Latest SRI research shows security culture integral to facilitating security excellence

This article was originally published by IFSEC Insider.

Entitled ‘The importance of Security Culture in Facilitating Security Excellence’, the research is based on the views of security professionals from both in-house and contract positions, as well as other security experts.

Among several findings, the report outlines the importance professionals place on security culture, but that it isn’t always easy to achieve. Fundamental to doing so requires the security department to effectively engage with other areas of their organisation and to showcase how security can go beyond its traditional remit and actively contribute to overall organisational success.

A copy of the report is downloadable for free from the Perpetuity Research website.

The report’s lead researcher, Professor Martin Gill, highlighted some of the key takeaways:

Security culture is very important to a successful security operation: Culture sits alongside other key aspects such as effective leadership, clear objectives and an effective security strategy.

Culture is at least as important as strategy: Culture brings life to strategy and defines the extent to which strategy is executed – a third cited culture as more important than strategy.

Security culture and organisational culture are linked: There is a relationship between security and organisational culture, with a good organisational culture enabling good security culture, but a bad one would create challenges.

Security professionals do not believe organisation workforces are sufficiently engaged in security: While two thirds of respondents felt the workforce values physical security measures, they were less inclined to view the workforces as strongly engaged with security.

The barriers to engagement need to be overcome: There are several reasons for a lack of engagement, including lack of senior level ‘buy in’, lack of investment, negative perceptions of security and lack of communication, among others. Meanwhile, new trends such as working remotely may compromise the quality of security and ability to develop a security culture.

Communication of the value of security is key: More focus is required on engaging the workforce and ultimately, effective communication of the value of security is key to overcoming the barriers. Messages need to be tailored for leadership and the right audience, to demonstrate the benefits of security.

“Good security culture is essential… but can be hard to obtain”

Professor Martin Gill who led the research noted:

“Our research suggests that security professionals are unequivocal about the value of security culture in supporting security excellence. Good security culture is an essential ingredient but one that can be hard to obtain.

“The key, according to our participants, is to effectively articulate the value of security in ways that are meaningful to different audiences within an organisation. This means stepping beyond the notion that security is only there to deal with a crisis and demonstrating that security is an enabler of operations and moreover a contributor to the overall success of an organisation.

“If good security is about engaging the hearts and minds of stakeholders, not least staff and hierarchies, then our results suggest that the security sector is struggling. Worse still some recent societal trends are complicating the problem and increasing the difficulty of the challenge.”

Advice and support from ESA Risk

For Security advice and support, contact Liam Doherty, Security Consultant at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Video surveillance tech on the rise in luxury homes

This article was originally published by IFSEC Insider.

Common features of the type of surveillance being invested in are said to be high-definition cameras for clearer images, AI-driven analytics for detecting unusual or suspicious activity and cloud storage, amongst others

Aesthetics, IoT and security 

As well as AI, other surveillance technologies are having a significant impact on luxury home security including motion detectors, infrared cameras and PTZ cameras, along with wireless systems.

This use of advanced technology for residential properties instead of traditional business premises may be driven by increasing awareness and want for more real-time, accurate information, such as with the rising use of doorbell cameras.

According to Forbes, integration of systems was a top smart home trend this year, followed by AI and Internet of Things (IoT).

The use of smart integration means that IoT is becoming more prevalent as a desirable feature, along with remote access, real-time alerts and unified control over the surveillance and security of a home.

Another main feature being prioritised is aesthetics. Discrete, seamless, well-designed and possibly tailored surveillance systems to suit the luxurious and high-priced homes are in demand.

Luxury houses are then thought to be more appealing as well as ‘future-proofed’ by the advanced security technology.

‘Peace of mind’

Similarly, another report found that smart locks provide more ‘peace of mind’ to homeowners who can use the technology to remotely lock or unlock doors and entrance systems without having a traditional key, using methods such as mobile access control. 

Middleton Advisors’ Head of London Sales team, James Moran said: “Those concerned about security will be drawn to gated communities and high-end apartment complexes which offer unrivalled amenities such as concierge services, 24hr security, and the added privacy of enhanced entry systems. Particularly, if people have had concerns or issues before, this often becomes a non-negotiable part of the search.

“A balance is definitely required with security features; people don’t want bunkers and panic rooms, they want to live life. Large steel gates and high walls can be unsightly, remind residents of safety issues, and make the house less desirable should they decide to sell in the future.

“Looking forward to new technologies, particularly with AI, including heat detection and night vision which AI can decipher the difference between animals and trees moving and people within the house circumference.”

Advice and support from ESA Risk

For Security advice and support, contact Liam Doherty, Security Consultant at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

A guide to mobile access control systems 

This article was originally published by IFSEC Insider.

There is greater demand than ever for convenient solutions to enter and exit buildings and facilities from users, and to manage and issue credentials from administrators – is mobile access control the answer?

Here, we provide a guide to mobile access control, which is one of the fastest growing methods of secure access provision, according to industry analysts such as Omdia.  

