City Security magazine contributor https://citysecuritymagazine.com/author/contributor-csm/ News and advice for security professionals Tue, 14 Oct 2025 13:14:51 +0000 en-GB hourly 1 https://wordpress.org/?v=6.8.3 https://citysecuritymagazine.com/wp-content/uploads/2021/08/Logo-Square-300x300-1.jpg City Security magazine contributor https://citysecuritymagazine.com/author/contributor-csm/ 32 32 The strategic evolution of mobile access control in UK security https://citysecuritymagazine.com/security-technology/the-strategic-evolution-of-mobile-access-control-in-uk-security/ Mon, 13 Oct 2025 03:45:00 +0000 https://citysecuritymagazine.com/?p=14643 The strategic evolution of mobile access control in UK security What are the implications…

The post The strategic evolution of mobile access control in UK security appeared first on City Security Magazine.

]]>
The strategic evolution of mobile access control in UK security

What are the implications of the move from plastic keycards to phone-based access control systems? Is this just a technological upgrade or a more significant change in how organisations approach security?

The UK security landscape is experiencing a fundamental transformation as organisations increasingly abandon traditional plastic keycards in favour of smartphone-based access control systems.

This shift is particularly evident in the commercial real estate sector, where mobile access control solutions offer greater intelligence, flexibility, and convenience, whilst delivering enhanced security. Rather than simply being a technological upgrade, this represents a strategic evolution in how UK businesses approach security infrastructure.

The security risks with plastic access cards

Traditional plastic access cards present significant security risks that mobile solutions effectively mitigate. Unlike our phones, which have become essential personal items, access cards are frequently treated as disposable afterthoughts – easily lost, forgotten, or carelessly shared with colleagues. Consider the everyday reality: most people instinctively check their smartphone dozens of times daily and feel genuinely anxious when separated from it, yet that same plastic access badge often gets forgotten in yesterday’s jacket pocket or left behind on the kitchen counter.

When physical cards go missing, the security implications extend far beyond inconvenience. Lost credentials create immediate vulnerabilities, requiring emergency lockouts, temporary access arrangements, and urgent replacement procedures. Meanwhile, the missing card could potentially be exploited by unauthorised individuals for days or weeks before the loss is even reported.

The benefits of mobile credentials

Mobile credentials eliminate these risks entirely. When access control is integrated into the device people already guard most carefully – their smartphone – the likelihood of credential loss drops dramatically. The embedded security features within smartphones themselves, such as biometric authentication, encrypted storage, and real-time credential management, provide additional protection layers that plastic cards simply cannot match.

When a mobile device is compromised or lost, administrators can instantly revoke or update credentials remotely through cloud-based platforms. This capability provides immediate response to security incidents, contrasting sharply with the delays inherent in traditional card replacement processes.

The technology operates through two primary communication standards that ensure broad compatibility and security. Bluetooth Low Energy (BLE) offers flexible interaction ranges, whilst Near-Field Communication (NFC) provides secure close-proximity authentication similar to contactless payment systems. Both standards support iOS and Android devices, ensuring comprehensive compatibility across diverse organisational environments. Today, most modern systems also support digital wallets, further integrating access control into users’ daily digital routines.

Operational benefits drive adoption

The operational advantages of mobile access extend well beyond security enhancement. Centralised identity management simplifies onboarding procedures and access provisioning, particularly valuable for organisations with multiple locations. Security teams can manage credentials remotely, eliminating physical card distribution logistics and associated costs. Real-time reporting capabilities enable comprehensive monitoring of access activities, providing valuable insights for security audits and compliance requirements. This data-driven approach allows organisations and building managers to analyse occupancy patterns, optimise security protocols, and make informed strategic decisions.

Environmental considerations

With sustainability increasingly influencing UK business decisions, mobile access helps them to significantly reduce their environmental footprint, as it eliminates plastic card production and distribution. This aligns with green certification requirements including LEED and BREEAM, and other environmental standards increasingly valued by UK property owners and tenants. The subscription-based model of mobile credentials, whilst representing a shift from one-time card costs, often proves more cost-effective when considering the total cost of ownership, including card replacement, shipping, and administrative overheads.

Successful mobile access deployment requires careful planning and stakeholder alignment. Unlike traditional access control decisions typically handled by single departments, mobile access necessitates collaboration across IT, security, HR, and facilities management teams.

Organisations must evaluate whether existing access readers support mobile credentials or require upgrades, as some legacy systems may need replacement to accommodate new technologies. Understanding workforce device preferences – whether iOS, Android, or mixed environments – influences implementation strategy and user adoption rates.

Integration requirements present another critical consideration. Seamless integration with existing security systems, HR platforms, and building management systems ensures optimal functionality and user experience. Mobile access systems must also meet relevant UK regulations and industry standards, including data protection requirements under UK GDPR and sector-specific compliance mandates.

The future landscape

Mobile access control represents a critical component of modern security frameworks. According to the 2025 State of Security and Identity Report, 37% of organisations are already implementing mobile credentials, with another 32% planning deployment. The technology’s alignment with digital transformation initiatives, sustainability goals, and user expectations positions it as an essential element of future-ready security strategies.

Advanced features such as identity positioning are transforming the sector by providing anonymised real-time occupancy data. This evolution transforms access control from purely security-focused systems to comprehensive building intelligence platforms, enabling integration with HVAC systems, workplace applications, and space optimisation tools. Such capabilities allow facilities managers to automatically adjust lighting and climate control based on real-time occupancy data, creating smarter, more efficient buildings.

UK organisations considering mobile access should adopt a strategic approach encompassing comprehensive stakeholder consultation, infrastructure assessment, and phased implementation planning. Success requires selecting experienced technology partners offering proven expertise, future-proof solutions, and comprehensive support capabilities.

The transition to mobile credentials represents more than technological advancement – it signifies a fundamental shift towards smarter, more sustainable, and efficient security infrastructure.

