security know-how Archives - City Security Magazine https://citysecuritymagazine.com/category/security-know-how/ News and advice for security professionals Tue, 20 May 2025 14:38:21 +0000 en-GB hourly 1 https://wordpress.org/?v=6.8.3 https://citysecuritymagazine.com/wp-content/uploads/2021/08/Logo-Square-300x300-1.jpg security know-how Archives - City Security Magazine https://citysecuritymagazine.com/category/security-know-how/ 32 32 Level 4 Protective Security Adviser Qualification launched https://citysecuritymagazine.com/security-know-how/level-4-protective-security-adviser-qualification/ Tue, 20 May 2025 14:03:37 +0000 https://citysecuritymagazine.com/?p=14412 Level 4 Protective Security Adviser Qualification launched On 16th May, the Level 4 Protective…

The post Level 4 Protective Security Adviser Qualification launched appeared first on City Security Magazine.

]]>
Level 4 Protective Security Adviser Qualification launched

On 16th May, the Level 4 Protective Security Adviser Qualification was launched at Mitie’s headquarters at The Shard. Available firstly as a standalone Level 4 qualification, it will also soon become available as an apprenticeship.

Developed in collaboration with leading experts from The Security Institute, National Protective Security Authority (NPSA), National Cyber Security Centre, UK NACE, and Skills for Justice, this programme aims to equip security professionals with the skills needed across the four major disciplines of protective security – physical, personnel, technical and cyber.

As the threat landscape evolves, the need for formally trained, competent, and trusted protective security advisers has never been greater. The different areas of security often operate in silos in the real world and effective protective security risk management highlights the need for converged solutions. This qualification aims to set a new benchmark for integrated, scenario-based learning and assessment, aligned with national standards and government guidance across all security disciplines. The qualification will be available to both public and private sectors, fostering a baseline competence across the sector. Upward of 10,000 security professionals are expected to receive the training over the next five years.

The programme is assessed through a combination of written coursework and scenario-based tasks, ensuring that learners are not only absorbing theoretical principles but also applying them in practical, real-world contexts. Upon successful completion, candidates will receive a recognised qualification that demonstrates both competence and credibility in a rapidly growing field.

Emma Shaw, Managing Director, Intelligence Services, Mitie said:

“The launch of the Level 4 Certificate for Protective Security Advisers is a much-anticipated step towards upskilling the industry, making security a career of choice and strengthening national security capabilities.

“We are proud to be the first to deliver this qualification, and to be providing the training for such an important mission. With options for both industry newcomers and existing security professionals to access the qualification, we hope it will set a high bar across the board.”

A spokesperson for the Protective Security Centre, Government Security Group said:

 “The Level 4 Certificate for Protective Security Advisers has been developed as a revolutionary training programme for the security sector. This innovative qualification integrates the main security disciplines, addressing gaps in knowledge, skills, and behaviours to encourage and enable security convergence.

“Endorsed by all three National Technical Authorities, this is the first qualification of its kind. Our collaboration spans across Government, Industry Partners, and Academia, with the shared goal of cultivating the next generation of security leaders.”

Professor Simon Hepburn, CEO, The Security Institute said:

“The Level 4 Protective Security Adviser Qualification and Apprenticeship are a timely and vital contribution to the UK’s national security landscape. As a member of the core trailblazer group, The Security Institute is proud to have supported its development, which represents a significant step forward in formalising the skills, standards, and professional expectations of those working in protective security roles. In a complex threat environment, a converged approach to security training has been a pressing need for quite some time: with this award, we have set a new benchmark that will help build national capability and trust.”

 To find out more information about the apprenticeship and qualification, please visit the Security Institute website: https://www.security-institute.org/level-4-protective-security-adviser-qualification

Learn more about how the new qualification will enable security professionals to adopt a security convergence approach on the NPSA website:  https://www.npsa.gov.uk/blog/news/level-4-protective-security-qualification

Hear MI5 Director General Ken McCallum explain why he welcomes this new approach here on the NPSA Youtube account: https://www.youtube.com/watch?v=GLgYv2eGD5k

The post Level 4 Protective Security Adviser Qualification launched appeared first on City Security Magazine.

]]>
Securing Left Baggage in Public Spaces: Challenges and Solutions https://citysecuritymagazine.com/security-know-how/securing-left-baggage-in-public-spaces-challenges-and-solutions/ Wed, 04 Dec 2024 10:46:57 +0000 https://citysecuritymagazine.com/?p=14089 Securing Left Baggage in Public Spaces: Challenges and Solutions Managing left baggage in public…

The post Securing Left Baggage in Public Spaces: Challenges and Solutions appeared first on City Security Magazine.