What is ‘mobile access control’?  

Mobile access control is a method of providing people with authorised access into a site, building or room via a digital credential on a smartphone or other wearable technology. 

The ‘mobile’ part of this access control allows users to use their smartphones for entry instead of a traditional key, badge, access card or fob. 

The solution works through a downloadable mobile app, which would then act as a ‘virtual key’ providing access.   

In many cases, mobile access control is powered by Bluetooth, where the phone communicates with a mobile-capable reader on a gate, door or barrier. Other methods include using Wi-Fi and Near Field Communication (NFC) for the electronic devices within a specific distance apart.  

Currently the majority of access control, according to IFSEC Insider’s 2022 State of Physical Access Control Report, is used through identification badges (ID) with 60% of the market adopting this. Following this, 50% use time and attendance as a way to track check in and out of employees and 49% use parking/gate control. 

Though mobile access control is a relatively new type of technology used by a smaller number of organisations, the report showed that there was significant uptake of it in the marketplace, with 32% of respondents saying they were actively using mobile IDs. 

In addition, the data from the report highlighted that there has been a growth in demand for mobile access control systems. In 2020, 16% of the industry had already upgraded to mobile capable readers – in 2022 this rose to 24%, while 42% of industry professionals are still planning to upgrade. 

The top day-to-day challenge for security professionals, cited in the report, was as improving user convenience with systems, and 43% would like to make the administration of physical access control easier. 

In an ever-advancing technological landscape, the ease of use for a mobile device providing entry is often perceived to be a more convenient way to control access instead of a separate physical card, but it also can be seen to align with many company objectives of sustainability, cost-saving and heightened security.  

Mobile-first approach  

An expert on the access control and smart lock industry, Lee Odess said that while the industry has been characterised by the words ‘no and slow’ when it comes to adopting new technology, this is no longer the case.

“What’s happened is that Covid has accelerated a handful of changes, particularly around digital transformation.”

According to Odess, although many commentators talk about IT convergence as the biggest impact the industry faces, it is also likely from enterprise software, as well as cloud and mobile computing.

He said that rather than looking at mobile as an ‘iteration of existing legacy systems’, external companies such as Apple and Amazon (which owns companies in the security sphere, such as Ring) are focusing on a mobile first approach.

“Complete systems are being built around the concept of an admin and an end user providing total control from a mobile computing device.”

And the market appears to be following this trend. For example, HID Global has been working in partnership with Apple to ensure its credentials can be accessed via the Apple Wallet system. The partnership resulted in HID, Apple and SmartSpaces all working together on a project at 22 Bishopsgate, London, to create a building that uses mobile access control throughout its entire ecosystem.

What are the benefits of mobile access control? 

As mentioned, mobile access control can provide organisations with convenient entry that’s also secured through unique mobile device credentials. 

Since an increasing number of organisations have added mobile access as their method to control entrance and safeguard employees, let’s take a look at some of the benefits::

Enhanced security: There are unique credentials for the user such as biometric authentication, plus using access through an app allows for easy conditions to be placed such as temporary or revoked access. – assigning credentials. Two factor authentication can also be embedded in the process, with the option to ensure users unlock their phone before using the mobile credential. 

User experience/convenience: Users may prefer to have their virtual key on their smartphones instead of a separate physical item to carry. Since they may carry their phone more often there are potentially less instances of users being locked out of areas accidently.

Remote management: When assigning credentials, security managers and administrators don’t have to be physically present as they would for other methods of access control, allowing for real-time, remote control. This works well for an increasingly hybrid working landscape.

Cost savings: Although the initial upgrade to a mobile-enabled access system can be costly, in the long-term it removes the need purchase or print cards, badges or fobs and any maintenance that may come with traditional locks.

Integration and scalability: Mobile access control can be integrated and upgraded with existing or new security systems and can scale to grow with an organisation. 

Environmental impact: With no manufacturing production or shipping of plastic cards or fobs, it can contribute to sustainability objectives with a lower environmental impact. 

Audit trail and reporting: Like other digital or electronic credential management systems, the logging of users can also be tracked with mobile access control for entry and exit times and can therefore be useful if needed for security scrutiny. 

Mass notification: Emergency or important company notifications can be sent via the mobile app to relevant users or the whole organisation for faster broadcasting.

What are the challenges around implementing mobile access control? 

Although mobile access control can provide organisations with plenty of benefits,  like any system there remain challenges or potential barriers:

Initial cost: With 38% of those asked in IFSEC Insider’s report selecting this as their biggest obstacle to upgrading, the initial cost of upgrading to a mobile access control enabled system could be an initial barrier.

Potential hacking: One system that is centralised could have the potential for hacking which would mean all access and user information is compromised- similar to any digital/electronic access management system. Similarly, if a user’s phone is stolen information could be hacked into this way.

Smartphone users: the use of mobile access control comes with the expectation that all employees have smartphones, which may not be the case for all. There is also the added challenge of whether an organisation would require all employees to have company devices. 