Organisations embracing mobile access now will be better positioned to adapt to evolving security requirements, regulatory changes, and user expectations in the increasingly digital landscape transforming the region. As workplace dynamics continue to evolve and security threats become more sophisticated, mobile access control offers the flexibility and intelligence needed to maintain robust security whilst supporting modern business operations.

Jaroslav Barton

Regional Product Marketing Manager

PACS Europe,

HID Global

www.hidglobal.com

The post The strategic evolution of mobile access control in UK security appeared first on City Security Magazine.

]]>
Breaking Barriers Building Futures https://citysecuritymagazine.com/security-careers/breaking-barriers-building-futures/ Mon, 13 Oct 2025 03:44:00 +0000 https://citysecuritymagazine.com/?p=14638 Breaking Barriers Building Futures A career in security can begin anywhere and lead anywhere.…

The post Breaking Barriers Building Futures appeared first on City Security Magazine.

]]>
Breaking Barriers Building Futures

A career in security can begin anywhere and lead anywhere. For some, it’s a lifelong passion to serve on the frontline, for others, it’s a springboard into new skills, expertise, and opportunities they never imagined.

The strength of our industry lies in equity of opportunity and choice. Whether exploring specialist areas, thriving at the heart of operations, or stepping into leadership, there’s room to grow in the direction that’s right for you. With investment in development, inclusive learning, and clear development pathways, a career in security can empower anyone, regardless of background, to shape their own future. In this industry, it’s not just about filling roles; it’s about enabling futures.

Leading with authenticity

Effective leadership stems from a simple truth: there is no single way to lead. The intention must be to help people discover their personal leadership style, grounded in their own unique strengths, values, and experiences.

Blended development through interactive workshops, scenario-based challenges, and real-world problem-solving, equips tomorrow’s leaders with the confidence and operational judgment to inspire teams and drive excellence. Leadership is defined by the value created, not the title held.

A ladder of equitable opportunity

Apprenticeships are designed to open doors, enabling professionals to deepen expertise, gain formal qualifications, and develop skills that future-proof the industry.

From the Level 2 Professional Security Operative to a security-contextualised Level 5 Management Apprenticeship, each stage is aligned to the Private Security Profession Map, developed through industry-wide collaboration with the Security Skills Board to ensure clear, credible, industry-recognised development pathways.

Learning from experience

Often, the most important lessons come from those who’ve walked the path, and there is enormous value in seeking the support of accredited coaches and business mentors. Such relationships can offer one-to-one guidance and tailored support, helping security professionals to develop strategic thinking, build resilience, and navigate their career with confidence.

Technology that opens doors

The next generation of talent expects learning to be accessible, immersive, and inclusive. AI-powered video avatars and virtual reality scenarios are fuelling flexible, engaging, and impactful training experiences that adapt to different schedules and learning styles.

A collective responsibility

Creating an inclusive future for security, and positioning the industry as an exciting, fulfilling career choice relies upon breaking down barriers and providing meaningful entry-level positions with clear opportunities for advancement. As an industry, we must work together to ensure that no matter the location, role, or background, security professionals can access high-quality development and equitable career opportunities.

Wherever ambition leads, the path to get there must be accessible, transparent, and fair.

Amy Dean

Head of Communications and Community Relations

Wilson James Limited

www.wilsonjames.co.uk

The post Breaking Barriers Building Futures appeared first on City Security Magazine.

]]>
Joint IPSA & Security Institute Event Celebrates frontline heroes https://citysecuritymagazine.com/security-careers/joint-ipsa-security-institute-event-celebrates-frontline-heroes/ Mon, 22 Sep 2025 16:00:35 +0000 https://citysecuritymagazine.com/?p=14656 Joint IPSA & Security Institute Event Celebrates frontline heroes… The Security Institute and International…

The post Joint IPSA & Security Institute Event Celebrates frontline heroes appeared first on City Security Magazine.

]]>
Joint IPSA & Security Institute Event Celebrates frontline heroes…

The Security Institute and International Professional Security Association (IPSA) co-host a celebration of International Security Officers’ Day.

Sometimes the most powerful moments happen when an entire industry stops to say thank you, and that’s exactly what happened in July at the Meta offices in London for International Security Officers’ Day (ISOD) 2025.

The International Professional Security Association (IPSA) and The Security Institute (SyI) joined forces to create this year’s sold-out event. The two organisations, representing thousands of security professionals across the UK, collaborated with one sole purpose – to focus on what really matters: honouring the people who keep us safe every single day and recognising the contribution of half a million frontline security officers working 24 hours a day, 7 days a week, 364 days a year.

The event was about giving security officers the recognition they’ve always deserved but rarely received. Security officers are the first people you see when you enter a building, the last line of defence when things go wrong, and the steady presence that makes everyone else feel safe. Yet how often do we actually stop to acknowledge their contribution?

Security officers from across the UK didn’t just want to attend – they needed to be there; to be in a room where their work was celebrated, where their challenges were understood, and where their contributions were acknowledged by peers who truly get it.

The theme of the day, ‘Our Frontline: a celebration’, featured a series of insightful talks and discussions from Sal Naseem FRSA, Kristin Thue & Sarah Brown, highlighting the professionalism, challenges, and growing recognition of those working on the frontline of our industry. These sessions provided a valuable platform to reflect on best practice and the evolving role of security professionals.

The main event of the day was the IPSA Hall of Fame Awards, where security officers who had gone above and beyond and surpassed all expectations were formally honoured.

On the day the following officers were recognised:

  • Torrez Desrae Gordon, K4 Security (K4 Group): awarded for de-escalating a high-risk incident and saving a life
  • Sylwia Dudley Stuck, ISS A/S: twice acted under pressure, saving lives with calm leadership
  • Charlotte Wigg M.IPSA, SGC Security Services: for lifesaving response at a packed concert
  • Barry Higgins, ProFM Group: for helping a resident in crisis with compassion and care
  • The late Mumtaz Hanif, Interr: remembered for his kindness and worldclass service. His legacy continues through his son Muhammad Ibrahim, who now steps into the same noble profession

The security officers who lost their lives in the course of duty since 2020 were also remembered.

