Tag Archives: SMT Online

SIA and NFIB work to raise awareness of online security recruitment scam

The Security Industry Authority is working in conjunction with the City of London Police’s National Fraud Intelligence Bureau to raise awareness of an online recruitment scam.

The scam involves a series of phony online adverts offering training or jobs within the private security industry, using the names of real employees within genuine recruitment agencies.

After submitting a CV, the individual is offered a job and requested to pay an upfront fee of around £50 through an online money transfer to carry out a criminal records check or uniform fitting.

After paying the fee, the ‘recruitment agent’ may then claim that the e-money payment has failed and that the victim must submit a further e-money voucher code to continue with the application. This additional step is purely to maximise the fraudsters gain after establishing the victim’s interest.

The victim is then asked to attend an interview or induction/training session taking place at a multi-purpose business venue such as a conference centre.

The company offering employment is later found not to exist or the genuine recruiter has no knowledge of the contact details used by the suspects.

Don’t be a victim!

There are steps individuals can take to ensure that offers for training or jobs are real. These include the following:

• Research the company offering the service, check their website for contact details and make contact with them
• Be aware of advertisements with free e-mail addresses such as gmail or Hotmail
• Be aware of any advertisement requesting payment upfront, especially through online methods using e-money payments
• Research the training company using the SIA’s training provider search tool on the SIA website.

Also, please note the following:

• The cost of a criminal records check is included in the SIA licence application fee.

For further advice on these issues please visit the NFIB’s website: http://www.cityoflondon.police.uk/advice-and-support/fraud-and-economic-crime/nfib/Pages/default.aspx

Leave a comment

Filed under IFSECGlobal.com News

Tavcom Training website redesigned for 5 November launch

Today witnesses the launch of a totally revamped Tavcom Training website.

http://www.tavcom.com has been redesigned so that it’s easier for visitors to navigate and find the information they need – be it a list of Tavcom’s traditional award-winning, BTEC-certificated classroom courses or distance learning courses, which allow participants to learn in their own time and at their own pace.

“The website now has a section dedicated to the Tavcom Academy where students can learn about and sign up for a comprehensive CPD (Continual Professional Development) course, or they can purchase individual ‘Knowledge’ courses which cover a wide range of security systems subjects and also allows students to acquire valuable CPD points,” said Paul Tennent, Tavcom’s managing director.

“I believe the new version of our website is much easier on the eye as we have used images as links to various sections. Most importantly, it allows clients to quickly hone in on a learning training opportunity which is most relevant to their current levels of knowledge and personal circumstances.”

CCTV systems training at Tavcom

CCTV systems training at Tavcom

The launch of the new website follows on from the announcement that Tavcom has completed a major upgrade of its CCTV training facilities at the company’s Bishops Waltham Training Centre.

The investment made in the new training facilities, as well as the new website, reflects Tavcom’s determination to maintain its position as a market leading security systems training provider.

Tavcom offers security systems training courses to installers, operators, managers and designers of CCTV, network IP, intruder alarm, access control, fire alarm and all other types of electronic security systems.

A wide range of technical and non-technical courses cover all security systems-related fields including security management, Control Room operations, system planning and project management, structured cabling, disaster recovery, PAT testing and covert CCTV.

Tavcom’s workshops provide unrivalled ‘hands-on’ facilities which offer immediate opportunities to put theory into practice – a Tavcom tradition of blended learning that has refined the knowledge and skills of thousands of delegates over nearly 20 years.

Paul Tennent: managing director at Tavcom Training

Paul Tennent: managing director at Tavcom Training

Courses are available to meet the training requirements of security personnel at all levels, from foundation courses for those with little or no previous experience to highly advanced programmes for Control Room supervisors, security managers and company executives.

In total, Tavcom currently offers over 50 regularly scheduled training courses ranging from one-day seminars to five-day fully residential programmes.

Tavcom Academy and Technical Services Division

The Tavcom Academy specialises in the development, promotion and provision of accredited online e-learning courses to students from around the globe.

