/10/2016 17:24 Page 2
Opinion: Resilience Management in the Supply Chain
at all – without the Internet and its supporting structure? What would happen if we were unable to maintain communication through our telephone networks, many of them owned or heavily invested in by overseas companies? Where does our food come from, and how are the supply chains guaranteed and managed when interdicted and challenged – not in the short term when delivery trucks are stuck in roadworks, but in the longer term when there’s inadequate flow of consumables to the public? How much do we (and, indeed, should we) trust a ‘system’ that we know so little about? In the worse case scenario, what happens if, for some reason, we’re compelled to remain indoors and we’re unable to communicate or resupply? What if something triggered that scenario right here and now today? Generally, and because I’m an optimist, we can be reassured that there are plans in place. Around a decade ago, plans were published in the UK alongside the orchestration of a national campaign to build civil protection. This has appeared to wither on the vine as public disinterest and apathy consigned the leaflets to the letter rack, the bottom drawer, the filing cabinet or, most likely, the waste paper bin. There’s even a dedicated website2 (although one suspects that, when it’s needed the most, it will be too late to consult it effectively). More recently in Germany, the Government’s advice to its citizens to stockpile food and water for civil defence caused some disquiet, with more people asking about the reason why the call was made than about what exactly they might need and for how long. The advice even engendered protest and dissent3, with inferences that Germany was preparing for war.
Acknowledging the fault line We know, then, that there are plans in place and that, for those whose role it is to protect us (or to advise us to protect ourselves), there’s sufficient concern to invest time, effort and material resource in some sort of process. That said, there’s a fault line running throughout all of this. It’s one underpinned by complacency and the ‘buffering’ that comes from watching the results of shortage, loss and disaster happening to someone else on the news from the comfort of our armchairs. The best plans will be confounded by our sheer societal laziness and our endemic reliability on someone else – located either within or running the supply chain – doing all of the necessary preparation work for us or guaranteeing our continuity of service in difficult times. There are no guarantees that we have any societal resilience in depth or
that, as individuals or organisations, we in general have the ingenuity or understanding to manage ourselves and our lives when the squeeze on resources is applied.
Part of everyday existence Out there where the guarantees are less credible and day-to-day life isn’t handed to us on a plate, resilience is a given and a part of everyday existence. I well remember once asking some industry colleagues in the Third World how they managed with intermittent power and food supplies. The answer was simple: they ran their own generators and grew their own food as and when they could. Perhaps their lives were not what we would aspire to here in the well-fed and wellsupported Western World, but to me these people were resilient. They would survive. How many of us could say the same if it were to grow unbearably cold and dark and the consumables dried up? How will our affluent society stack up when the benefits of affluence are no longer within easy reach? It’s nothing short of an extremely challenging problem that we ignore at our peril.
References 1Huffington Post (2013), ‘New York City Blackout 2003: Remembering The Power Outage 10 Years Later’ (https://goo.gl/pwvUlD) 2Cabinet Office (2016), ‘Preparing for Emergencies’ (https://goo.gl/Cqzs8h) 3Global Research (2016), ‘Stop the German Government’s Preparations for War against Russia’ – The Civil Defence Concept (KZV): Measures to Prepare the Population for War (https://goo.gl/wwqPzW)
“Our society is precariously supported by a challenged structure, with the relentless pull of consumption and need linked by vulnerable and expansive lines of delivery” 15
www.risk-uk.com
OpinionSecurity'sVERTEXVoice October2016_riskuk_apr15 10/10/2016 17:25 Page 1
Combating ‘Lone Wolf’ Terrorism There have also been ‘Lone Wolf’ plots and attacks orchestrated by neo-Nazis, white supremacists and other ‘single issue’ extremists. In fact, a recent study led by the Royal United Services Institute found that, when it came to attacks by ‘Lone Wolves’ without guidance from an outside group, the extreme right has been behind as many events as have Islamic extremists.
Prowling among us
The shocking events in Nice and Munich highlighted a growing trend for terrorist atrocities carried out by individuals acting alone rather than as part of established and well-organised groups. Peter Webster examines how the ‘Lone Wolf’ creates a unique set of issues for security professionals to confront and outlines why we all have a role to play in maintaining levels of vigilance
16
www.risk-uk.com
e now populate a world in which we’re accustomed to terrorist atrocities. The July event in Nice – during which 84 people were killed when a 19-tonne cargo truck driven by Tunisian-born Mohamed Lahouaiej Bouhlel was deliberately steered into Bastille Day crowds on the Promenade des Anglais – portrayed a shocking degree of violence. Just days later in the Moosach district of Munich, German-born Ali David Sonboly, who had dual Iranian and German nationality, opened fire on diners in a McDonald’s restaurant and killed ten, among them seven teenagers, while close on 40 individuals were injured. Sonboly later shot himself. The latter episode was followed by the death of a woman in the German city of Reutlingen, after the poor female had been attacked by a 21 year-old Syrian asylum seeker with a machete. These acts of extreme violence signify a growing and disturbing trend, whereby rather than working as part of a group or a cell, radicalised individuals – or ‘Lone Wolves’ as they’re often referred to – are able to operate beneath the radar of the Security Services due to their apparent willingness and sheer determination to act alone. Although there’s clearly a rise in this type of terrorist activity, it’s important to remember that lone attackers operating under a model of leaderless resistance isn’t a new phenomenon. It’s one that spans the political and religious spectrum. For example, in July 2011 antiIslamist Anders Breivik set off a car bomb in Oslo and then journeyed to the island of Utoya to massacre scores of youths attending a summer camp, killing 77 people in all.
W
It’s all too easy to dismiss ‘Lone Wolves’ as seriously disturbed individuals who are either mad, bad or both. Breivik was at war with Muslims and multiculturalism, and believed that the slaughter he carried out would be a wake-up call. There are, no doubt, others within society that share his views. It has also been reported that Sonboly was bullied and isolated at school and, when police searched his home, they found newspaper clippings and books related to mass murders, among them one called ‘Why Kids Kill: Inside the Minds of School Shooters’. Searches revealed no links to organised terror groups. His attack was unlikely to have been driven by Islamist extremism. While they hold views that go against the majority of others in society, these people are what the Security Services call ‘clean skins’ – a term used to describe those who have a spotless criminal record and a history that doesn’t arouse suspicion. With this type of background, it’s incredibly difficult to identify and monitor ‘Lone Wolves’, a problem compounded by the fact that they often have no communication with others. It’s precisely their use of mobile phones, e-mail and the Internet that makes those working in larger organised groups easier to thwart. Unfortunately, working alone also makes it far more likely for those with malicious intent to succeed in their endeavours. As described, the methods they use to carry out atrocities are usually basic, but deadly. The Nice terror attack demonstrated that bombs and guns are not always necessary – carnage can be caused just as easily by items that are around us every day.
A tough task Although the proliferation of ‘Lone Wolves’ poses an insidious and covert threat, it makes it all the more vital that security professionals work with the wider Security Services and the general public in a comprehensive effort to
OpinionSecurity'sVERTEXVoice October2016_riskuk_apr15 10/10/2016 17:26 Page 2
Opinion: Security’s VERTEX Voice
increase vigilance and identify suspicious behaviour. Ultimately, it’s incumbent upon us all to recognise the threat, take it seriously and do everything possible to minimise the danger posed to people, property and assets. Security professionals need to be on high alert to the potential impact of threats on the organisations that they’re tasked to protect. Rather worryingly, there’s sometimes an inability to look at the ‘bigger picture’ in terms of identifying the reasons that a particular organisation could be a target, where a threat might originate from and what to do about it. Frankly, this situation must change. For example, managing the security of a business that’s American-owned and based in the UK, as well as having facilities in other parts of the world affected by political violence or extremism, requires planning and contingencies that extend far beyond a local perspective. That ought to be obvious, but too often the threats from terrorism are overshadowed by a pre-occupation with less dramatic threats, such as criminal damage, pilfering, vandalism or petty crime. Knowledge, information and intelligence must guide and shape the approach and thinking of security professionals, and particularly so in terms of risk and threat assessments and when determining security policy and strategy. A significant factor in widening the scope and implementation of security solutions is adopting the concept of the convergence of security risk. This involves bringing together all those dedicated to the overall security of a given organisation and facilitates collaboration between security, finance, insurance, Health and Safety and reputational risk leaders, allowing knowledge and information to be correctly shared, understood and acted upon. Every situation is unique. A security strategy necessitates the integration of a range of measures including security guarding, CCTV, access control, lighting and remote monitoring. It may also be necessary to deliver on-site training to enhance an organisation’s existing security measures. This will help personnel identify and respond to potential threats and give them confidence in the organisation’s ability to keep them safe. When it comes to guarding, companies specialising in protecting certain types of environment possess unique knowledge of the threats posed to specific kinds of establishments. A specialist provider will be able to deploy individuals who have been given training and support that enables them to perform their roles to the highest standard.
This includes, for example, Operation Fairwaybased training on spotting suspicious behaviour, guiding members of the public to safety in the event of an attack, how to carry out sensitive questioning and due recognition of hostile reconnaissance procedures.
Maintaining public order In order to stand the best chance of identifying ‘Lone Wolves’, members of the public must also play their part by reporting any suspicious behaviour. Put simply, terrorists operating under this model are far more likely to be seen by ordinary citizens with good situational awareness than they are by an individual counter-terrorism agent. In the event of a terrorist attack taking place, minimising the level of damage is going to be absolutely paramount. At the end of last year, the National Police Chiefs’ Council produced a four-minute video entitled ‘Stay Safe: Firearms and Weapons Attack’ which outlined its ‘Run, Hide, Tell’ policy. At the time, Metropolitan Police Service Deputy Assistant Commissioner Neil Basu commented: “From Case Studies and the testimony of individuals who have survived attacks, we know full well that the advice given in this film has saved lives. With the UK terror threat level remaining at ‘Severe’, the police and the Security Services continue to operate at a heightened state of readiness. We’re working on hundreds of investigations and making arrests every day. However, it’s only with the ongoing support of communities that we can defeat terrorism.”
Peter Webster: Chief Executive of Corps Security
Living in troubled times There’s little doubt that we find ourselves living in what can best be described as rather troubled times, with the apparent proliferation and success of dedicated ‘Lone Wolf’ attacks representing a frightening new development in the sphere of terrorist activity. It’s therefore imperative that individuals and organisations fully comprehend the dangers posed by potential adversaries, understand their motives and take appropriate action. Only by doing so will we all be in the very best possible position to address this clear and present danger and determine to ensure that the terrorists don’t ‘win’ the wider battle to disrupt our way of life.
*The author of Risk UK’s regular column Security’s VERTEX Voice is Peter Webster, CEO of Corps Security. This is the space where Peter examines current and often key-critical issues directly affecting the security industry. The thoughts and opinions expressed here are intended to generate debate among practitioners within the professional security and risk management sectors. Whether you agree or disagree with the views outlined, or would like to make comment, do let us know (e-mail: pwebster@corpssecurity.co.uk or brian.sims@risk-uk.com)
“A significant factor in widening the scope and implementation of security solutions involves adopting the concept of the convergence of security risk” 17
www.risk-uk.com
Project1_Layout 1 12/09/2016 14:29 Page 1
How many hits would it take to bring down your website?
This sounds like the start of a bad joke, but if you experience a DDoS attack, you won’t be laughing at the punchline.
Don’t wait to be a victim of cyber crime. Daisy’s DDoS Protection service can help. Visit: www.daisygroup.com
0344 863 3000
enquiry.dcs@daisygroup.com
we are daisy www.daisygroup.com
BSIABriefing October2016_riskuk_mar15 10/10/2016 17:21 Page 2
BSIA Briefing
igures issued in July by Cifas – the UK’s fraud prevention service – reveal that episodes of identity theft are rising, with more than 148,000 victims in the UK during 2015 alone. That represents a 57% increase on the previous 12 months. Data was appropriated from over 260 companies and, in most cases, the fraudsters had completely assumed the identity of the victims in question, accessing their names, dates of birth, addresses and bank account details2. Interestingly, Cifas also discovered that many of the personal details involved were retrieved by fraudsters using social media sites such as Facebook, LinkedIn and Twitter in order to gain more information about their potential victims. Identity theft can carry huge repercussions for victims, and particularly so in a financial sense. The Annual Fraud Indicator 20163, published by the University of Portsmouth in May of this year in association with PKF and Experian, finds that the annual UK fraud loss could be around £193 billion, with private sector fraud losses estimated to be £144 billion per year and public sector fraud weighing in at a cost of £37.5 billion per annum. Fraud committed directly against individuals is estimated to cost around £9.7 billion every year. Along with the financial burden involved, identity theft can result in a multitude of problems including credit issues and legal difficulties, not to mention the emotional stress that comes with such an occurrence. There are some steps individuals can take in order to protect their identities from online fraudsters. While social media seems to be a key target area for online criminals, it doesn’t mean these fraudsters are actually hacking accounts in order to gain information. Information is made available by the victims themselves, particularly if they’re not using profile privacy settings to their best advantage. It’s important not to publish any identifying information on a profile or public post, including photographs of your home or workplace, telephone numbers, address or date of birth. Privacy features on social media sites should also be used, making any profile as private as possible and only accessible by those who are actually friends or family.
F
Victims of phishing scams Individuals can also fall victim to a variety of phishing scams while using social media or e-mail accounts. Such scams can include friend requests from fictitious profiles, chain letters, hidden charges from online quizzes or surveys, links requesting you to log into your social media account (such that criminals may gain
Fighting ID Fraud: Secure Information Destruction
According to the Office for National Statistics1, around six million cyber-based crimes occurred between March 2015 and March this year. Of those offences, 3.8 million were related to fraud, and in particular financial fraud. However, it’s not just bank accounts being targeted. Criminals are also on the hunt for identity details. Here, James Kelly explores some of the measures that should be put in place to ensure the ongoing security of personal information
your details) and hidden URLs directing you to websites that could download harmful malware to your computer. Generally speaking, it’s extremely important to be as wary as possible when online, right down to chosen usernames. Usernames should not include any personal information, while passwords ought to be as ambiguous as possible. Alongside these protective measures, it’s also very important to make sure that your computer’s firewall, anti-virus and anti-spyware software programs are regularly updated to mitigate potential cyber threats. In many instances of identity theft, the victims don’t realise they’ve been targeted until it’s far too late. Therefore, it’s also important to be aware of the signs that you may have become a victim. Such signs can include mail from a bank or utility service provider not arriving as usual, receiving receipts for goods or services you have no recollection of or certain items appearing on your bank statements that have nothing to do with you.
James Kelly: CEO of the British Security Industry Association
19
www.risk-uk.com
BSIABriefing October2016_riskuk_mar15 11/10/2016 15:48 Page 3
BSIA Briefing
Another extremely important thing to be mindful of is any change of address. When moving house or business address, it’s essential to update your details as soon as possible with your financial institution, utility provider, insurance company, doctor, dentist and anyone else that may possibly send correspondence to your premises. ‘Present address’ fraud is a very common type of fraud whereby the fraudster intercepts mail at the old address and uses it to their advantage. For some, change of address notification can be low on the priority list when moving, but it’s essential that it takes prominence when trying to prevent identity fraud.
Reducing the cost of fraud
References 1Shaw D, ‘Nearly six million fraud and cyber crimes last year states ONS’, BBC News Online (21.7.2016) (http://www.bbc.co.uk/ news/uk-36854413) 2Crawford A, ‘Identity fraud up by 57% as thieves ‘hunt’ on social media’, BBC News Online (5.7.2016) (http://www.bbc.co.uk/ news/uk-36701297) 3University of Portsmouth’s Centre for Counter Fraud Stories, ‘Annual Fraud Indicator’ (May 2016) (http://www.port.ac.uk/ media/contacts-anddepartments/icjs/ccfs/ Annual-Fraud-Indicator2016.pdf )
20
www.risk-uk.com
It’s not only online data that should be safely protected, but also physical documents. As such, one of the most essential security measures is the safe destruction of data. Individuals and businesses should be taking extra care when destroying documents or materials containing personal information. For a business, any improper destruction of documents can result in a breach of the Data Protection Act, bringing with it hefty fines for the organisation in question. Although fraudsters do appear to be gaining most of their information through online measures, it’s still essential to be destroying physical data on a secure basis. Information destruction covers a wide range of materials, not just paper, but also computer hard drives, laptops, hard disks, CDs, DVDs, USBs, credit cards, SIM cards and even branded products like uniforms. If any of these items landed in the wrong hands it could be extremely detrimental and result in cases of fraud. It’s essential to make sure such items are shredded and safely destroyed. In many cases, it’s a wise move to employ the services of a quality information destruction supplier whose key purpose is to ensure that materials are destroyed to such an extent that they may never be reconstructed. Talking about the importance of selecting a trusted information destruction supplier, Don Robins (chairman of the BSIA’s Information Destruction Section) explained: “Information destruction is vital to prevent identity fraud. When specifically looking at electronic media waste, it’s important that if you don’t have the
in-house expertise, don’t take any risks. Outsource to a professional service provider. When selecting an information destruction company, steps should be taken to ensure they will protect your digital data until it has been safely destroyed. Often, these steps are common sense, but surprisingly the major consideration is the initial financial cost rather than the positive assurance gained from using an accredited destruction company.” Robins continued: “Make sure your choice of company uses security-cleared personnel. They must have clear and secure procedures from collection through to destruction. Check that they select the appropriate destruction particle size for the media being destroyed and that they provide you with a destruction certificate. You should also ask for references.” Robins added: “Make certain your chosen provider adheres to an Information Destruction Code of Conduct and that it’s a member of a professional body such as the BSIA. Draw up a contract with explicit requirements. One of the first steps is to make sure you have an individual within your organisation who’ll be responsible for the destruction of media assets and the data contained within.”
Impact of the electronic era As more and more information is crammed inside increasingly smaller devices, it’s clearly obvious that smaller particle output sizes are going to be required. For its part, the Centre for the Protection of National Infrastructure has duly recognised that there’s an increasing focus on security of both destruction processes and outputs and, as a result, will be publishing a new standard (namely PAS 7010) later on this year. “Data on electronic media is also increasing in size and scope,” asserted Robins. “Across the next decade, paper documents will decrease. We’ll begin to see more service providers offering e-waste destruction services and destruction output particles becoming ever smaller. Regulations will have an impact on client requirements, but only if data breach fines become more widely spread than is presently the case. Irrespective of this, clients can see the overriding need for higher standards. Ultimately, that will be the driver for increased professionalism within the information destruction sector.”
“Businesses should be taking extra care when destroying documents or materials containing personal information. Any improper destruction of documents can result in a breach of the Data Protection Act”
Project1_Layout 1 11/10/2016 12:12 Page 1
BusinessContinuityandResiliencePowerSupplyContinuity October2016_riskuk_sep14 10/10/2016 17:22 Page 1
Power Supply in Continuity When assessing the exhibitor profile and product list for the first IFSEC International in 1973 and comparing it to this year’s event at London’s ExCeL, one of the most striking features is how the majority of security products now require power in one form or another. The 1973 product portfolio featured more physical security solutions. The electrical devices were often powered by dry batteries. Where are we now, and what does the future look like for power supply continuity? Tony Makosinski investigates
s newer and more intelligent devices entered the market, the need to maintain power to them increased and the security/fire business sector turned towards what was then the accepted way of providing this power: standalone power supplies. In reality, this was simply using what was around at the time: a lead-acid battery and charger, something people were used to using in their own cars. Indeed, many are still using that combination, albeit in a modernised fashion. With technology moving on, we’ve seen the provision of power continuity dividing into two camps: Uninterruptible Power Supplies (UPS) that automatically cut in when a building’s mains power crashes (and keep critical machinery and systems functioning) and selfcontained local standby power supplies connected to low voltage CCTV, access control, fire and intruder alarm systems in residential, commercial and industrial buildings alike. Most access control, fire and intruder alarm systems use the latter to provide power continuity such that solutions can continue to function reliably on a 24/7/365 basis even if the mains power is cut. As they’re usually contained in anonymous steel housings, people don’t always understand what local standby power supplies are, how they work and how they’re critical to the operation of their security systems. This makes them an easy target for cost-cutting when budgets are tight, and yet
A
spending a little more at the design/installation stage can save end users and their installers money over the system lifecycle. Specifiers and installers spend much of their time selecting security products for a system, but rarely calculate how much it will cost to actually power up and run that system on a 24/7/365 basis, the exception being remote sites where local power isn’t easily available. It’s then that every Watt counts and the security installer has to really search for a solution.
Technology has moved on Too many security installers and specifiers still think only of using conventional linear units charging traditional lead-acid batteries when, in reality, power technology has moved on in leaps and bounds. Nowadays, most of us use a mobile phone. Imagine the problems if we tried to use a conventional lead-acid battery to drive them, yet a badly-informed security installer could well be doing that with old-fashioned technology where cumbersome power supplies are driving modern electronic security devices. In today’s world, we expect our electronic devices to have the right level of power to drive them reliably and be rechargeable without any fuss. We also expect the solution manufacturer to either specify or otherwise supply the correct power unit to achieve this. When it comes to driving our advanced electronic security systems, do we expect the same? In many cases, the provision of suitable power supplies isn’t even considered. Too many individuals still rely on their traditional, lowtech linear power supply. They try to save on amperage and are pretty swift to apply the ‘cheapest is best’ rule. The latest power supply developments are more than the simple battery chargers of the past, with both the electronics and battery types changing to meet the ever-evolving challenges of modern life.
PSUs with lead-acid batteries Power supply units (PSUs) in tandem with leadacid batteries is still the most popular combination for use in intruder, fire and access control systems, but modern technology is now used in the electronics to improve performance and enhance energy usage, which is important in meeting today’s ‘green’ agenda. Equally, the battery technology has been markedly improved. This increases power capacity and lengthens system life.
22 www.risk-uk.com
BusinessContinuityandResiliencePowerSupplyContinuity October2016_riskuk_sep14 10/10/2016 17:23 Page 2
Business Continuity and Resilience: Power Supply Continuity
When this improvement in performance and extended life comes at a small increase in price compared to the old-fashioned linear units, why do installers still try to save a few pennies by not using them? One additional service call over the expected product life, the need to replace batteries at more frequent intervals and the fact that the end user will employ significantly more electricity during the system’s life often wipes out any cost savings that the initial installation may have realised. The best of these units use switched-mode technology which offers upwards of 85% efficiency compared to linear units struggling to reach 30% in their use of electricity, and constant current/constant voltage (CC/CV) methods to improve battery life/performance. In the constant CC/CV voltage method, a regulated current raises the terminal voltage until the upper charge voltage limit is reached, at which point the current drops as the battery attains its maximum charge density. The charge time is 12 to 16 hours and up to 36 to 48 hours for large stationary batteries. With higher charge currents and multi-stage charge methods, the charge time can be reduced to somewhere between eight and ten hours. This doesn’t strain the battery as much, and substantially improves its life. Another important factor in ensuring that the battery is kept at optimum level is the ambient temperature. A warmer ambient requires a slightly lower voltage threshold, while a colder temperature prefers a higher setting. Better quality chargers exposed to temperature fluctuations include temperature sensors designed to automatically adjust the charge voltage for optimum charge efficiency. Conventional units without this feature can easily find battery life drastically curtailed if the ambient temperature remains high. Put simply, if you want your system to be at the optimum operational capacity at all times, simply specify switched-mode operation with CC/CV battery charging. Don’t let anyone try to convince you that their linear unit costing a pound or two less is as good.
Electricity cost savings A traditional 12 V DC 1A linear power supply will use at least 400 kWh per annum of electricity just to keep it running 24/7/365 which, at the current costs of between 11 pence and 16 pence per kWh, means an annual outlay of between £44 and £64 per 1A unit. Multiply that by the number of PSUs on a CCTV, access control, fire or intruder system and the end user has a substantial ‘hidden’ service charge in front of them just to keep the system switched on.
A 12 V DC 1A switched-mode efficient power supply uses considerably less electricity, each 1A unit saving the user at least 121 kWh per annum (or in cash terms somewhere between £14 and £20 per annum). Those savings are going to rise even higher in future. Over the last 45 years, we’ve become used to using the power supplies mentioned above, but with the rapid advances in communications technology, is that still the best way of driving secure communication devices? You cannot put some devices in the normal security power supply steel housing as their radio signals will not be able to escape, so you’re forced to consider a plastic version. If you use a conventional PSU and a lead-acid battery, that plastic box is going to be quite large and may prove costly and obtrusive. Your mobile phone has the same transmission issues. It uses a radio-transparent plastic housing and is powered by a lithium battery to avoid problems. The obvious solution, then, would be to switch to a lithium-based battery for similar security devices.