]]>
Securing Left Baggage in Public Spaces: Challenges and Solutions

Managing left baggage in public spaces presents both logistical and security challenges. For instance, in early November, a section of Stratford town centre had to be cordoned off due to an unattended suitcase, causing significant disruption. Similarly, in Aberdeen, authorities established a cordon and closed surrounding areas to the public after a suspicious package was found unattended, underscoring the critical need for swift and effective responses to such incidents.

In places like shopping centres, transport hubs, and entertainment venues, abandoned items may range from harmless personal belongings to potential threats. Ensuring safety without disrupting daily operations is a complex task that requires vigilance, technological innovation, and comprehensive training for security staff. Todd Research, as a pioneer in security solutions, delves into the nuanced landscape of managing and safeguarding public spaces from the risks associated with left baggage.

The Context of Left Baggage Risks

In bustling public environments, unattended bags are common. A rushed commuter might forget their backpack on a train platform, or a distracted shopper could leave a package near a café table. In most cases, these items are innocuous and quickly reclaimed. However, the possibility of an abandoned bag containing hazardous materials or explosives cannot be ignored, particularly in the context of increased global security threats.

Left baggage poses a dual challenge. On one hand, the sheer volume of misplaced items in busy areas makes it impractical to treat every instance as a potential threat. On the other, the stakes of dismissing a genuine hazard are extraordinarily high. Striking the right balance between caution and efficiency is an ongoing struggle for security professionals.

The Challenges Faced by Security Personnel

Security staff are on the front line of managing left baggage. Their role involves rapid assessment, decision-making, and action—all under the pressure of ensuring public safety without causing undue panic or disruption. One of the most significant challenges is determining whether a left bag is safe or suspect. This is often easier said than done.

Human judgment plays a critical role in these situations, yet it is inherently fallible. Security personnel must quickly evaluate the context: the location of the bag, its appearance, and the behaviour of individuals nearby. A suitcase abandoned in an airport terminal might warrant more suspicion than a shopping bag left on a bench, but such judgments are far from straightforward. Biases, stress, and fatigue can all influence decision-making, leading to potential errors on either side of the spectrum—overreacting to harmless items or underestimating genuine risks.

Compounding the issue is the challenge of communication. When a left bag is identified, security teams must coordinate their response with management, emergency services, and sometimes the public. Clear and concise communication is critical to avoid confusion and maintain order. However, in high-stress situations, ensuring accurate information flow can be difficult, especially in crowded or chaotic environments.

The broader operational landscape adds another layer of complexity. Transport hubs like airports and train stations must contend with tight schedules and the movement of thousands, sometimes millions, of people. A false alarm or prolonged investigation into a left bag can lead to costly delays, frustrated travellers, and reputational damage. Similarly, shopping centres and venues must prioritise the customer experience. Visible disruptions due to security checks can deter visitors, impacting business operations.

Technological Innovations as Key Enablers

To address these challenges, technology has become an indispensable ally. Advanced screening systems provide detailed images of a bag’s contents, enabling security staff to make informed decisions without opening the item. These tools enhance accuracy, reduce the time needed for inspections, and minimise disruption in high-traffic areas.

Recognising the need for portable and efficient solutions, Todd Research has partnered with Videray to supply a cutting-edge range of handheld X-ray imaging equipment. These devices empower security teams to safely and quickly check the contents of baggage without requiring extensive equipment setups or intrusive methods. Compact, lightweight, and highly effective, Videray’s handheld scanners provide sharp imaging that helps operators make rapid, informed assessments. By integrating these tools into their security frameworks, organisations can significantly enhance their ability to manage left baggage while maintaining public safety and operational flow.

The Human Element: Training and Awareness

Despite the advances in technology, the human element remains irreplaceable. Effective security protocols hinge on well-trained personnel who can interpret data, make judgments, and respond appropriately. Comprehensive training programs are essential to equip staff with the skills needed to manage left baggage incidents. This includes not only technical knowledge but also soft skills such as communication, situational awareness, and conflict resolution.

Security personnel must also be educated on evolving threats and trends. For instance, perpetrators may use increasingly sophisticated methods to conceal dangerous materials, necessitating continuous learning to stay ahead of emerging risks.

Public awareness campaigns can further support these efforts. Encouraging individuals to report unattended items promptly and fostering a culture of vigilance help create an environment where security is a shared responsibility. Clear signage, announcements, and community engagement initiatives can all play a role in building this collective approach.

Balancing Safety and Normalcy

Ultimately, securing left baggage is a balancing act between safety and normalcy. Public spaces thrive on openness, movement, and interaction, making it impractical to impose overly restrictive measures. The goal is to create an environment where people feel secure without being burdened by invasive protocols or constant reminders of potential threats.