A subscription-based arm of the Academy offers online education, technical tips, industry news and generous discounts on Tavcom products and services to its members.

Tavcom’s Technical Services Division offers a wide diversity of expertise including product and system testing, security audits, risk assessment and training needs analysis.

‘Under one roof’, the company has assembled a highly qualified team of experts who can collectively provide professional advice on all aspects of electronic security.

All members of this hand-picked team are recognised as leading authorities in their respective fields, with unrivalled technical knowledge underpinned by a thorough understanding of ‘real world’ security issues.

For further information telephone +44 (0)1489 895099 or e-mail: sales@tavcom.com. Alternatively, visit: http://www.tavcom.com

Leave a comment

Filed under IFSECGlobal.com News

Former SIA chairman Baroness Ruth Henig joins SecuriGroup

Award-winning security firm SecuriGroup has announced the appointment of Baroness Ruth Henig as a non-executive director.

Baroness Henig joins SecuriGroup after completing two successful terms as chairman of the Home Office Regulator, the Security Industry Authority (SIA).

Baroness Henig’s commitment to security and policing is well documented, having held the post of chairman of the Lancashire Police Authority and the chairmanship of the Association of Police Authorities in England and Wales (which led to the award of a CBE in 2000 for services to policing).

The Baroness also served on the National Criminal Justice Board and Street Crime Action Group, chaired by the then Prime Minister, Tony Blair.

Baroness Henig was appointed as Deputy Lieutenant for Lancashire in 2002 and made a life peer in 2004 as Baroness Henig of Lancaster. As a sitting member of the House of Lords, Baroness Henig takes her place on the European Scrutiny Committee on Foreign Affairs and is a member of the Independent Policing Commission.

Prudent timing for the appointment

The timing of this appointment is particularly prudent for SecuriGroup as the Home Office prepares to reform the Private Security Industry Act 2001 and create a new regulatory system.

Baroness Henig was instrumental in devising the new regulatory strategy and her in-depth knowledge will ensure that SecuriGroup is well placed to meet the requirements of the new regime.

Baroness Henig said of her appointment: “I am delighted to join the SecuriGroup Board of Directors. The new regulatory framework will provide exciting opportunities for a company with such a strong reputation, and I’m keen to play my part in delivering further success to the organisation.”

Russel Kerr, the managing director of SecuriGroup, said: “This appointment helps to underline our ambitions and further strengthens our credentials. Our organisation continues to expand well ahead of the industry average, and this announcement will increase our profile even further.”

SecuriGroup has navigated the recession well and has experienced double-digit growth throughout the downturn, doubling its turnover in less than five years.

Board exhibits extensive security experience

The Baroness joins a Board with extensive security experience which is chaired by retired Strathclyde Police deputy chief constable John LS Malcolm QPM.

The SecuriGroup Board also includes former assistant chief constable and head of counter-terrorism for Scotland, namely Allan Burnett QPM, and the former joint regional liaison officer and civil contingencies expert Colonel John Kelly MBE.

Leave a comment

Filed under IFSECGlobal.com News

The Security Institute announces Emma Shaw as its new chairman

The Security Institute, the UK’s largest membership body for security professionals, has announced that Emma Shaw is its new chairman.

Working alongside her fellow directors, Emma will take the organisation to the next stage of its development by ensuring that it continues to meet the needs of its growing membership.

Shaw is the founder and managing director of Esoteric, a well established electronic sweeping, counter espionage and intelligence gathering company based in the UK. An MBA graduate and a Chartered Security Professional (CSyP), Emma’s early career was spent with the Royal Military Police, followed by a period working in the UK Security Service.

Having previously been vice-chairman of The Security Institute, with responsibility for its strategic direction and finances, Emma takes over from Mike Bluestone CSyP, who had been in the position since 2009.

Bluestone stated: “It has been a pleasure and a privilege to lead The Security Institute over the last four years and I will continue to promote the excellent work that it does wherever and whenever I can. Having worked closely with Emma during that time, I’ve no doubt that the Institute is in the best possible hands and I wish her all the best.”