Tony Makosinski: Commercial Director at Dycon Power Solutions
Solving the dilemma The dilemma faced by manufacturers was that, while such batteries are not a problem, you cannot charge a lithium-based battery with a conventional power supply charger. Manufacturers have been working to solve this issue. At IFSEC International 2016, a PSU was launched that includes this new type of charger and a lithium battery all within its own low-profile housing. The cost of the lithium battery here is now no greater than the cost of the same capacity lead-acid version. Given that the total cost of larger capacity lithium units is rapidly reducing, the day when the normal 8 Ah-size lithium battery becomes the de facto unit for all security-based systems may well be approaching. Think of what this could mean to a security system: stand-alone power supplies in small, unobtrusive plastic housings, smaller and neater control panels that include the power supply and battery, more reliable operation and longer battery life (typically up to five years). Current thinking suggests that lithium/leadacid pricing parity for a given storage capacity may be reached within the next 12 months. Watch this space.
“Specifiers and security installers spend much of their time selecting security products for a system, but rarely calculate how much it will cost to actually power up and run that system on a 24/7/365 basis” 23
www.risk-uk.com
Project1_Layout 1 10/10/2016 15:13 Page 1
Exit Door Alarms
Emergency Key Boxes
Indicator Panels
Interlocking Solutions
Talking Voice Module
Multi-Purpose Relays
Follow us: @HoylesElecDev
Like us: HoylesElecDev
UK Manufacturers of High Quality Security, Fire and Safety Equipment www.hoyles.com Tel: +44 (0)1744 886600
HealthcareSecuritySolutionsFrontCover October2016_001 12/10/2016 12:53 Page 1
October 2016
www.risk-uk.com
Security and Fire Management
Heart of the Matter Security Management in the Healthcare Sector NAHS Conference: ‘Making the NHS Fit for the Future’ Point of Entry: Access Control Solutions Best Practice Going Digital: Communication Systems Migration Reading Between The Lines: Perimeter Protection
Project1_Layout 1 10/10/2016 15:38 Page 1
Offering you the very latest radio communication solution for your hospital Wee ccan W an ooffer ffer yyou ou ssound ounnd advice advicee and a first-class fifrstt class service servi v ce for the safety of your staff, your patients and your site. With our help, your digital radios can connect you to: Access Control Fire Alarm Monitoring Telephone Interconnect Lone Worker Guard Tour Intercom/PA GPS Tracking
Body Worn Video Cameras Protect your staff with this high definition video recording unit Extra-long lasting, removable battery Rugged construction, water resistant IR/Low-light recording, Tamper-proof security Continuous high definition video
Call Smye-Rumsby: 0800 975 6444
0800 975 6444
www.smye-rumsby.co.uk
HealthcareSecuritySolutionsNAHSAnnualConference October2016_riskuk_feb15 11/10/2016 15:22 Page 11
Healthcare Security Solutions: NAHS Annual Conference 2016
‘Making the NHS Fit for the Future’ he 2016 National Association for Healthcare Security (NAHS) Conference aims to bring together up to 150 likeminded delegates from this vital sector and duly address some of the key challenges they’re now facing on a daily basis. The conference – which this year runs under the banner ‘Making the NHS Fit for the Future’ and is once again organised by Ascent Events – will enable delegates to network with colleagues from right across the country. The content will be of particular interest to healthcare security managers, mental health and dementia leads and all those interested in methods dealing with challenging behaviour. Following on from a Welcoming Address by NAHS chair Jayne King, the confirmed speakers include UK Surveillance Camera Commissioner Tony Porter LLB who’ll be leading on the subject of ‘Surveillance Cameras in the NHS’ with regard to their future and regulation. Also, Laura Wilks-Sloan (commercial manager at the Suzy Lamplugh Trust) will review the future of lone working in the healthcare environment before Adam Liardet, director of Audax Solutions, examines Best Practice guidance around the deployment and use of body-worn cameras. After luncheon and an opportunity to visit exhibitors at the event – including ASIS International, Finegreen Associates, Corps Security, Cortech Developments, Guardian, Selectamark, Smye-Rumsby and The Security Institute – conference delegates can then listen to presentations on secure access control for healthcare buildings (delivered by Anthony Searle, commercial manager at Paxton), counter-terrorism and present developments with Project Argus and Project Griffin (this session being presented by Superintendent David Roney) and emergency planning. The latter is the focus of Stephen Groves, national head of this discipline at NHS England. The 2016 NAHS Annual Conference commences with registration from 9.00 am. Luncheon is included for all delegates, with the day’s proceedings scheduled to conclude at 6.00 pm following a speech from NAHS president Peter Finch CSyP, the NAHS Annual General Meeting and a drinks reception.
T
Training and information exchange The NAHS was formed in 1994 as a non-profit making professional organisation in the UK. The NAHS works to continually improve security
The National Association for Healthcare Security’s Annual Conference runs at Stamford Bridge, the West London home of Chelsea FC, on Thursday 10 November. Risk UK is an Official Media Partner for this year’s Paxton-sponsored event, previewed here by Brian Sims
in healthcare facilities through training and the exchange of information and experiences. A key aim is to promote co-operation and development among NAHS members and provide them with current information through the organisation’s website, conferences, meetings and events designed to meet the challenges and complexities of protecting modern medical facilities. Without doubt, the sphere of healthcare security is one of the most complex of today’s security functions. On that basis, the NAHS aims to support and enable healthcare provision through the delivery of professional security. Ultimately, it’s about enhancing the safety of the healthcare environment. As a stakeholder in healthcare security, the NAHS supports NHS Protect as it develops the strategic direction and development of NHSfocused healthcare security. This is reflected in NAHS membership of NHS Protect Working Groups as a key stakeholder. The NAHS operates in a single national network headed by the Association’s chairman and supported by a Board of Directors who form the NAHS’ Executive Committee.
*For further information and to book your place visit: www.ascentevents.co.uk/ nahs2016-registration.php **Those organisations who wish to sponsor the event should contact Guy Whiffen at Ascent Events on (telephone) 01892 530027. Alternatively, send an e-mail: guywhiffen@ ascentevents.co.uk
27
www.risk-uk.com
HealthcareSecuritySolutionsAccessControl October2016_riskuk_apr15 11/10/2016 11:59 Page 1
Healthcare Security Solutions: Access Control
Access Control: The Point of Entry
Given the amount of expensive equipment and medicines they harbour, not to mention the overriding need for the safety of patients and staff alike, hospitals must be underpinned by strict access control regimes. Here, Gareth O’Hara outlines a recent solution installed for the Conquest Hospital in East Sussex
onquest Hospital is a modern District General Hospital (DGH) serving East Sussex. Located at St Leonards-on-Sea on the outskirts of Hastings, it employs over 5,000 members of staff. When Conquest Hospital opened in 1992, it was part of Hastings and Rother NHS Trust which, in 2002, merged with the Eastbourne Hospitals NHS Trust to form East Sussex Hospitals NHS Trust. Then, in 2012, East Sussex Hospitals NHS Trust integrated with Community Services in East Sussex to form the East Sussex Healthcare NHS Trust. The services provided at the hospital include a Coronary Care Unit, a Cancer Care Centre, diagnostic laboratories, an Emergency Department, a Gynaecology Ward, an Intensive Care Unit, occupational and physiotherapy services, operating theatres and medical and surgical wards. The previous access control system at the site failed and couldn’t be recovered. Installation of a new system by the current provider was over budget and not an option. John Kirk, security manager for Conquest and the DGH in Eastbourne, commented: “Security is very important in this sort of environment. Hundreds of people come through the hospital every day, and we absolutely need to ensure that members of the general public cannot wander freely around the hospital.”
C
Consistent system Gareth O’Hara: Sales and Marketing Director at Paxton
28
www.risk-uk.com
The DGH in Eastbourne was already secured using Paxton’s Net2 system, while one of the satellite buildings on the Hastings site had four doors already controlled by the same solution.
Kirk continued: “Our security team leader, Steve Edwards, had been managing the satellite system at Hastings and found it both easy and effective. It made more sense for the hospital to have a consistent access control system across our different buildings.” Solution Vistec Systems of Crawley was appointed as the installation company on the project. Net2 access control is now working across all five of the sites, including the main hospital in Hastings, at Bexhill, the Irvine Unit, St Anne’s and at the Woodlands Unit. Net2 connects to the remote buildings and between floors using the hospital’s existing network. A total of 6,500 user cards and 83 doors are now secured by the Net2 solution. “These sites play host to a mix of different staff that work for different Trusts,” outlined Kirk. “The ability to clearly define who has access to which site is essential, and Net2 provides us with that functionality.” Steve Edwards controls everything from one PC at Conquest Hospital. “Despite the huge number of staff,” observed Edwards, “Net2 is still simple to use because the software is very intuitive. It’s so easy to set up individual groups and different access levels for each group. The interface means that training other members of staff to use Net2 takes less than an hour.”
Emergency lockdown The Conquest Hospital team also found that some of the more specific characteristics of Net2 fitted its needs. “We’re subject to acts of opportunist theft,” explained Edwards, “but using the Net2 events screen we can see who was in an area at a given time. It means that we can narrow down the culprits and also deter thieves from stealing in the first place. If any episode should arise, such as a chemical spill or the need to create a temporary mortuary, the emergency lockdown of different areas is also really appealing. We can swiftly prevent access to selected areas on an immediate basis.” Importantly, the hospital plays host to an essential blood bank for the local area. Each time the blood bank is opened, someone must be accountable for that action. Blood can only be signed in or out by a qualified member of staff. Access to the blood bank is restricted to those members of staff via Net2. “Having access control on our blood banks is vital,” concluded John Kirk. “Without it, the process would be far more time-consuming and less accurate. We can quickly view reports on who has opened the doors and when.”
Project1_Layout 1 11/10/2016 10:10 Page 1
Join us at the NAHS 2016 Conference
Cortech Developments
Mitigation of Risk and Smarter Integration for the Healthcare Sector Software solutions for integrating building, fire, security and energy technology Managing multiple technologies across multiple buildings and sites is a recognised risk. Cortech Developments core software product, Datalog 5, addresses this challenge through the integration of a wide range of technology operated within the healthcare sector. This includes CCTV, intruder, intercom, staff safety, nurse call, baby tagging, fire, access control, energy, BMS and vehicle control systems.
Reduced Risk
Reduced Operational Cost
Increased Efficiency
Greater Situation Awareness
Accountability
We assist healthcare organisations to meet regulatory requirements, reduce risk and costs, while maximising situation awareness and operational efficiency.
Cortech Developments UK
Cortech Developments Middle East
Web www.cortech.co.uk Tel +44 (0) 1925 750 600 Email info@cortech.co.uk
Web www.cortech.ae Tel 00 971 (0) 44 524 256 Email info@cortech.ae
HealthcareSecuritySolutionsSecureCommunications October2016_riskuk_apr15 11/10/2016 15:23 Page 1
Healthcare Security Solutions: Secure Communications
Communication: That’s What You Need management teams. Very often, funds are spent unnecessarily on multiple stand-alone systems. With new digital technology, it has never been easier to have one single solution capable of providing many simultaneous conversations, and therefore supporting multiple user groups. By design, a system can support individual calling, text messaging and remote monitoring and, with additional control software, all voice may can be recorded and GPS tracking (both internal and external) achieved. Digital systems are backed-up by batteries so that, in the event of a power failure, the system continues to function. As more analogue radios are being discontinued and replaced by digital technology, migration becomes inevitable.
Body-worn cameras
Two-way radio communication is widely used in the healthcare sector to support patient care, enhancing staff safety and ensuring security. That said, not all hospitals have migrated their radios to digital platforms. Here, Maggie Wilkinson puts forward the case for end users doing so
Maggie Wilkinson: Sales Support and Marketing Manager at Smye-Rumsby
30
www.risk-uk.com
igital radio communication provides instant contact in terms of voice or data for individuals, departments or groups, and offers a practical and reliable solution for a large range of hospital departments, among them security, general management, maintenance, portering, catering and cleaning whose team members can all use digital radio communication to improve operational efficiencies and performance within a safe working environment. Larger sites would typically employ a trunked digital radio communication system accommodating multiple user groups, all linked to a resource management dispatch and event logging programme where tasks are prioritised and dispatched via text message or voice and tracked through all key stages to completion. Some members of staff operating in healthcare environments work alone and, no matter how careful, can find themselves in situations where they may be vulnerable. Digital hand-held portable radios have feature-rich functionality offering advanced lone worker options with programmable alert signalling and GPS to provide staff with the reassurances they need to work alone in safety. The very latest technology can now increase the functionality of a digital radio system as well as other communication devices. It’s able to connect digital radio networks to many other systems including alarms (fire alarms, intruder alarms and Nurse Call), telephones (phone calls and text messaging), GPS tracking, voltage monitoring, e-mail and the Internet. Many hospital staff can suffer due to lack of communication between departments and
D
The use of body-worn video cameras is becoming a common practice in the security sector, acting as a deterrent to those who may look to cause harm and a trusted source of evidence should an incident occur. The use of such technology is now being implemented across other sectors to enhance the safety and well-being of staff and service users alike. A report commissioned by NHS Protect records an increase in the number of assaults suffered by NHS staff across the country and the health sector during 2010-2015. During 2014-2015, the NHS recorded 67,864 assaults on members of staff with only 1,679 – equating to less than 2.5% – of those incidents resulting in recorded criminal sanctions. A number of NHS Trusts have begun to trial body-worn cameras in a bid to improve the safety and security of their employees. While patient confidentiality will always be of paramount concern to those delivering health and social care, the safety of those providing this specialist service needs to be weighed against that. Research has indicated that the presence of a camera will often be sufficient to cause a would-be assailant to modify their behaviour, in turn reducing the number of incidents and assaults arising in the first place. Using a visible device, such as a B-Cam, provides this deterrent factor without compromising privacy. The caregiver’s bodyworn camera will only operate when activated and not inappropriately record personal and/or protected data. Once activated, a light on the camera will ensure those being filmed are also aware that recording is taking place. All B-Cam devices feature a tamperproof design. Data cannot be removed from them.
Project1_Layout 1 10/10/2016 14:48 Page 1
AC2000 SECURITY HUB $ 32:(5)8/ 81,),(' 6(&85,7< $33/,&$7,21 )25 021,725,1* $1' 1 0$1$*,1* $/$506 $1' (9(176
AC2000 Security Hub is the centralized command and control application for AC2000; seamlessly blending IP security surveillance systems and alarm processing, into a single, simple and intuitive user interface.
:LWK LWV KLJKO\ FRQÃ&#x20AC;JXUDEOH FHQWUDO FRPPDQG DQG FRQWURO LQWHUIDFH $& 6HFXULW\ +XE PDQDJHV DOO HYHQWV DQG DODUPV ZLWKLQ WKH $& DFFHVV FRQWURO V\VWHP DQG LWV LQWHJUDWHG VXE V\VWHPV LQFOXGLQJ YLGHR Ã&#x20AC;UH LQWUXGHU DQG EXLOGLQJ PDQDJHPHQW V\VWHPV $& 6HFXULW\ +XE KHOSV EXVLQHVVHV VLPSOLI\ VHFXULW\ RSHUDWLRQV UHGXFH ULVN DQG UHVSRQVH WLPHV WR FULWLFDO HYHQWV LQFUHDVH VLWXDWLRQDO DZDUHQHVV DQG LPSURYH DODUP DFFRXQWDELOLW\
For more information:
Call: +44 (0)28 9045 6767 Email: cem.info@tycoint.com Visit: www.cemsys.com © 2016 Tyco Security Products. All Rights Reserved.
SECURITY HUB
HealthcareSecuritySolutionsInteroperableSystems October2016_riskuk_apr15 11/10/2016 12:01 Page 1
Healthcare Security Solutions: Interoperable Systems
Safe, Secure and Smarter Buildings Typical integrations within the healthcare sector would include CCTV, intruder, intercom, staff safety, Nurse Call, baby tagging, fire, access control and energy systems, BMS and vehicle control solutions.
Staff, patients and visitors
Managing sustainable and efficient buildings, protecting assets and ensuring the safety of staff and patients are processes at the heart of wider business strategies for healthcare bodies. Mark Thomas explains why today’s building and estate managers are increasingly driven by the need to mitigate risk and improve efficiencies
Mark Thomas: Director of Cortech Developments
32
www.risk-uk.com
ortech Developments works with many hospitals throughout the UK, several of whom manage their systems and equipment disparately across extensive sites (which is a recognised potential risk). Due to the sheer number of buildings (often spread across multiple sites), there’s a common requirement and need for visibility and control of multiple systems and equipment alike. Integration, smarter interoperability and the centralisation of such systems reduces risk and costs, while improving situation awareness. Extensive sites often involve the monitoring of thousands of circuits with multiple control systems. This is daunting for an operator in the instance of simultaneous events, where speed and consistency of response in line with company policy is a prerequisite. These events could be critical life safety situations and require immediate action to limit risk. Response to either minor or critical events is dependent upon the experience and knowledge of the operator. From a single Control Room, the events transpiring at a wide range of remote sites may be monitored and controlled quickly and effectively through solutions such as Datalog 5. System warnings, events and alarms are all clearly identified, prioritised, graphically located and visually verified by way of automatic CCTV video. All system actions are logged, which is a powerful tool when it comes to determining the sequence of events should any historical analysis be required. This provides the practising risk and security professional with a comprehensive audit trail of alarms, events, operator information and verification.
C
The mitigation of risk is best achieved through a combination of people, technology and process. Incident management within hospitals can be managed on the basis of scale. In certain situations, an incident may be considered serious enough to warrant the lockdown of certain zones or rooms in the hospital. Datalog 5, for example, allows the end user operator to invoke full lockdown with immediate effect, securing all nominated doors. Patients are afforded further reassurance and comfort around personal safety through Nurse Call integration. Meanwhile, hospital staff are able to make use of pagers to raise panic alarms via the software and this can be verified through CCTV. Control Room operators can respond quickly to incidents and deploy resources to a specific location, thereby reducing risk and scenario escalation. It’s widely recognised that equipment faults, breakdowns, defects and maintenance will occur during the operational lifetime of systems. This can lead to serious breaches of regulation and, potentially at least, damage the reputation of the hospital. Without a clear visual status of situation awareness, the impact of such defects arising from a ‘silo’-style approach could lead to an escalation of both the threat and the risk. Datalog 5 helps to reduce the cost of testing significantly by using intelligent software that carries out dynamic virtual ‘walk-testing’ of systems in the background. This highlights devices which need to be tested, reducing the impact on resources and cost by enabling building owners to intelligently target the testing of those systems not operating as expected. This also eliminates human frailty. Existing, legacy and new technology, together with tomorrow’s innovations, may be combined with smart ‘open’ solutions to make the use of buildings more visible, providing real-time and historical analysis for early corrective intervention and improved performance. Smart monitoring reduces energy usage, emissions and costs. Datalog 5 provides real-time threshold monitoring for consumption and emissions, automatically generating alarm events and important procedural responses.
HealthcareSecuritySolutionsInteroperableSystems October2016_riskuk_apr15 11/10/2016 12:02 Page 38
Healthcare Security Solutions: Planning for Integration
Addressing ‘The NHS Security Challenge’ Hospitals exists as safe havens that you visit to receive treatment and aid recovery, but official statistics suggest a darker side to hospital life that could pose additional risks to the health and well-being of patients, visitors and staff alike. Chantel Smith examines the issue
Chantel Smith: UK Business Development Manager at Inner Range Europe
hether it be the prospect of violent patient behaviour in A&E Departments and on hospital wards or muggings and serious assaults taking place in car parks and isolated corridors, NHS Trusts need a tougher approach towards minimising criminal activity. With the terrorism threat level in the UK remaining at ‘Severe’, hospital managers understand that, even though they may assert a zero tolerance policy to crime, the turbulence of today’s society and surges in hospital-based crime call for higher levels of safeguarding and preventative, everyday vigilance. Security challenges facing hospitals are complex. The sporadic development of hospital sites to meet the demands of the everincreasing UK population has resulted in NHS Trusts having to manage and maintain multiple buildings, some in different locations and many installed with independent access control and intruder systems bereft of central management. When dealing with crime and terror incidents, systems that cannot ‘talk’ to each other present major obstacles to developing cohesive audit trails, be that around tracking and reporting the movement of a suspected criminal or being able to quickly and efficiently lockdown and monitor multiple departments or buildings in the event of an abusive situation or terror threat. Adequate security is only possible through the implementation of one robust integrated access control and security system with sophisticated reporting functionality and a dedicated and trained security team enjoying access to the right tools to support their role. Unlike commercial buildings that may only have one or two entrance and exit points,
W
hospitals will typically have numerous doors, many of which will be left unlocked during the day and early evening, enabling easy access for staff, patients and visitors alike. Installing an integrated security system allows security team members to either automate door locking procedures or lock each door independently via an interactive schematic map without having to leave the Control Room. In combination with the use of CCTV, trained and licensed security officers can check for unauthorised visitors, escalating an incident if any suspicious activity is identified. Without sufficient security on site, such as CCTV monitoring, panic buttons or lone worker protection systems all being integrated within the hospital’s security system, people can be left vulnerable. This is particularly true of evening visitors or staff on late or early shifts who face a lonely walk from the hospital car park and through deserted corridors playing host to darkened corners and hiding places. Along with protecting patients, hospitals have a Duty of Care to ensure the safety of their staff, and notably those employees who work shifts outside of normal hours. Implementing an integrated access control and security system may increase the probability of catching criminals, or even act as a deterrent. Quality video coverage and additional reporting can undoubtedly increase the potential of a successful prosecution.
Surveillance intelligence It’s a situation every NHS Trust fears: a terrorism attack. Hospital security staff and counter-terrorism policing teams need to have the power to easily lockdown hospital buildings, allowing containment of situations at the same time as being able to care and tend to patients of victims of the terror activity. Being able to control access via interactive schematic maps and provide surveillance intelligence to the authorities places hospital management in the driving seat, ensuring that danger to life is kept to a minimum. In conclusion, NHS Trusts should focus on the following when choosing a suitable security system for a hospital: the need for providing a safe and secure environment for patients and staff, the requirement to deliver flexible access control that can be overridden in emergency situations, the necessity of centrally managing security across multiple buildings and the integration of systems including CCTV, lone worker protection and car park management.
33 www.risk-uk.com
HealthcareSecuritySolutionsEndUserPlatformsandInterfaces October2016_riskuk_apr15 11/10/2016 12:00 Page 1
Healthcare Security Solutions: End User System Interfaces
Command and Control
With legislative changes and increasing threats and vulnerabilities visited upon healthcare establishments in recent times, an even greater importance is now placed on the hospital security agenda. Paul Sheeran delves into the detail
Paul Sheeran: Business Development Manager (UK North) at CEM Systems
34
www.risk-uk.com
hen it comes to the tender/specification stage, hospital security managers require a robust and future-proof security solution featuring the latest technology to protect against vulnerabilities, but this scenario has to be realised within a defined programme and budget. The $64,000 question is this: ‘Is it achievable?’ Many NHS Trusts are large and spread over numerous buildings/areas. Some already have discrete security solutions such as CCTV, intruder alarms, perimeter detection, fire detection and baby-tagging systems. One way to increase efficiency and reduce costs is to integrate these systems and use access control as the central security management platform instead of a system in isolation. This enables the access control solution to become a full security management system whereby cost savings and operational efficiencies may be realised through functionality like centralised Command and Control. Using one unified security platform/user interface, security personnel can critically monitor and manage alarms within all security systems. This helps hospitals enhance their response times to events, increase situational awareness and improve alarm accountability. A great example of systems integration is Glasgow’s NHS Greater Glasgow and Clyde, Stobhill and Victoria Hospitals, where the access control system integrates with intruder panels and CCTV/DVR systems. This hospital project marks one of the UK’s largest virtual CCTV matrix systems ever implemented. To consider access control as a fixed cost and a means of only letting staff, visitors and
W
contractors enter and exit a hospital is limiting. Deploying access control hardware such as the new touch-screen access terminals that offer more functionality at the door is offering hospitals greater operational benefits. In addition to being a card reader and controller in one, the terminals boast a fully-integrated Voice-over-IP intercom. This enables cost savings to be realised by removing the requirement for a separate intercom solution from the access system. As an intelligent edge device, these access terminals can also perform what were historically PC client functions at the door. They have the ability not only to allow authorised personnel to change staff access levels directly at the door, but can also be used for other functions such as meeting room booking procedures as well as Time and Attendance. Healthcare sector security managers face the unique challenge of ensuring free access in some areas, while at the same time implementing heightened 24/7 security in others (among them pharmacies and theatres). Best Practice is to use intelligent card readers/controllers with an on-board database to ensure that offline card validation is available at the door at all times. Card readers may also be used to turn on and off specific hospital equipment when a card is swiped, in turn saving on energy costs.