Satia Rai, CEO IPSA, said: “A heartfelt thank you to all our frontline security professionals and the wider IPSA membership – thank you for believing in us and the work we do. This event was our way of giving back to those who protect us every day. You’re seen. Respected. Supported.

“International Security Officers’ Day isn’t just one day, it’s every day, and this year, we made history. In collaboration with The Security Institute, and partners Meta & MOONHUB, we honoured the real heroes keeping us safe – with meaningful, custom awards that reflect their impact. Having started my career on the frontline 30 years ago, I know what it takes to do this job. It’s tough, often invisible. But absolutely vital.

“ To everyone in the security profession: your story matters. Your actions matter. You can achieve this too. The world is finally paying attention to what we do and it’s about time.”

What made ISOD 2025 truly special wasn’t just the event itself, but what it represented: proof that the security industry is stronger when we work together.  IPSA and the Security Institute chose collaboration over competition, creating something bigger and more meaningful than either organisation could have achieved alone.

Partnerships like this send a clear message to every security officer in the UK: your industry is united in supporting you.

Andrew Cooper

Director of Communications

www.ipsa.org.uk

The post Joint IPSA & Security Institute Event Celebrates frontline heroes appeared first on City Security Magazine.

]]>
The changing face of professional security https://citysecuritymagazine.com/security-careers/the-changing-face-of-professional-security/ Mon, 22 Sep 2025 15:40:33 +0000 https://citysecuritymagazine.com/?p=14629 The changing face of professional security Georgina Martin, Head of Talent Resourcing at CIS…

The post The changing face of professional security appeared first on City Security Magazine.

]]>
The changing face of professional security

Georgina Martin, Head of Talent Resourcing at CIS Security discusses recruitment and evolving hiring practices, highlighting the importance of an inclusive approach and diverse paths to learning for successful onboarding.

Rethinking recruitment: hiring for character, not just credentials

As threats to people, property, and physical assets evolve, so must the approach to hiring those who protect them. Security is no longer just about boots on the ground, it’s about people who understand customer service, emergency response, surveillance technology, access control systems, risk & threat, and securing people, property, and assets. In this new reality, organisations must rethink how they attract and retain top security professionals.

In an increasingly competitive and driven sector, recruitment has evolved from a reactive process to a strategic foundation of organisational success. As we step deeper into 2025, companies are reimagining how they attract, assess, and retain top talent. Recruitment is no longer just about filling seats; it’s about building future leaders-ready teams.

Traditional hiring practices often prioritise CVs, application forms, job titles, and formal qualifications. But these alone don’t tell the whole story of who a person is or what they’re capable of becoming. At the heart of effective recruitment lies a simple truth: the right people aren’t always the ones with the longest CVs, but those with the strongest values.

When recruiting, three core qualities should be emphasised: communication, professionalism, and decision-making under pressure. These aren’t just skills, they’re essential behaviours that reflect how someone operates in real-world situations. But beyond those competencies, looking for the right calibre should include those who are eager to learn, self-aware, reflective, motivated by personal growth, and guided by values, not just ambition.

Life experiences can be as valuable as job experience. Whether someone has navigated challenges, community projects, cared for family, travelled, studied independently, or reinvented themselves, those journeys shape resilience, empathy, and resourcefulness.

These strengths should be recognised, by not just asking. “Where have you worked?”; instead ask, “What have you learned? How have you grown? What do you value?”. This approach shifts recruitment from a checkbox exercise to a thoughtful conversation, aiming to understand the person behind the profile, their story, their mindset, their potential. Of course, experience and skills still matter, but the right attitude, character, and willingness to grow often outweigh a “perfect CV”. Some of the most successful candidates can come with non-traditional backgrounds allowing them to thrive because they align with a company’s culture and values.

Building a diverse and inclusive security industry

Equality, Diversity, and Inclusion (EDI) is no longer a “nice to have” or an internal checkbox exercise, it’s a mindset and a culture. It’s a long-term investment in your people and by extension, your brand, your customers, and your future. Companies that embrace inclusive hiring practices and build truly diverse teams are not only doing what’s right ethically, they are also unlocking better performance, innovation, and trust. The most successful hiring strategies today revolve around employer branding, personalised candidate experiences, skills-based hiring and a diverse skill set from situational awareness and de-escalation skills.

Inclusive hiring practices, blind resumé reviews, diverse interview panels, and equitable job descriptions aren’t just fair; they yield stronger teams. As when people feel included, valued, and supported, they don’t just stay longer, they perform at a higher standard. This is especially critical in service-oriented roles, where trust, communication, and professionalism are key.

The security industry has long been male- dominated. Modern recruitment strategies should actively seek to diversify the workforce, welcoming women, LGBTQ+, minorities, and neurodiverse individuals into roles at every level. A diverse team not only reflects the communities they serve, it enhances decision-making, creative thinking and team performance.

Recruitment in security is evolving just like the threats professionals are hired to deter. By adopting forward-thinking hiring practices, investing in training, supporting inclusive innovation, promoting diverse leadership and valuing personnel as an essential part of organisational success, companies can build security teams that are not just capable, but exceptional.

Building a diverse and inclusive security industry isn’t a one-time initiative, it’s a long-term cultural shift. It requires commitment from leadership, community engagement, and accountability and transparency to ensure a secure future is an inclusive one.

Investing in Learning & Development

In security, the role of people is just as critical as the systems, policies, and technologies in place. While surveillance cameras, access control, and risk protocols are essential, they are only as effective as the individuals trained to use, understand, and act on them.

As with many things in life, a balanced and varied approach can often lead to optimal results, by creating diverse pathways to learning and development and cultivating a diverse range of security professionals, from all walks of life and experiences.