Refinement of the membership process

Emma has served on the main Board of The Security Institute since 2007. Having also been both registrar and chairman of the Validation Board for several years, she has been instrumental in the ongoing refinement of the membership process, ensuring it remains both current and relevant.

In addition to her work at The Security Institute, Emma is the southern region chairman of the Defence Industry Security Association (DISA) and a council member for City and Security Resilience Networks (CSARN). An active participant in the development of industry standards and Best Practice techniques for technical security counter measures, Emma has worked closely with Skills for Security on National Occupational Standards and with the National Security Inspectorate on Codes of Practice.

No stranger to industry acclaim, Emma was a finalist at the Association of Security Consultants’ (ASC) Imbert Prize 2012, a finalist for Director of the Year at the 2013 Toast of Surrey Awards and won the Security Consultant of the Year 2012 accolade at the 2012 Security Excellence Awards.

Emma also featured in the list of recent IFSEC Global ‘Top 40 Influencers in Security’.

Commenting on her new role, Shaw said: “I feel both delighted and privileged to have been elected to lead The Security Institute. Although we are a UK-based organisation, our future direction, approach and thinking should also reflect our ability to support our members globally. It’s my intention to achieve this objective via a cohesive strategy that makes use of external communications to develop and influence the shape of our industry, as well as supporting our members in their professional career development. The Security Institute has many dedicated volunteer security professionals and I’m looking forward to working with them to shape the organisation’s future.”

Leave a comment

Filed under IFSECGlobal.com News

Lone Working: why risk assessments are vital

If you look on Wikipedia, risk assessments are defined thus: ‘The determination of the quantitative or qualitative value of risk related to a concrete situation and a recognised threat.’

Such assessments – or security risk analyses – are essential for every organisation. Only by conducting these exercises can those who hold the purse strings be absolutely sure that the controls in place – and the expenditure aligned with them – are fully commensurate with the risks to which any given organisation is exposed.

Drilling down to the micro level, it’s also true to say that risk assessments around employees are equally vital. No more so than when it comes to members of staff who work alone. The Corporate Manslaughter Act and companies’ Duty of Care to staff as part of today’s CSR policies absolutely set that assertion in stone.

What factors, though, demand most consideration for a genuinely collaborate risk assessment procedure to be executed between manager and employee?

Fundamental questions must be asked

Certain fundamental questions must be asked. For example, can the work defined be carried out safely by a lone individual? What arrangements need to be put in place to make certain a lone worker isn’t exposed to a greater risk than those who operate in tandem?

In essence, the risk assessment for any lone worker has to pinpoint all potential hazards, identify those who may be affected by the perceived risks and outline the right control procedures.

Looking specifically at hazards (or threats), does the workplace present a special risk to the lone worker, perhaps because of the environment, its location or any degree of unfamiliarity with their surroundings?

From a Health and Safety perspective, is the working environment appropriate in terms of, say, lighting and heating? Are welfare facilities – toilets, drinking water, etc – on site both adequate and accessible? And what about immediate access to First Aid facilities should they be required?

From a pure security point of view, does the lone worker have access to suitable communication devices for summoning assistance? Needless to say this area is always important, and particularly so if there’s any perceived or real risk of violence associated with the work activity or location.

Is there an emergency plan in place, and is it appropriate? Has the employee received specific training in how to respond to emergency situations that may arise in the course of their duties when working alone? Variables such as fire safety or the need for electrical shutdowns ought to be considered.

For their part, control measures are focused on reducing risk and the consideration of alternative work methods/patterns, additional training (around, say, emergency procedures and personal safety) and adequate supervision.

Enhanced on-site security (courtesy of CCTV and personal alarm systems) will likely be part of the mix, so too increased lighting at entrances, exits and for external zones like car parks.

When, where and how to seek guidance

As a ‘must’, all lone workers have to be privy to the necessary information that assists them in dealing with everyday scenarios but they should also understand when, where and how to seek guidance or assistance from others should they be confronted by threatening or otherwise abnormal situations.