Power over Ethernet Elements of an access control system can also be used to reduce costs in new hospital buildings or through security system upgrades. Using existing IP network infrastructure and opting for Power over Ethernet technology can dramatically save on hospital security installation costs, particularly in the case of new purpose-built hospitals. Stobhill and Victoria Hospitals used IP card readers and Power over Ethernet Plus (PoE+) technology for significant cost savings during construction. PoE+ is a technology that supplies power over a Cat 5 cable. For each access-controlled door, only one Cat 5 cable needs to be run to it in order to power both the card reader and the lock. In a large hospital project, this can massively reduce costs. Many hospitals are now realising the security and cost advantages of using smart cards, especially so the larger NHS Trusts that have multiple sites and require a one-card solution for all staff and visitors as well as those contractors who often work between sites.
HealthcareSecuritySolutionsEndUserPlatformsandInterfaces October2016_riskuk_apr15 11/10/2016 12:01 Page 38
Healthcare Security Solutions: Physical and Perimeter Security
Reading Between The Lines As Adam Binns observes, security professionals, hospital new build architects and specifiers can learn from their peers operating in the education sector by designing physical security systems that are cost-effective and ‘do the job’, yet avoid turning their creations into fortresses
eter Finch MSc CSyP CPP FSyI FCMI FInsLM, president of the National Association for Healthcare Security (NAHS), believes that managing security in medical facilities is much like doing so in other sectors and industries. Finch is perhaps better placed than almost anyone to know. He became NAHS president following 14 years of service in the healthcare security world, most recently as security advisor at Sandwell & West Birmingham Hospitals NHS Trust where he experienced the 2011 Handsworth riots at first hand. Finch argues that the theory of security and security management was pretty much the same in all of his roles, whether it be crime prevention or security of hazardous materials. This begs the question as to why healthcare security solution specifiers don’t look to their peers in the public sector and beyond to innovate in how best to protect the facilities they design with fencing and perimeter protection, CCTV and access control. Our experience at Binns Fencing mirrors that of Peter Finch in healthcare, military installations and banking, but also encompasses education, the utilities, prisons and manufacturing (to name but a few). Our healthcare experience has more often been in the secure institution field where buildings need to be accessible, open and welcoming to their users – meaning that intimidating security measures are frowned upon.
P
Parallel in schools Adam Binns: Managing Director of Binns Fencing
Perhaps the best parallel for new build hospitals or healthcare facilities is schools.
Most new schools and academies constructed under the ‘Building Schools for the Future’ programme have incorporated the ‘full monty’ of physical security, with perimeter security fencing, CCTV and access control at entrances. As new builds, they were designed with a strategic vision for security, in turn allowing all elements to be integrated rather than the bolton approach adopted by so many NHS Trusts as funding becomes available. Yet they face much the same issues of protecting users and staff from harm and violence and the monitoring and control of multiple visitors during the day. Both are subject to the Safeguarding Vulnerable Groups Act 2006, which made it a legal requirement to protect children and other vulnerable adults from harm – or the risk of harm – by preventing those individuals who are deemed unsuitable from gaining access to them through their work. They also face wellpublicised safety and security threats.
Early involvement A Briefing Note issued by Gloucestershire Constabulary urges: “In order to teach and to learn, staff and pupils must feel safe and secure. Criminal and anti-social behaviour can cause disruption to the work of the school, physical and mental damage to people and damage to buildings. Worse still, fear is created among pupils, staff and parents which is out of all proportion to the actual crimes committed.” Its first recommendation is to provide a substantial secure boundary and limit access points for vehicles and pedestrians, which has now become a key part of Ofsted inspections.
Open and welcoming environments The education sector faces no less a squeeze on its budgets than other sectors, yet has absolutely mastered the skill of making sites secure without them seeming fortified such that they remain open and welcoming and contribute to the well-being of all users. Aesthetics, security, the environment, the school footprint and budgets are considered before any tailored solutions are devised. For their part, a good solution provider will involve itself early on in the planning phase, ideally even at the concept stage of a major new site or development. In this way, physical security experts can help define and assess threats and risks and, wotking together, devise solutions that are as secure, cost-effective and unobtrusive as possible. Ultimately, this has to be the overriding aim.
35
www.risk-uk.com
HealthcareSecuritySolutionsTheftPreventionMethods October2016_riskuk_apr15 11/10/2016 15:24 Page 1
Healthcare Security Solutions: Theft Prevention Methods
Preventing Theft in the Healthcare Sector
Millions of pounds worth of vital medical equipment goes missing every year, leaving patients at risk and healthcare staff frustrated by the resulting lack of resources. Hospitals have to cover the cost of any stolen items, which can actively worsen their operating margins. James Brown highlights solutions to solve this problem
ften it’s high-value specialist technology such as defibrillators, heart monitors and resuscitation equipment that will ‘disappear’, stolen to order by organised gangs who can sell these items on to private companies overseas. Laptops and PCs also go ‘walkabout’, but it’s not just the cost of their replacement that’s of concern: confidential patient details, important research notes and lecture papers often disappear as well. IT equipment in hospitals is particularly vulnerable as it’s often left unmonitored in public spaces or empty consulting rooms. Asset labelling is one of the best and most costeffective ways of ensuring that IT equipment remains safe. Another is the use of DNA marking solutions containing a unique code which can be easily applied to IT equipment such that the latter can be traced back to a given hospital once recovered by the police.
O
UCLH places its Trust
James Brown: Managing Director of Selectamark
36
www.risk-uk.com
Thousands of items of equipment belonging to one of the largest NHS Trusts in the UK were forensically marked with SelectaDNA as part of an ongoing initiative to improve equipment management and prevent and deter theft at University College London Hospitals (UCLH) NHS Foundation Trust. UCLH provides acute and specialist services at sites including University College Hospital, the Royal National Ear, Nose and Throat Hospital, the National Hospital for Neurology, the Heart Hospital, the Hospital of Tropical Diseases and Eastman Dental Hospital. All of these sites are using DNA marking to protect portable equipment including infusion
pumps, roll stands, monitors, ECG recorders and specialist defibrillators. Deterrent warning signs are on display at each hospital to warn potential thieves that equipment is both marked and traceable. Mike Phelps, technical services manager at UCLH, said: “Since we began using DNA marking, we’ve had no reported thefts of portable medical equipment, whereas a previous audit established that up to 400 infusion pumps alone had gone missing.” It’s not just hospitals that are being targeted by thieves. A leading High Street pharmacy chain has successfully protected its stock of valuable drugs and medicines for more than six months following the installation of an intruder spray at one of its branches in Glasgow. The shop had previously been broken into six times in one month, sustaining damage on each occasion. However, since the introduction of the spray system, which emits a burst of forensic solution on activation, there have been no break-ins reported. The spray gives pharmacy owners and managers added protection and peace of mind that their vital and expensive stock is well protected. If the worst does happen and a burglar enters the premises by force, they will be sprayed with the forensic DNA which links them instantly to the crime scene.
National database In another scheme that uses DNA marking to protect valuable medical equipment, Public Access Defibrillators in Farnham, Surrey have been marked to protect them from theft. The seven defibrillators, which are positioned around the town and available for use should someone have a cardiac arrest, were partfunded by local charity Farnham Lions. They have their own unique marking registered on a national database, which in turn will enable the police service to identify where they’ve come from in the event that they’re stolen and then subsequently recovered. Professor Tom Quinn, volunteer clinical director of Farnham Lions (which teaches emergency life support skills to local residents), said: “Having our equipment marked means we don’t have to rely on locked cabinets, which can cause unnecessary delay.” Stolen equipment continues to place a huge financial burden on the healthcare sector. With callous thieves prepared to steal even baby heart monitors, it’s vital to find effective solutions that will protect healthcare assets.
Project1_Layout 1 10/10/2016 16:15 Page 1
Paxton
Smart, Integrated Security Solutions from Paxton • Leading
• Supported
Market leaders, over 30 years experience
Free design & specification help and advice
• Scalable
• Efficient
Access control and building intelligence systems for a variety of sites
Manage electrical utilities and control lifts, saving energy and money
• Integrated
• Straightforward
IP ready solutions integrating with CCTV, door entry, intruder & fire alarms
Utilise NHS Smartcards for access control reducing the number of cards in circulation
> Want to Know More? Speak to our team at the NAHS Conference or contact us to discuss your requirements Visit paxton.info/2682 or email specifier@paxton.co.uk Paxton healthcare projects include: NHS hospitals, care homes, residential schools for the disabled and private hospitals
BodyWornCamerasEffectiveandEfficientEndUserSolutions October2016_riskuk_apr15 10/10/2016 17:19 Page 1
Body-Worn Cameras: ‘Black Boxes’ or Beneficial Operational Systems? threat may be immediately assessed and support sent as needed. Potential scenarios clearly extend beyond law enforcement and into wider safety and security. A lone worker can be monitored during critical operations, but doesn’t need an assistant for the majority of the time. The remote assistant can spread their support among a number of in-field workers. For their part, Cash-in-Transit officers may be supported by a remote view of their vehicle during the higher risk transfer operations with a tethered bodycam capable of live streaming. A further example of how the technology can be used is in safety-critical inspections for railway repairs where an expert has to sign off an electrical installation before it can be declared safe. By giving site workers a bodyworn camera with live streaming capabilities, such inspections may be performed remotely without an expert having to travel to the site.
To date, body-worn cameras have been focused upon allocating liability and modifying public and staff behaviours. They’re seen by many as ‘black boxes’ only to be interrogated after an incident has taken place, but there’s now a huge rise in demand for over-the-air streaming which is critical in allowing such cameras to support police or security officers during the important moments of an incident. Mark Patrick delves into the detail
38
www.risk-uk.com
icture the scene… An incident is developing at a Shopping Centre. A small fire in a waste bin has set off alarms and the head of security for the site requests live video of the area such that shoppers and staff can be safely evacuated. “Sorry”, comes back the answer. “The video cannot be seen live. We receive the footage later in the day when the camera operators report back at the end of their shift. Don’t worry, though. We’ll have the video to assess liability later on when the insurance company calls.” Such a scenario is clearly unacceptable for fixed position CCTV, so why is it acceptable for body-worn and vehicle-borne cameras? Members of the public are now streaming video live to Facebook and Periscope, so why is it that Police Control Room operators and other teams of law enforcement and security professionals are not able to see immediately what’s happening on the ground? From our perspective, the future is wireless streaming, and that path can be accessed right now. The rise of body-worn cameras in terms of their adoption by police services focuses in the main on ease of use, quality of evidence and evidence chain management. Now, if an officer triggers the video stream, an alert can immediately be received in the Control Room, with live access to identity, location, the video stream and audio. The scale of the issue or
P
Signal quality and bandwidth Streaming from any mobile device is one of the hardest video challenges. The signal quality and bandwidth available varies second by second when an individual’s on the move. Cell tower hand-offs are frequent, and can cause delays in transmission as well as break-up of the video stream. In addition, latency is a huge issue where the video is often five seconds or more behind the real-time view. This is too long a delay for many operations. Entering buildings, of course, reduces the signal even further. There are no guarantees of a healthy 4G signal. In fact, the networks – even in London – are surprisingly ‘lumpy’. The carriers combat this through ‘bursting’ information – a fast download of your e-mail or ‘chunking up’ 30 seconds of your favourite streamed TV show in one second’s worth of data. Buffering makes the network look smooth, but it’s useless for live video. Streaming uses high power, produces more heat from the device which must be kept away from the body, realises high data costs and will never deliver video at a high enough quality to be retained by local storage. Exactly who’s going to watch all of that video anyway? The best balance to strike is high quality local recording to either cover an operative’s full shift or that’s triggered by the end user in
BodyWornCamerasEffectiveandEfficientEndUserSolutions October2016_riskuk_apr15 10/10/2016 17:20 Page 2
Body-Worn Cameras: Effective and Efficient End User Solutions
tandem with occasional streaming during the day on demand or otherwise initiated by a specific event. There are few scenarios wherein long-term streaming is a real requirement. It’s key that consultants specifying streams on behalf of end users take into full account the likely and peak streaming needs. Specifying an ability for body-worn cameras to stream all day would require the holder to carry around a rucksack full of batteries and could dwarf the cost of their salary in mobile data bills. In terms of current strategies for moving video around, buffering and media codecs such as H.264 are poorly designed for mobile platforms. H.264 works best when given a consistent quality connection and is ‘bursty’ (ie it regularly uses more bandwidth than the target that has been specified). This causes loss of data or latency as the extra data will not fit within the available connection.
Dedicated approach H.265 will hardly make the situation better as it’s focused much more on the challenges of very high resolution feeds rather than the smaller pipes available to mobile platforms. The challenge is best met by a dedicated approach to streaming over any cellular platform from 2G upwards, and allowing reliable streaming down to sub-28 kbit/s. It must be fully end-to-end encrypted and realise full view HD images when required (even at these tiny bandwidths). To put all of this into perspective, what we’re essentially talking about here is secure video and audio streaming at less than a dial-up modem’s bandwidth and all solvable with specialist approaches. One reason that live streaming is so difficult to get right is because laboratory conditions are so different from those encountered in the real world. A good example of this is linking a remote camera to a processing unit using a WiFi connection. This normally works well in demonstrations. However, when moving through a real environment such as a busy High Street, the stream repeatedly fails. This is because the High Street environment can contain tens or even hundreds of existing transmitters and other sources of interference which create instability. The whole system needs to be designed to overcome the challenges of operating in these noisy and complex environments.
Hardware challenge What about the hardware challenge? We’re seeing the arrival of self-contained, streaming body-worn cameras on the market which tend
“Streaming from any mobile device is one of the hardest video challenges. The signal quality and bandwidth available vary second by second when an individual’s on the move” to be large devices that accommodate a modem, larger battery and processing unit as well as storage and the camera itself. Other solutions tether a remote camera to the processing unit (typically with a fixed cable). The likely winning device will be a multipurpose processing unit also running other software such as work scheduling, with a builtin battery and modem plus a camera worn on the chest or that employs a remote cabled camera with the device on the hip and the camera on the chest, shoulder or helmet. As life is never simple, there’s also the video management challenge. How can you store huge amounts of data and for what retention period? How might you extract value out of that data and efficiently search for key people or events? Smart analytics can search for identities or simply summarise a large collection of video files into key moments, for example by providing a basic extract of all the faces in a video file that’s viewable as a timeline or a PDF document.
Delivering a streaming strategy Do make streaming a goal for your strategy. It may be introduced to your teams over time, but it absolutely can be tried now. Find a cohesive approach that also supports vehicles and other camera types such as rapidly deployable tripod-mounted cameras moved to a scene during an incident. Be realistic in the needs for quality of the live stream – resolution and streaming time add significantly to equipment and data costs, size and weight. Embrace what is an evolving market. Cameras and capabilities are changing all the time. The average life of the camera may only be 18-24 months, which can be similar to a mobile phone. There will be opportunities to refresh capabilities rapidly over the coming years. Learn what works from field use. The back-end collection system is likely to outlast that by many years. Buy into a platform that can evolve as your needs become clearer. Make sure you can access the data – ie that you own your video – making transfer to other systems easier and affordable in the future. Be reactive, not proscriptive. In police forces and companies where we’ve deployed streaming, we’ve found that end users discover creative ways to apply the technology, working out how they can save time and do more.
Mark Patrick: CTO at Digital Barriers
39
www.risk-uk.com
Project3_Layout 1 13/07/2016 12:08 Page 1
wanker_Layout 1 12/10/2016 14:49 Page 1
FIRE SAFETY Management & Installation
Fire Protection and Prevention with Technology and Innovation A special supplement in association with:
FireSafetySupplementFIA October2016_PSI_may15 10/10/2016 15:56 Page 1
FIRE SAFETY
Looking for Third Party Certification? f you’re a fire detection and alarm company, gaining third party certification is a worthy consideration. Certified companies build trust within potential clients and afford them the confidence to use your services. However, the process of becoming certified can be long, confusing and, quite often, rather daunting. Directors of companies considering certification often don’t know where to begin and have a long list of questions... How do I start? What certification scheme do I need? How long will it take? How do I do it? How much will it cost? Naturally, any business considering a process such as third party certification will want to weigh up the benefits, but the fact of the matter is many larger clients will not speak to fire detection and alarm companies that don’t have certification. In order to pick up the larger clients, becoming certified is a necessary step. How, though, does it all work? Thankfully, Kevin Stearns – compliance manager at the Fire Industry Association (FIA) – as the answers. The FIA operates a special ‘Route to Certification’ package, which provides a consultancy service to ensure that all companies wishing to become certified gain their certified status in as little as 10-12 months. We interviewed Kevin to find out more...
I
Kevin Stearns, compliance manager at the Fire Industry Association, answers questions about gaining third party certification
Hi Kevin. Please tell us your main aim for the companies that you work with Kevin Stearns: My main aim for the companies under the ‘Route to Certification’ package – or any company that wants some advice or guidance – is to help them become certified to the certification requirements they’re aiming for, whether that’s a BAFE certification, ISO 9001 or any other scheme. To help them to the point of the certification body turning up, carrying out the certification audit and giving them the certificate. Job done.
“Many larger clients will not speak to fire detection and alarm companies that don’t have certification. In order to pick up the larger clients, becoming certified is a necessary step” 42
That’s great. What comes next? Kevin Stearns: ...and then providing ongoing support after that as and when it’s required. How would you say the package that you’re offering can benefit companies? Kevin Stearns: There are two main aspects. The first one is that the company achieves its certification aims, provided they do the work that’s required with my help, support and guidance, for whatever standard they’re going for. The second
part is that, through the ‘Route to Certification’ package, they have their FIA first year of membership fees included, so it’s free of charge. There’s no costings for membership, but they still become FIA members. Then, of course, on top of that they receive access to reduced rates on training courses and all the other benefits that the FIA offers – website news, guidance documents, publications, standards, Best Practice advice , Focus News and all the additional benefits. That’s all there for them to access. The certification schemes... Are they difficult for people to access? Do people struggle with them? Kevin Stearns: Some are struggling, but that’s mainly because of the work that they need to put into it from the point of view of being in the office. If you’re doing paperwork, you’re not earning money. For some of the smaller companies where there are only two or three employees, the workload, and things like pre-planned maintenance, is so packed that some of them struggle to actually sit down and find the time to actually do the paperwork that’s required to propel them to the point of being ready for certification. The other part of my job, then, is to gently nudge them and push them along towards getting it done, and pester them for visiting dates to go and see how they’re getting on. I try and work to a timetable that sets deadlines for when they have to have certain things done by. I can then turn up and they’re not wasting their money paying for my time. I can see how they’re progressing and give them the help, advice and guidance they need to move on to the next stage. Tell us about some of the companies that you’re currently working with, Kevin Kevin Stearns: They range in size from one company down in Cornwall where it’s just two guys running the business up to a couple of others – one in Leighton Buzzard, for example, where they have five or six employees and a company in Willenhall including with around ten to 12 employees including the admin staff. It’s the whole range. It’s still mostly that SME-sized business area rather than the bigger companies with their Compliance Departments that are expected to have their certification and compliance and everything else. In terms of the job role for me, it’s pretty much the same because they’re all going for the same
www.risk-uk.com
FireSafetySupplementFIA October2016_PSI_may15 10/10/2016 15:56 Page 2
sort of certification – it’s either BAFE 203 for the fire detection and alarm systems, and either all the modules or a combination of all the modules, or ISO 9001 because they’re dealing with portable fire extinguishers. In a couple of cases it’s the whole package, because they’re doing a range of different schemes to gain certification for all of the different parts of the business. I work with a whole range of firms, depending on what the company is, the business model and what it is they’re doing. Generally speaking, are they quite young companies? Quite new businesses? Kevin Stearns: Some of them have been going for ten years or more, but they’ve only just now begun to look at the certification, and then there are three or four companies that are just new starts from December last year. Again, it’s opposite ends of the spectrum. The whole range. I’m due to go and see a company next month for the ‘Route to Certification’. They’ve been running for six years, but they’re only just looking now towards certification for portable fire extinguishers. Why do you think the companies you’ve worked with so far have wanted the assistance of a consultant? Kevin Stearns: It’s easier to have that advice to come in and steer them in the right way to go, and also be able to provide them with a range of different document templates and formats that they can use that are acceptable to the industry for certification, rather than trying to muddle through themselves and work out what they need. Companies can go and find their own consultant, and they can then go and arrange with their own certification body to be certified. What the ‘Route to Certification’ package offers, which I think is the biggest benefit, is that it’s a one-stop shop. So everything’s all in one place, then? Kevin Stearns: Yes. For one fee. Although it’s a 12month invoice it can be paid quarterly. That’s another benefit: the payments can be split into four. Everything’s in one place. Companies receive the necessary advice, the guidance, the template documents to help them get started, FIA membership and all necessary support and access to the FIA immediately. If they were going it alone, they wouldn’t receive that support until such time that they became members of the FIA. Companies also gain access to the technical managers and all the other FIA benefits. It also means that they’re not paying bills to two or three different organisations. They’re paying just one
www.risk-uk.com
organisation over the four payments, but that organisation [the FIA] then makes the payments to the certification body on their behalf as part of that package. The process allows us to help companies with cashflow. It just helps those companies that are not able to pay the certification bodies all in one go. Some businesses can’t do it, but some can, and if you can pay in four payments, then why not? It makes it easier for them, doesn’t it? Kevin Stearns: Exactly. All the fees are transparent, so there’s a cost for my time and, depending on what certification body they’re going to, there’s a cost for that, too, but all those fees are transparent. Firms know that there’s no hidden admin charge or percentage mark-up or anything like that. If, for example, the certification body is charging £2,000 for the auditing process, then that’s exactly what’s passed on. Simple as that.
“Directors of companies considering certification often don’t know where to begin and have a long list of questions. How do I start? What certification scheme do I need? How long will it take? How do I do it, and exactly how much will it cost?”
What sort of feedback do you receive towards the end of the process? Kevin Stearns: It’s all extremely positive, to be honest. There was a company in Worcester that passed through its certification audits last Monday and Friday. It was two days, but they had to split it because of auditor availability. They went through the first stage with no non-conformities, and I’m just waiting to see how they went on Friday. Certainly, on the Monday the business was chuffed to bits because they’d had no nonconformities raised against them at all. I was personally very happy with that because, when I first went to see them back in November, they had
nothing at all. Just a pile of forms. To find out more about how the ‘Route to Certification’ package works, go to www.fia.uk.com/membership/third-party-certification/let-us-help-you-achieve-thirdparty-certification.html or telephone Kevin Stearns at the FIA on 0203 166 5002
43
FireSafetySupplementApolloFireDetectors October2016_PSI_may15 10/10/2016 15:54 Page 2
FIRE SAFETY
Tackling False Alarms with Technology designed to be sensitive to any dust that does accumulate over long periods of time. Finally, our improved design includes a fine mesh barrier providing protection from insects. The design and manufacture of reliable, effective and innovative fire detection devices is absolutely critical to reducing false alarms, but there are additional measures which the industry should consider.
Karl Westhead, technical director for Apollo Fire Detectors, looks at tackling false alarms through technological advances and a number of industrywide solutions
f there’s one issue that’s always front of mind and top of the agenda for today’s fire sector professionals, it’s that of false alarms and how, as an industry, we can tackle this dangerous, costly and inconvenient problem. According to the Office for National Statistics, over 300,000 false alarms were raised in the UK in 2014-2015. The FIA quotes the estimated cost of false alarms in the UK as being in excess of £1 billion per year. In addition to that cost, false alarms also take up the time and resources of the Emergency Services who may not be available to respond to a genuine alarm at the same time. At Apollo Fire Detectors, we believe that the best solution to combat false alarms is the use of innovative technology and designing a product which helps eliminate the variety of issues that can cause them. Of course, there’ll always be contributing factors which will never be eradicated by any manufacturer, such as malicious MCP activations, but there are certainly recurring causes
I
which can be addressed.