This balance can only be achieved through a combination of technology, training, and proactive measures. By leveraging advanced detection systems, fostering skilled security teams, and promoting public cooperation, it is possible to mitigate the risks associated with left baggage while preserving the vibrancy of public spaces.

Todd Research remains committed to advancing these efforts, partnering with organisations to develop tailored solutions that address their unique challenges. In a world where threats continue to evolve, our mission is clear: to provide the tools and expertise needed to protect what matters most. Through innovation and collaboration, we can create safer environments for everyone.

Jason Wakefield

Todd Research

The post Securing Left Baggage in Public Spaces: Challenges and Solutions appeared first on City Security Magazine.

]]>
Fire safety training for security and facilities staff from London Fire Brigade https://citysecuritymagazine.com/security-know-how/fire-safety-training-security/ Wed, 14 Feb 2024 12:05:15 +0000 https://citysecuritymagazine.com/?p=13464 Fire safety training for security and facilities staff from London Fire Brigade London Fire…

The post Fire safety training for security and facilities staff from London Fire Brigade appeared first on City Security Magazine.

]]>
Fire safety training for security and facilities staff from London Fire Brigade

London Fire Brigade has worked with partners to create an online training package, Project Kestrel, for security and facilities personnel to equip them with greater fire safety knowledge.

Those interested can enrol on to the course by visiting the Project Kestrel website

Project Kestrel was developed in partnership with the City of London Crime Prevention Association and the Corporation of London following a multi-agency exercise, which identified the opportunity to enhance the role of security professionals. The package is designed to give additional assurance to building owners and managers by providing trained personnel in fire safety, security awareness and emergency response.

There are over 115,000 licenced security officers within the London area providing security services to a range of properties from large corporate headquarters to industrial warehouse spaces, hospitals, schools and residential spaces. Often the first on scene, as they are based at the premises, a Project Kestrel trained security officer can respond to a fire alarm activation appropriately and take the necessary action required if a fire is discovered. Most importantly, they can ensure that the correct information needed is presented to firefighters when they arrive on scene.

London Fire Brigade’s Borough Commander for The City, James Chapman, said: “This is a great project, giving security officers protecting some of the UK’s most complex and impressive buildings the opportunity to enhance their skill set to help firefighters in the event of an emergency at their building.

“This initiative is a testament to the commitment and dedication of the partnership work between the City of London and the Brigade to improve our response and work together to better serve businesses and Londoners.”

Don Randall MBE, Chairman of the City of London Crime Prevention Association, said: “The current training a security officer receives only touches on the basics of fire awareness which makes Project Kestrel the ideal training programme for frontline security staff to enhance their knowledge.

“It’s also another fine example of public and private sector partnerships. It will heighten fire safety and security skills and give greater assurance and protection to the community.”

Rajeev Pradhan, Director of Operations at Bidvest Noonan who participate in the Project Kestrel programme, said: “Poject Kestrel complements the competencies that are required from all our frontline colleagues.

“The course has equipped our staff with an understanding of all aspects of fire safety and they receive a certificate from London Fire Brigade. It has an added benefit as it allows the learners to go through the six units at their own learning pace, so they are fully prepared to take the test.”

Participants will complete six training modules which will consolidate their knowledge of safety and security functions in relation to fire in the workplace. The course takes approximately three hours and awards 2 Continuing Professional Development (CPD) points.

The individual course enrolment fee is £25 which includes a donation to London Fire Brigade’s Fire Cadets programme and other LFB Fundraising initiatives and the Cross-Sector Safety and Security Communications charity.

Those interested can enrol on to the course by visiting the Project Kestrel website

The post Fire safety training for security and facilities staff from London Fire Brigade appeared first on City Security Magazine.

]]>
Eight important skills for security guard career development https://citysecuritymagazine.com/security-know-how/eight-important-skills-for-security-guard-career-development/ Mon, 06 Jun 2022 17:39:38 +0000 https://citysecuritymagazine.com/?p=11763 Eight important skills for security guard career development Our archive contains more than 1,000…

The post Eight important skills for security guard career development appeared first on City Security Magazine.

]]>
Eight important skills for security guard career development

Our archive contains more than 1,000 articles on security know-how, many relating to how security guard career development. Here, we have gathered together some of our most popular articles on this topic.

Working as a security guard or officer may be a temporary role for you, or it could be the starting point for a career in security.  There are many key skills to working in a security role. Our collection of articles from experts in the field provides insight into a range of important skills for security guards and how these can support security guard career development:

  • Maintaining your professionalism
  • Security search procedures
  • Completing the Daily Occurrence Book
  • Evacuation and dispersal procedures
  • Understanding behavioural detection awareness
  • What makes a good close protection officer?
  • Managing your health and wellbeing
  • The secrets to developing your career in security

Maintaining your professionalism

Angie Clark, Director at the Security Institute says: “Frontline operatives are regularly exposed to incidents involving conflict whereby they are verbally and sometimes physically abused – their action, inaction, or indeed, reaction being filmed in order to sensationalise across social media. Everyone will take a view. Many will take to commenting, few will support. How do we help ourselves? By maintaining your professionalism and implementing your training.” She explains the three basic stages for security guards to achieve this in her article here: Professional Standards in Security.