Companies should strive for all colleagues, from entry level through to management and beyond, to develop themselves through blended learning. Promote diversity, by showing individuals there are new and alternative routes and pathways to formal qualifications or professional development, and encouraging and supporting them all to follow them. Embracing these different routes to education allows us to bring in “life experiences” as part of the development life cycle and therefore achieve true diversity – the practice or quality of including or involving people from a range of different backgrounds. These include:

  • Security Apprenticeships such as Level 2 Professional Security Operative, Level 3 Security First Line Manager, and the new Level 4 Protective Security Advisor.
  • Short Courses – regulated courses from SIA Refreshers and First Aid courses to Health and Safety and Fire Safety, as well as in-house, bespoke, and specialist webinars and networking.
  • Scenario-based training such as handling escalations, and active threat situations
  • Regular up-skilling on tools like CCTV systems, access control tech, and incident reporting software, plus legislation and regulation updates.
  • Leadership and communication workshops for front-line supervisors.
  • Cross-training to improve coordination with facilities, HR, emergency response, and external agencies.
  • Values-based training to reinforce professionalism, inclusion, and ethics.
  • E-Learning – this should not just be a “tick-box exercise”, rather a component of the wider learning culture. Short, sharp and focused learning for outside the classroom setting.

As security becomes more integrated with technology and workplace culture, the most valuable asset continues to be people – trained security professionals who understand their environment, lead with integrity, and act with confidence in uncertain situations. We’re not just training for today’s threats; we build teams that can handle tomorrow’s. And that starts by hiring the right individuals, developing their capabilities, and fostering a culture where learning never stops.

Comprehensive learning for real-world readiness

The effectiveness of security professionals hinges on their preparedness, expertise, and ability to adapt to diverse situations. In the security industry, one of the most powerful ways to achieve this is through targeted, high-quality training. The goal should be to equip every security professional with the skills, knowledge, and confidence to respond decisively to incidents – managing challenges dynamically while maintaining service excellence.

Providing rich, meaningful learning experience that combines technical skill-building with personal and professional growth ensures all are not only operationally ready, but also supported in their wellbeing, personal ambitions, and sense of belonging.

Core security knowledge areas

These cover the fundamental concepts and practices necessary to protect people, property, and physical assets from threats like unauthorised access, theft, vandalism, terrorism, and natural disasters. A few to highlight include:

  • Situational Awareness – Staying alert, observing surroundings, and assessing dynamic environments to identify potential risks and take proactive measures.
  • Radio Communications – Using radios and communication tools clearly, professionally, and effectively to ensure accurate, timely information exchange.
  • Report Writing – Producing clear, factual, and well-structured incident reports that uphold accountability and legal compliance.
  • Conflict Management – Applying techniques to de-escalate confrontational situations safely and professionally.
  • Emergency Response – Acting promptly and calmly in a range of emergency scenarios, following protocols, and making sound decisions under pressure.
  • Relevant Legislation – Understanding the legal frameworks that govern security work, including the rights and responsibilities of security professionals.
  • Uniform Standards – Maintaining a professional appearance that reflects our values and inspires public confidence.
  • Professional Conduct – Demonstrating integrity, accountability, and respect in all aspects of duty, both independently and as part of a team.
  • Chain of Communication – Following established communication lines to ensure clarity, consistency, and efficiency in information flow.
  • Chain of Command – Respecting operational hierarchy, recognising roles and responsibilities, and escalating matters appropriately.

Building a stronger future together

By fostering continual growth in core competencies and providing a supportive, inclusive environment, security professionals will be well-prepared to meet today’s challenges and tomorrow’s opportunities. By investing in people’s wellbeing, inclusion, and development, we are not just building skilled security professionals, we are strengthening our community and safeguarding our future.

Whether patrolling a facility or overseeing global security operations, every professional in the security industry contributes to a shared mission: safeguarding people, property, assets and peace of mind. With clear career pathways, a growing demand for skilled personnel, and ever-evolving challenges, security offers a rewarding and essential career across industries and sectors.

A workplace should be more than just a place to work, it should be a community where individuals grow, thrive, share ideas, and feel valued and included. It should be dedicated to building a culture that reflects values and supports every individual on their journey to success. That means putting equal emphasis on individual wellbeing, inclusion, and personal development, ensuring that everyone can perform at their best while feeling a genuine sense of belonging and purpose within the security industry and their career.

From hiring and vetting to uniforms, training, and the accumulation of valuable institutional knowledge, the costs of bringing someone on board go far beyond the initial salary; each new hire represents a significant investment. That’s why short-term thinking in recruitment is a fast track to wasted time and money. A strategic, long-term approach not only protects that investment but amplifies its return.

Georgina Martin

Head of Talent Resourcing

CIS Security

 

The post The changing face of professional security appeared first on City Security Magazine.

]]>
Strengthen your organisation’s personnel security with the NPSA maturity assessment tool https://citysecuritymagazine.com/risk-management/strengthen-your-organisations-personnel-security-with-the-npsa-maturity-assessment-tool/ Mon, 22 Sep 2025 03:41:00 +0000 https://citysecuritymagazine.com/?p=14631 Strengthen your organisation’s personnel security with the NPSA maturity assessment tool  NPSA research indicates…

The post Strengthen your organisation’s personnel security with the NPSA maturity assessment tool appeared first on City Security Magazine.

]]>
Strengthen your organisation’s personnel security with the NPSA maturity assessment tool

 NPSA research indicates that many UK businesses haven’t considered whether their personnel security is fit for purpose and are therefore carrying unknown insider risk.

The Personnel Security Maturity Assessment tool is designed by NPSA to help you understand personnel security maturity in your business and provide steps to manage insider risk.

The Personnel Security Maturity Assessment tool covers the seven key areas of personnel security

  • Governance and Leadership
  • Insider Risk and Management
  • Pre-Employment Screening
  • Ongoing Personnel Security
  • Monitoring and Assessment of the Workforce
  • Investigation and Disciplinary Practices
  • Security Culture and Behaviour Change.