Technology solutions
For more information on Apollo Fire Detectors visit: www.apollo-fire.co.uk
44
An example of this design focus can be seen in the development of our recent SOTERIA® product range, which offers the next generation in fire detection technology, improving detection, reducing false alarms and delivering enhanced reliability for the end user. SOTERIA® uses new optical sensing technology, PureLight®, to detect smoke particles entering its chambers. This unique system marks a new stage in the development of advanced optical technology and increases the reliability of fire detection while resulting in fewer false alarms. A number of other technical developments have been integrated within the SOTERIA® design. They include the latest in electronics, improving the detection of smoke and enhancing reliability of the detection process. In addition, the sleek low profile design of SOTERIA® means that less dust penetrates the outer casing. The detectors are
Lifespan considerations
The introduction of a European lifespan product standard for fire detection devices would be a positive move by the industry, and it’s one which some countries have already embraced. Wear and tear over a number of years can affect the sensitivity of a device, as the BRE found in its report ‘Causes of False Fire Alarms in Buildings’, where the old age of detectors was identified as the third most comment cause of false alarms. It’s of concern that there may be detectors currently in operation that are 15 to 20 years-old, possibly without appropriate servicing.
Best Practice standards for installation and maintenance
Another issue which has a considerable effect on false alarms is that of installation and maintenance. A detector can be of the highest possible quality, but if it’s badly fitted or poorly maintained, the possibility of false alarms will be increased. To combat this, the introduction of mandatory training certification across the European fire detection industry would be somewhat advantageous. Some test bodies and trade associations, such as BAFE, the LPCB and the FIA, do offer third party certification schemes and training courses for the design, installation, commissioning and maintenance of fire systems, but this should be taken further and a compulsory standard established.
Optimising available resources We will never totally eradicate false alarms, but what we can do as an industry is combine the latest in technological advances with calls for the introduction of standards, legislation and Best Practice in those areas which can make a difference. It’s clear that reducing false alarms will contribute towards optimising precious Emergency Services resources, as well as avoiding cost and inconvenience to businesses and the public alike.
www.risk-uk.com
Project1_Layout 1 10/10/2016 14:40 Page 1
Open up your future with a Diploma in Fire Prevention
â&#x20AC;&#x153;The course was PU]HS\HISL 0Âť T Ă&#x201E;UKPUN practical app lications for what I ha ve learnt every week.â&#x20AC;? 1 )LLJOPUN 0:: -HJPSP[` : LY]PJLZ 3[K
With a CFPA Europe Diploma in Fire Prevention you can open up your personal pathway to a successful future.
The level 4 Diploma also provides a gateway to higher-level
As a holder of the Diploma you will have a proven knowledge
;OL -PYL 7YV[LJ[PVU (ZZVJPH[PVU PZ [OL VUS` <2 WYV]PKLY VM [OL
HUK \UKLYZ[HUKPUN VM Ă&#x201E;YL WYL]LU[PVU PZZ\LZ Ă&#x201E;YL WYV[LJ[PVU
+PWSVTH VU ILOHSM VM [OL H^HYKPUN IVK` *-7( ,\YVWL
HUK Ă&#x201E;YL WYL]LU[PVU WYPUJPWSLZ (SS VM ^OPJO HYL LZZLU[PHS MVY
6U YLJLP]PUN `V\Y +PWSVTH ^OPJO PZ YLJVNUPZLK ,\YVWL ^PKL `V\
[OVZL SVVRPUN [V LZ[HISPZO JHYLLYZ HZ Ă&#x201E;YL ZHML[` WYVMLZZPVUHSZ
^PSS QVPU Z[\KLU[Z ^OV OH]L ILLU H^HYKLK [OL X\HSPĂ&#x201E;JH[PVU
YPZR THUHNLYZ WYVWLY[` Z\Y]L`VYZ LU]PYVUTLU[HS OLHS[O VÉ&#x2030;JLYZ
;OL ,\YVWLHU *VUMLKLYH[PVU VM -PYL 7YV[LJ[PVU (ZZVJPH[PVUZ *-7( PZ H MVYTHS IVK` [OH[ SPURZ UH[PVUHSS` YLJVNUPZLK Ă&#x201E;YL WYV[LJ[PVU HZZVJPH[PVUZ PU ,\YVWLHU JV\U[YPLZ 0[ L_PZ[Z [V WYVTV[L [OL OPNOLZ[ Z[HUKHYKZ VM Ă&#x201E;YL ZHML[` THUHNLTLU[
[V UHTL Q\Z[ H ML^
Z[\KPLZ Z\JO HZ [OL *-7( (K]HUJLK +PWSVTH PU -PYL 7YL]LU[PVU HUK ):J /VUZ KLNYLL PU -PYL 9PZR 4HUHNLTLU[
=PZP[ ^^^ [OLMWH JV \R MVY TVYL PUMVYTH[PVU HUK MVY[OJVTPUN Z[HY[ KH[LZ
0M `V\ÂťK SPRL [V KPZJ\ZZ PU KL[HPS [OL VW[PVUZ VWLU [V `V\ JHSS \Z VU 01608 or email training@thefpa.co.uk HUK ^LÂťSS IL OHWW` [V OLSW THE UKâ&#x20AC;&#x2122;s NATIONAL FIRE SAFETY ORGANISATION Protecting people, property, business and the environment
812 500
FireSafetySupplementXtralis October2016_PSI_may15 10/10/2016 16:05 Page 2
FIRE SAFETY
Major Data Centre providers are looking towards colder countries to reduce power and cooling costs, meaning that the UK and Ireland (among other countries) are enjoying an even greater status as homes for these facilities. That’s the view of Jim Thompson, regional manager for the UK and Ireland at Xtralis
Xtralis is working with all the global leaders in the Data Centre industry to ensure that the legislated design principles are adhered to and the best equipment is specified in order to create efficient, reliable and costeffective solutions. More information on the use of VESDA in Electronic Data Processing areas can be found at: www.xtralis.com/ applicationbrochures
46
VESDA: Addressing Smoke Detection Challenges in Data Centres election of location ties directly to transitions in terms of cooling strategies largely driven by two factors: increased heat loads and lower PUE (Power Usage Effectiveness), where the total power being used is compared to the actual power used for the computing equipment itself. The objective is the ratio is as low as possible. From a fire detection perspective, cooling strategies and innovations continue to evolve, with many configurations outpacing prescriptive requirements and capabilities of traditional detection technologies. Fire detection design is often further confused by blue chip service providers constructing standardised facilities in multiple countries with varying fire protection codes and standards, but at the same time wanting a standardised design concept. In the UK, we’re very accustomed to BS 5839, but perhaps our knowledge of BS 6266 Fire Protection for Electronic Equipment installations is somewhat lacking. Additionally, many of the larger providers invariably have a requirement for compliance with NFPA 72 (similar to BS 5839) and NFPA 76 (similar to BS 6266). To further complicate matters, Ireland has its own IS3218 standard which is almost identical to BS 5839, but has no specific electronic data processing standard at all. The airflow distribution path plays a significant role in terms of smoke detection placement. During the incipient stage of fire development, which is ideally the best time to detect an impeding fire, smoke being diluted and having little thermal energy is buoyant and highly influenced by airflow. The key to smoke detection in areas subject to forced air cooling is placement within the airflow distribution path at a point where smoke is likely to intersect the sensor or port prior to leaving the compartment, such as at return air grilles or within air containment aisles. In over 90% of tested facilities, detection within the airflow distribution path is first to respond. In a fullyfunctional
S
Data Centre, it’s actually very often the only detection that responds. So why VESDA? When properly implemented, Aspirating Smoke Detection (ASD) uniquely addresses detection challenges, providing effectiveness in terms of performance and cost. ASD, but much better known as VESDA, enables a much more sensitive detection level or levels. It can work effectively in high air velocity environments and actively draws air/smoke into the detector. Additionally, ASD benefits from a cumulative effect (ie a small amount of smoke enters more than one sampling point on the pipe, meaning a larger sample of smoke is taken and enables diluted smoke to be detected more easily). The aforementioned standards recognise this and most Data Centre facilities will be categorised as high or critical risk. Correct specification of fire standard and risk category of these facilities would ensure that High Sensitivity Smoke Detection is installed to monitor airflow distribution paths, thereby giving effective detection. It’s also recommended that detection spacing across the ceiling is decreased, typically to 25 sq/m per detection point/sampling hole. It’s important that this principle isn’t overlooked. As an industry, we need to be more aware of and drive acceptance of these more specialised (but now increasingly common) standards. Xtralis has striven for many years to promote a very early warning performance-based detection philosophy through CPD courses and regular VESDA-accredited training courses. The ASD industry has taken great steps forward in recent years. Xtralis has been the pioneer and market leader for many years, with the widest portfolio and global experience. The latest VESDA technology innovations allow us to not only identify smoke, but also work towards identifying what type of particles are being produced. This is enabled by the patented Flair technology in the VESDA E Series range of detectors. This technology not only opens a world of future possibilities for the way in which we look at smoke detection, but also drastically reduces the risk of false alarms while still providing the highest possible level of detection.
www.risk-uk.com
Project1_Layout 1 10/10/2016 15:52 Page 1
Syncro Range - Analogue Addressable Fire Alarm Control Panels
Analogue Addressable Repeater Control Panels
Syncro ASM - Marine & Offshore Analogue Addressable Control Panels
Syncro XT+ - Multi Area Addressable Extinguishant Control Panels
Sigma Si - Extinguishant Status Indicators
Sigma XT - Extinguishant Control Panels
By Appointment to Her Majesty The Queen Supplier of Fire Detection Equipment Kentec Electronics Ltd. Dartford
Did you know Kentec can offer all this and more? www.kentec.co.uk
+44 (0) 1322 222121
Sigma CP - Conventional Fire Alarm Control Panels
Sigma Matrix - Conventional Fire Alarm Mimic Display System
Power Supplies - EN Approved range of PSUs
Miscellaneous - Warning Signs, Document Enclosure, Indicator Units
UL/ FM Approved Analogue Addressable Control Panels
Custom Site SpeciďŹ c Engineered Solutions
FireSafetySupplementKlaxon October2016_PSI_may15 11/10/2016 15:58 Page 2
FIRE SAFETY
Audible and Visual Protection Pulse Alert Technology from Klaxon Signals is an award-winning beacon warning system which produces a light output that can protect most rooms with just a single device “All buildings deserve to benefit from the latest fire evacuation technology, all fire alarm systems should be able to be upgraded and everyone occupying those buildings deserves to feel safe and secure”
M
odels in the Sonos Pulse range of EN54-23 compliant beacons and sounder beacons are designed to ensure that all personnel are notified of fire emergencies, including people with sensory impairments or those working in sensory-depriving conditions. Featuring Pulse Alert Technology, Klaxon’s EN54-23 compliant beacons help buildings to be evacuated quicker, make evacuation requirements clear and unambiguous and allow personnel to feel safe and secure. Relying on audible fire alarm notification alone disadvantages people with hearing impairments or those working, or living, in sound-reducing conditions. Even something as simple as wearing a pair of headphones could prevent someone from hearing an audible fire evacuation warning. To truly evacuate everyone from a building, fire systems need to signal effectively using light as well as sound. EN54-23 specifies the minimum performance requirements for Visual Alarm Devices. Klaxon’s Sonos Pulse beacons produce a light output that can protect most rooms with just
a single device. Optical systems disperse light evenly, ensuring the most efficient distribution of light to maximise effectiveness. Klaxon’s Pulse Alert Technology provides all the benefits that an EN54-23 compliant system can bring, while at the same time answering all of the design challenges in doing so.
Efficiency improvements Featuring the latest high power LED technology, Pulse Alert Technology contains advanced LED drive circuitry, further improving efficiency, light output performance and long-term device reliability. Sonos Pulse LED circuits are designed to exceed five years’ continual operation without degradation of light output. As a business operating in the fire sector, Klaxon firmly believes that all buildings deserve to benefit from the latest fire evacuation technology, that all fire alarm systems should be able to be upgraded and that everyone occupying those buildings deserves to feel safe and secure.
Installation EN54-23 specifies three different classification categories for Visual Alarm Devices: Wall, Ceiling and Open. Wall and Ceiling mount categories are specified at designated mounting heights and particular coverage pattern areas, as detailed by EN54-23. Open classification allows the manufacturer to specify the coverage volume and coverage shape, and doesn’t restrict mounting height. Pulse Alert Technology has been designed to exceed the requirements of both Wall and Ceiling classifications, providing system designers with simple device performance specifications. Wall Classification Wall-mounted devices provide a rectangular prism of light. Wall classification devices with Pulse Alert Technology can be mounted up to 3.1 m in height and cover an 11.3 m x 11.3 m area
48
Ceiling Classification Ceiling-mounted devices provide a cylinder of light. Ceiling classification devices with Pulse Alert Technology can be mounted up to 3 m in height and cover a 15 m diameter area
www.risk-uk.com
Project1_Layout 1 10/10/2016 14:49 Page 1
FireSafetySupplementKentec October2016_PSI_may15 10/10/2016 16:02 Page 2
FIRE SAFETY
Compliant Extinguishant Control Technology Heralding the launch of Kentec Electronics’ much-anticipated Syncro XT+ MultiArea Addressable Extinguishing Panel, Jonathan Gilbert (the company’s general manager for sales and marketing) reviews the technological foundations underpinning today’s extinguishant control panel solutions
www.kentec.co.uk
ost fires cannot be sustained with less than 15% Oxygen, a phenomenon of physics central to the development of inert gas Automatic Fire Extinguishing Systems. It’s also a reason why this technology is specified in environments where system continuity is critical, and fire prevention management of the highest reliability is absolutely essential. However, only in recent years has the design and functionality of the control panel for fire protection extinguishing systems been defined by its specification within a common standard. Kentec was the first company to introduce an EN12094-1:2003 compliant extinguishing panel. Since 1985, the company has specialised in comprehensive systems for extinguishant control together with the design and manufacture of a range of standard extinguishing control panels. EN12094-1 became a harmonised standard in 2006. It’s a measure of Kentec’s command of this specialised technology that, at the time of harmonisation, the company was the only manufacturer able to apply the CE Mark showing compliance with the Construction Products Directive to any type of fire control panel. Notable developments in the design and functionality of Kentec’s extinguishant control panels and ancillaries have included the expansion of configuration options for versatile programming, the enhanced wide choice of inputs and outputs, the serial interface to ancillary items such as status indicator units in order to reduce wiring and the simple connectivity for ease of installation for rapid commissioning procedures.
M
All types of extinguishant agents EN12094-1:2003 compliance means that Kentec’s panels are suitable for controlling the actuation and discharge of all types of extinguishing agents including CO2, inert gases, gas generators, water mist and pre-action sprinkler systems, with reference to those parts of BS 7273 that describe types of system having control equipment conforming to the requirements of EN12094-1.
Industry-leading features At the heart of Kentec’s integrated control solutions for extinguishing systems is the Sigma XT range of extinguishing panels. Simple, powerful and highly configurable, they feature a large range of ancillary items that connect via a serial bus, including: Sigma Si status indicator units with and without controls (including a weatherproof version)
50
and relay output boards for remote control of plant or remote signalling. Indeed, many of its leading design characteristics have been taken on board by other fire alarm control panel manufacturers.
Syncro XT+ multi-area addressable extinguishing panel The new Syncro XT+ addressable multi-area extinguishant control panel, fully approved to EN12094-1, EN54-2 and EN54-4, provides addressable detection over one or two loops with 16 Zone LED Indicators and is available with up to four extinguishant release control units. The extinguishing modules between the Syncro XT+ and the Sigma XT+ share many common features. The extinguishant control modules on the panel boast a comprehensive set of inputs and outputs to monitor and control the extinguishing system whether it be gas, aerosol or another. Being configurable via a simple programming interface means that the panel can be programmed to meet the end user clients’ specific requirements. All extinguishant areas may have up to seven serially-connected Sigma Si status indication and control units or ancillary relay boards connected via a simple four-core cable. Sigma XT+ control panels are multi-area extinguishant control panels and, as stated, comply with EN12094-1, EN54-2 and EN54-4. Up to eight zones of conventional detection with up to four extinguishant areas are available. Stand-alone extinguishant control units are also available with two monitored inputs to receive initiating signals from remote fire detection control panels or addressable modules. The versatility of the control panel can be enhanced further by the fitting of up to seven Sigma CP Ancillary boards (K580) or Sigma CP Sounder boards (K461) to the RS485 serial bus.
Simple and intuitive configuration All Sigma XT and Sigma XT+ control panels feature Kentec’s removable bridge plate concept, which makes installation easier and reduces the risk of damage to each panel’s sensitive electronics. Setting the many configuration options is easy and intuitive with simple menus displayed on an LCD. Kentec products are independently tested and approved to EN54 Parts 2 and 4 and EN12094 Part 1. The company is accredited to ISO 9001:2000 for its Quality Management Systems and ISO-14001:2004 for Environmental Management Systems.
www.risk-uk.com
Project1_Layout 1 08/06/2016 17:05 Page 1
Evacuate everyone
Sonos Pulse & Nexus Pulse
EN54-23 Fire Beacons ,Q D Ã&#x20AC;UH HYHU\RQH PDWWHUV 6RQRV 3XOVH DQG 1H[XV 3XOVH Ã&#x20AC;UH EHDFRQV HQVXUH WKDW DOO SHUVRQQHO DUH QRWLÃ&#x20AC;HG RI Ã&#x20AC;UH HPHUJHQFLHV :LWK 3XOVH $OHUW 7HFKQRORJ\ EXLOGLQJV DUH HYDFXDWHG TXLFNHU HYDFXDWLRQ UHTXLUHPHQWV DUH XQDPELJXRXV DQG HYHU\RQH LV PDGH WR IHHO VDIH DQG VHFXUH
Signalling Solutions
FireSafetySupplementFireProtectionAssociation October2016_PSI_may15 10/10/2016 15:59 Page 1
FIRE SAFETY
Third Party Sprinkler Inspections t’s often claimed that 96% of fires in sprinklerprotected buildings are controlled by four sprinklers operating. Continuous improvement and updating of sprinkler system design, installation and maintenance standards, such as the LPC Rules for Automatic Sprinkler Installations incorporating BS EN 12845, is an important part of ensuring the technology remains state-of-the-art.
In some quarters, there’s strong opposition to the new requirement for sprinkler systems to be periodically inspected. There are even calls that the new clause should be deleted or somehow made inapplicable in the UK. Fair criticism of the new requirement might be that it’s scant on detail and does give rise to several questions: • inspections must obviously be performed by competent persons, but what constitutes competence in this field of endeavour, and where are these people going to come from? • what should the scope of an inspection be? • what about systems to standards other than BS EN 12845? Should they be inspected as well? • can inspections be combined to avoid multiple inspections?
have quite a different focus from that intended by a system inspection. We would expect maintenance providers to be expert at maintaining systems. However, they (and quite reasonably) may not be re-evaluating the design of the system, especially in broader areas such as its suitability against given, and potentially changing, hazards. Given that neither ‘independent’ nor ‘third party’ are defined in the clause, we have formed the view that the inspection cannot be carried out by the system owner, building occupier, system installer (or a competitor to them, as this is a clear conflict of interest) or the existing service and maintenance provider (or a competitor to them). It would also appear that insurers may not always wish to undertake this work where they have an interest in the building. The inspector will need to be sufficiently expert in the design and operation of sprinkler systems and how the system was designed to protect the particular risk at the time, equally establishing whether alterations to the risk or building layout have affected the effectiveness of the system to protect the risk. They should have a good understanding of fire and mechanical engineering. Routes to competency are: • engineering background/training/qualifications, successful completion of the LPC Sprinkler Design qualification examinations and industry experience, or • professional engineer (ie chartered) combined with relevant sector experience We would expect that the independent expert will concentrate on answering fundamental questions such as: ‘Will the system still actually work as intended in the event of a fire?’. They will need to be proficient in applying and interpreting sprinkler design, installation and maintenance standards and making expert judgements when they inevitably encounter installations at variance with the standard in order that they can offer the system owner meaningful guidance. This new requirement creates the opportunity for increased uptake of independent inspection in the UK.
Inspector competency
Scope of inspections
I
New requirement
Dr Simon Bird CEng MIET MIFireE, principal consultant at the FPA, discusses reactions to a new clause within the standards requiring the periodic inspection of sprinkler systems, along with its potential scope, implications and overall value
One such recent notable change is the inclusion of a new clause, ‘Clause 21 – Third Party Inspection’, in BS EN 12845. It reads: ‘The sprinkler system shall be periodically inspected at least once a year by a third party. The inspection report shall assess whether the system is in accordance with this standard with regard to maintenance, operation and adequacy for the risk involved. A list of deviations shall be issued for action.’ The practice of periodic system inspection is nothing new. In the UK where, once a certain scale is reached, fixed firefighting systems are critical, they make sense from an economic, social and sustainability point of view. The consequence of an unprotected fire loss would be uninsurable or very expensive to insure.
Strong opposition
It’s expected that the majority of sprinkler systems are subject to periodic maintenance, provided by reasonably competent practitioners. There are, of course, some instances where this provision falls short of expectations. An important distinction to make here is that an annual maintenance visit will
52
The new requirement of BS EN 12845 Clause 21 states that inspections shall assess whether sprinkler systems are in accordance with the standard with regard to maintenance, operation and adequacy for the risk involved. We believe that a pragmatic approach is necessary and that the
www.risk-uk.com
FireSafetySupplementFireProtectionAssociation October2016_PSI_may15 10/10/2016 16:00 Page 2
emphasis should be on taking reasonable steps to ensure that the system is highly likely to be effective when called upon. This is to ensure that the cost of the provision of periodic inspections is not unreasonable and offers the best possible value for money, while at the same time proving a means to address the numerous non-compliances frequently encountered in application.
Other fixed systems
It seems entirely reasonable that, if they are to perform an important safety or property protection function, all fixed firefighting systems should be subject to periodic inspection by a competent and independent person. The requirement of Clause 21 could be viewed as reasonable contemporary Best Practice in this regard.
Value of inspections
Some argue that this new requirement of BS EN 12845 Clause 21 will bring an additional cost and burden to the system owner. The new requirement is that inspections shall assess whether sprinkler systems are in accordance with the standard, with
Innovation, integrity and trust. www.apollo-fire.co.uk
regard to maintenance, operation and adequacy for the risk involved. It seems difficult to argue that this is in any way unreasonable. Indeed, we believe it’s proportionate, necessary and in line with established practice. In our own experience of undertaking such inspections (a service we have provided on request for many years now), we have found that inspections are of critical importance in highlighting a wide range of technical issues and latent defects which have remained undetected by others. Frequently occurring findings include identifying non-operational or impaired systems, flawed protection design rationales, changes to storage practice of undetected significance, moved walls in the course of alterations to buildings and offices, identifying components subject to recalls or with known performance issues and identifying problems caused by other trades. That’s merely to name but a few examples.
Dr Simon Bird CEng MIET MIFireE is principal technical consultant at the FPA. For more information send an e-mail to: technical@thefpa.co.uk
FireSafetySupplementFireSafetyinLargePremises October2016_PSI_Dec12 10/10/2016 16:01 Page 1
FIRE SAFETY
Fire Safety Issues in Large Premises
The big indoor shopping centres with which we’re all now very familiar have served to change our buying habits forever, drawing in customers to meet their retail needs under one roof. However, with the increase in size of these premises come new fire safety concerns.