Security Search Procedures

One of key skills for security guards is carrying out search procedures. John Wyatt MBE, a well-known security and explosives expert spent nearly 25 years in the Army mainly as a Bomb Disposal Officer, wrote an article explaining search procedures.

Firstly, he defined search procedures: “These are the systematic procedures used to find weapons, explosives or other contraband. There are procedures for body (and bag), vehicle, building, area and route search. Each discipline has its ‘system’ to ensure that the chance of success in finding threatening or illegal items is that much higher than just checking those areas you think are most likely to hide items.”

He went on to explain that searching can be carried out in a variety of situations, the most common being at airports. “But there are many other examples where a restricted area may require this procedure, for instance at museums, at international events/exhibitions or even global events, or climate change conferences – anything that might be an emotive issue to which there could be demonstrations or a threat to the establishment.”

For details of the Bag Search, the Body Search and the Random Vehicle Search, read Guarding Search Procedures

Completing the Daily Occurrence Book

A further important key skills for security guards is maintaining accurate records of activities and events. In some locations, these will be recorded in the Daily Occurrence Book (DOB) and it will a paper document. In other locations, this is implemented as a digital  system.

In his article on the Daily Occurrence Book, Glanville Williams SIA Controlroom says: “DOBs are intended to provide a chronological and sequential record of all occurrences that have transpired over time, on a specific site. An occurrence for those who are wondering, is anything that has been seen, smelled, found, heard or done that may have a security implication. And of course, the vast majority of these are mundane and ordinary.

“However, situations will invariably arise, albeit infrequently, where what has been seen, smelled, found, heard or done is of such vital importance to the building owners or a third party such as the Police, that they must therefore be chronicled with a degree of care and meticulousness.”

Read his article to learn more about how to complete entries in the DOB and how these can be implemented online: Daily Occurrence Book

Evacuation Procedures

If it is necessary to evacuate the building or location where you are working, it is important for security guards to understand how people may react to evacuation requests. Also, it is a good idea for you to make yourself familiar with the emergency evacuation process or procedures.

Our article from Prof. Dr. G. Keith Still  explains some of the common responses to evacuation: Emergency Evacuation Procedures

Behavioural Detection Awareness (BDA)

The ability of security guards to identify a threat at the earliest opportunity is key – whether the threat is from physical violence, damage to property or more subtle threats such as the deployment of monitoring devices.  Behavioural Detection Awareness (BDA) can be used as a first line of defence in countering threats. BDA is the methodical, scientific and systematic appraisal of people’s behaviour when under stress in an environment through observation, assessment and decision-based operations.  Learn more on Behavioural Detection Awareness (BDA) in security from Cadence Woodland at Wilson James

What makes a good Close Protection Officer (CPO)?

Close protection is a specific security role where you assigned to protect an individual and his or her family. We asked Will Geddes – who has over 25 years’ experience in specialist security and is a regular commentator for international media on risk, security and terrorism – what makes a good CPO?  He began by saying: “it’s difficult to encapsulate the many diverse dynamics of an extremely complex service” but goes on to summarise some of the key skills required:

  • First impressions are important. Time-keeping (never be on time, always be early).
  • Always come to the task well-dressed (you can always dress-down, never up), dress conservatively, no jewellery (chains, earrings), good hygiene (not unshaven or too much cologne).
  • Always carry your passport and driving licence (rapid response is standard).
  • Discretion and confidentiality (never name your past clients).
  • Keep physically fit (train hard, fight easy).
  • Work hard on your ‘soft’ skills (‘hard’ skills are easy, ‘soft’ aren’t).
  • Always call your Principal and Client ‘Boss’, ‘Sir’ or ‘Ma’am’ (until they tell you differently).

You can read the full article here and find out Will’s tips for success: What makes a good Close Protection Officer

Managing your health and wellbeing

There is growing awareness and support for maintaining good health and wellbeing for everyone working in security. We asked contributors from across the security sector to share advice, resources and organisations they would recommend to support health and wellbeing. You can read their responses in Managing your health and well-being

If you have experienced a traumatic incident at work, are you taking steps to alleviate any ongoing mental health issues? In his article on PTSD, Patrick Rae explains how some of the symptoms: “The problem is that it is impossible to predict how anyone, even ourselves, will react to a disturbing event. We are all affected differently. An individual’s reaction may include feelings of shock, anger, distress and disrupted sleep, for example. This is not abnormal in the short term; most people, most of the time, will be able to cope with and resolve these symptoms by talking with partners, friends and also colleagues and managers at work. Find out more and how to find help in his article on Mental Health for Security Personnel

The secrets of developing your career in security 

It’s a fact of life that progression in your chosen career path may not be dependent solely on your performance.