It will provide you with an assessment in each of these key areas plus an overall assessment across all seven keys areas of your personnel security maturity. On completion, the tool will recommend actions to take that will guide you to the next level of maturity. It will also suggest digital learning, guidance and behaviour change campaigns that will help you achieve the appropriate level of personnel security for your business.

The tool is completely free with no fees or subscriptions, available now on the NPSA website.

Is the tool right for me?

This assessment tool has been designed for any business to independently use, regardless of the size or sector. If you’re unsure about its suitability, begin with a short triage questionnaire to assess your readiness for the full assessment.

These questions will help determine whether the tool will be useful in your business’s journey towards developing a personnel security programme and provide next steps so that your organisation gets the most value from using the full assessment tool.

If you are responsible for personnel security in your business or are in a role where you would like to get a snapshot of personnel security maturity, this tool can take you through that process and help you focus resources to build or maintain a proportionate personnel security programme.

The assessments can raise awareness of potential gaps and vulnerabilities in your current personnel security programme to your senior decision makers. It will help to focus attention on those specific areas and support bids for appropriate resources, with engaging colour-coded management information to tell the story.

If you have an insider risk stakeholder group, the tool can help shape your organisation’s action plans, support priorities and measure your organisation’s performance against key indicators.

How does the tool work?

You’ll answer five questions across each of the seven key personnel security areas. For each question, select the response that most closely describes your current business position. You may need to consult other business areas to gather accurate information. The tool allows you to pause and save responses, returning later without losing information.

To ensure the output of the tool provides you with a meaningful and fair reflection of your personnel security maturity, along with relevant signposting to appropriate resources, you are, of course, encouraged to respond as accurately as possible.

Based on your responses, you will be immediately provided with an assessment of your maturity in each key area with links to resources that will help you to improve, or maintain, your maturity in those seven key areas.

You will be also provided with an overall personnel security assessment for your business and indications on where improvement is required. This will be presented in graphical format for quick export into reports for senior leaders.

The questionnaire takes approximately 30 minutes to complete by one person who has an in-depth knowledge of the existing personnel security arrangements in your business. You may choose to record your own evidence and notes as you progress through the questionnaire to support your decision making.

You should look to repeat this assessment in the future, as your action plans are implemented and embedded, to help maintain oversight on the development of your personnel security maturity. This information could help influence proportionate resourcing and instil confidence in security-related decisions.

To access this tool please visit the NPSA website: https://psma.npsa.gov.uk

The post Strengthen your organisation’s personnel security with the NPSA maturity assessment tool appeared first on City Security Magazine.

]]>
From reactive to proactive: how data intelligence is reshaping UK security operations https://citysecuritymagazine.com/security-technology/from-reactive-to-proactive-how-data-intelligence-is-reshaping-uk-security-operations/ Wed, 17 Sep 2025 08:58:16 +0000 https://citysecuritymagazine.com/?p=14589 From reactive to proactive: how data intelligence is reshaping UK security operations Security operations…

The post From reactive to proactive: how data intelligence is reshaping UK security operations appeared first on City Security Magazine.

]]>
From reactive to proactive: how data intelligence is reshaping UK security operations

Security operations have a data problem, but it’s not what you think. You’re already collecting massive amounts of operational data through workforce management systems and ERP platforms – guard movements, client interactions, scheduling details, performance metrics. The problem is getting useful answers out of it.

Think about it like this. You don’t want to wait until quarter-end to know which contracts ran over budget. You want to know about what budgets ran over last week. Or, better yet, you want to know which contracts are in danger of going over budget before they do. If you’re using a sophisticated workforce and contract management software, then your systems already have all the data needed to answer these questions – the problem is aggregating the data in the ways that can get you the answers fast. Meanwhile, your teams are operating under the same onslaught of challenges: last minute absence management, contract gaps, employee churn and administrative overhead.

What putting your data to work looks like

Analytics platforms change how you use information you already have by addressing fundamental operational questions that drain management time and profitability. Consider the possibilities within scheduling alone, where advanced data analytics can make a tangible difference:

  • Schedule stability: Instead of wondering why certain shifts consistently require last-minute coverage, you will identify patterns in unfilled positions within master schedule templates and track what percentage of adjustments happen within 24 hours of shift start. This visibility helps operations managers understand whether scheduling problems stem from template design or execution issues.
  • Resource utilisation: Data analysis reveals how effectively you’re using different resource pools – subcontractors versus salaried employees, assigned teams versus flexible coverage. Historical patterns will show which sites consistently require overtime coverage and whether you’re deploying the right mix of personnel types for different contract requirements.
  • Predictive possibilities: Analytics may identify employees most likely to drop shifts within 24 hours of start time based on historical patterns, letting managers proactively plan backup coverage. A simple query like “Who is at highest risk to not show up for their shift?” could return employee names with their percentage of last-minute cancellations, enabling targeted scheduling decisions.
  • Reconciliation accuracy: Supervisors may quickly identify discrepancies between scheduled coverage and actual time records, ensuring accurate billing and payroll while catching potential compliance issues before they affect client relationships.

In these examples, real-time monitoring replaces monthly surprises through budget tracking that shows contract performance daily rather than at month-end, while alert systems flag problems immediately – missed checks, unusual activity, overtime costs climbing beyond targets.

A foundational step of making this future a reality for your business is ensuring you’re operating from a clean and curated data warehouse; one that supports a true single-source-of-truth database. This way, each team sees relevant, accurate information that can be spliced-and-diced based on their own unique needs, without dealing with overwhelming data clutter or digging through multiple systems.

The financial impact of organised data

These operational improvements translate directly into measurable financial benefits.