B
“When smoke from the fire becomes trapped by the roof, it spreads in all directions to form a deepening layer. Smoke, rather than fire, is often the real danger” 54
ack in 1991, there were eleven UK shopping centres of 700,000 sq ft or above. Now, there are 40. In 1991, there were 18 shopping centres of 500,000 sq ft or above compared to nearly 70 in the present day. The largest UK shopping centre is the Gateshead Metrocentre, a stone’s throw from Newcastle, which, with over 2,000,000 sq ft of retail space, is still claimed to be Europe’s largest retail and leisure centre – although it does have competitors for the title, including the Westfield Stratford City shopping centre in east London, which is claimed to be the largest urban shopping centre in Europe. The Metrocentre has a working population of 7,000, annual visitors of almost 23 million, three and a half miles of shop fronts, bus and railway stations and over 330 shops, stores, banks and building societies. It is, however, dwarfed by the world’s largest shopping malls, the top two of which are in China. The largest is the New South China Mall in Dongguan, at nearly 6,500,000
square feet in area. The rest of the list is made up of malls in Thailand, Iran, Turkey, Canada, Malaysia and the United Arab Emirates. “The impact of the shopping centre on British retailing has been profound, changing our shopping habits forever, and also changing the face of the British High Street,” explained Jane Embury of Wrightstyle. “Their development has also had an impact on fire safety, because a shopping centre isn’t one building. Rather, it’s an interlocked building with multiple occupiers.” Current safety requirements demand collaboration between the designers, developers, fire system installers and the centre’s management team based on building control regulations. It’s the reason why UK shopping centres are so safe. Compare that with the worst civilian tragedy in Paraguay for the last 60 years, which started with a spark in a fast food outlet. That comparatively minor incident in the Ycuá Bolaños supermarket on the outskirts of Asunción, the country’s capital city, would go on to orphan over 200 children. It was Sunday 1 August 2004, and the threestorey supermarket was crowded with shoppers, many of them families with small children. International fire investigators found that the fire started in an improperly-maintained grill located in the centre’s food court, a full hour and a half before
www.risk-uk.com
FireSafetySupplementFireSafetyinLargePremises October2016_PSI_Dec12 10/10/2016 16:01 Page 2
SMOKE DETECTION
“Shopping centres can be extremely complex environments, with potentially large fire loads and equally large numbers of people located within a series of spaces” the first explosion. The shock wave created by that explosion broke external windows, flooding in oxygen and allowing the fire to rapidly spread from the food court to the rest of the shopping centre, including the central air conditioning system, causing its nitrogen coolant to explode. The fire then spread downwards to the underground garage where a car exploded, subsequently setting off another shockwave that brought the ground floor crashing into the basement and cut off lower level escape routes. Dozens died in their cars. The final death toll was 364. Nine individuals simply ‘disappeared’ and nearly 500 people were injured. Tragically, 46 children perished. The sheer scale of the tragedy so overwhelmed the local health services that burns victims were also treated in nearby Uruguay. In developed or developing countries, the threat from fire is being slowly reduced with stricter Building Regulations covering both passive and active fire safety measures – everything from better detection systems to catch the fire early through to better sprinkler systems to extinguish the blaze. Indeed, in 2010-2011, local authority Fire and Rescue Services attended no less than 623,800 fires or false alarms in Britain, 5% less than the 2009-2010 figure of 653,600. Within this total, fires decreased by 4% to 286,500, while false alarms fell by 5% to 337,300. The International Association for the Study of Insurance Economics (better known as the Geneva Association) comments that, in the developed world, the cost of fire has reduced over the past decade from 0.28% to 0.16% of GDP, while the risk of dying in a fire has fallen from 1.88 to 1.34 per 100,000 of population. The Paraguay fire started with just an ember from a chimney. In fact, that’s how most catastrophic fires begin. It’s often down to a dropped cigarette or a spark from faulty wiring. If dealt with adequately, most fires pose little threat, but when a fire does take hold, building occupants must be able to exit the space quickly and safely. “Kitchens, most obviously, are a key danger point, but fire safety in complex buildings is determined by many different factors, including means of escape, the ability for a building to resist the effects of fire and minimise the spread of fire and smoke,” added Embury. “Fire is spread through three methods: convection, conduction and radiation. Of those, convection is the most dangerous. This is when smoke from the fire
www.risk-uk.com
becomes trapped by the roof, spreading in all directions to form a deepening layer. Smoke, rather than fire, is often the real danger.” Materials such as metal can absorb heat and transmit it to other rooms or shops by conduction, where it can cause new fires to break out. Radiation transfers heat in the air until it too sets off secondary fires, in turn spreading the danger a distance away from its original location. That happened in 2013 in a shopping centre in Qatar, where an electrical fire started near a child care centre, going on to trap the children and their teachers. In total, 13 children died, mostly from smoke inhalation, as well as four teachers and two firefighters – among them three two-year-old triplets from New Zealand. According to an eyewitness, the fire alarm sounded “almost like a door bell” and was ignored by many. “The fact is that shopping centres can be extremely complex, with potentially large fire loads and equally large numbers of people within a series of spaces that can include hotels, food courts, cinemas, restaurants, bars and offices, with most people unfamiliar with the shopping centre’s layout and exits,” explained Embury. “That’s why compartmentation is so important, dividing the building into discrete fire zones with retardant materials to limit the spread of fire, and an adequate sprinkler system able to extinguish the fire at source. The fire safety approach, which is being standardised across Europe, involves engineering assessments based on computational fluid dynamics and zone models.” The main lesson to be learned from the Qatar and Paraguay episodes described above is that fire can spread with devastating speed, and particularly so in a large open space such as a supermarket or shopping centre. The key is containment, trapping the fire and allowing people to escape in a safe manner.
55
Project1_Layout 1 11/10/2016 13:45 Page 1
If you have problems with these...
...then you need one of these! CONTACT US NOW QUOTING RISK/SG TO RECEIVE YOUR
FREE SAMPLE
SMART GUARD 3URWHFW \RXU ĆUH V\VWHP IURP malicious and acccidental abuse At least 50% of all Fire Service call outs are false alarms, resulting in a potential loss of millions of pounds to business organisations, with thousands of hours lost in working time.
SIGMA
ParAid House, Weston Lane, Birmingham B11 3RS. United Kingdom. Tel: +44 (0)121 796 1421 E: enquiry@sigmafs.com
FIRE & SECURITY
Visit www.sigmafs.com for further info information orm m
SMART+THINKING
The Euro Stopper® and Universal Stopper® are effective deterrents in helping to significantly reduce false alarms, saving time and money. When lifted, a powerful 96 dB integral alarm is activated drawing immediate attention to the area and a prankster will either run or be caught. Choice of colour, label and mounting option available.
Euro Stopper® & Universal Stopper® Prolong the life and reliability of Manual Call Points and Electrical Switches with STI’s range of tough polycarbonate Protective Covers
Safety Technology International Ltd For more information please contact Sales: Telephone 01527 520999 info@sti-europe.com I www.sti-europe.com
MANAGEMENT SYSTEMS
Assessed to ISO 9001 LPCB ref. no. 653
EN54-11 Cert no. 653a/01 ReSet Series 01
8QSURWHFWHG ĆUH HTXLSPHQW LV DQ HDV\ WDUJHW IRU someone who can operate and activate in seconds ZLWKRXW EHLQJ LGHQWLĆHG UHVXOWLQJ LQ D EXLOGLQJ being evacuated and the Fire Service responding to a false alarm. The Smart+Guard is a tough polycarbonate hinged protective cover that can easily be installed over a range of emergency switches and other devices to provide protection from vandalism, accidental damage or misuse.
Sigma Fire & Security are a division of INTERNATIONAL
RiskUKEndUserBenchTest October2016_riskuk_mar15 12/10/2016 10:06 Page 2
Risk UK Product Test for End Users
Product Test for End Users: Hikvision DS-2CD4A26FWD-IZHS Bullet Camera his camera is a high-end outdoor bullet model identified as part of Hikvision’s DarkFighter range. The supplied CD contains much general information on the wider Hikvision range and lists support documentation according to the range as 2-Line IPC, 4-Line IPC, 6-Line IPC and Intelligent IPC. Unless you’re familiar with their notation, it may take a little while to find the relevant manuals. Once located, the 30-page installation manual and 168-page end user manual provide all the information necessary to quickly have these cameras up-and-running. Software is also provided on the disk. The first package SADP searches the network for relevant products and allows changes to IP addressing to be performed on discovered devices. On first access, the camera requires the password to be changed from its default so it’s helpful to have this defined prior to initial set-up, though it can of course be changed later on. The second software package is iVMS-4200 Video Management Software (VMS).
T
Main system features These cameras offer very high sensitivity and 1920 x 1080p HD performance with preinstalled firmware to provide video analytic functions. These can be selected from options including Audio Exception, Defocus, Scene Change, Face, Line Crossing, Intrusion, Region Entrance, Region Exiting, Unattended Baggage and Object Removal Detection. Alternatively, the camera may be switched to Road Traffic mode for vehicle licence plate detection. The DS-2CD4A26FWD-IZHS has a three-axis mounting arm and is supplied with a back box for wall, ceiling or post mounting. A lanyard is fixed to the camera mount base for securing to a suitable structure. A sunshield provides some protection, but only has around 1 cm of variation in its position. At the front of the camera, four high intensity IR LEDs are positioned around the lens (one in each corner). The top and bottom pairs can be changed in intensity to balance the scene lighting or used in ‘Smart IR’ mode to prevent foreground flaring. A photo-sensor mounted beneath the lens is used to control the point at which the IR lamps automatically turn on. From the base, connectors are provided for the Network (RJ45), Power (3 pin, 12 V and Gnd), Alarm (4 pin, Gnd, In, A and B), Video
Risk UK’s sister titles at Pro-Activ Publications – namely Professional Security Installer and Benchmark – have been rating security products and systems in terms of their performance for many years. In the first of an occasional series, Risk UK* takes a look at Hikvision’s DS-2CD4A26FWDIZHS Bullet Camera from the perspective of the end user
(BNC), Audio In (3.5 mm jack socket) and Audio Out (again, a 3.5 mm jack socket). While the power connector is marked as just 12 V DC, the Quick-Start manual suggests that 24 V AC can also be used for external power. The user manual warns that this is “depending on models”. Care must be taken if using a separate power supply. PoE is also supported (and was used for the test procedure).
System performance With a shutter time of one second and West of London light pollution as the only light source, the camera was able to discern objects invisible to the naked eye in an area 30 metres from the camera with much lower than 0.1 lux levels at the scene. Up to 20 plate images and details can be listed on the browser results page, while images may be stored to SD card, though for real-world LPR applications this would need to be used with a suitably configured network recorder or VMS. With careful set-up and suitably high shutter speed, this camera can provide excellent capture results. Motion detection and related features such as directional line crossing detection are extremely easy to set up with intuitive box or line creation to suit the specific application. The more processor-intensive people counting function requires other detection modes to be turned off and gives an on screen count of entry and exit numbers. Bench Test Score: 8.5 out of 10
The Verdict The wide range of detection methods mean that this camera can fulfil the majority of current security video tasks and should meet the needs of any end user across a variety of sectors (and notably so in applications where there are areas of high footfall or traffic that requires video analytictype functionality). The camera’s built-in IR illuminator range and high sensitivity provide very good image quality even in challenging conditions, further widening the scope of the camera for end users. As installation is simple, it’s not a unit that will require specific training so will prove popular with technicians and security managers alike.
*Note: Product tests are not carried out by the editorial staff on Risk UK. Manufacturers have no input in terms of either the reviews or the results
57
www.risk-uk.com
TheSecurityInstitute'sView October2016_riskuk_apr15 12/10/2016 10:08 Page 1
Insuring Against The Terrorism Risk: Is ‘The Silo Mentality’ A Limiting Factor? who may be killed or injured in an attack episode. However, to date, insurance policies haven’t focused on these risks, instead keeping their efforts concentrated around large-scale property damage and business interruption. The need for change has been reinforced at recent (re)insurance conferences, across the insurance media and by dint of commentary by influential (re)insurance leaders.
Situation post-9/11
Each month appears to realise a new terrorist plot or some form of violent criminality designed to maximise disruption to the Western World or cause loss of civilian life. Although we tend to perceive this problem from the viewpoint of security institutions, little is being done to consider the economic consequences of terrorism as they affect individuals and communities. Rachel Carter focuses on insurance against the terrorism risk
58
www.risk-uk.com
hile it’s deeply unpleasant to think of those killed and severely injured as the result of a terrorist attack, there’s an industry specifically equipped to shift the financial and economic risk of such events occurring – the insurance industry. Broadly speaking, we know what the problem is: the number of terror attacks is increasing. The nature and targets of those attacks, however, are changing and evolving. Recent terrorist attacks have focused less on property damage and more on soft targets – first and foremost, the killing or injuring of the most people possible and, second, interrupting cultural norms that don’t align with the ‘ideal’ activities of ISIS as frequently portrayed by ISIS beliefs, messaging and propaganda. This can be seen through attacks on places inconsistent with the message and culture ISIS seeks to propagate, such as locations with ‘inappropriate’ music, food and drink (particularly those involving socialising and alcohol, hence attacks on bars). The targets are where ISIS can find large numbers of complacent soon-to-be victims. Since the recent ISIS trend involves killing and injuring humans, the insurance industry needs to offer cover that shifts economic and financial risks away from both individuals and communities. Terrorism insurance should be seen as a valuable protection mechanism for individuals
W
Advances in terrorism insurance since the terror attacks of 11 September 2001 must be recognised. Governments and national pools, so too international organisations such as the OECD (developer of the e-platform on terrorism risk insurance), have improved the post-9/11 insurance offer for large-scale property insurance and business interruption cover. Post-9/11, there was a virtual withdrawal of insurance capacity from the market for terrorism insurance cover. Advancements in international insurance product development and lower insurance rates – itself a side effect of abundant industry capital rather than any laser-like focus on solving the terror financial protection problem – has led to the evolution of an important safeguard against catastrophic economic losses arising from terrorist events. However, this progress is just the beginning of what’s needed. In addition, progress achieved to date has been in part coincidental rather than consequential. The focus of the insurance industry in providing cover for terrorism risks for largescale property damage and associated limitations is by no means a negative reflection on that industry. We must bear in mind the events that cause such damage could return because of a future shift in terror trends, and so it’s best for the industry to be prepared. The fact that the insurance industry remains focused only on large-scale physical damage illustrates a systemic problem: a lack of salient information. Insurers need information to create new products and price them in an actuarially sound manner. They require data on threats and losses, as well as research on Best Practice and industry limitations. Unfortunately, the combined knowledge of the industry and non-insurance stakeholders is trapped in separate corporate confines. This
TheSecurityInstitute'sView October2016_riskuk_apr15 12/10/2016 10:09 Page 2
The Security Institute’s View
‘silo’ effect has constrained the development of new products to the point that, where cover is offered by the commercial market, loss limits are generally low and, due to the nature of insurance, there’s a period between when a claim is made, when losses are adjusted and when compensation is actually paid out. The advent of a ‘terrorism cycle’ with increased event frequency has awakened the industry. The need to look beyond what’s currently offered is clear. Insurers should start to consider new options, but a solution to the information vacuum is most certainly required.
Enhancement of insurability Part of the solution must be to enhance the insurability of terrorism risks as they evolve. This means addressing the past incarnations of the threat (ie large physical damage events), solving the need for cover for financial loss to individuals and small businesses as a result of terrorist events and – in an ideal world – providing the flexibility to deliver protection for future iterations of the threat either still in their infancy or not yet conceived. To do so, a certain amount of industry collaboration is crucial. Insurers writing terrorism cover – whether traditional or leading edge – should explore ways in which to share resources from research to underlying data. Although this may seem like a relatively simple solution, driving such sharing activity has long been difficult among insurers, even where the willingness to do so is palpable. Breaking down existing barriers will open the floodgates for innovation, but this requires a neutral central party to co-ordinate such efforts combined with the input of the insurers who ultimately stand to benefit. Successfully accomplishing this status quo would drive both industry-wide and individual company innovation, in turn leading to the types of insurance products that would directly address the evolving threats in the market based on specific risk appetites. Co-ordinated and relevant information sharing has the potential to transform the terrorism insurance industry and affect every subsequent link in the global risk and capital supply chain (eg reinsurance, retrocession and insurance-linked securities), especially if it encompasses other stakeholders involved in providing various reduction, relief and recovery outcomes to combat terrorist threats. After all, breaking down information silos in insurance shouldn’t leave the industry itself as nothing more than a larger silo. Sharing may involve information about threat intelligence (provided this doesn’t
create additional security risks), losses sustained, foiled plots and the changing nature of targets with Governments, national pools and insurers. The combined effort would create a more complex web of information capable of serving the multiple purposes characteristic of each stakeholder. In addition to the potential for protecting lives, property, community assets and businesses, the resulting programme could ensure that there are adequate economic safeguards and insurance products in place to alleviate the aspect of the losses which insurance can provide: monetary cover and economic protection. If a terror event occurs and a family member is killed or injured or a small business is severely interrupted, an insurance policy will not ‘un-do’ that episode. What it does do is provide some certainty in a time of chaos and fear, minimising the overall impact by reducing the strain related to basic post-event needs such as food, housing, clothing and bill-paying.
Greater financial resilience One way in which the research, information and data sharing initiative is being born is through the development of the Journal of Terrorism and Cyber Insurance. This is a free publication available to anyone interested in terrorism insurance or cyber insurance. Information, research, comments, thought pieces and ideas on innovation emanate from members of the insurance industry (ie underwriters, brokers, terrorism/cyber insurance modellers and consultants), security professionals, cyber practitioners, military specialists and anyone who has information which they would like to share with the terrorism and cyber community to enhance the offer and thus ensure there’s greater financial resilience in place against terrorist attacks. Together, we are a stronger force against terrorism. The sharing of research which can then be used by different stakeholders to strengthen resilience has the potential not only to benefit the insurance industry, but also ensure that adequate insurance products are offered to provide fiscal protection for individuals against the economic costs of an attack. The difficult part of the equation is to ensure that the ideas are carried towards fruition and a positive difference is made.
Rachel Carter PhD (Candidate) BA (Hons) LLB (Hons) MSyI: Managing Director of Carter Insurance Innovations, Manager and Co-Founder of the Journal of Terrorism and Cyber Insurance and Subject Matter Expert on Terrorism Insurance and Cyber Insurance for The Security Institute
“True genius resides in the capacity for the evaluation of uncertain, hazardous and conflicting information” (Sir Winston Churchill KG OM CH TD DL FRS RA) 59
www.risk-uk.com
s_Layout 1 10/06/2016 11:54 Page 1
Perfect for retail stores and small offices, Synology NVR216 is a compact NVR solution that helps you monitor physical environments and schedule recordings. Simply plug it into your network and connect it to a monitior. NVR216 comes with 4 or 9 channel configurations, and offers a dedicated mobile app for you to check on the office when youâ&#x20AC;&#x2122;re away.
Where to buy:
InTheSpotlightASISInternational October2016_riskuk_apr15 12/10/2016 10:05 Page 2
In the Spotlight: ASIS International UK Chapter
Big Data Analytics in Security ttention is now being focused on all elements relating to the protection of information and personnel across a given business. Those elements are many and varied. For example, there’s a need for policies to be devised and defined around access to critical areas (be they physical or virtual) for subsequent implementation and monitoring. Also, in order to reduce the probability of ‘The Insider Threat’ materialising, organisations are including measures designed to vet and audit each individual (or logical account) who has either requested – or already enjoys access to – critical areas within the company. The boundaries of these physical or logical areas are carefully defined, taking into account both local operations and industry regulations. Today, it’s more often the case that all aspects of security – encompassing cyber, data, people, assets and physical sites – are being looked at from an holistic perspective with specific reference to core business objectives. In addition to this, Security Departments are becoming – or are increasingly intending to be – far more proactive towards the matter of identity risks and threats as opposed to being reactive to issues which might have already impacted the host organisation’s business, people and/or reputation. In this regard, various tools and technologies may be deployed to capture data across the aforementioned areas and, with most of these technologies now connected to the network, it’s becoming relatively easier to integrate them. Doing so offers a cost-effective alternative to managing various operations that, as an alternative, would be divided across different individuals and systems.
A
Identifying and resolving risk The wealth of data today’s dedicated Security Departments are capturing on a continual basis through their various activities or systems is being used in novel ways to identify and resolve risks (ie exceptions) which would otherwise go unnoticed until manifesting themselves in potentially serious incidents. The principles of these novel approaches may be classified under the ‘security intelligence’ and ‘behavioural analytics’ banners. Let’s examine a few examples. The management team for a global bank playing host to a large workforce (ie over 150,000 employees) and operating out of more than 100 sites across the world was keen to identify instances of where
Given the spate of recent incidents occurring on the global stage, it’s no surprise that much attention is being visited upon cyber security. However, as most organisations now duly recognise, attention isn’t only limited to the cyber side of security. Vibhor Gupta expands on that notion the company’s staff were ‘remote’ logging-in to its IT systems despite being (physically) inside the organisation’s premises. Such exceptions relate to possible duplication of an identity record, which is a serious threat indeed. As the bank’s management team duly discovered, the ‘best’ – in other words the cheapest, quickest and most easily replicable – way for them to approach this issue was to apply the simple principles of data integration and visualisation across base logical and physical access control systems. By doing so, members of the security team were notified of any exceptions to the rule in real-time, in turn allowing for instant investigations and assisting the bank with risk mitigation tasks. A Fortune 500 organisation had multiple reported cases of expensive equipment being stolen from different buildings across its main campus area. The management team suspected the thefts were occurring after normal office hours, but an analysis of access records registered by the installed physical access control system alone wasn’t very helpful. Hundreds of individuals were working late at that site on a regular basis so it was difficult to identify a manageable number of suspects. By applying analytical intelligence to an integrated set of time and attendance data as well as physical access data, the management team was then able to resolve this situation.
Vibhor Gupta PhD: Director of Sales and Business Development (UK and Europe) at Quantum Secure and Technology Lead for ASIS UK
61
www.risk-uk.com
InTheSpotlightASISInternational October2016_riskuk_apr15 12/10/2016 10:18 Page 3
In the Spotlight: ASIS International UK Chapter
The team first defined a ‘usual’ behaviour of an individual and groups of individuals (ie which areas they accessed the most and at what times). Management team members then looked for exceptions (ie if certain individuals or groups accessed certain areas at specific times which fell outside of their ‘usual’ behaviour). By dint of conducting this analysis, a single employee stood out. This individual’s access pattern also coincided with the thefts. The next time that employee entered a new area after normal working hours, the Security Operations team was notified. A security officer was then sent to inspect the building and the thief was caught red-handed. This determined and focused approach not only helped management to resolve a mystery, but also provided the team with a strategy to prevent similar activities occurring in the future.
Individual risk assessments In another case, a highly secure Research and Development-focused organisation had spent enormous amounts of money each year on performing background checks for every person accessing its campus. A reduction in the security budget led to a change in policy, and a decision was taken to perform risk assessments on each individual. Checks were re-run on those who represented the highest risk. However, this simply led to a cut in the frequency of checks and raised the risk levels quite significantly. It was critical for the business to redefine the way in which it conducted risk assessments. The management team began by factoring each individual’s level of access, the time they had been with the organisation and the period since they last went through a background check. This information was coupled with their known ‘behaviour’ (ie which areas they were accessing on a frequent basis and at what times) in order to compute a ‘risk score’. Background checks were mandated for individuals with a high risk score and those who showed a sudden increase in their overall result. This helped a great deal in terms of maintaining high levels of security – no issues have since been reported – while reducing operational costs by approximately 85%. There are several other use cases highlighting the benefits and values Security Departments are now beginning to create using the principles of ‘security intelligence’ and ‘Big
“Look for ‘extensible’ solutions that can actively contribute towards the bigger picture if that should become necessary. Scalability is easily achieved with ‘out of the box’ solutions” 62
www.risk-uk.com
Data’ analytics. Salient points to note are: • Site usage metrics: to what degree is a site being used? • Key Performance Indicators: how well are operational security teams doing based on defined Service Level Agreements? • Impact analyses: conducted in case of changes such as an alteration of security policies or in existing technologies like access cards and access control systems • Supporting the ‘green agenda’: reducing energy usage in zones not greatly occupied based on the analysis of available data
Successful outcomes All of that said, every great idea ultimately requires a successful execution (ie implementation) for that ‘greatness’ to be recognised. To this end, there are several tenets deemed as being key to successful outcomes. First of all, identify the use cases (which should be addressed through the endeavours of ‘security intelligence’ or ‘Big Data’). Base these use cases on the experiences of known risks, threats and exceptions. Look for ‘extensible’ solutions that can actively contribute towards the bigger picture if that should become necessary. Scalability and extensibility are easily achieved when ‘out of the box’ solutions are deployed as opposed to customised ones. This really does assist organisations in protecting their investment as such solutions can be geared towards handling changes occurring in terms of other third party systems or business processes. Partner with systems vendors who actively specialise in the security vertical and connect to applicable systems (such as access control solutions, logical Human Resources systems and general security devices) in a noncustomised/non-bespoke manner.