Disruption: Upgrading can mean changing access control devices internally and having to introduce the use of a mobile app on a large scale. Some users may find it difficult to learn and navigate. 

User privacy: Users may be uncomfortable installing a company application on their personal device due to privacy concerns. 

Not suited to all sectors: Mobile access control may be easier to integrate into an office building rather than a building site or food production plants where mobiles aren’t allowed, for example, meaning that it may not be as convenient an upgrade for all sectors.

The future 

Mobile access control is on the rise as a modern and convenient method to manage and track physical access, and its benefits can be greater than just security – with the use of mass notification, sustainability benefits, and more. However, there are some drawbacks as listed above that may be more of a challenge depending on the sector and smartphone users in a company.

In any case, it is likely that mobile access control could play a leading role in the future of physical security access control systems. 

Advice and support from ESA Risk

For Security advice and support, contact Liam Doherty, Security Consultant at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

AI and machine learning for enhanced video surveillance security

Originally published on IFSEC Insider

Dakota Murphey provides an overview of the opportunities and precautions the security industry must consider as adoption rates in video surveillance grow.

From smart alarms to CCTV camera monitoring solutions integrated with intelligent analytical algorithms to analyse video footage and detect anomalies in real time, the surveillance landscape is rapidly seeing evolution at the hands of AI/ML technology.

Not only this, but AI-powered facial recognition software provides a whole new dimension to biometrics and access control.

This isn’t even mentioning the amount of data that can be autonomously aggregated and condensed to inform top-level strategic decisions – as far as surveillance system integrators and providers are concerned.

In short, it’s clear that AI/ML tech in video surveillance provides numerous promises, from enhanced security to greater productivity and actionable insights collated more quickly. As a result, it may be evident to begin integrating more AI/ML programmes and tools into your operations, however, you should be mindful of certain risks and limitations when adopting this technology at scale.

The promise of AI in video surveillance

Automated Monitoring: AI allows surveillance systems to continuously and autonomously monitor environments for abnormalities and threats. The consistency and high level of accuracy allows security teams to dedicate more resources and time to higher-level tasks. Machine learning algorithms can be trained to identify signs of trespassing, loitering, vandalism, violence and fire.

Real-Time Alerts: Intelligent cameras with built-in analytics can immediately notify security personnel when a high-risk event is detected, allowing for rapid response. This is far more effective and efficient than manual video reviews that are subject to human error.

Facial Recognition: AI facial recognition provides a touchless biometric solution for visitor management, access control and watchlist screening. Stadiums, airports and other high-traffic facilities are employing this technology to identify individuals of interest for swift containment and referrals to authorities if needed.

Crowd Analysis: Computer vision algorithms can scan crowds to detect high-density levels, suspicious abandoned objects, abnormal noise levels, higher-than-normal temperatures, smoke and many other hazardous scenarios. This allows officials to manage crowds proactively and avoid situations from escalating into dangerous ones.

Investigations: AI enables intelligent video search to easily surface clips of interest from vast surveillance archives. Security staff can use visual data mining to quickly investigate incidents and find correlations.

Concerns around AI-powered video surveillance

While the benefits of widespread AI adoption in a security or surveillance environment seem apparent, unsupervised use can yield some concerns for both integrators and end users.

Cyber security: Connected camera networks – along with incumbent enterprise infrastructure – create plenty of attack surfaces vulnerable to compromise by malicious hackers. Steps must be taken to encrypt video feeds, install software updates, and follow cyber security best practices. This includes prioritising continuous software patching, stringent access controls, encryption, MFA (multi-factor authentication) and investing in off-site penetration testing solutions to identify hidden vulnerabilities.

Privacy: Many organisations have raised concerns about the privacy implications of widespread public camera systems coupled with technologies like facial recognition. There are fears about constant monitoring and tracking of individuals without consent, along with suspected unscrupulous use of this data to be given to mysterious third parties.

Bias: Like any technology, AI models reflect the unconscious biases inherent in their training data. Critics point out that facial recognition systems often perform worse on women and people of colour. Therefore, measures must be taken to ensure fair, unbiased usage and continual improvement.

Over-reliance: There are worries that over-dependence on AI surveillance could lead to complacency and substandard human oversight. There are also concerns that AI/ML adoption could put workers at risk of employment termination if organisations look at the bottom line; the technology should augment security staff, not replace their expertise.

Balancing innovation with responsibility

The risks highlighted above should not deter the adoption of AI in surveillance outright, but rather compel companies in the industry to deploy the technology responsibly and not at the extent of human supervisors and operatives.

In short, while security firms advocate the application of AI to help security teams do what they already do, albeit faster and with greater accuracy, there is still a need for responsible human input.

With careful oversight and governance, AI/ML can make monitoring environments more secure and alleviate security personnel from low-level tasks that can instead be entrusted to computers and algorithms.

A balance of healthy AI/ML integration with resource optimisation can help companies adopt a more secure and less time-intensive process with teams fulfilling more high-value work.