The unwritten and unspoken rules for climbing the career ladder are revealed in ‘Empowering Yourself: The Organisational Game Revealed’ by Harvey J. Coleman.  Essentially, Coleman’s idea is that the selection process for upward mobility involves three elements of unequal proportion: Performance, Image and Exposure. A failure to understand these could be stopping your career progression in security. Read our full article: Developing your career in security by raising your profile

The post Eight important skills for security guard career development appeared first on City Security Magazine.

]]>
How to implement effective physical security measures https://citysecuritymagazine.com/security-know-how/how-to-implement-effective-physical-security-measures/ Mon, 06 Jun 2022 17:38:39 +0000 https://citysecuritymagazine.com/?p=11777 How to implement effective physical security measures Our archive contains more than 1,000 articles…

The post How to implement effective physical security measures appeared first on City Security Magazine.

]]>
How to implement effective physical security measures

Our archive contains more than 1,000 articles on security know-how, many relating to how to implement effective physical security measures. Here, we have gathered together some of our most popular articles on this topic.

Effective physical security measures are a critical part of your overall site security strategy. It is essential to take a well-researched and thorough approach, starting with the site audit and risk assessment, through to the specification and installation of your complete security solution. The measures you implement can begin with effective perimeter security, possibly including high security doors. Together these physical measures form part of the site access control and these can be further enhanced with electronic access control solutions. Surveillance using CCTV systems is generally seen as an essential component of physical security measures.  Read our articles from security experts with a range of advice and ideas on physical security measures:

  • Ten steps to successful perimeter security
  • High security doors – do we know what we’re walking through?
  • Best practice CCTV and CCTV and GDRP – are you compliant?
  • Access Control brings global benefits
  • Top Tips: for post and parcel delivery risk assessment
  • Hardening physical security against cyber criminals

Ten steps to successful perimeter security

Your physical security strategy must include making sure your perimeter is as safe and secure as possible.  Peter Jackson CEO, Jacksons Fencing provides ten key steps to installing successful perimeter security:

  • Planning, planning, planning
  • Assess the threat
  • Maintain business as usual
  • Assess what’s practical
  • Get as much advice as possible
  • Integrate with other security measures
  • Specify an effective solution
  • Use innovation to save time & money
  • Maintain your security
  • Future proof

Read the full article here: Ten steps to successful perimeter security

High security doors – do we know what we are walking through?

Master Locksmith Tom Jenkins of ATAJ Secure has spent 40 years securing doors and now holds training sessions on physical security standards. In his article here: High security doors – do we know what we are walking through? he provides some background on door security, why it’s needed and how it ends up in front of us, without most of us taking much notice. He writes: “Today, doors and associated locking hardware are required to comply with several regulations and standards. These include building regulations, such as Part B (Fire) and Part Q (Residential Security); British and European standards; and independent standards, such as those published by the Loss Prevention Certification Board (LPCB). Manufacturers invest in testing and certification to these standards in order to provide assurance of the performance provided by their doors and locking hardware. Of particular note is Loss Prevention Standard LPS1175. This standard which was first published over 25 years ago, previously defined eight levels of security (SR1 to SR8). The latest edition (Issue 8) defines a matrix of options covering eight threat levels (A to H) and six levels of delay, ranging from 1 to 20 minutes.”

Read full article here: High security doors – do we know what we are walking through?

Best practice CCTV operations

Richard Jenkins, CEO of NSI signposts the standards to follow for the management and operation of CCTV in his article: Best practice CCTV operations. This includes British Standard Code of Practice BS 7958. Richard writes: “This standard provides a framework for defining the objectives for the use of a system as well as ensuring records of images are kept securely, with a clear policy regarding the release of information to statutory prosecuting bodies, including the police, and members of the public.”

Read the full article here: Best practice CCTV operations

GDPR & CCTV – are you compliant? 