Avoiding generic solutions In addition, avoid generic ‘Big Data’ solutions from vendors who don’t understand security. Domain knowledge is very important given that one size certainly doesn’t fit all. That domain knowledge coupled with the referenced experience of a solution provider implies cheaper, shorter and scalable implementation. It’s evident that Security Departments around the wolrd are fast recognising the opportunity for them to become business enablers. As a result, they’re aligning their objectives such that host organisations can run efficiently. This is a very welcome deviation from the traditional view of security being seen as a reactive and investigative process only and one unfairly labelled as merely a cost centre.
InTheSpotlightASISInternational October2016_riskuk_apr15 12/10/2016 10:06 Page 3
In the Spotlight: ASIS International UK Chapter
The team first defined a ‘usual’ behaviour of an individual and groups of individuals (ie which areas they accessed the most and at what times). Management team members then looked for exceptions (ie if certain individuals or groups accessed certain areas at specific times which fell outside of their ‘usual’ behaviour). By dint of conducting this analysis, a single employee stood out. This individual’s access pattern also coincided with the thefts. The next time that employee entered a new area after normal working hours, the Security Operations team was notified. A security officer was then sent to inspect the building and the thief was caught red-handed. This determined and focused approach not only helped management to resolve a mystery, but also provided the team with a strategy to prevent similar activities occurring in the future.
Individual risk assessments In another case, a highly secure Research and Development-focused organisation had spent enormous amounts of money each year on performing background checks for every person accessing its campus. A reduction in the security budget led to a change in policy, and a decision was taken to perform risk assessments on each individual. Checks were re-run on those who represented the highest risk. However, this simply led to a cut in the frequency of checks and raised the risk levels quite significantly. It was critical for the business to redefine the way in which it conducted risk assessments. The management team began by factoring each individual’s level of access, the time they had been with the organisation and the period since they last went through a background check. This information was coupled with their known ‘behaviour’ (ie which areas they were accessing on a frequent basis and at what times) in order to compute a ‘risk score’. Background checks were mandated for individuals with a high risk score and those who showed a sudden increase in their overall result. This helped a great deal in terms of maintaining high levels of security – no issues have since been reported – while reducing operational costs by approximately 85%. There are several other use cases highlighting the benefits and values Security Departments are now beginning to create using the principles of ‘security intelligence’ and ‘Big
“Look for ‘extensible’ solutions that can actively contribute towards the bigger picture if that should become necessary. Scalability is easily achieved with ‘out of the box’ solutions” 62
www.risk-uk.com
Data’ analytics. Salient points to note are: • Site usage metrics: to what degree is a site being used? • Key Performance Indicators: how well are operational security teams doing based on defined Service Level Agreements? • Impact analyses: conducted in case of changes such as an alteration of security policies or in existing technologies like access cards and access control systems • Supporting the ‘green agenda’: reducing energy usage in zones not greatly occupied based on the analysis of available data
Successful outcomes All of that said, every great idea ultimately requires a successful execution (ie implementation) for that ‘greatness’ to be recognised. To this end, there are several tenets deemed as being key to successful outcomes. First of all, identify the use cases (which should be addressed through the endeavours of ‘security intelligence’ or ‘Big Data’). Base these use cases on the experiences of known risks, threats and exceptions. Look for ‘extensible’ solutions that can actively contribute towards the bigger picture if that should become necessary. Scalability and extensibility are easily achieved when ‘out of the box’ solutions are deployed as opposed to customised ones. This really does assist organisations in protecting their investment as such solutions can be geared towards handling changes occurring in terms of other third party systems or business processes. Partner with systems vendors who actively specialise in the security vertical and connect to applicable systems (such as access control solutions, logical Human Resources systems and general security devices) in a noncustomised/non-bespoke manner.
Avoiding generic solutions In addition, avoid generic ‘Big Data’ solutions from vendors who don’t understand security. Domain knowledge is very important given that one size certainly doesn’t fit all. That domain knowledge coupled with the referenced experience of a solution provider implies cheaper, shorter and scalable implementation. It’s evident that Security Departments around the wolrd are fast recognising the opportunity for them to become business enablers. As a result, they’re aligning their objectives such that host organisations can run efficiently. This is a very welcome deviation from the traditional view of security being seen as a reactive and investigative process only and one unfairly labelled as merely a cost centre.
FIATechnicalBriefing October2016_riskuk_nov14 12/10/2016 10:04 Page 1
Boosting The Numbers: The Need for ‘New Blood’ in the Fire Sector Employers within the fire sector often recruit from the small base population that currently exists in the industry. However, this is causing a huge problem in that there’s now an ageing population within the workforce and a huge need for new blood to populate the sector. Ian Moore charts the best way forward
he Fire Industry Association (FIA) represents around 700 companies on a national basis, embodying the voices of hundreds of employers and thousands of their staff. When speaking to others within the fire industry, we often hear the same old joke being bandied about – that the industry is very insular, and that it always has been. An island, if you will, all of its own. There’s certainly an overriding need for new blood to populate the sector as many stalwarts either retire or are promoted further up the business ladder, leaving vacancies that need to be filled. This can be a difficult task as many applicants lack the requisite training, skills and knowledge for specific posts. “The FIA has been consulting extensively with a range of employers and recruiters to gain a better understanding of the current issues facing the industry today,” said Martin Duggan, our general manager. “We’re listening to the industry’s concerns such that we can help in moving it forward.” Brett Ennals, managing director at Cento Group (an agency specialising in placing fire and security engineers into specific roles), stated in a recent interview with us that the lack of new blood in the fire industry has been a problem for at least three or four years. “With the UK coming out of a recession, the demand for skilled staff has inevitably increased,” explained Ennals. “Of course, there are people ‘falling off’ at the other end as they retire. Also, during the recession there were people that had moved into a different discipline, into different roles and different jobs. Emerging from the recession, employers then say: ‘Oh, I need a fire alarm engineer and a project manager’.”
T
Engineers in high demand
Ian Moore: CEO of the Fire Industry Association
64
www.risk-uk.com
The problem stems from the current demands in the industry. According to the results of the last FIA Market Conditions Review, 60% of employers have recruited skilled labour in the first quarter of 2016. A skilled workforce is absolutely integral to the industry as a whole. Naturally, recruiting more skilled staff makes tactical sense, since those individuals will be able to design, install and maintain fire alarm systems for end users as required. Unlike in other industries, being able to understand and apply the technical aspects are
vital. Indeed, it’s not unheard of for fire alarm maintenance companies to face court charges in relation to the Regulatory Reform (Fire Safety) Order 2005, a piece of legislation that clearly sets out the need for a ‘responsible person’ (usually the owner of any business) to use competent individuals. On that note, in May this year – in a case referred to as ‘the first of its kind’ – a fire alarm maintenance company was taken to court over an alleged failure to properly service the fire alarm system within a care home and duly fined £6,000 for failing to inform the owners of the deficiencies in the system. ‘Competence’ is always the big key word in the fire world, with many debates and discussions taking place around this subject, but how does one know when an engineer is truly competent? This is precisely why those fully-trained and confident in their knowledge and skills are in such high demand, and also quite possibly why there are not enough high quality engineers to go around. Brett Ennals assesses that the current state of play in recruitment is now becoming pretty desperate. “One in every five employers is facing a talent shortage at the moment,” said Ennals. “This is having an impact on their service delivery, and the situation is worsening. Some employers are now starting to pay over the odds for less-skilled engineers. Most of our clients are looking for the skilled individuals, but they’re becoming harder to find.”
Need for diversification As a whole, the fire industry needs greater diversification. The level of professionalism demands to be raised. This can only be done by bringing in new people with a range of additional soft skills that would be beneficial to the industry as a whole. We all need to start instilling this idea into our minds now more than ever before. Other industries can bring a range of skills that businesses within the fire alarm sector need, such as customer service, an ability to problem solve or management techniques. Other qualifications and knowledge can help afford an individual a more rounded understanding of their current role in the installation or commissioning of alarm systems. “Without a doubt,” continued Ennals, “new blood and fresh ideas can bring valuable skills
FIATechnicalBriefing October2016_riskuk_nov14 12/10/2016 10:04 Page 54
FIA Technical Briefing: Recruitment in the Fire Sector
to employers in the fire sector. It’s a service business, and it’s a highly competitive one. You’re only as good as the last project, really, so if you bring people into the business who have the right attitude and aptitudes they can help to secure future contracts.” According to Martin Duggan, businesses should consider investing in their less experienced staff such that they can then ‘feed’ them into the industry to fill the huge need for more engineers. That’s the latest thinking. It’s a train of thought with which Ennals concurs. “Most employers are looking for people with experience. In short, individuals who can really hit the ground running. The majority of candidates we place would be on the electronic detection side and average somewhere around five or six years of experience.” However, it’s the gap in experience that’s causing the problem, as new people are not entering the profession and leaving companies desperate to recruit. The only real solution is to invest in more junior engineers or consider applicants from other related fields that could be trained in current standards and Best Practice. For example, ex-Armed Forces personnel are likely to have hugely beneficial technical skills that could be deployed. They may also have the right aptitude and ‘can do’ attitude sought by today’s businesses.
Investing in new talent “To help fill the gap in experience, it’s worth employers in the fire industry considering taking on people who possess an electrical qualification and then training them,” asserted Ennals. “Employers need to have an open mind and a desire to invest in some new talent, but they all seem to have their blinkers on and think they need someone with at least five years’ experience who knows the various systems back to front, inside out and upside down. They’re seemingly not willing to budge on that view.” The only real way in which the fire industry can move forward is to begin to see the potential of less experienced or junior candidates. While they may not be able to be truly competent at the time of hiring, with a little investment of an employer’s time, they can be trained to perform all the necessary tasks to an excellent standard. They just need the chance to learn and become qualified.
The issue right now is that, while there are plenty of ways in which to gain experience ‘on the job’ and develop knowledge through attending manufacturers’ training courses on their individual pieces of equipment, there’s currently no-one offering a formal qualification. “Employers are looking for people who have been trained on particular pieces of equipment,” observed Ennals. “In the last 12 to 18 months, businesses have been pushing for what they call ‘multi-disciplined’ engineers who can cover security systems as well as fire. There has been a recent trend for fire businesses to look at security work and vice versa.” Employers want candidates to be electrically qualified, as in a qualified electrician or a qualified engineer on low voltage engineering, but more and more now it’s fair to state that they’re just looking for experience. There’s a real need for a formal qualification in fire detection and alarm systems in order to improve the quality of engineers in the industry today. It’s definitely an opportune time for employers to begin thinking about taking on new staff and how they’re going to train them and move them forward. All in all, competency is the important issue, but employers must be prepared to make allowances. They have to be more open-minded to less experienced or junior applicants, and demonstrably willing to give them the training they both need and deserve in order to better service the industry as a whole.
Martin Duggan: General Manager of the Fire Industry Association
“The level of professionalism demands to be raised. This can only be done by bringing in new people with a range of additional soft skills that would be beneficial to the industry as a whole” 65
www.risk-uk.com
SecurityServicesBestPracticeCasebook October2016_riskuk_apr15 12/10/2016 10:07 Page 1
Talent Spotting: Recruitment in the Private Security Business Sector However, where pay increases within companies have recently ranged from nothing to 2%, it can often be a hard justification for the discerning buyers of security to award higher increases to supporting contractors. This situation is further exacerbated in contracts that are out of town in the leafy suburbs, as these areas are typically also less fertile grounds from which to draw new recruits. Better paid jobs are available elsewhere, while the demographic is such that there are not enough people we can attract.
Licensing talent
The ongoing development of Government regulation (with business licensing seemingly on hold), a terrorist threat level set at ‘Severe’ and an economy still finding its way out of recession are just some of the challenges presently facing business service providers within the security sector, not to mention their customer base. Is there any light at the end of the tunnel when it comes to recruitment? David Mundell offers his considered opinions on the matter
66 www.risk-uk.com
ecruitment is a key issue in any business sector. Finding, training and then retaining the very best talent is what all businesses strive to achieve. Not only does this help to grow a strong and sustainable company, but it’s also a defining factor in the delivery of a consistent service to the client base. What has always been a difficult challenge, however, is today becoming even harder still. The September 2016 Bulletin from the Department of Work and Pensions states: ‘Employment continues to run at a record high of 74.5% and the unemployment rate holds firm at 4.9%, which is its lowest level in more than ten years’. While this is excellent news for most of the country, and indeed our national economy, for firms like ours and those working in our sector it means that the pond from which we can fish for new talent grows smaller. Additionally, in many cases the wages on offer for security personnel tend to compare unfavourably with less onerous or less responsible tasks where the hourly rates of pay are much higher. To put it bluntly, people can be paid more for holding a less responsible position, and for many reasons it’s understandable – and not in any way surprising – why they would choose to do so. Indeed, hourly rates can still be something of an Achilles heel for security businesses. At Axis Security, we’re extremely proud to be an active supporter of The London Living Wage and, in the main, the London clientele understands the situation and is willing to pay attractive rates.
R
Perhaps a more controversial issue regarding the shortage of staff available to security companies relates to the licensing regime operated by the Security Industry Authority (SIA) in tandem with ongoing training. When SIA licensing was first introduced, security companies would recruit, train and support candidates to see them through their licence applications. Fast forward to the present day and the industry harbours a huge pool of licensed individuals, some of the constituent members of which we believe are not up to the standards required of modern security officers. Legally, they’re fully entitled to work, while the licences they possess should suggest that at least an entry level of training has been delivered. However, all too often the training, knowledge and skills these individuals should readily have at their disposal appears to be somewhat lacking, which is either an indictment of the individual, or may at least in part be down to the quality – or perhaps the lack of it – within the training process. Either way, some licensed officers are simply unemployable if we wish to retain the same high standards of quality that our clients have come to expect. That’s not to say the situation is in any way a lost cause. Several recent Government initiatives are opening up new pools of talent, one of the most exciting being the forthcoming Apprenticeship Levy.
The Apprenticeship Levy In April next year, the Apprenticeship Levy will become a reality. It’s a new levy placed upon employers to contribute towards apprenticeship funding and, in essence, means that all UK businesses with an annual payroll bill of more
SecurityServicesBestPracticeCasebook October2016_riskuk_apr15 12/10/2016 10:07 Page 2
Security Services: Best Practice Casebook
than £3 million are required to contribute 0.5% of that annual payroll to the new fund. The Government has published its 2020 vision for English apprenticeships wherein it proposes sound reasoning for the Apprenticeship Levy being introduced. The Conservative Party states that apprenticeships provide a typical return of £26-£28 for every £1 of Government investment in apprenticeships at Levels 2 and 3. It also reports that 83% of apprentices say their career prospects have improved since becoming apprentices, and – perhaps most important of all – that 70% of employers said apprenticeships have improved the overall quality of their product or service. Not everyone views the new Apprenticeship Levy as a cause for celebration. There’s some cynicism displayed by those companies who see this move by the Government as simply being another tax on businesses, and look upon apprentices in general as a drain on their time-limited resources. Employers liable for the Apprenticeship Levy receive a £15,000 Government allowance, but for the idea to substantially take off they need to see a real and genuine return.
Viewed as an opportunity Given the points raised earlier, the Apprenticeship Levy should be viewed as an opportunity, and one that could help us alleviate the pressures we’re facing in the recruitment sphere. We run a successful trainee programme. In our case, it’s managed in association with an external recruitment and training agency that uses funding provided by the Government’s Skills Funding Agency. The cost to the employer is each apprentice’s salary. They don’t pay for the training. As will be so with the Apprenticeship Levy scheme, all training provision is regulated by Ofsted, giving us some additional assurances around quality. To date, Axis Security has taken on 11 trainees, five of whom subsequently went on to become apprentices. Of those five individuals, four were offered full-time employment opportunities. We see this as being extremely positive as it has allowed us to successfully recruit and train people to our own exacting standards, and the standards that our customers expect. By valuing new employees in this way, and supporting them in their development, it also engenders a greater loyalty that supports a higher level of retention.
Number of differences There are, of course, a number of notable differences – and significant ones at that –
between the scope and remit of our current trainee and apprenticeship system and the new programme to be launched in April 2017. First and foremost, our existing scheme is targeted at 16 to 24-year olds, whereas the Government apprenticeship scheme is available to any and all people of working age. This will not only significantly increase the number of potential applicants, but also opens up training opportunities for our existing employees to further their career and widen skill sets. Also significant is the fact that our current trainee and apprenticeship scheme has been limited to head office Human Resources, finance and management recruitment, whereas we will be using the wider remit of the Apprenticeship Levy to recruit much-needed front line security officers. There remain numerous questions as to exactly how the new Apprenticeship Levy will work. For instance, we don’t know as yet what training courses will be available and what degree of autonomy companies will have in the selection process, and indeed when it comes to determining the particular relevancy of the training provided. While time is running short for the Conservative Government to provide definitive answers for these questions and others, in the meantime we’re concentrating our efforts on conducting as much research as possible such that we’re in the very best possible position to take advantage of a wider net of recruitment come next April.
David Mundell: Managing Director of Axis Security
Investment is the key Having low unemployment is, of course, a positive position for the UK as a whole, but within this climate, end users must critically examine their security budgets if we’re to retain the good quality people needed within our business sector and, more importantly, attract other high calibre individuals to join the ranks. For security companies, in addition to investment in the upcoming Apprenticeship Levy as well as other schemes, the time has now surely come for us all to spread our recruitment net far wider than just looking at those who already hold an SIA licence. This process will result in an uplift in costs, but it may well be a price that’s worth paying for the good of what is a vital business sector.
“Not everyone views the new Apprenticeship Levy as a cause for celebration. There’s some cynicism displayed by those companies who see this move by the Government as simply being another tax on businesses” 67
www.risk-uk.com
CyberSecurityRiskManagementforEndUsers October2016_riskuk_apr15 12/10/2016 10:02 Page 1
Addressing the Risks of Cyber Security The evolving nature of security means that organisations have to look at physical security systems in a new light. After all, our physical security systems are, in many ways, IT systems that ‘do’ security. As a result, IT Departments place the same requirements upon our solutions that they would on any software running on the corporate network.
Penetration testing
A growing number of physical security systems including video, access control and intercom (as well as a wide range and variety of edge devices like cameras, encoders and door controllers) reside on the corporate network. This means that organisations are potentially increasing the number of entry points vulnerable to attack. Francis Lachance and Simon Cook outline riskfocused solutions for today’s professionals
68
www.risk-uk.com
ny unsecured endpoint, be it a surveillance camera or door reader, can become an attack surface that allows access to an organisation’s network. Once an attacker gains entry to a networked camera, it becomes far easier for them to access every element of the system to which the camera is connected. While this is the largest issue related to keeping a physical security system secure or ‘hardened’ against attacks, there are other concerns as well. For example, failing to block unauthorised access to live or recorded video surveillance footage can lead to both operational and legal issues, not to mention a serious invasion of privacy. Additionally, when an organisation fails to secure an access control system, it can undermine efforts to restrict access to sensitive areas and place the whole company at risk. Securing a platform to mitigate risks requires a combination of encryption, authentication and authorisation to ensure that all data is secure both in transit and at rest. Increasingly, this means that the elements of physical security systems are maintained by IT staff. In fact, we’ve found that, with large installations such as at airports, schools and universities, the majority of these systems are hosted and managed by an organisation’s IT Department. The interesting end result of this is that, according to the detailed report entitled ‘State of the CIO: 2015’ , Chief Information Officers are now spending up to 30% of their time on cyber security matters.
A
Increasingly, IT Departments worldwide are asking us to provide thorough penetration testing to ensure that we comply with their rigorous IT standards. Compliance with these standards highlights that we’re able to deliver end-to-end physical security systems that are more secure than ever before. To address the needs and requirements of both security and IT professionals, we must first understand what our clients and end users actually know. While we’ve seen that individuals worldwide are rightly concerned about the security of their security systems, they don’t always know what the answer involves. To make absolutely sure everyone’s up to speed, it’s important to understand what encryption, authentication and authorisation are and how they work in the real world. Encryption is one of the benchmark strategies for keeping sensitive data private, whether in transit or at rest. It helps to protect sensitive information and can enhance the security of communication between client apps and servers. When an organisation encrypts the data in its physical security systems, it’s rendering that data unusable to unauthorised parties should it be stolen, intercepted during transit or accessed while in storage. To encrypt data, the system uses an algorithm that translates plain text into unreadable cypher text that can only be translated back to readable plain text with a decryption key. An organisation can limit access to the decryption key to only those individuals with the proper credentials and authorisation. While encryption can effectively obfuscate the contents and ensure the confidentiality of a message, it can neither keep a message from being changed nor ensure that the sender of the message is who they say they are, which is why authentication is so very important.
Process of authentication The process of authentication – either claimsbased or through a digital certificate – allows a user, client or server to determine whether the
CyberSecurityRiskManagementforEndUsers October2016_riskuk_apr15 12/10/2016 10:03 Page 2
Cyber Security: Risk Management for End Users
entities are who they claim to be. There are several methods of authentication, including tokens, user name/password combinations, biometrics and digital signatures and certificates, all of which help to protect the integrity of a given system’s messages. Claims-based authentication is employed by applications to acquire identity information about users either inside or outside of the organisation. It allows an application to know certain things about users without interrogating them as the claims are transported in an envelope: a ‘security token’. One of the benefits of this is that an application can use third party claims providers who offer well-established systems for authenticating users, among them Facebook or Google. Known as trusted and secure companies, they offer some of the most ‘hardened’ protocols against cyber attacks or security breaches. Another method of authentication is the digital certificate. This includes information about the owner’s identity and the signature of the digital entity that attests to the correctness of the certificate’s contents. Through the exchange of this authentication data between the server and the client application, a user can validate the authenticity of the server and prevent certain types of cyber attack. Transport Layer Security (TLS) uses both encryption and authentication. It’s one of the latest protocols that can be employed to better protect physical security systems. TLS provides secure communications over a network by protecting communication channels between a server, such as a video recording server, and the client application (eg an alarm monitoring application) as well as the servers in-between. Using digital certificates, TLS authenticates the counterpart in the communication and then negotiates a session key that’s used to encrypt data during the conversation.
The Third Step: Authorisation Finally, authorisation is the process by which security personnel can ensure privacy as a result of defining all access rights for private data, computing resources and applications. When you restrict access to only those entities who are trained and authorised, you then increase personal privacy as well as the overall security of your security system. This is particularly relevant for video surveillance systems. Ensuring that surveillance content is accessible only to authorised users, even in the event of a theft or interception, is absolutely vital when it comes to ensuring privacy.
“While we’ve seen that individuals worldwide are rightly concerned about the security of their security systems, they don’t always know what the answer involves” In addition, security personnel need to be able to treat video differently based on its contents. After all, even when surveillance data is secure, organisations still need mechanisms that allow them to flag video that’s sensitive and define how it should be managed. It’s through the process of authorisation that administrators are able to assign specific rights and privileges to system users. Concerns regarding cyber security are a global phenomenon. After all, news of security breaches hits media outlets everywhere. It doesn’t matter if you’re a retail store in London, a water treatment plant in Madrid or a preschool in Minnesota, keeping video content private and secure must be taken seriously. What we’ve found is that there are considerable differences between these regions in terms of where most organisations land on the ‘security versus privacy’ scale. While this may change moving forward, privacy seems to be a larger concern in Europe when compared to the UK and North America. Europeans tend to focus on their personal privacy and how video surveillance footage might be accessed and used by companies, Government bodies and hackers (and what these groups could potentially do with that footage).
Francis Lachance: Director of Product Management at Genetec
Addressing end user concerns In the security business sector, we focus on providing customers with secure physical systems that protect people, assets and spaces while maintaining personal privacy. There’s an overriding desire to assist customers in addressing their concerns. One way to do so is by offering solutions that have strong built-in encryption, including endto-end encryption from cameras to client stations, and ensuring that all client-to-server and server-to-camera communications are encrypted. Also important is supporting strong authentication mechanisms, including TLS and claims-based with ADFS, and providing client companies with the ability to set authorisation parameters to protect video data and privacy. To be truly effective in this industry, solution providers must strive for transparency. Hiding issues or developing a fix in secret doesn’t work. The nature of security is always changing. Just because an organisation’s system is secure today doesn’t serve to guarantee that it will remain that way in the future.