Here are some other best practices to follow:

  • Conduct thorough, conclusive assessments on privacy and data protection before deploying organisation-wide facial recognition, profiling, and aggregation technologies. If end-users express concerns, be forthcoming and transparent about the use and monitoring of data, with clear and unambiguous policies.
  • Train AI models on diverse, unbiased datasets to avoid inaccurate or discriminatory results. Rigorously test systems for fairness defects and ensure that any known flaws are rectified promptly and without prejudice.
  • Clearly define the division of task management between AI and human workers. Maintain the ideal amount of experienced security operatives and personnel and upskill them – if necessary – on casting judgement, overriding errors and validating decisions that AI programmes make.
  • Develop strict policies and safeguards around data retention and lawful use that align with regulations like GDPR. Give individuals visibility and control over their personal data.

The future of AI-enabled surveillance

AI promises to unlock safer, more data-driven security and monitoring capabilities than ever before. However, thoughtful governance and diligent oversight are imperative as these powerful technologies continue evolving and proliferating.

The video surveillance industry must lead by example, pioneering AI applications that enhance security while still upholding privacy, accountability and fairness.

Get your corporate physical security risk assessment

You may think your corporate security is iron-clad. However, the risks to businesses are constantly evolving. Staying on top of risk management will protect your bottom line and your employees.

Arrange your security risk assessment today – contact Liam Doherty, Security Consultant, at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

What’s next for AI in the security sector?

This article was originally published on IFSEC Insider.

With the use cases for AI ever-expanding, IFSEC Insider asked several experts to give their predictions for the future of AI in the security sector and possible barriers to adoption for 2024 and beyond.

James Chong, Chairman at Advancis

 

“The next decade will be dominated by AI applications in the security industry. AI can be very helpful when it comes to assessing and analysing massive amounts of data to help monitor critical security threats, such as detecting anomalies captured on digital video cameras.

“However, AI can also be leveraged for identifying trends and patterns to enable proactive mitigation measures, which otherwise may have gone unnoticed or undetected.

“This means AI will not only be used for forensic use cases in the near future, such as sifting through hundreds or even thousands of hours of recorded video and other data, but it can also help prevent possible future incidents through predictive analysis by recognising common threats and vulnerabilities based on historical data, combined with real-time situational awareness.

“To most effectively leverage the power of AI, it all starts with the quality and integrity of data, which can be significantly enhanced when you are able to help secure, integrate and harmonise data coming from disparate security sensors and systems. Through next generation data unification software such as Advancis Open Platform, the security industry will be able to apply different AI algorithms to create best-of-breed solutions, at scale.”

Paul Dodds, Country Manager UK & Ireland at Genetec

 

“We’ll always need trained security operators to take decisions. However, AI is already proving its value in trawling through huge data sets to identify meaningful patterns and trends. For example, it can take over arduous tasks such as monitoring occupancy levels or combing through hours of video footage for specific people and objects.

“Machine learning, a subset of AI, is also already contributing to tangible improvements in accuracy rates. For example, we’ve successfully adopted it in our own AutoVu ANPR solutions to minimise false positive readings.

“The major barrier to long-term adoption is the setting of unrealistic expectations. When introducing a new solution, manufacturers, integrators and end users all have a shared responsibility to seek clarity not just on what it can do but also what it can’t do.

“Additionally, we need to be thinking about deepfakes which use deep learning to create convincing but entirely fictional images, videos, voices or text. Detecting deepfakes is a challenge because the technology is evolving so quickly. Right now, deepfakes train on images of the fronts of faces. So, one way to detect them is to focus on the sides of faces and heads. As detection techniques evolve, I can foresee a future in which our VMS would incorporate a deepfake detection component.”

Mike Gips, Security Industry Commentator

 

“Like all technology, AI is a double-edged sword for security. Use of generative AI, such as ChatGPT, has skyrocketed, because it enables security providers to develop competent marketing copy in an instant, helps security professionals draft reports, simplifies research, and so on.

“However, generative AI is often confidently and forcefully wrong. This could expose users to liability. For example, consider the case of a query about a law professor in which ChatGPT, citing a Washington Post article, stated that the professor sexually harassed a student on a trip to Alaska.

“Not only didn’t the article exist, but the professor never faced such an accusation, hadn’t been to Alaska, and never taught at the law school. The results would be exponentially worse if a bad actor could contaminate generative AI’s data source.

“AI tools are being used productively to automate and optimise fraud detection, patch management, threat prediction, and vulnerability identification. But AI is also being weaponised to create more pernicious malware, mimic and enhance successful misinformation campaigns, and improve phishing emails. As in the case of video surveillance, drones and facial recognition, we should expect an ongoing battle with adversaries determined to use technology to attack and exploit us.”

Pauline Norstrom, Founder and CEO at Anekanta Consulting

 

“As the CEO of a leading AI safety company, my team are experts in governance, compliance, risk, and impact mitigation for biometric AI in security and safety applications. We have researched mature task-driven narrow AIs which improve intruder detection and predict that commoditisation will lead to market saturation and reduced profit.