As well as the best practice outlined above, the new General Data Protection Regulation (GDPR) came into effect in May 2018. However, in his article: GDPR & CCTV – are you compliant? Andrew Crowne-Spencer of Clearway Services found that many organisations are not complying in relation to GDPR for CCTV systems. Check your compliance to ensure that you have:

  • Appropriate signage with accurate information
  • Carried out a GDPR risk assessment prior to CCTV deployment
  • Checked that DVRs (digital video recorders) are not left unlocked or unsecured so anyone, not just designated security personnel, has access to footage?
  • Ensured the lenses of CCTV cameras are not appropriately directed or they’re masked so that inappropriate footage is not recorded, and, if the data is shared with other parties, for example to monitor specific individuals, then innocent people are blurred out, something easily managed with the right software
  • Ensured that CCTV monitors are not viewable by the public
  • Trained staff to monitor the CCTV
  • Passwords and usernames are not on default settings or noted next to the equipment
  • Checked that if the images are to be shared with other organisations, eg the police, TfL, or other security service providers, you manage this appropriately to conform to Regulations

Read the full article here: GDPR & CCTV – are you compliant? 

Access Control brings global benefits

Access control is the way in which we allow (or prevent) access to a place or other resource. There are two main types of AC – physical and electronic. In his article Access Control brings global benefits, Andy Rainforth of Grosvenor Technology explains further: “Physical access control uses locks, doors, barriers and other equipment to facilitate or deny entry. Electronic access control allows or prevents access to a building or other private area by using IT to facilitate selective access. We usually talk about access control as a system or solution, because today’s electronic AC does more than just guard an entry point  – it commonly also allows for ongoing monitoring of personnel and their movements, and can be integrated with other third party security and building management systems.”

Read the full article here: Access Control brings global benefits

Top Tips: Post & Parcel Delivery Risk Assessment

Your security risk assessment and the resulting measures put in place will include how your organisation implements postroom security. This will include the physical location and security for delivery, equipment to consider and processes and procedures for staff to follow, taking into account the size and nature of your business.

The CPNI, in collaboration with the British Standards Institution (BSI), have produced detailed guidance on mail screening and security: PAS 97:2015 Mail screening and security.  In his article Postroom security: parcel delivery risk assessment Jason Wakefield, Todd Research provides nine key areas to consider for effective postroom security:

  1. Establish a delivery policy for post and packages
  2. Consider the location of your delivery room
  3. Put security in place for the loading bay / post room
  4. Have a single point of entry for all deliveries
  5. Train all staff dealing with post and parcels in suspect package recognition
  6. Consider implementing a hand sort – to identify the tell-tale signs that could make a package suspicious
  7. Consider the use of an effective x-ray machine for the scanning of parcels and letters
  8. Establish an action plan for dealing with a suspect package
  9. Review

Read the full article here: Postroom security: parcel delivery risk assessment,

Hardening physical security against cyber criminals

Cyber criminals will relentlessly look to exploit vulnerabilities in all technology, including physical security systems. How can organisations harden their physical security systems to protect them from cyber attacks? Paul Dodds from Genetec writes: “Physical security systems and devices, including CCTV cameras and access control systems, are smarter, more powerful and more connected than ever before. As part of both public and private networks, they are increasingly unified to facilitate their management, speed up communications, increase data sharing, and, most importantly, empower security professionals to keep people and organisations safe and secure.” He adds: “It makes sense to have a security strategy in place that protects against both physical and cyber threats.”

Read the full article here: Hardening physical security

The post How to implement effective physical security measures appeared first on City Security Magazine.

]]>
Expert insights into delivering effective security management https://citysecuritymagazine.com/security-know-how/expert-insights-into-delivering-effective-security-management/ Mon, 06 Jun 2022 17:37:13 +0000 https://citysecuritymagazine.com/?p=11768 Insights into security management Our archive contains more than 1,000 articles on security know-how,…

The post Expert insights into delivering effective security management appeared first on City Security Magazine.

]]>
Insights into security management

Our archive contains more than 1,000 articles on security know-how, many relating to delivering effective security management. Here, we have gathered together some of our most popular articles on this topic.

Security management requires wide-ranging skills, knowledge and experience. It involves careful management of risk, people and systems. Recent articles from our expert contributors support in-depth insights into how to deliver effective security management. We provide a broad selection here to help refresh and widen your knowledge:

Security past, present & future

In his article Security past, present and future, Joe Connell, Chairman of the Association of Security Consultants  considers the key areas that will influence effective security management in the next 20–30 years. He writes: “It is essential that, in order not to evade responsibility, those of us in the security sector use all the tools at our disposal today to shape that future. To enable us to do this, we must consider three key areas that security in the next 20–30 years will be influenced by:

  • The effects of global events
  • The success of partnerships and community ownership
  • The continued building of professionalism and trust”

Read his full article here: Security past, present and future

What makes good security?

Noah Price, Head of the G4S Academy highlights nine best practices that can help organisations stay one step ahead of the evolving threats:

  • Regular risk assessment, planning and testing
  •  Ongoing training for security personnel
  • Working in partnership with all stakeholders
  • Developing a security culture across the organisation
  • Balancing security and customer service
  • Taking advantage of new technology
  • Building in integration
  • Using shared information and best practice

Read the full article here: Nine key steps to good security

How prepared is your business for the next crisis?