Simon Cook: Sales Engineering Manager at Genetec
69
www.risk-uk.com
TrainingandCareerDevelopment October2016_riskuk_apr15 12/10/2016 10:10 Page 1
Education in Security and Risk: The Need for Academic and Vocational Synergy courses (subject to Parliamentary approval). This is a huge investment for the student, and doesn’t take into account living costs. When a student is making this kind of investment, and likely committing to a huge loan to fund it, it’s no surprise that quality of teaching is a huge part of the decision-making process when selecting a university. Alongside teaching quality sits the thorny issue of subject matter relevance. Knowledge for its own sake is a long-established principle in universities and it is now, as it has always been, a good guiding principle. However, there’s a need in some areas to balance degree subject with degree application, and particularly so as the ultimate usefulness or value of the degree obtained will go a long way towards determining future employment prospects and how long it will take to pay off that substantial loan.
Risk and security focus
When it comes to education for practising security and risk management professionals, there needs to be a genuine attempt to merge both skills and knowledge sets, and also construct and offer courses that genuinely combine the academic with the vocational. Ken Livingstone outlines a new MSc course devised by the Perpetuity Academy and the University of South Wales which is based on that model
70
www.risk-uk.com
he Conservative Government’s recent decision to rate universities as either Gold, Silver or Bronze based on their teaching quality comes into effect next year. The move represents a very positive step forward in terms of providing students with a clear indication of teaching standards. This ‘medal’ system – and a Bronze rating here isn’t good news – marks something of a sea change in the performance grading of universities. Up until now, university performance has primarily been measured by research success, but this hasn’t always aligned with the student learning experience. While recognising the importance of good research in expanding knowledge, and fully acknowledging that good research provides sound learning material, it seems odd to largely ignore the quality of delivery and focus instead on the publication of research papers many of which have little real impact. Walking into a lecture hall, students will be much more interested in the skills of their lecturer to teach the subject well, rather than his or her ability to publish an esoteric paper in the pages of an obscure journal. The burgeoning emphasis on teaching quality is largely due to the increasing cost of a university education. From August 2017, publicly-funded universities and colleges will be able to charge up to £9,250 per year for
T
In the risk and security profession, there have traditionally been two threads running through the provision of education and qualifications. The universities and colleges have provided academic courses and degrees with an emphasis on theory and scholastic excellence, while vocational training companies have offered certification in workplace skills with an emphasis on Best Practice. In recent years, however, these separate threads have become increasingly intertwined with the distinction between them increasingly blurred. Training providers who once were the sole arbiters of their own quality and courses are increasingly applying to have their courses accredited by formal awarding bodies. There are significant benefits to doing so for both the learner and the training provider. The training provider can market a course that not only combines vocational knowledge and Best Practice, but also provides a formal qualification. This makes it much more attractive in the marketplace and often allows a premium price to be charged. For their part, the learner enjoys a guarantee of quality, and gains both knowledge and an educational qualification. This plays much more strongly to their CV and ongoing professional development, with the qualification significantly increasing the value of the training in both their own and employers’ eyes.
TrainingandCareerDevelopment October2016_riskuk_apr15 12/10/2016 10:10 Page 2
Training and Career Development
The offer of these accredited vocational qualifications, together with the potential profits associated with them, has not gone unnoticed by the universities and colleges. Ideally placed to offer recognised qualifications, many universities and colleges have entered – or further expanded into – the vocational training market, including some who’ve developed risk and security courses.
Squaring the circle As you might expect, the quality of provision across the universities and training companies varies, but a fundamental problem is that universities tend to be less well informed with regard to vocational risk and security, while for their part the training companies are often more geared towards vocational training than they are theoretical education. Universities and colleges can be light on vocational expertise, while the training companies may be light on theory and academic rigour. This isn’t true in every case, of course, but as a general rule of thumb it’s more consistent than not. What’s missing is a determined effort by either the universities and colleges or the training companies themselves to marry academic theory and excellence with professional Best Practice and experience. Simply offering a vocational course through a university or an accredited qualification through a training company isn’t sufficient. There needs to be a genuine attempt to merge both skills and knowledge sets, and also construct and offer courses that genuinely combine the academic with the vocational. It’s this type of course that security and risk management professionals are seeking, and it’s this type of course which will help those same security and risk professionals continue to develop and seize future opportunities.
Forming a new approach Let’s examine the present partnership between a commercial training provider and a university to create such a course. Working together, the University of South Wales and the Perpetuity Academy have developed an MSc in International Security and Risk Management in what’s a new approach towards combining academic theory and vocational knowledge. There are a number of ‘firsts’ involved here. One is that the course content is authored by the Perpetuity Academy, with the course design and content overseen, approved and validated by the university. Throughout the course design, writing and accreditation process, the Perpetuity Academy and the University of South
“What’s missing is a determined effort by either the universities and colleges or the training companies themselves to marry academic theory and excellence with professional Best Practice and experience” Wales worked hand in glove to ensure a qualification that reflects the aims and expertise of both parties. This unusual approach to the authoring of the MSc content is made possible by the fact that the Perpetuity Academy has very close associations with academia. The managing director of the Perpetuity Academy has lectured in security and risk management at both Leicester and Loughborough Universities and has a long track record in combining theory and practice in both courses and qualifications. Similarly, the Perpetuity Academy differs from the majority of training companies in that its trainers hold Master’s degrees, and have worked in both academia and the spheres of commercial security and risk management. The University of South Wales is no less innovative in the structure of its lecturing team, and the Faculty of Life Science and Education has an established reputation for its expertise and work in combining vocational expertise and academic content. Another unique aspect of this MSc is that it’s delivered through online distance learning, enabling learners to combine their studies with their work and to do so from anywhere in the world. To mitigate the fact that distance learning can be an isolated experience for some, learners are able to interact with each other and receive support from tutors through a specially designed virtual learning system which, in addition to the learning materials, includes forums and discussion groups. Offering the course by way of online distance learning makes it accessible to those in employment, while at the same time affording it an international reach. In line with this, the MSc course can also be studied either on a one year full-time basis or across two years part-time, making it accessible for those with different amounts of time available to commit to study. In terms of content, the MSc again merges academic theory with security and risk management. The course consists of five modules – Security Management: Prevention and Design, Security Management: Risk Management and Loss Prevention, Strategic Security Management and Leadership, Security and Risk Management: Delivering Value and Research Methods – and a dissertation.
Ken Livingstone MSc FSyI: Managing Director of Perpetuity Training
71
www.risk-uk.com
RiskinAction October2016_riskuk_oct16 11/10/2016 15:43 Page 1
Risk in Action Motorola Solutions digital radio system cleared for take-off at London Gatwick Airport Motorola Solutions is providing its MOTOTRBO Capacity Max system at London Gatwick Airport alongside authorised channel partner Servicom. The state-ofthe-art system will bring enhanced voice and data communications to no less than 1,300 end users both airside and groundside. The new Digital Mobile Radio system is set to double the capacity of the existing analogue network and is fully scalable in readiness for the airport’s ongoing growth. London Gatwick Airport is one of the UK’s most important transport hubs, with more than 4.6 million passengers travelling through the facility in July this year alone. In addition to reliable and secure voice communications, airside and groundside teams at Gatwick Airport will also be able to take advantage of Capacity Max’s powerful data performance with new applications. These include TRBOnet PLUS, a dispatcher application that enables voice recording, mapping and event logging in the Control Room, and iBeacon indoor positioning (which allows alerts to be sent to individual radios based on location). With the new system, central controllers can dispatch the closest employee to an incident, in turn saving members of staff valuable time. Other functions include settings for lone workers, geo-fencing to create restricted areas and automated escalation protocols which will bring upgraded safety and security capabilities. As the hardware is connected to Wi-Fi, software updates may be sent to equipment on a swift footing and with less load on the radio network. “We chose Motorola Solutions’ MOTOTRBO Capacity Max system not only for how resilient and secure it is, but also because of the flexibility it affords us,” said Simon Telling, IT project manager at Gatwick Airport.
Alpro determines to take the racing line at Silverstone Business Park Pull door handles from Alpro are being used on office buildings at Silverstone Business Park. The location is a high-performance technology and motorsport cluster adjacent to the Silverstone Formula 1 Circuit which is the current venue for the British Grand Prix. The handles are Alpro’s Functional 97 Series pull handles which cater for a broad user base since their wide diameter makes them suitable for both general users and those who may have an impaired ability to grip. These stainless steel handles offer clients the build quality and durability associated with 316 grade and can be satin anodised, satin stainless, polished stainless, powder coated or nylon coated. The handles are supplied with bolt-through or back-to-back fixing and an F27 fixing kit as standard.
72
www.risk-uk.com
CEM Systems moves to enhance security and safety for Northern Ireland’s iconic Harland and Wolff CEM Systems, part of the Security Products Business Unit at Tyco, has just won the contract to secure Harland and Wolff Heavy Industries’ site in Belfast which serves the maritime, offshore oil and gas and renewable energy sectors. Purposely developed to create some of the world’s largest ocean-going vessels, these world class facilities can handle the largest of structures in a safe, productive and costeffective environment. Environmental Health and Safety management is a vital element of Harland and Wolff’s business, while ensuring the safety of personnel is paramount. To protect employees and secure valuable equipment across its vast location, Harland and Wolff has had the AC2000 security management system installed alongside a comprehensive range of CEM Systems’ access control readers. The AC2000 is a powerful access control solution supplied with a comprehensive range of software applications for enhanced site operations. Harland and Wolff uses the AC2000 Security Hub for alarm and CCTV event management. This blends IP security surveillance systems and alarm processing into a single and intuitive end user interface. The Functional 97 Series pull handles can be used in pairs or single arrangements. Many end user customers appreciate the ability to have an offset bracket that allows staff keyed access to the premises without any obstruction from the throw of the handle. The Alpro handles at Silverstone Business Park have been fitted on doors created by Ridgeway Glazing. Specialisms for the business include thermally broken curtain walling, windows and doors as well as automatic entrance screens and solar shading. Recent work includes a £1.2 million project for McLaren Construction at Tottenham Hotspur FC’s Training Academy. Silverstone Business Park is occupied by companies specialising in the engineering and automotive sectors. The 275-acre site received a financial boost in 2015 when its potential for rapid growth was recognised by designation as an Enterprise Zone.
RiskinAction October2016_riskuk_oct16 11/10/2016 15:43 Page 2
Risk in Action
Chubb Fire and Security protects Osborne, Morris and Morgan with total fire safety package Chubb Fire and Security is providing a complete fire safety equipment installation, service and training package to Osborne, Morris and Morgan (OMM) Solicitors, subsequently helping to protect employees at three of the firm’s main offices. OMM Solicitors selected a total fire solution for its head office that includes a fire risk assessment and regular servicing of all equipment encompassing the alarm panel, fire alarm testing, training for employees, emergency lighting and fire extinguishers. This fire safety approach helps to ensure compliance with regulations and provides peace of mind for employees. At two other OMM offices, Chubb Fire and Security will undertake a fire risk assessment and maintain and service the fire extinguishers and emergency lighting, replacing equipment as and when needed. Sarah Winters, administration and accounts assistant at OMM Solicitors, explained: “The decision was made to change suppliers due to the servicing and maintenance of the equipment becoming too frequent and expensive. We also needed to include a training element within our fire safety regime. Chubb’s package proved to be a cost-efficient way in which we could cover everything that we needed.” Meanwhile, Chubb Systems has won a major new contract to supply and install a fully-integrated intruder detection and security management system at key installations for West & Wales Utilities, the gas distribution network. A dedicated team of Chubb specialists will design and install custom security systems at six hubs. Each design will include a combination of bespoke CCTV, access control and intruder detection solutions, with remote monitoring taken care of thanks to a 24/7 Alarm Receiving Centre.
Advanced selected for fire safety provision at Atlantic Islands Heritage Centre Even the smallest of buildings can be of critical importance to its end users, and notably so in relatively isolated communities. The performance and reliability of Advanced’s MxPro fire alarm panels has seen them installed in another remote coastal location, this time the Atlantic Islands Heritage Centre on Luing off the West Coast of Scotland. The Visitor Centre in the village of Cullipool is set to revitalise the island’s economy, raising awareness of Luing as a tourist destination and offering a range of outdoor activities. The Visitor Centre will also realise a community hub for the island’s 200 residents and has the capability to be used as an emergency refuge should the need arise. The contract for the installation was awarded to the team at Adam Fire, who specified the latest MxPro 5 panels from Advanced. MxPro 5 is a multiprotocol fire panel range renowned for its reliability and flexibility. Graeme Bruce of Adam Fire told Risk UK: “We had already installed MxPro panels at Iona Abbey, one of the oldest and most important religious centres in Western Europe. In remote locations, system quality and reliability are paramount, which is why we felt that the proven reliability and longevity of the MxPro panels were crucial attributes for this latest project.” The Atlantic Islands Heritage Centre is now being protected by the MxPro 5 single loop panel, offering high performance fire detection and alarm control across the entire site. MxPro 5 panels can be used in single loop, single panel format or otherwise easily configured into high speed 200-panel networks.
Facewatch ‘digital detective’ leads hunt for UK’s £30 million fuel thieves A national crime-reporting platform employing ‘digital detective’ technology to help retailers save police time and effort in collecting evidence is turning its attentions to fuel thieves. Working in a new partnership with Forecourt Eye, Facewatch is planning to roll out its technology for the benefit of petrol retailers nationwide. The platform includes a secure cloud-hosted ANPR system linked to CCTV cameras to identify suspect vehicles and send out automatic alerts configured to warn retailers of potential fuel theft threats. Facewatch founder and chairman Simon Gordon said: “Using our technology, businesses can upload CCTV footage, images and information about suspects to compile digital evidence files, including witness statements, which can then be instantly reported to the police. Subscribers are also able to share pictures and number plate details with local forecourts and use the ANPR system to receive alerts when known offenders access a given petrol station. The next step in our development is to combine this with facial recognition software. This is being tested and will be ready to deploy in the very near future.” Nick Fisher, CEO of Forecourt Eye, explained to Risk UK: “Our system allows the forecourt industry to take steps to tackle a fast-growing menace that’s costing retailers millions of pounds every year. The sophisticated online tools we provide also offer enhanced protection for forecourt staff.”
73
www.risk-uk.com
TechnologyinFocus October2016_riskuk_sep16 11/10/2016 15:44 Page 1
Technology in Focus Axis Communications “sets new standard for image quality” in video surveillance arena thanks to Q1659 network camera
Axis Communications has introduced the Q1659 network camera, the first to combine professional-calibre photographic imaging technologies from Canon with its own proven security offering. The camera brings a new level of ultrahigh image quality for a fixed, wide area surveillance camera, and leverages leading-edge image sensor and EF lens technologies for “unmatched” colour, contrast and detailing even in the most challenging of lighting conditions. “This camera represents a ‘best of both worlds’ approach,” said Olof Leidecker, global product manager at Axis Communications. “In addition to the level of quality and detail involved, thanks to its broad VMS support the Q1659 may be quickly integrated with existing security environments.” The Q1659 delivers 20 MP resolution at eight frames per second, achieving “unprecedented levels of detail” for observing open spaces and across long distances. It features digital single lens reflex imaging technology and offers a choice of seven different EF/EF-S lenses depending on individual user needs. The camera enables easy lens changes for security professionals. www.axis.com
Inception by Inner Range: An innovation in small buildings security access that you can operate from your smart phone
If you’re responsible for security and access control in buildings with entry points starting at two or four doors and 16 inputs, there’s a new name to look out for: Inception. Developed by Inner Range Europe, Inception uses an innovative web-based engine that end users can control via any web browser on a computer, tablet or even a smart phone. Indeed, an entire system can be set-up, commissioned and operated from Inception’s web-based interface. “When it comes to security and access control solutions, round-the-clock control is vital,” explained Chantel Smith, business development manager at Inner Range Europe. “Inception’s web-based interface represents a budgetfriendly solution with secure and yet flexible remote accessibility. It’s connected to the local network, but end users don’t need to leave a computer running on site. Inception works with almost any device that has a web browser, and may be operated from wherever the end user happens to be.” An engineer will install the system using an industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, back-up of the database and downloading of all commissioning reports. Opting for a Wi-Fi adaptor as well not only affords end users flexibility, but also means that technicians don’t need to find an IP address or connect to the user’s local network. They can also employ the adaptor as a service tool with a view towards performing maintenance tasks on site. The Inception system can be expanded to 32 doors (64 readers using Inner Range’s SIFER Reader), 32 areas, 512 inputs and 512 outputs. These inputs and outputs are universal and may be used independently of each other to directly control door locks. All alarm communication is secured using standard 128 Bit AES encryption. www.innerrange.com
74
www.risk-uk.com
Green Gate Access Systems launches “UK’s first mobile solarpowered barrier and gate system” Described as “the UK’s first mobile solarpowered barrier and gate system”, SOSEC from Green Gate Access Systems can be used anywhere and easily moved wherever it’s needed. SOSEC combines a five-metre automatic traffic barrier with optional drop skirt and LED lights to control vehicles, and features a rugged, locked and self-closing gate for pedestrians. It can also be supplied as a gate or barrier on its own, depending on a given site’s perimeter protection needs. The product’s solar power and power storage abilities allow the barrier to operate up to 900 times each day even in an average British winter. SOSEC can be delivered with a battery store for up to one month’s use. Green Gate Access Systems’ managing director Neil Sampson, who’s also Powered Gate Section chairman of the Door and Hardware Federation, commented: “The SOSEC concept meets the challenges of combining security with mobility, solar power, durability and flexibility, all brought together in a single platform for end users.” www.solarbarriers.co.uk
Risk and crisis tool from Instinctif Partners assists Boards of Directors in measuring business resilience
CrisisOptic – a new risk and crisis tool developed by Instinctif Partners to ascertain a business’ ability to respond to a crisis – quantifies business resilience in ten key areas, from governance and risk management through to operational response. The solution generates a bespoke Business Resilience Score and visual dashboard presentation based on the examination of 112 data points. Instinctif Partners then prepares a brief report to accompany the score that can be used to inform policies, procedures and capabilities to strengthen risk management. www.instinctif.com
TechnologyinFocus October2016_riskuk_sep16 11/10/2016 15:44 Page 2
Technology in Focus
VCA sets new benchmark for thermal imaging with IP bullet cameras
Available at “a price point not previously seen”, VCA claims that, for perimeter detection applications, its new intelligent thermal IP bullet cameras with on-board analytics offer a compelling cost comparative to the usual method of combining standard surveillance cameras with passive detectors. “We believe we’ve set a new benchmark for thermal imaging cameras,” said Kevin Waterhouse, executive vice-president of global sales for VCA. “In addition to being highly affordable, our new VCA-6500TC and VCA650LD intelligent thermal IP bullet cameras are equipped with the VCA video analytics engine and packed with added-value features for real life practical benefits.” Waterhouse continued: “The VCA-650LD, for example, supports tMonitor, a temperature monitoring App which can be configured to generate alerts if there’s a danger of fire due to plant or machinery overheating. It can also be used to improve energy efficiency by monitoring temperature variations in real-time in any building environment.” With the introduction of these ONVIFcompliant models, VCA is aiming to change market perceptions that the cost of installing thermal cameras can only be justified in larger Government or utility projects. Both the VCA-6500TC and VCA-650LD cameras are supported by a wide range of leading VMS providers.
Vanderbilt provides BUS detector solution alongside cost-effective migration path to specialist SPC intrusion system
Vanderbilt has unveiled the SPC Enhanced EBUS Gateway to facilitate a cost-effective migration strategy for Sintony customers. This provides Sintony end users with the ability to enjoy all of the advantages of the latest security technology provided in the SPC range of products without needing to finance an entirely new infrastructure. Migrating from Sintony to the more sophisticated SPC range is now an option, as the SPC Enhanced E-BUS Gateway provides an interface between SPC X-BUS and Sintony E-BUS. Now, Sintony devices (ie existing power supply units, transponders and keypads) are recognised by SPC controllers. End users are able to maintain their existing infrastructure and, at the same time, take advantage of SPC’s powerful intrusion control functionality. The SPC Enhanced E-BUS Gateway has been designed to support a variety of installation options. Initial system set-up is simple and can be carried out via the SPC Web Browser, while system configuration involves standard SPC installer tools. Through the new SPC controller firmware, each Vanderbilt MAGIC detector is mapped as a virtual two-zone expander, in turn allowing an increased number of detectors on the SPC system. www.vanderbiltindustries.com
www.vcatechnology.com
Intratone introduces Video Mobile App and puts the ‘control’ into access control Intratone has launched a new App that allows users to control access to their property from anywhere in the world through their smart phone, tablet or mobile device. Ideally suited to Housing Associations, Social Housing projects and wider ‘care’ environments, and used in conjunction with Intratone’s existing door entry systems, the 4G-based Video Mobile App enables residents not only to ‘see’ who’s at their door, but also grant access to legitimate visitors such as friends, family and essential care workers. The App is simple to use: the visitor’s image appears directly on the mobile giving the user the option of opening the door directly, speaking to the visitor to confirm their identity and purpose for the call or hanging up.
Anthony Plasse, UK sales manager for Intratone, asserted that the App is already being well received. “Response to the App so far has been encouraging,” enthused Plasse, “and especially for smaller systems where the technology really adds a further level of both flexibility and control.” Plasse also explained to Risk UK: “As opposed to traditional ‘fixed’ door entry systems, the App can be carried with you and is therefore particularly useful for the elderly or less agile who now don’t even have to move to see who’s at the door. It also ensures that essential care visits will not be missed.” Intratone manufactures a range of costeffective door entry and access control solutions designed around the customer need. Its systems are installed across a range of Housing Association and Social Housing projects in the UK and on mainland Europe. www.intratone.com
75
www.risk-uk.com
paper ad_Layout 1 04/06/2015 17:59 Page 1
thepaper
Pro-Activ Publications is embarking on a revolutionary launch: a FORTNIGHTLY NEWSPAPER dedicated to the latest financial and business information for professionals operating in the security sector
Business News for Security Professionals
The Paper will bring subscribers (including CEOs, managing directors and finance directors within the UKâ&#x20AC;&#x2122;s major security businesses) all the latest company and sector financials, details of business re-brands, market research and trends and M&A activity
FOR FURTHER INFORMATION ON THE PAPER CONTACT: Brian Sims BA (Hons) Hon FSyI (Editor, The Paper and Risk UK) Telephone: 020 8295 8304 e-mail: brian.sims@risk-uk.com www.thepaper.uk.com
Appointments October2016_riskuk_jul15 12/10/2016 10:01 Page 1
Appointments
Adrian Kirk
Surveillance camera design and manufacturing concern 360 Vision Technology has announced Adrian Kirk’s promotion from national sales manager to director of strategic accounts. In his new role, Kirk will be responsible for helping the Cheshire-based business to achieve its planned growth strategy as the company continues to lead on innovation in the sphere of surveillance camera solutions. Commenting on his appointment, Kirk told Risk UK: “The last five years at 360 Vision Technology have witnessed the organisation’s manufacturing business go from strength to strength in a market that’s dominated by firms from the Far East. In an industry where it often seems to be a race to the bottom on price, we’ve managed to forge extremely strong relationships with our customers.” Kirk added: “In my new role, I’m looking forward to working closely with the national sales team on further promoting 360 Vision Technology’s full range of British-made CCTV and IP-based camera solutions.” Mark Rees, business development director at 360 Vision Technology, stated: “On behalf of 360 Vision Technology’s Board of Directors, I would like to congratulate Adrian on his promotion to director level and praise the significant contribution that he has made to the company’s ongoing success.” Rees continued: “Our high-end Predator camera is established as a leading ruggedised PTZ model. We now need to create awareness that we have a wide range of technically superior commercial grade cameras that can compete with imports from the Far East.”
Brian Laney ISD Tech, the life safety and security systems integrator, has appointed Brian Laney to the role of commercial operations manager based out of the company’s headquarters located in Camberley, Surrey. Reporting directly to ISD Tech’s managing director Nicky Stokes, Laney will be responsible for overseeing installation, commissioning, maintenance and monitoring procedures for new and ongoing projects as well as managing key existing accounts. Laney will lead ISD Tech’s UK-wide Engineering and Service Department, taking on a range of staff management disciplines as well as executive profit and loss responsibility.