“The sector needs to use new AI to add value. LLM/GenAIs (Gen AI) are accessible through providers such as IBM and Microsoft, and open source communities such as Hugging Face. A diverse and talented in-house AI team can solve facilities management problems including frictionless enrolment and access control, visitor tracking and employee safety monitoring.

“However, the dark side of Gen AI produces blatant lies, fake audio, and images. Automated threat detection reliant on inferences from infected sources including internet-trained Gen AI and social media can poison the evidence chain. A capable human-in-the-loop who makes the high-impact decisions is an essential element of safe AI governance and deployment.

“On one hand, AI may take jobs and when poorly governed may create serious legal liabilities. On the other hand, it will drive growth opportunities and create fulfilling employment if organisations drive their responsible and compliant AI strategy from the top down.”

David Quinn, Product Manager at G4S UK (an Allied Universal company)

 

“Contrary to popular opinion AI has developed incrementally; it’s only able to mimic human behaviour and relies on being fed data. In the next decade, I suspect security professionals will use AI platforms to differentiate between animals and humans remotely – or even between people – based on attributes like smell, movement, heartbeat and heat signature.

“We’re already seeing that parts of our company are using access control systems that flag behaviours or events that are out of the ordinary. It learns normal behaviours of a building user over time.

“An employee may use a building between 8.30am – 5pm from Monday to Friday. If that person starts entering at different times, it could be an indication of a security risk that needs to be further explored.

“Similarly, if a person starts to access an area they have not previously, the system will flag this for further examination. At no time is the system given the rules to apply, it uses machine learning to observe patterns and look for anomalies.”

Mats Thulin, Director of Core Technologies at Axis Communications

 

“The advancements of deep learning on the edge are a key driver for AI in the security sector. The integration of deep learning enhances analytics accuracy, forming the basis for reliable, scalable and bandwidth-efficient cloud solutions. The combination of edge processing, advanced metadata from the edge and additional processing in server or cloud – what we refer to as hybrid solutions – creates a scalable and cost-efficient model for more advanced analytics solutions. These solutions often generate events or alerts, or the data is the basis for site insights which are often consumed in the form of dashboards.

“In 2023, the discussion centered on AI risks. Large language models (LLMs) also entered the spotlight, becoming the foundation for generative AI, and we anticipate seeing more security applications powered by LLMs in 2024.

“Looking ahead more broadly, new regulation together with the formation of industry norms will have an impact on the development and adoption of AI as a technology, but it would be incorrect to refer to this process as a challenge. Rather, this is about laying a solid foundation for future innovation where ethics, responsibility and accountability are default.”

Jason Towse, Managing Director of Business Services at Mitie

 

“Intelligence-led services have been the gold standard for the security industry for quite some time and the use of AI is a natural evolution of this. Especially within retail security where it is fast becoming a key factor in tackling different types of retail crime, ranging from shoplifting to the more violent and prolific thefts committed by organised crime groups.

“For example, AI-powered security cameras can analyse and learn the typical movements and behavioural patterns associated with shoplifting including position in the stores, suspicious behaviour at self-checkout aisles, and the number of items someone is carrying without a basket.

“This intelligence can be shared with in-store security detectives and analysts based in operations centres who can evaluate the situation and intervene where appropriate before a potential incident can take place.

“It’s this type of high-quality intelligence that Mitie is already harnessing to combat retail crime and ensure the safety and security of our customer’s retail stores. AI technology is a welcome addition to the tools we can use to unlock another layer of intelligence that will keep us a few steps ahead of prolific offenders and more sophisticated and organised crime groups.”

Security solutions from ESA Risk

Our experienced consultants can give advice on and install practical security solutions including GPS trackers, overt and covert cameras, alarm systems and more. We also provide manned security services.

Contact Liam Doherty, Security Consultant, at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form to learn more.

Corporate physical security: Is your organisation in safe hands?

Violent crime, incivility, and public disorder are on the rise.

Office managers are dealing with increased levels of workplace violence as employees return to the office.

At the same time, data theft is increasing, extremism is rising, and people are dealing with an increased number of economic and social issues.

Corporate security threats can come from external and internal sources. Incidents of insider activism and cyber security threats are also increasing.

The solution is a comprehensive corporate physical security strategy that will protect your employees and assets.

This article will examine the importance of business security and how to develop a suitable corporate physical security strategy following current best practice.

Why have a corporate physical security policy?

To keep your business running smoothly, you need to manage potential risks. This will protect your reputation, your customers, and your employees.

No matter the size of your company, you are potentially vulnerable to workplace theft, violence, and property damage. Employee theft costs UK companies around £190 million every year.

Many aspects of how you do business have changed in recent years. Data is kept in the cloud, and employees may be working remotely. However, crucial financial information may still be stored on your premises. If someone gains physical access to this data (just as with a cyber breach), the resulting damage limitation activity is likely to cost you time and money. It also has the potential to weaken trust in your business and to break data protection regulations.