  • When schedule stability increases and last-minute adjustments decrease, overtime costs drop while client satisfaction improves. Fewer emergency callouts mean lower premium pay rates and reduced administrative time spent on crisis management.
  • Better resource utilisation delivers immediate savings. Understanding which sites consistently require overtime coverage allows for more accurate initial staffing, while optimising the mix between salaried employees and subcontractors reduces unnecessary labour costs. Accurate reconciliation between scheduled and actual time prevents billing discrepancies that can damage client relationships and delay payment cycles.
  • Predictive analytics around shift coverage reduces the financial impact of no-shows. When managers can identify high-risk employees and plan backup coverage in advance, sites avoid expensive emergency staffing solutions or potential contract penalties for inadequate coverage.

The cumulative effect can markedly improve contract profitability.

Moving forward with data as a differentiator

Security operations generate enormous amounts of data through normal business activities. This information sits in workforce management systems, contract management platforms and scheduling databases across the industry. Now, security companies have the opportunity to leverage the data in ways never before possible.

Data Factory, TEAM Software by WorkWave’s Wavelytics data warehouse solution, is on the forefront of delivering this kind of unprecedented business intelligence.

The post From reactive to proactive: how data intelligence is reshaping UK security operations appeared first on City Security Magazine.

]]>
How to recover an exchange server after a major failure: A step-by-step approach https://citysecuritymagazine.com/cyber-security/how-to-recover-exchange-server-after-major-failure-step-by-step/ Wed, 10 Sep 2025 15:53:02 +0000 https://citysecuritymagazine.com/?p=14583 How to recover an exchange server after a major failure: A step-by-step approach Emails…

The post How to recover an exchange server after a major failure: A step-by-step approach appeared first on City Security Magazine.

]]>
How to recover an exchange server after a major failure: A step-by-step approach

Emails are a crucial element of communication when it comes to business. If you are running an Exchange Server, it is vital to make sure that the server runs properly to ensure uninterrupted email communication. There are many things that can happen to an Exchange Server. When a disaster strikes, you need to ensure that the server is recovered in the least possible time, with minimal disruption and no data loss. In this guide, we will see how to recover Exchange Server and the data after a major failure.

In case of Exchange Server failure, the major concern of admins is recover the server within minimum time and without data loss. You can follow the below given steps to recover the server after failure within minimum downtime.

Pre-Recovery Checklist

In case of failure or any issue, you must first go through the following checklist:

  • Check the Event Viewer and the Exchange Server logs to confirm the extent of damage and allocate some time to troubleshoot, before going for a full rebuild.
  • Confirm that the backups are in order and available, in case a full restore is needed.
  • Confirm that the documentation of the server is fully updated. Ensure that the Operating System, Exchange Server version, and Cumulative Update level are updated, and roles are defined.
  • Have all the media and licenses in hand so that the server can be rebuilt to the same specifications and software level.
  • Confirm that the disaster recovery document is in place and the required people are informed and the teams are engaged.
  • Make sure to have a copy of the certificates used on the Exchange Server, with respective passwords.

Rebuild the Exchange Server

Rebuilding the Exchange Server involves creation of the same environment. As all the configuration is stored in the Active Directory Schema, you can use the recover server process to rebuild the same server. However, it is to be noted that certificates and custom send/receive connectors are not stored in the Active Directory Schema.

When rebuilding the server, the first part is to reset the computer account from the Active Directory Server using the Active Directory Users and Computers. For this, right-click on the computer name and click on the Reset Account. This will allow you to join the Active Directory domain using the same computer name.

From the documentation, you can build a server with the following specifications:

  • Same operating system
  • Same server configuration in CPU, drives/letters, memory, network cards/VLANs, and other specifications
  • Same computer name and IP addresses

Once this is complete, you should join the server to the Active Directory domain. Once this is complete, you can get the installation media of your Exchange Server and run the setup.exe file using the recoverserver parameter.

Although you would not see much activity, the server will be installed and reconfigured from the configuration found in the Active Directory Schema. The installation will take around 45 minutes, depending on the performance of server. Once this is done, you will have an operational Exchange Server without any mailbox data.

Recover the Databases

The next step is the recovery of databases. Since you have the same data drives with the corrupted or orphaned databases, the Exchange Server will fail to mount the databases. In this case, you can try using the EseUtil command to change the database state from Dirty Shutdown to Clean Shutdown.

You can run the below command to check the state of database.

eseutil /mh “M:\ExchangeDatabases\DB01\DB01.edb”

If the state is Dirty Shutdown, you can start by trying soft recovery using the command as given below.

eseutil /r E00 /l “M:\ExchangeDatabases\DB01\Logs” /d ” M:\ExchangeDatabases\DB01″

This command will replay the transaction logs in the folder and try to bring the database to a consistent state. After the command is completed, you can recheck the state of database. If the state is Clean Shutdown, you can mount the database.

In case the database state is still Dirty Shutdown, you can use the hard recovery mode but it is highly not recommended. This will guarantee data loss as it will create a new database and literally purge any items which are deemed as corrupted. In addition, it will take an extensive amount of time and storage to complete.

An Alternative Solution to Recover Databases

If the databases are corrupted, soft recovery can only fix minor corruption issues and hard recovery can result in data loss. On the other hand, recovering databases from backup will also result in data loss – from when the backup was taken to when the server failed. However, specialized Exchange database recovery tool, like Stellar Repair for Exchange, can reduce the recovery time to a minimum and guarantee recovery of databases.

The tool supports all versions of Exchange Server and can open any database of any size and in any state, without the need of a running Exchange Server. After a quick or extensive scan, you will be presented with the full structure of database. You can granularly export user mailboxes, user archives, shared mailboxes, disabled mailboxes, and public folders, to PST and other file formats. You can also export the EDB file data directly to a live Exchange Server database of any version with automatic mailbox matching, priority export, and parallel exports. The tool can also be used to migrate mailboxes and public folders to Microsoft 365 (Exchange Online).