Senior security professional Ian Pugh says the questions organisations should be asking themselves post-pandemic are “How prepared is your business, how prepared are your teams and are you doing enough to mitigate risk and prepare your teams for that next crisis?”.  He says we should remember the following about the next crisis:

  • It will happen, unfortunately, and it will be instant – without government briefings or advice telling you what to do.
  • It will lead to disruption to your business and, if significant enough, could lead to injury and death.
  • It will have an effect on your brand and could affect your reputation.
  • It could see senior directors in an enquiry answering questions about decisions they took or failed to take.

Read the full article here: How prepared is your business for the next crisis?

Capitalising on the benefits technology brings security

SSR® Personnel  carried out research into how technological innovation is transforming security and providing practitioners with powerful new capabilities. We have extracted five key pieces of wisdom from their contributors on how to understand the threats and benefits technology can bring security as part of effective security management:

  • Support the business
  • Understand the expanded nature of the security risk
  • Embrace the convergence of physical security and cyber security
  • Integrate Systems
  • Don’t forget the human touch

Read the full article here: The benefits technology brings security

Working from home – the new insider threat

Sarah Austerberry, Director at the Security Institute  analyses the potential threat that increased working from home brings. She says: “Businesses that have allowed flexi-time and remote working have reported increased benefits including office costs being reduced, staff retention increased with better staff morale and productivity and the ability to attract a wider talent pool. COVID-19 forced many businesses to move their entire enterprise to remote working.” But, she adds: “The potential for insider risks within our business is as they say a clear and present danger.”

Sarah asks: Are you ready to meet these new challenges? It is certainly time to dust off the security risk register and apply a COVID-19 lens to the contents:

  •  What does the new normal for your business look like?
  •  What risks have changed and why?
  •  Do you have confidence that the measures you have in place are effective?

Read the full article here: Working from home – Working from home – the new insider threat?

The road to innovative security through inclusion and diversity

Across the security sector many are asking how can we attract and retain the talent needed to reflect the diversity of the society it supports? Anna-Liisa Tampuu & Lisa Reilly Co-Chairs of the Security Institute’s Inclusive Security Special Interest Group (ISSIG) are clear that inclusion and diversity enhance the practices and innovation of the security sector. They believe that if the sector encourages a growth in opportunities for all individuals and provides a safe environment that truly nurtures diversity and inclusion, innovation and growth will follow.

Read full article here: The road to innovative security through inclusion and diversity

Mental Health for security personnel: the missing link in resilience planning

You have invested in mitigating risk and ensuring the resilience of your systems and property – but what about the mental health of your security personnel? Have you considered how they may be affected if they have to deal with a traumatic event, and the aftermath?

Patrick Rea, Director of PTSD Resolution, the charity for the mental health of UK Forces’ Veterans says: “There is much talk in the security industry about the issue of mental health, but many organisations still struggle to understand what they need to do to protect staff from the effects of trauma and how to align their training programmes, HR and management. This matters. Responsible employers support both the physical and mental welfare of their teams. All organisations have a duty of care to staff in relation to work-related incidents. There is a direct impact too in the risk of higher rates of absenteeism and costly errors in the workplace.”

Read full article here: Mental health for security personnel

The post Expert insights into delivering effective security management appeared first on City Security Magazine.

]]>
How does technology support security today? https://citysecuritymagazine.com/security-know-how/how-does-technology-support-security-today/ Mon, 06 Jun 2022 17:35:24 +0000 https://citysecuritymagazine.com/?p=11782 How does technology support security today? Our archive contains more than 1,000 articles on…

The post How does technology support security today? appeared first on City Security Magazine.

]]>
How does technology support security today?

Our archive contains more than 1,000 articles on security know-how, many relating to how technology supports security. Here, we have gathered together some of our most popular articles on this topic.

Technology is now integral to security. CCTV, access control systems and alarms, as well as integrated IT management systems can support the security operation to keep organisations and their people safe. Technology is continually evolving and we have a variety of articles on current developments:

  • Capitalising on the benefits technology brings security – a selection of views
  • Facial Recognition Security Technology: The Facts
  • Big data analytics in security – improve proactivity and value
  • Situational Awareness Software – the benefits of real-time insights
  • Door interlocking – how to extend the usefulness of security measures
  • The benefits of using Security Workforce Management software
  • Will technology replace the security guard?