You may think your business security services are sufficient. However, the scope of potential risks is constantly changing. This highlights the need to assess your corporate physical security policy regularly and adapt it when necessary.

You want to ensure you have a security plan which will restrict access to, and control access within, your premises.

The technology with which you can achieve this is constantly changing. It is vital to keep track of the latest security software and hardware, as well as other developments in the security industry, to ensure your business is as secure as possible.

The right corporate physical security strategy will:

  • Protect you from intruders
  • Shield you from internal threats
  • Plan for natural disasters and accidents
  • Protect networks and data
  • Deter fraud
  • Detect crimes
  • Raise awareness among employees.

Not all companies require the same level of security. Some smaller companies may be able to focus on a few specific issues such as theft, while a larger business will need a full range of business security services.

Either way, introducing an appropriate corporate physical security strategy will ensure your business runs smoothly.

Corporate physical security best practices

A few decades ago, it might have been sufficient to have a single security guard protecting the entrance of your company. For most businesses, this is no longer the case.

There are several components to a successful physical security strategy.

Access control

The first step to protecting your business is to gain control over who enters the premises and how they do so.

This can begin at the entrance to a car park or garage, or at the front door. You can equip employees with unique access control cards or require biometric authorisation to allow them to enter. Biometric control can include fingerprint, voice, facial, or iris recognition. Some technologies now allow employees to use their mobile phones as a form of access control.

Access cards and biometric control can also be used for sensitive locations within your building. This will allow you to choose who is allowed to go where once inside.

Many of these systems log important data about who accessed a particular zone, which you can use to analyse employee and visitor movement.

Experts believe layered authentication systems will provide you with the best security.

To streamline your access control, you should develop a policy to manage visitors to your premises. This can include allowing only prior appointments or having detailed procedures for visitors to sign in on arrival. These steps became commonplace during the Covid pandemic, and many businesses have kept such procedures in place despite restrictions ending.

Visitor passes also allow you to monitor when someone has entered and left the building.

Video surveillance and monitoring

Another vital pillar of your corporate security policy is video surveillance. This will allow you to monitor for any suspicious activity in real time, and record video to detect security breaches, identify perpetrators, and be used as evidence, if required.

There is a wide range of video technology to choose from to suit your business.

Depending on the size and sensitivity of your operation, you may want someone to monitor surveillance footage at all times and to respond to any potential threats (a service we offer alongside 24/7 alarm monitoring and response).

Security systems

Aside from video surveillance, you can install a range of alarms and sensors for business security.

Sensors can detect movement, smoke, or heat. Fires are, of course, a potential risk to people on your business premises, and they can wreak havoc on valuable property and assets. A fire alarm and connected sprinkler system are essential for the safety of your company.

You can install alarm sensors on doors, windows, and other important locations. Alarms have a dual purpose – they may scare off potential intruders, while alerting security services to the threat.

The most important thing to remember is that criminals are more innovative than ever and can employ a range of technology to overcome security systems. Hence, you need to stay on top of the latest innovations to be aware of new risks.

Testing and training

Implementing the correct physical security measures is only the beginning of a good corporate physical security strategy, though.

You need to train your employees to recognise threats and use the security system where necessary. They should be up to date with your best practices and visitor access rules. This training will also show employees you are serious about security and may deter efforts by internal threats to steal data or physical property.

You should also schedule regular drills and tests of your surveillance systems and other security measures, including instructing independent security experts to test the systems you have in place.

Get your corporate physical security risk assessment

You may think your corporate security is iron-clad. However, the risks to businesses are constantly evolving. Staying on top of risk management will protect your bottom line and your employees.

ESA Risk has decades of experience in managing business risks and providing expert solutions.

Arrange your security risk assessment today – contact Liam Doherty, Security Consultant, at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Avoid rising theft with a caravan tracking device

Unfortunately, an increase in demand has led to a rise in caravan theft in the UK.

You can protect your caravan in the UK and abroad by installing caravan tracking devices and by following a few basic steps. Keep reading to learn the best way to keep your caravan safe and keep enjoying the great outdoors.

Lock your entrances

Would-be thieves always check the easiest access points first. So, if you leave doors or windows unlocked, a thief will find the access point. Furthermore, you may compromise your insurance coverage if you don’t secure your doors.

Check all the door and window locks to make sure they’re functioning properly as well. Look for aftermarket locks to secure your caravan, which may be more effective than the standard fitted locks.

Lock your hitch and your wheels

When you tow a caravan, you should have a hitch lock. This lock prevents others from just hooking up your caravan and towing it away.

Furthermore, your insurance policy will often require a secure hitch lock. If someone steals your caravan and you do not have a hitch lock, your insurance company may not cover your losses.

If you do have a hitch lock, make sure it is secure. Always reattach the lock after you’ve both hitched and unhitched. When you’re preparing for a trip, you will have a dozen things on your mind, so it’s easy to forget this one step.