Generally speaking, the level and extent of training required for lone working employees depends largely on the nature of the work to be conducted in addition to the knowledge and experience of the individuals in question. It stands to reason that younger, less ‘worldly-wise’ individuals and those new to the company have to be inducted by way of more training.

Supervision must also be paramount. The level and degree of this ‘mentoring’ is determined by the nature of the risks involved in tandem with the aforementioned abilities and experience of each lone worker.

Manual (panic alarms) or automatic (motion sensors) warning devices may come into the mix, along with periodic telephone contact/site visits from managers at set intervals. Regular contact (by way of dedicated radios or telephones) or perhaps ‘end of shift’ or ‘end of task’ contact could be initiated.

At the end of the risk assessment, every lone worker must be made fully aware of the outcome and of all necessary control measures to be orchestrated.

Brian Sims BA (Hons) Hon FSyI
Media Solutions Manager
UBM Live Security and Fire Portfolio

Leave a comment

Filed under IFSECGlobal.com News

Access control: what happens next?

For some time now, an ongoing drive for converged solutions has dominated the security debate across corporate management. A simplistic version of events is that task consolidation helps to realise reduced costs. While that may be an undercurrent bolstering the convergence movement in these austere financial times, there’s far more to it than mere pounds and pence.

Converged solutions actively assist companies in meeting their regulatory requirements and obligations while helping to enforce consistency of policy.

At least in part, the convergence movement is motivated by due recognition that business assets are increasingly information-based. In today’s commercial landscape, information assets demand every bit as much attention – if not more, some would argue – as do their physical cousins.

One need only converse with recognised experts from ASIS, ISACA and ISSA – co-founders of the Alliance for Enterprise Security Risk Management – to support and develop that statement.

This overriding desire for convergence is mirrored in the access control solutions market. For operational convenience, end users now increasingly crave a single credential that will allow – in the first instance – access to buildings, followed swiftly by an ability for personnel to log on to the company network with that same credential and, subsequently, access remote networks without the necessity for any one-time password tokens or key fobs.

Such solutions are not just about convenience, either. Importantly, it’s a more secure response to the situation. Why? Converged access control permits far stronger authentication throughout a given company’s IT backbone and doesn’t solely focus on defence at the perimeter.

By extension, organisations are able to leverage their existing credential investment, appending logical access control for network access on the way towards energising multi-layered and fully-interoperable security solutions that truly span their network, systems and physical facilities.

Trends in the access control sector

That’s one trend in the access control space, then, but what of the others as we rapidly approach the 40th Anniversary edition of IFSEC International?

Card technologies are themselves continuing to evolve from prox to magstripe and on to ‘smart’ variants. Contactless smart cards founded on open standards are viewed by many as the ‘Holy Grail’. More and more layers of additional security are being added, be they purely digital or visual. Meantime, card storage capacities are expanding to accommodate the latest biometrics as well as other multi-factor forms of authentication.

One of the $64,000 questions here is: ‘Will Near Field Communication (NFC)-enabled smart phones come to replace physical smart cards in the years ahead?’ Received wisdom suggests the answer is: ‘No’. It’s more likely the case that the two will co-exist as part of overall physical access control solutions.

In terms of developing NFC-enabled projects, the security sector spent much of 2012 laying a solid base from which to build mobile access control solutions.

If widespread adoption is to take place, though, a distinct ecosystem has to continually evolve and include widely-available and secure handsets, readers and locks that can recognise digital keys embraced by those handsets and service providers able to deliver and manage mobile credentials duly created.

Outsourcing traditional ‘badged’ solutions

Speaking of mobile credentials… One trend witnessed of late is that some organisations have begun to outsource what might best be described as traditional ‘badged’ access control solutions to those offering services in the Cloud. Put simply, mobile devices could be connected to the network via, for example, a link that’s WiFi-enabled.

A further approach is derived by making use of mobile network operators ‘over the air’. New applications can be farmed out to the NFC-enabled phones in much the same way that Apps and music may be downloaded by consumers in the social environment. The idea is that multi-factor authentication is then transformed into a managed service run in the real-time arena.