Capitalising on the benefits technology brings security

SSR® Personnel  carried out research into how technological innovation is transforming security and providing practitioners with powerful new capabilities. We have extracted five key pieces of wisdom from their contributors on how to understand the threats and benefits technology can bring security. In summary:

  • Support the business
  • Understand the expanded nature of the security risk
  • Embrace the convergence of physical security and cyber security
  • Integrate Systems
  • Don’t forget the human touch

Read the full article here: The benefits technology brings security

Facial Recognition Security Technology: The Facts 

In their article, Lorraine Antiri from LA Business Partnerships and Jane Mason from www.issdigital.co.uk face up to whether facial recognition is as inaccurate and intrusive as the media would have us believe. Their article begins: “Security Facial recognition is a hot topic and there has been considerable media interest in the development and use of this technology.  Many companies are banking on it as a technological force that can solve complex problems and shape and improve our day-to-day lives. At the same time, the technology is highly controversial, with privacy, accuracy and its ethical use raising key concerns.” They go on to say: “However, the technology has now reached a level of maturity and accuracy allowing it to be deployed and integrated across a wide range of critical applications and sectors. In fact, there are vendors who can verify accuracy rates of 98% and above with false match rates (based on a 1:1 comparison) of 1 in a billion.”

Read the full article here: Facial recognition in security: the facts

Big data analytics in security – helping proactivity and value creation

Dr. Vibhor Gupta, Ph.D., Technology Lead (at time of writing) ASIS UK , writes about the benefits of using the principles of big data analytics and security intelligence to create value for security departments and their organisations. His article outlines how the wealth of data captured by security departments through their various activities or systems is being used in novel ways to identify and resolve risks.

To outline a few:

  • Site utilisation metrics – the degree to which a site being used
  • Key performance indicators for the service level agreements with the security operational teams
  • Identifying risk indicators, such as tailgating and unused access cards
  • Impact analysis in case of changes, such as change of security policies or existing technologies such as access cards and access control systems.
  • Supporting the green agenda by reducing the energy usage in areas which are not used heavily based on the data analysed.

Read the full article here: Big data analytics in security

Situational Awareness Software – the benefits of real-time insights 

Darren Read, MD at Amulet Security says:  “When it comes to physical security, knowledge is everything. Without a clear understanding of key information in the event of an incident, teams will be unable to prevent potential situations from developing from the outset or be able to react at speed and ensure rapid recovery.” He says: “With an accurate and shared situational awareness solution, information won’t be missed – it will instead be received and interpreted in a unified manner, enabling an effective, joined-up response effort while avoiding confusing and contradictory messaging.

Read the full article here: Situational Awareness Software – the benefits of real-time insights 

Door interlocking – how to extend the usefulness of security measures

Jon Jorundsson from ICT: “One example of technology in security is a technique called door interlocking. At face value, it may not seem as impressive as more visible types of security, but for me, it is a perfect example of using technology to make separate parts more valuable by using them together in a unified manner.”

He continues: “Door interlocks are also known as mantraps or sally ports, and have traditionally been used to help secure premises like prisons or zoos. They keep people or animals inside, while still providing safe access for authorised people. It ensures that only one door in the group can be opened at any one time, preventing a completely free path between the hazardous and safe sides.

“Using technology, you can extend the usefulness and functionality of door interlocking. No longer do you need separate systems to control interlocks and building access control. With a unified platform, access control, intruder detection, and building automation can all be integrated so you only need one system for programming and reporting.”

Read the full article here: Door interlocking – how to extend the usefulness of security measures

The benefits of using Security Workforce Management software

Debbie Howlett from TrackTik writes: “The security industry has matured from using a paper and pen-based approach to using security workforce management software to manage everything from rostering changes to billing, payroll, and more. If you are not using a security workforce management solution, you should ask yourself why not.”

She continues: “Not using a security workforce management solution can result in missed or double-booked shifts, spending too much time adjusting schedules, increased overtime costs, and over/under posting security officers. By contrast, a security workforce management solution can save time and money, increase client satisfaction, and streamline operations.”

Read the full article here: The benefits of using Security Workforce Management software

Will technology replace the security guard?

Steve Gardner, Head of Security, OCS, writes: “There is much said about the disruptive power of technology and conversation around it usually takes two distinct paths. Some discuss how it will help to make our personal and professionals lives better by streamlining processes and taking on the repetitive tasks that require precision. Others will be more concerned, querying the ethical limits and wondering whether it will one day replace large portions of the workforce.

He goes on to say:This pace of change combined with a multitude of emerging threats and global upheaval has naturally asked questions of the security industry, and in particular of manned guarding:

  • How will the role of security officer change as technology becomes more powerful?
  • Can we completely trust technology to keep people safe?
  • Will there even be a need for manned guarding in the not-too-distant future?”

Read his answers in the full article here: Will technology replace the security guard?

 

 

 

The post How does technology support security today? appeared first on City Security Magazine.

]]>