You can purchase a wheel clamp which locks the wheels of your caravan. If someone can bypass your hitch lock, the wheels will still not roll because of the wheel clamp.

Purchase an alarm

Because of the growing popularity of caravans, the caravan industry along with the home security industry has come up with some creative solutions for caravan theft. For example, you can purchase an alarm that has an internal motion sensor. The alarm is triggered when it detects a tilt.

Caravan alarms mimic home and car alarms. The more sophisticated the alarm, the more it will deter thieves.

Install caravan tracking devices

GPS tracking device for a caravan takes caravan security to a new level. The tracking device will allow you to pinpoint the location of your caravan through the tracker’s online dashboard.

Higher-tech trackers come with an alert that will go off when the application detects caravan movement outside of a set geographical boundary. If someone attempts to steal your caravan, you’ll receive a notification that something suspicious is happening.

At this point, you can contact the authorities to let them know someone is moving your caravan without your permission.

Not only will the tracker let you know someone is moving your caravan, but it increases the chances that you’ll recover the caravan if someone takes it.

If you have a caravan GPS tracking device installed, you can put a sticker in your caravan window telling thieves you have a tracker to discourage them from taking your vehicle.

Store smart

Keep your caravan somewhere secure when you’re not using it.

If you have a touring caravan, you can best secure it by locking it to a security post at your home. Park it with the nose against your home, so thieves cannot back up and take it easily.

Empty the caravan of all your valuables, so if someone does break into it, they won’t have anything to steal. Keep the curtains of the caravan open, so that would-be thieves can see that there’s nothing to take.

Mark your caravan discreetly

A proper marking won’t prevent thieves from taking your caravan, but it will increase your chances of recovering the caravan if someone takes it.

A VIN chip kit will allow the police to identify you as your caravan’s owner when they recover it. The VIN chip will have markings that contain the unique CRiS or Central Registration and Identification Scheme number.

If your caravan was manufactured after 2016, it already has a VIN chip. However, if you have an older model, you should order and install a VIN chip. As with a GPS tracker, let potential thieves know you have a marking on your caravan by putting stickers in the window.

Such stickers protect your caravan and tell thieves your vehicle isn’t worth their time to steal. You will recover it, and they will pay for your stolen caravan.

Enjoy the great outdoors in peace

A caravan allows you to see the world in a whole new way. You can live in the places you love, and you can enjoy the great outdoors. But a caravan is essentially a home on wheels and, because of its mobility, it’s obviously more susceptible to theft than a traditional home.

Hence the importance of proper security and protection. Secure your caravan, lock the doors, and consider adding a caravan tracking device and discreet markings. Such technology will likely prevent thieves from taking your caravan, will make your vehicle easier to recover if it is stolen, and will give you peace of mind.

Security solutions from ESA Risk

Alongside the Prime 3G GPS Tracker – a high-end, discreet and effective GPS tracking device for a caravan – which is available to purchase from our online store, we offer various security services including security risk assessments for private and corporate clients.

Our experienced consultants can give advice on and install practical security solutions including GPS trackers, overt and covert cameras, alarm systems and more. We also provide manned security services.

Contact Liam Doherty, Security Consultant, at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form to learn more.

 

 

Benefits and limitations of regulatory and standards-based compliance

First, there’s compliance with standards, certifications and codes of practice that offer assurance that best practices have been followed.

Whether around products or procedures, complying with non-binding guidance can secure better deals with insurers and reassure stakeholders, as well as bolster security.

Alternatively, compliance can be about following the law, with regulations invariably relating to areas other than security, such as data protection and health and safety.

However, security professionals must convince boardrooms that bare-minimum compliance alone is not necessarily ‘job done’ when it comes to executing their obligations to protect personnel and assets.

And regulations, such as around fire safety or data privacy, must be adhered to in a way that doesn’t inadvertently undermine security measures.

Consolidated wisdom

Physical security standards and codes of practice provide a framework, developed by governments and independent bodies, for judging whether products or practices robustly protect people and property against theft, vandalism, terrorism, natural disasters and so on.

They consolidate wisdom drawn from rigorous testing, academic research and the input of experts from government, law enforcement, and the insurance, architecture and risk consultancy industries, among other sources.

These frameworks, which are refreshed periodically, effectively liberate security professionals from having to conduct due diligence and establish best practices from the ground up.

Secured by Design

For instance, Secured by Design, a police initiative, works with fire and security test houses like the Building Research Establishment (BRE) and its subsidiary, the Loss Prevention Certification Board (LPCB), in fulfilling its mission to ‘design out crime’ for homes, commercial premises and public spaces.

The Secured by Design’s product accreditation scheme, the Police Preferred Specification, makes certification contingent on demonstrating that a product has been designed with security as a priority.

Products are independently tested before being certified by the UK Accreditation Service (UKAS).

Necessary – but not sufficient

But might compliance with minimum standards potentially risk fostering complacency among security professionals and a false sense of security among stakeholders?