Conclusion

When there is a major disaster on Exchange Server – be it standalone or with a high availability (Database Availability Groups), you must ensure that it will be recovered within the least possible time and without any major data loss. Though you can easily rebuild the Exchange Server, recovering databases without data loss is a challenge. Restoring databases from backup can result in data loss. For quick recovery of databases without data loss, you can take the help of an Exchange repair tool, such as Stellar Repair for Exchange. This tool can repair corrupted database (EDB file) of any size and recover all the mailboxes and other items with complete integrity.

Bharat Bhushan
Stellar Data Recovery

The post How to recover an exchange server after a major failure: A step-by-step approach appeared first on City Security Magazine.

]]>
Focus on a Chartered Security Professional: Andy Smith https://citysecuritymagazine.com/security-careers/focus-on-a-chartered-security-professional-andy-smith/ Tue, 19 Aug 2025 05:28:00 +0000 https://citysecuritymagazine.com/?p=14456 Focus on a Chartered Security Professional: Andy Smith Let’s start at the beginning of…

The post Focus on a Chartered Security Professional: Andy Smith appeared first on City Security Magazine.

]]>
Focus on a Chartered Security Professional: Andy Smith

Let’s start at the beginning of my involvement with computing: at school, I was a member of both the maths and chess clubs – the ideal person to be bullied, but for the fact I had a lot of cousins.

Being part of the maths club meant that when we got the first computers in school, I was one of those to start using them. They were the Acorn BBC computers that went along with the BBC series, The Computer Programme and Making the most of the Micro.

Fast forward a few years and after a short stint in the Royal Air Force, I ended up working for Acorn Computers in Cambridge. I got my first internet email address in 1986, so will celebrate using the internet for 40 years next year. Even back then hacking was a thing and I found the concept fascinating. This predated the first Computer Misuse Act of 1990. Not saying I was naughty before then…. I also achieved Bachelor of Computer Science in 1992.

From there I went to an internet service provider, where I started working with firewalls and other aspects of computer security. I installed the first official firewall in GCHQ in 1991. Having realised my potential, I became an independent consultant and soon realised I needed professional qualifications to support my career. During the process of attaining them, I worked for the European Space Agency in Italy and Germany, then General Motors in Belgium.

I got CISSP (Certified Information Systems Security Professional) in 2003 when I became a CESG (Communications-Electronics Security Group) Listed Advisor, which started a 13-year run of working as an advisor in government. I got my Master’s degree in Information Security in 2006.  I soon realised that a Royal Charter was respected and something I really needed to aspire to. I got Chartered IT Professional (CITP) and Chartered Engineer (CEng) via the BCS (British Computer Society) in 2009, as there was nothing specifically for security. I also studied hard and achieved an array of security qualifications.

I joined the Security Institute with a recommendation and sponsorship from colleagues, and achieved Fellow in 2008. When Chartered Security Professional came along, I applied and was number 23 to be admitted to the Register and the first Cybersecurity practitioner. That was back in March 2012. It was a hard process being the first cyber specialist, as the interviewers had no experience in this area. Most in the Security Institute at that time came from protective security backgrounds. I would like to think I helped expand their view a bit.

So why the Royal Charter? Like other Royal Charters, it’s highly respected, be that Chartered Accountant, Chartered Surveyor or Chartered Engineer. It commands this respect as it’s not easy to achieve and has a stringent peer review process to oversee entry. Chartered Security Professional covers all areas of security, from physical through personnel to cyber. Its key aspect is that it applies to those who operate at a strategic level or have strategic influence in the industry. In many of my consulting roles, my Royal Charters have helped to ensure I am taken seriously and respected as an expert in my field. I have now held CSyP for 13 years.

Since 2016 I have been one of the interviewers for CSyP and enjoy the learning experience I get from the interviews, in addition to giving back to the community and helping others progress in their career. CSyP is the gold standard and ultimate accolade for a security professional. It is therefore important that we keep the standards of entry to the Register high and I am humbled to be part of the process.

I think it’s a great goal to strive for and should be the ultimate accolade for anyone in any area of security.

Eur Ing Andy Smith MSc CEng CITP FBCS CSyP FSyI SMIEEE SIRM CISSP ISSAP ISSMP CCSP CISA CISM CRISC CDPSE

 

The post Focus on a Chartered Security Professional: Andy Smith appeared first on City Security Magazine.

]]>
Six Steps to creating a Secure Website https://citysecuritymagazine.com/cyber-security/six-steps-to-creating-a-secure-website/ Thu, 14 Aug 2025 13:37:54 +0000 https://citysecuritymagazine.com/?p=14563 Six steps to creating a secure website A secure website isn’t just about protecting…

The post Six Steps to creating a Secure Website appeared first on City Security Magazine.

]]>
Six steps to creating a secure website

A secure website isn’t just about protecting data – it’s about protecting your business, your customers, and your reputation. While security might feel technical or overwhelming, most breaches come from simple oversights.

Thankfully, there are clear and manageable steps you can take to reduce your risk, without needing a full IT department to make it happen.

Start with a strong setup

Every good website begins with a solid foundation. That means:

  • Using a trusted web host that offers strong security protocols
  • Installing a valid SSL certificate (so your domain shows as secure)
  • Keeping your content management system and plugins updated

Neglecting these basics leaves your site open to common automated attacks that scan the internet for vulnerabilities.

Keep passwords strong and unique

It might seem obvious, but password strength is still one of the biggest weaknesses across the web. Reused, predictable passwords make things easy for hackers, especially if login pages aren’t protected.

Avoid using default usernames like “admin” and consider tools like password managers to help generate and store complex passwords securely.

Even one compromised password can be enough to access sensitive data or lock you out entirely.

Limit access to those who need it

If you’re not the only person managing the site, make sure roles and permissions are clearly defined. Someone writing blog posts doesn’t need full admin access.

Outdated or unused accounts should be removed. Any access given to agencies, freelancers or temporary users should be reviewed regularly. This reduces the chance of accidental changes or malicious activity.

You should also keep a close eye on login activity and audit logs, especially if something doesn’t seem right.