Appointments Risk UK keeps you up-to-date with all the latest people moves in the security, fire, IT and Government sectors Rob Konowalchuk
Avantage Reply – the Reply Group company specialising in risk management consulting including regulatory change, compliance, finance and treasury within the financial services business sector – has named Rob Konowalchuk as an associate partner. With 16 years of experience in the financial services sector primarily across banking and capital markets, Konowalchuk has become an expert in a broad range of issues facing financial services firms, and particularly so in terms of prudential risk and regulation. Konowalchuk began his career at PwC in Toronto back in 2000 with a role in the Financial Services Assurance practice and, by 2013, had become director of the Financial Services Risk and Regulation practice in London. Leveraging his audit-focused background, Konowalchuk duly applies skills related to governance, controls, systems and data to design and deliver change and remediation programmes, many of them primarily driven by prudential regulation. As a partner at Avantage Reply here in the UK, Konowalchuk will now oversee the provision of risk and regulatory consulting services to a group of financial services clients. “I’m absolutely delighted that Rob is joining our growing London office,” stated Freddy Gielen, executive partner at Avantage Reply. “He brings a wealth of hugely valuable knowledge and experience to the business.” Laney brings with him 20 years’ security industry experience gained in a range of operational roles. He began his security career as an installation engineer and progressed through the ranks to senior management roles. Armed with a strong technical background, Laney has a deep knowledge of surveillance, access control and intruder alarm systems as well as monitoring services. During Laney’s tenure at Secom plc he held a number of senior operational roles and, most recently, headed up operations at Servest Security Services. Commenting on his new role, Laney informed Risk UK: “I’m relishing the challenge of managing an engineering and servicefocused team within a fast-growing company.”
77 www.risk-uk.com
Appointments October2016_riskuk_jul15 12/10/2016 10:01 Page 2
Appointments
Simon Davey
Fiona Chan
Fire detection specialist FFE has appointed Fiona Chan as its head of marketing. Prior to joining FFE, Chan was a product manager at fellow Halma Group company Keeler, the manufacturer of medical diagnostic equipment. Chan originally joined the Halma Graduate Development Programme in 2013 and achieved significant success in placements with a number of Halma companies across China and the US, working on market research and product development projects. As part of the Graduate Development Programme, Chan benefited from an assignment as marketing manager for Halma Group elevator safety specialist Avire. “Fiona’s rise up the ranks in Halma has been meteoric,” commented FFE’s managing director Mark Osborne. “We’re delighted to have her join us as head of marketing. I’m sure she’ll make an instant impact on the business.” Chan holds a BA, MEng and PhD in Chemical Engineering from the University of Cambridge. Born and raised in Hong Kong, Chan moved to the UK when she was a teenager. In addition to English and Cantonese, Chan speaks fluent Mandarin as well as conversational Japanese. FFE’s leading and hugely popular brands are the Fireray optical beam smoke detector and the Talentum flame detector.
Paul Winstanley
Continuing to invest in new markets through technology differentiation and services, Reliance High-Tech has appointed Paul Winstanley to the firm’s Board of Directors. “Reliance High-Tech’s reputation is built on delivering solutions that provide tangible benefits through technology,” explained managing director Terry Sallas in conversation with Risk UK. “We’ve recently entered a number of new sectors. Paul’s appointment supports our ambitious growth plan and reflects our ongoing commitment to expand the range of services that we offer.” Winstanley, who has held a number of senior roles across Government and plcs, brings with him a substantial track record of innovation in the security sector and strong experience of developing specialist and differentiated capabilities. Having served in several Board positions, including roles at QinetiQ in the US, Winstanley is ideally qualified for the challenges of this new role. “Reliance High-Tech is such a highly regarded security systems integrator, and I’m absolutely delighted to be joining the business,” commented Winstanley. “Technology enrichment will drive our next phase of growth, and I very much look forward to contributing towards that as well as helping to meet the future needs of our myriad customers.” The company has just posted a 28% increase in profits on a healthy £26.5 million turnover.
78
www.risk-uk.com
Evidence Talks – the Milton Keynes-based business which provides expert digital forensic systems and advice to law enforcement, security services and corporates around the world – has announced the appointment of Simon Davey as the company’s new head of sales. With a move to bigger premises imminent and a record-breaking sales year behind it, Evidence Talks has recently announced a number of new staff appointments of which Davey is the most senior. A highly experienced security solutions professional, Davey joins from information security consultant and reseller Bridgeway Security Solutions, where he was business development manager. With previous experience in related sectors gained at the likes of Foursys, Smartlogic and Dataware Technologies following an earlier career as a futures trader in the City of London, Davey boasts an enviable track record combining success in finance, technology and sales.
Steve Bailes
The Zaun Group has secured the services of an industry champion from a market leader to spearhead sales of its integrated portfolio and turnkey solutions. Steve Bailes joins perimeter security fencing specialist Zaun to serve in the key role of integrated business development manager. He comes to the business from a similar role across the past seven years with Gallagher Security Europe. Prior to that, Bailes was at Betafence where he worked alongside Chris Plimley (Zaun’s current head of sales for high security products). Among other projects, Bailes originated some of the fencing that Zaun ultimately installed for the London 2012 Olympic Games. Speaking about his new role with Zaun, Bailes informed Risk UK: “I’m looking forward to working together with the team to really grow the Zaun Group. That will entail bringing the physical systems together with EyeLynx’s electronics and the contracting option of Binns Fencing in order to provide turnkey solutions for our myriad clients.”
Project1_Layout 1 10/10/2016 15:10 Page 1
The Worshipful Company of Security Professionals PROUDLY PRESENTS
A kind of Magic
Registe Registered Regist stered dC Charity har arrity ty N o. 10 1 0886 86 658 58 No. 1088658
A Black Tie Spring Dance REMBRANDT HOTEL Knightsbridge, SW7 www.sarova.com
Saturday 4th March 2017 RECEPTION 6.30PM FOR 7.15PM
A TRIBUTE TO
Queen & Irie J Charity Raffle & Auction Carriages at 12.30 am The Rembrandt Hotel is located at 11 Thurloe Place, London SW7 2RS Tickets individually priced at £120 inc VAT , tables of up to 10 people available For more details please contact Carole Henley - chenley@ssr-personnel.com
THE EVENING IS SUPPORTED BY
ADDRESSABLE VADS TO BE HAD! C-TEC’s addressable visual alarm devices & sounders are here! Introducing C-TEC’s new range of UK-manufactured addressable visual alarm devices and sounders. Fully compatible with our XFP & ZFP range of XP95/Discovery fire panels, Base, Hi-Output and Compact variants are available, all certified to the relevant parts of EN54 parts 3, 23 and 17.
C-3-8 Base VAD c/w 96dB(A) Sounder
Hi-Output W-2.4-8.2 Wall VAD c/w 103dB(A) Sounder
Compact C-3-8 Ceiling VAD c/w 91dB(A) Sounder
• C-3-8 light distribution • Ideal for mounting under fire detectors in corridors, etc. • Sounder, VAD-only and Voice Sounder variants also available
• W-2.4-8.2 light distribution • 14mA alarm current @24V DC • IP33C rated • VAD-only and Voice Sounder variants also available
S • C-3-8 light distribution NOWESIGN G TEM UI A C A V • 14mA alarm current @24VDC LL +44 AILA DE ( 0 FOR )1942 3 BLE • IP21C rated A CO 2274 4 PY • Sounder, VAD-only and Voice Sounder variants also available
sales@c-tec.co.uk
SY
www.c-tec.com A PROUD BRITISH M
You’re safe with C-TEC
VAD
A
0359-CPR-00446
NU
ER
+44 (0)1942 322744
D
FA C T U
R
sep16 dir_000_RiskUK_jan14 12/09/2016 14:42 Page 1
Best Value Security Products from Insight Security www.insight-security.com Tel: +44 (0)1273 475500 ...and lots more Computer Security
Anti-Climb Paints & Barriers
Metal Detectors (inc. Walkthru)
Security, Search & Safety Mirrors
Security Screws & Padlocks, Hasps Fastenings & Security Chains
ACCESS CONTROL
Key Safes & Key Control Products
Traffic Flow & Management
see our website
ACCESS CONTROL & DOOR HARDWARE
ALPRO ARCHITECTURAL HARDWARE ACCESS CONTROL
ACT ACT – Ireland, Unit C1, South City Business Centre Tallaght, Dublin 24 Tel: +353 (0)1 4662570 ACT - United Kingdom, 2C Beehive Mill Jersey Street, Manchester M4 6JG +44 (0)161 236 3820 sales@act.eu www.act.eu
Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks, Waterproof Keypads, Door Closers, Deadlocks plus many more T: 01202 676262 Fax: 01202 680101 E: info@alpro.co.uk Web: www.alpro.co.uk
ACCESS CONTROL – SPEED GATES, BI-FOLD GATES
HTC PARKING AND SECURITY LIMITED ACCESS CONTROL – BARRIERS, GATES, CCTV
ABSOLUTE ACCESS Aberford Road, Leeds, LS15 4EF Tel: 01132 813511 E: richard.samwell@absoluteaccess.co.uk www.absoluteaccess.co.uk Access Control, Automatic Gates, Barriers, Blockers, CCTV
4th Floor, 33 Cavendish Square, London, W1G 0PW T: 0845 8622 080 M: 07969 650 394 F: 0845 8622 090 info@htcparkingandsecurity.co.uk www.htcparkingandsecurity.co.uk
ACCESS CONTROL
INTEGRATED DESIGN LIMITED ACCESS CONTROL
KERI SYSTEMS UK LTD Tel: + 44 (0) 1763 273 243 Fax: + 44 (0) 1763 274 106 Email: sales@kerisystems.co.uk www.kerisystems.co.uk
Integrated Design Limited, Feltham Point, Air Park Way, Feltham, Middlesex. TW13 7EQ Tel: +44 (0) 208 890 5550 sales@idl.co.uk www.fastlane-turnstiles.com
ACCESS CONTROL
SECURE ACCESS TECHNOLOGY LIMITED Authorised Dealer
ACCESS CONTROL
COVA SECURITY GATES LTD Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68
Tel: 01293 553888 Fax: 01293 611007 Email: sales@covasecuritygates.com Web: www.covasecuritygates.com
Tel: 0845 1 300 855 Fax: 0845 1 300 866 Email: info@secure-access.co.uk Website: www.secure-access.co.uk
Custom Designed Equipment ACCESS CONTROL MANUFACTURER
NORTECH CONTROL SYSTEMS LTD. Nortech House, William Brown Close Llantarnam Park, Cwmbran NP44 3AB Tel: 01633 485533 Email: sales@nortechcontrol.com www.nortechcontrol.com
ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES
UKB INTERNATIONAL LTD Planet Place, Newcastle upon Tyne Tyne and Wear NE12 6RD Tel: 0845 643 2122 Email: sales@ukbinternational.com Web: www.ukbinternational.com
• • • • • ȏ •
Indicator Panels Complex Door Interlocking Sequence Control Door Status Systems Panic Alarms &HOO &DOO $UD\ 6\VWHPV Bespoke Products
www.hoyles.com sales@hoyles.com Tel: +44 (0)1744 886600
Hoyles are the UK’s leading supplier of custom designed equipment for the security and access control industry. From simple indicator panels to complex door interlock systems.
BUSINESS CONTINUITY
ACCESS CONTROL, CCTV & INTRUSION DETECTION SPECIALISTS
BUSINESS CONTINUITY MANAGEMENT
VANDERBILT INTERNATIONAL (UK) LTD
CONTINUITY FORUM
Suite 7, Castlegate Business Park Caldicot, South Wales NP26 5AD UK Main: +44 (0) 2036 300 670 email: tradeshows@VanderbiltIndustries.com web: www.vanderbiltindustries.com
Creating Continuity ....... Building Resilience A not-for-profit organisation providing help and support Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845 Email: membership@continuityforum.org Web: www.continuityforum.org
www.insight-security.com Tel: +44 (0)1273 475500
sep16 dir_000_RiskUK_jan14 12/09/2016 14:43 Page 2
CCTV CCTV Rapid Deployment Digital IP High Resolution CCTV 40 hour battery, Solar, Wind Turbine and Thermal Imaging Wired or wireless communication fixed IP CE Certified Modicam Europe, 5 Station Road, Shepreth, Cambridgeshire SG8 6PZ www.modicam.com sales@modicameurope.com
CONTROL ROOM & MONITORING SERVICES ADVANCED MONITORING SERVICES
EUROTECH MONITORING SERVICES LTD.
Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring • Vehicle Tracking • Message Handling • Help Desk Facilities • Keyholding/Alarm Response Tel: 0208 889 0475 Fax: 0208 889 6679 E-MAIL eurotech@eurotechmonitoring.net Web: www.eurotechmonitoring.net
CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS
ALTRON COMMUNICATIONS EQUIPMENT LTD
DISTRIBUTORS
Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ Tel: +44 (0) 1269 831431 Email: cctvsales@altron.co.uk Web: www.altron.co.uk
CCTV
G-TEC Gtec House, 35-37 Whitton Dene Hounslow, Middlesex TW3 2JN Tel: 0208 898 9500 www.gtecsecurity.co.uk sales@gtecsecurity.co.uk
CCTV/IP SOLUTIONS
DALLMEIER UK LTD 3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH Tel: +44 (0) 117 303 9 303 Fax: +44 (0) 117 303 9 302 Email: dallmeieruk@dallmeier.com
sales@onlinesecurityproducts.co.uk www.onlinesecurityproducts.co.uk
ADI ARE A LEADING GLOBAL DISTRIBUTOR OF SECURITY PRODUCTS OFFERING COMPLETE SOLUTIONS FOR ANY INSTALLATION.
ADI GLOBAL DISTRIBUTION SPECIALISTS IN HD CCTV
MaxxOne Unit A10 Pear Mill, Lower Bredbury, Stockport. SK6 2BP Tel +44 (0)161 430 3849 www.maxxone.com
Chatsworth House, Hollins Brook Park, Roach Bank Road, Bury BL9 8RN Tel: 0161 767 2900 Fax: 0161 767 2909 Email: info@adiglobal.com
WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS, PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER. CCTV & IP SECURITY SOLUTIONS
PANASONIC SYSTEM COMMUNICATIONS COMPANY EUROPE Panasonic House, Willoughby Road Bracknell, Berkshire RG12 8FP UK Tel: 0207 0226530 Email: info@business.panasonic.co.uk
MAYFLEX Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ
Tel: 0800 881 5199 Email: securitysales@mayflex.com Web: www.mayflex.com
COMMUNICATIONS & TRANSMISSION EQUIPMENT
KBC NETWORKS LTD. Barham Court, Teston, Maidstone, Kent ME18 5BZ www.kbcnetworks.com Phone: 01622 618787 Fax: 020 7100 8147 Email: emeasales@kbcnetworks.com
THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESS CONTROL AND INTRUDER DETECTION SOLUTIONS
DIGITAL IP CCTV
SESYS LTD High resolution ATEX certified cameras, rapid deployment cameras and fixed IP CCTV surveillance solutions available with wired or wireless communications.
1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333 Email: info@sesys.co.uk www.sesys.co.uk
NORBAIN SD LTD 210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP Tel: 0118 912 5000 Fax: 0118 912 5001 www.norbain.com Email: info@norbain.com
CCTV SPECIALISTS
UK LEADERS IN BIG BRAND CCTV DISTRIBUTION
PLETTAC SECURITY LTD
SATSECURE
Unit 39 Sir Frank Whittle Business Centre, Great Central Way, Rugby, Warwickshire CV21 3XH Tel: 01788 567811 Fax: 01788 544 549 Email: jackie@plettac.co.uk www.plettac.co.uk
Hikivision & MaxxOne (logos) Authorised Dealer Unit A10 Pear Mill, Lower Bredbury, Stockport. SK6 2BP Tel +44 (0)161 430 3849 www.satsecure.uk
www.insight-security.com Tel: +44 (0)1273 475500
sep16 dir_000_RiskUK_jan14 12/09/2016 14:43 Page 3
EMPLOYMENT
INTEGRATED SECURITY SOLUTIONS
INNER RANGE EUROPE LTD FIRE AND SECURITY INDUSTRY RECRUITMENT
SECURITY VACANCIES www.securityvacancies.com Telephone: 01420 525260
Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead, Reading, Berkshire RG74GB, United Kingdom Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001 Email: ireurope@innerrange.co.uk www.innerrange.com
SECURITY PRODUCTS AND INTEGRATED SOLUTIONS
TYCO SECURITY PRODUCTS
IDENTIFICATION
Heathrow Boulevard 3, 282 Bath Road, Sipson, West Drayton. UB7 0DQ / UK Tel: +44 (0)20 8750 5660 www.tycosecurityproducts.com
PERIMETER PROTECTION ADVANCED PRESENCE DETECTION AND SECURITY LIGHTING SYSTEMS
GJD MANUFACTURING LTD
COMPLETE SOLUTIONS FOR IDENTIFICATION
DATABAC GROUP LIMITED 1 The Ashway Centre, Elm Crescent, Kingston upon Thames, Surrey KT2 6HH Tel: +44 (0)20 8546 9826 Fax:+44 (0)20 8547 1026 enquiries@databac.com
INDUSTRY ORGANISATIONS
Unit 2 Birch Business Park, Whittle Lane, Heywood, OL10 2SX Tel: + 44 (0) 1706 363998 Fax: + 44 (0) 1706 363991 Email: info@gjd.co.uk www.gjd.co.uk
PERIMETER PROTECTION
GPS PERIMETER SYSTEMS LTD 14 Low Farm Place, Moulton Park Northampton, NN3 6HY UK Tel: +44(0)1604 648344 Fax: +44(0)1604 646097 E-mail: info@gpsperimeter.co.uk Web site: www.gpsperimeter.co.uk
POWER
TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY
BRITISH SECURITY INDUSTRY ASSOCIATION Tel: 0845 389 3889 Email: info@bsia.co.uk Website: www.bsia.co.uk Twitter: @thebsia
POWER SUPPLIES – DC SWITCH MODE AND AC
DYCON LTD Unit A, Cwm Cynon Business Park, Mountain Ash, CF45 4ER Tel: 01443 471900 Fax: 01443 479 374 Email: sales@dyconpower.com www.dyconpower.com
THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY
SSAIB 7-11 Earsdon Road, West Monkseaton Whitley Bay, Tyne & Wear NE25 9SX Tel: 0191 2963242 Web: www.ssaib.org
STANDBY POWER
UPS SYSTEMS PLC Herongate, Hungerford, Berkshire RG17 0YU Tel: 01488 680500 sales@upssystems.co.uk www.upssystems.co.uk
INTEGRATED SECURITY SOLUTIONS UPS - UNINTERRUPTIBLE POWER SUPPLIES SECURITY PRODUCTS AND INTEGRATED SOLUTIONS
HONEYWELL SECURITY GROUP Honeywell Security Group provides innovative intrusion detection, video surveillance and access control products and solutions that monitor and protect millions of facilities, offices and homes worldwide. Honeywell integrates the latest in IP and digital technology with traditional analogue components enabling users to better control operational costs and maximise existing investments in security and surveillance equipment. Honeywell – your partner of choice in security. Tel: +44 (0) 844 8000 235 E-mail: securitysales@honeywell.com Web: www.honeywell.com/security/uk
ADEPT POWER SOLUTIONS LTD Adept House, 65 South Way, Walworth Business Park Andover, Hants SP10 5AF Tel: 01264 351415 Fax: 01264 351217 Web: www.adeptpower.co.uk E-mail: sales@adeptpower.co.uk
UPS - UNINTERRUPTIBLE POWER SUPPLIES
UNINTERRUPTIBLE POWER SUPPLIES LTD Woodgate, Bartley Wood Business Park Hook, Hampshire RG27 9XA Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk www.upspower.co.uk
www.insight-security.com Tel: +44 (0)1273 475500
sep16 dir_000_RiskUK_jan14 13/09/2016 12:28 Page 4
SECURITY
LIFE SAFETY EQUIPMENT
C-TEC CASH & VALUABLES IN TRANSIT
CONTRACT SECURITY SERVICES LTD Challenger House, 125 Gunnersbury Lane, London W3 8LH Tel: 020 8752 0160 Fax: 020 8992 9536 E: info@contractsecurity.co.uk E: sales@contractsecurity.co.uk Web: www.contractsecurity.co.uk
Challenge Way, Martland Park, Wigan WN5 OLD United Kingdom Tel: +44 (0) 1942 322744 Fax: +44 (0) 1942 829867 Website: www.c-tec.com
PERIMETER SECURITY
TAKEX EUROPE LTD QUALITY SECURITY AND SUPPORT SERVICES
CONSTANT SECURITY SERVICES Cliff Street, Rotherham, South Yorkshire S64 9HU Tel: 0845 330 4400 Email: contact@constant-services.com www.constant-services.com
Aviary Court, Wade Road, Basingstoke Hampshire RG24 8PE Tel: +44 (0) 1256 475555 Fax: +44 (0) 1256 466268 Email: sales@takex.com Web: www.takex.com
PHYSICAL CONTROL PRODUCTS, ESP. ANTI-CLIMB
INSIGHT SECURITY FENCING SPECIALISTS
J B CORRIE & CO LTD Frenchmans Road Petersfield, Hampshire GU32 3AP Tel: 01730 237100 Fax: 01730 264915 email: fencing@jbcorrie.co.uk
Units 1 & 2 Cliffe Industrial Estate Lewes, East Sussex BN8 6JL Tel: 01273 475500 Email:info@insight-security.com www.insight-security.com
SECURITY EQUIPMENT
PYRONIX LIMITED INTRUSION DETECTION AND PERIMETER PROTECTION
OPTEX (EUROPE) LTD Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311 Email: sales@optex-europe.com www.optex-europe.com
Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY. Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042 www.facebook.com/Pyronix www.linkedin.com/company/pyronix www.twitter.com/pyronix
SECURITY SYSTEMS INTRUDER AND FIRE PRODUCTS
CQR SECURITY 125 Pasture road, Moreton, Wirral UK CH46 4 TH Tel: 0151 606 1000 Fax: 0151 606 1122 Email: andyw@cqr.co.uk www.cqr.co.uk
BOSCH SECURITY SYSTEMS LTD PO Box 750, Uxbridge, Middlesex UB9 5ZJ Tel: 0330 1239979 E-mail: uk.securitysystems@bosch.com Web: uk.boschsecurity.com
SECURITY EQUIPMENT INTRUDER ALARMS – DUAL SIGNALLING
CASTLE
CSL
Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042
Salamander Quay West, Park Lane Harefield , Middlesex UB9 6NZ T: +44 (0)1895 474 474 @CSLDualCom www.csldual.com
INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS
RISCO GROUP Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton, Manchester, M24 2SS Tel: 0161 655 5500 Fax: 0161 655 5501 Email: sales@riscogroup.co.uk Web: www.riscogroup.com/uk
www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity
www.twitter.com/castlesecurity
SECURITY PRODUCTS
EATON Eaton is one of the world’s leading manufacturers of security equipment its Scantronic and Menvier product lines are suitable for all types of commercial and residential installations. Tel: 01594 545 400 Email: securitysales@eaton.com Web: www.uk.eaton.com Twitter: @securityTP
ONLINE SECURITY SUPERMARKET
SECURITY SYSTEMS
EBUYELECTRICAL.COM
VICON INDUSTRIES LTD.
Lincoln House, Malcolm Street Derby DE23 8LT Tel: 0871 208 1187 www.ebuyelectrical.com
Brunel Way, Fareham Hampshire, PO15 5TX United Kingdom www.vicon.com
www.insight-security.com Tel: +44 (0)1273 475500
Project1_Layout 1 12/09/2016 14:30 Page 1
Security? Itâ&#x20AC;&#x2122;s in our DNA . The ultimate deterrent against theft, burglary & robbery
SelectaDNA is one of the most effective security solutions to protect valuable property and assets within an organisation. SelectaDNA is available in a number of formats including property marking solutions to mark and protect assets and infrastructure such as IT equipment, tools, machinery and vehicles, a lacquer aerosol for the protection of valuable metals including copper cable, and a spray to deter commercial burglaries and robberies. SelectaDNA is a huge deterrent, as the one thing criminals fear most isâ&#x20AC;Ś DNA evidence. Discover how SelectaDNA can help protect your business www.selectadna.co.uk or call 01689 860757 to find out more.
SelectaDNA is a registered trademark of Selectamark Security Systems plc
DA0302/1