Last, but not least, what about Bring Your Own Device (BYOD)? Companies may save money on technology while employees can work with chosen systems that might just boost staff productivity and/or morale. However, key company information could be rendered somewhat less secure.

With a recent Logicalis study suggesting that only 20% of employees surveyed had signed a BYOD policy, there’s clearly much work still to be done here.

Leave a comment

Filed under IFSECGlobal.com News

CCTV: is it really spiralling out of control?

1987 wasn’t a great year, to be frank, what with the Stock Market crash in the States (how ironic that the movie Wall Street hit our cinema screens at the same time), the King’s Cross London Underground fire, special envoy Terry Waite’s kidnapping in Beirut and the horrific Zeebrugge ferry disaster.

On a more positive note, 1987 witnessed my first year at university and, lest I forget – and possibly incur the wrath of millions of Bart, Homer and Marge disciples – The Simpsons made its TV debut.

In terms of what transpired in our security world, 1987 was pretty monumental. Why? We witnessed – no pun intended – the very first UK town centre CCTV system installed across King’s Lynn with a view towards protecting its 40-odd thousand citizens.

Since then, of course, CCTV’s presence in the public domain has burgeoned both in terms of the number of cameras involved and the quality of the technology that lies within them (which is quite superb). Positively, specific systems operators are now licensed and regulated by the Government.

These regulated operators in unison with top quality cameras have given rise to myriad success stories of more and more criminals being brought to justice by way of all-seeing ‘Eyes in the Sky’.

Buy-in from members of the public

Key to the ongoing success of CCTV has been, is and always will be buy-in from the public – the people being watched. As citizens, we all need to know that surveillance is both appropriate and proportionate in its deployment.

It must also be the case that camera system operators, and those who use the information duly captured, demonstrate integrity in doing so at all times – and are held to account.

All of which is why the current UK coalition Government is committed to the further regulation of CCTV by way of the Protection of Freedoms Act 2012, and is presently seeking views on a draft Code of Practice focused on surveillance.

That Code is built squarely upon 12 guiding principles. Interestingly, and for the first time, the notion of ‘surveillance by consent’ is brought into play. There’s an obvious parallel here, then, with the ethics behind ‘policing by consent’.

The consultation period – which closes on 21 March – takes place while surveillance commissioner Andrew Rennison’s comments (reported in The Independent just before Christmas) remain fresh in the memory.

If you’re not committing a crime, what’s the problem?

The commissioner has stated that the proliferation of HD surveillance systems – and facial recognition technologies – in public spaces could result in a backlash from citizens.

“The technology has overtaken our ability to regulate it,” said Rennison in the broadsheet. HD cameras are “popping up all over the place”, asserted the commissioner, with the exponential growth of high power megapixel cameras potentially becoming an issue around Article 8 of the Human Rights Act (relating to the protection of family and private life).

Of course, discussions around ‘The Surveillance State’ have surfaced time and again. They’re not likely to disappear. Indeed, across the years I’ve chaired numerous industry debates on this topic – all of them impassioned affairs.

At one of those debates I suggested that the proliferation of CCTV cameras in public spaces isn’t an issue if – like myself – you happen to be a law-abiding citizen and are behaving appropriately. Some would assert that such a suggestion is perhaps a touch naive.

In all honesty, I would argue that neither the number of cameras monitoring us nor the inevitable advance of technology is the crux of the matter. Rather, it’s what subsequently happens to the images, data, information – call it what you will – gathered as a result of that process that really matters.

The Protection of Freedoms Act is to be welcomed, as is the draft Code of Practice on surveillance.

Certainly, the balancing act that has to be struck for CCTV – between the need to enhance public space safety and, at the same time, safeguard privacies – is far from an easy task, but those two outcomes are not mutually exclusive.

Let’s never forget the vital information gathered by CCTV during 7/7 and the London riots of August 2011. Properly regulated, deployed and used CCTV is one of the very best crime-fighting tools at our disposal.

Leave a comment

Filed under IFSECGlobal.com News