Use Penetration Testing as a Service (PTaaS)

While good practices go a long way, there are vulnerabilities you simply can’t see. especially as your site grows or changes. A Penetration Testing as a Service (PTaaS) provider simulates real-world cyberattacks to test how your site would hold up.

These services are valuable for identifying flaws in security architecture, user access, or data handling. It’s particularly useful for e-commerce websites, platforms dealing with customer data, or companies with compliance needs.

Even just running penetration testing once a year can provide insights no basic scanner can match.

Always back up before you need to

Security is also about recovery. If your website were suddenly taken offline or corrupted, how quickly could you restore it?

Backups should be:

  • Stored offsite (not just on your web server)
  • Taken regularly, daily or weekly, depending on how often your site changes
  • Easy to restore, so you’re not left guessing when time matters most

Several plugins and services now automate backups in the background, but it’s worth testing your restore process now and again.

Complete website security, one step at a time

Website security isn’t a one-time fix; it’s a regular part of maintaining a modern online presence. While the risks are real, most threats can be prevented with straightforward steps and some ongoing attention.

From managing passwords and limiting access, to working with professionals like PTaaS providers when needed, keeping your website secure is more about consistency than complexity.

Paul Cronin
Rootshell Security

The post Six Steps to creating a Secure Website appeared first on City Security Magazine.

]]>
Why transparency is vital in the AI era https://citysecuritymagazine.com/security-technology/why-transparency-is-vital-in-the-ai-era/ Tue, 05 Aug 2025 05:18:00 +0000 https://citysecuritymagazine.com/?p=14435 Why transparency is vital in the AI era Mats Thulin, Director of AI and…

The post Why transparency is vital in the AI era appeared first on City Security Magazine.

]]>
Why transparency is vital in the AI era

Mats Thulin, Director of AI and Video Analytics, Axis Communications, discusses the role the modern security-tech industry must play in ensuring the safe, effective deployment of AI.

AI technology is transforming the security landscape.

Advanced video analytics offer new opportunities to refine and enhance the security process.

AI is changing the rules: human-centric security is rapidly transforming into human-augmented security. Our growing knowledge of AI, combined with innovations in the use of multiple data streams and algorithmic analysis, means we’re entering a new era, one in which AI filters out irrelevant information, leaving security teams sharper and more effective than ever.

But let us be clear: for all its growing power, AI is not a universal solution. It is a vital aid and a great driver of efficiency, but it is not an answer to every problem. Without careful deployment AI can get things wrong. It is effective in the right situations, but blind reliance on AI can lead to costly mistakes, false alarms, or overlooked threats. Its performance depends on quality data, thoughtful configuration, and a full understanding of its limitations.

The burden and importance of clarity

Responsibility for this understanding goes beyond the user. As AI-driven security solutions become more prevalent, it is vital that manufacturers, vendors and installers highlight what they can and can’t do.

Transparency is essential for building trust and enabling end users to make informed decisions. The security industry benefits from a head start in understanding and managing the use of AI – and its potential misuse. With that experience comes a responsibility to ensure that AI is deployed ethically and effectively.

Technology providers, therefore, must generate trust through transparency

Responsibility does not just mean ensuring that technology is used properly, it means being open about the capabilities of AI, the areas in which it will shine and those in which it might struggle. Businesses can only make informed decisions on their security if they have the full information.

They must be able to grasp how different systems perform under various conditions, because any misrepresentation of capabilities or limitations can lead to dangerous blind spots.

Safety through solution design

Some use cases are more sensitive than others. For organisations in critical infrastructure, manufacturing, or chemical processing, an undetected security breach or a system failure could lead to severe consequences or loss of life. In any industry, an AI tool that misses the presence of a trespasser or a mechanical malfunction could result in significant harm.

No AI solution offers universal functionality – its abilities are influenced by the environment in which it operates. AI is, in every case, situational. Certain analytics, for instance, may struggle in poor lighting or noisy environments, necessitating additional data sources or different positioning. Poor camera sensors may not be able to offer AI engines the data they need to perform analytics well. And biases, too, can impact the decision-making capabilities of AI.

If a model consistently struggles to detect movement in certain weather conditions, for example, it is critical that users are informed. Clarity about the limitations of AI helps create a good foundation of overall system design and allows businesses to construct more effective security solutions by avoiding flawed assumptions about AI’s capabilities.

Ensuring responsible use of AI

Technology providers have a secondary responsibility. The power and versatility of AI systems mean they have, like any technology, risks of exploitation and misuse. Some may employ AI in unethical or illegal ways. The security industry has always carried ethical responsibilities in areas such as surveillance. With AI, those responsibilities are equally important.

Measures must extend beyond vendors refusing to sell to customers known to use technology irresponsibly

AI’s growth demands a transparent approach throughout the sales channel. It is imperative that vendors, integrators and manufacturers work hard to foster trusted, open relationships with each other – and exhibit the discretion to work only with partners that align with their ethical and moral views on AI use.

Building an AI future – the right way

The pace of AI innovation makes it difficult to predict what security technology will look like in the coming years. Given this uncertainty, the need for an ethical discussion cannot be overstated: by prioritising openness and fostering strong industry relationships, security providers can positively contribute to a safe and responsible future for AI. Manufacturers should place trust at the top of their list of business goals.

Trust creates a significant competitive advantage in a crowded market, as vendors and integrators are far more likely to recommend a company that has shown a commitment to responsible behaviour over one which acts impulsively over something as powerful and divisive as AI.

As artificial intelligence evolves, the businesses which have demonstrated such a commitment today will be the ones trusted in the future. They are the ones that will lead the industry forward towards a smarter, safer world.

Mats Thulin

Director of AI and Video Analytics

Axis Communications.

Learn more about Axis approach to AI: www.axis.com/campaigns/ai-in-video-surveiliance

The post Why transparency is vital in the AI era appeared first on City Security Magazine.

]]>