Having a product that is ‘secure by design’ is necessary – but not sufficient – to ensure that people and property are adequately protected.

A product’s suitability to the environment, and how it’s installed and used are vital too – and there are standards and guidance for these area, also.

Security teams should therefore find out which guidance and standards are relevant for their use case.

And they should be willing to go above and beyond minimum standards where relevant. For instance, if they’re protecting a busy public space at high risk of terror attacks and other criminality, then there’s a strong case to procure the highest calibre systems – not just the cheapest solutions that comply with baseline security standards.

Tiered security ratings

While binary standards – i.e. you either comply or you don’t – are easy to administer and understand, graded or tiered security ratings offer a more nuanced framework for choosing a system that meets your risk profile.

As such, compliance provides assurance that your system is appropriately secure for the environment in which it is installed, without being needlessly feature-rich (and thus expensive).

For example, EN 50131, a European standard outlining performance requirements for intruder alarm systems, sets out four security grades that scale up feature sets, resilience to tampering, and availability of police response, according to the likelihood of attacks and sophistication of likely attackers.

Set according to a risk assessment conducted by installers, they range from grade 1 – the lowest risk category used for domestic properties – to grade 4, assigned to high-risk premises like banks, museums or energy facilities that may be targeted by organised criminals.

Insurers will generally make conformity with the appropriate grade a prerequisite of providing cover.

LPS 1175

LPS 1175, which relates to ‘intruder resistant building components, strongpoints, security enclosures and free-standing barriers’, is also ratings-based.

Overseen by the LPCB, 1 of 7 security ratings is assigned based on how effectively a product – for example, fencing and security doors – can withstand assaults from tools such as drills, hammers or wire cutters.

Naturally, an airport will typically need perimeter fencing with a much more stringent security rating than an office carpark, for instance.

Access control regulatory compliance

According to the UK government, your access control system should be compliant with The Equality Act, Human Rights Act, Health and Safety at Work Act and General Data Protection Regulation (GDPR).

Vendors and their customers must accommodate these regulatory requirements when designing, installing and using security systems and policies, and ensure that, say, fulfilling a health and safety requirement does not undermine a security need.

For instance, to comply with UK fire safety laws your access control system should automatically unlock when a fire alarm sounds. Similarly, health and safety legislation necessitates that control rooms and other critical areas have fail-safe systems. Security teams should think about how to mitigate the security risks created by the activation of these functions.

CCTV regulatory compliance

The GDPR and – especially for local authorities and the police – the UK Surveillance Camera Code of Practice are pivotal to the appropriate specification, installation and usage of CCTV systems.

A data controller’s obligations under GDPR are broadly similar in regard to CCTV images – which count as personal data if the individual can be identified – as they are to text-based personal data like names, dates of birth or national insurance numbers.

This includes having a legitimate reason for processing personal data, protecting data during storage, transmission and processing, and keeping footage no longer than is strictly necessary.

The Surveillance Camera Code of Practice is also – rightly – focused on protecting data subjects’ privacy, and is useful in terms of bolstering both data security and physical security.

The newly revised code (pending parliamentary approval) has 12 guiding principles, including asking end users to establish:

  • the purpose of their system;
  • clear policies and procedures;
  • adherence to approved and relevant operational, technical and competency standards;
  • clearly defined rules on who has access to systems and when;
  • and that images will have evidential value if used by the criminal justice system.

Advice and support from ESA Risk

For Security advice and support, contact Liam Doherty, Security Consultant at liam.doherty@staging.esarisk.com, on +44 (0)343 515 8686 or via our contact form.

For support with regulatory compliance, contact Mike Wright, Risk Management & Investigations Consultant at mike.wright@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

Beyond security: How access control and CCTV video analytics can generate business intelligence

Fortunately, modern, network-connected security systems can deliver operational benefits that give security chiefs a powerful argument when it comes to pitching to the boardroom for greater funding.

Security systems are, of course, fundamentally – and historically, solely – about deterring and thwarting criminal acts in order to protect people and property.

However, today’s AI-powered video surveillance and access control software can transcend this core purpose to provide other benefits, often in concert with building management systems (BMS).

Deployed wisely, cutting-edge security systems can play a role in reducing energy use, boosting productivity and sales, enhancing work environments and delivering services more effectively.

New technologies can therefore be justified on the grounds of cutting costs and boosting the bottom line, as well as reducing insurance premiums and improving safety, security and loss prevention.

Consider how, for instance, automatic licence plate recognition (ANPR) systems can eliminate the need for ticket inspectors in carparks.

Access control efficiencies

In mediating the entry and exit of authorised individuals, meanwhile, physical access control systems build a picture of which and how many individuals occupy any given room or floor at any particular moment.

If access control reports show an office building is consistently quiet at the same time each month – say, Friday afternoons – facilities managers could decide to close certain floors to lower cleaning, maintenance, staffing and energy demands.

And integration with building management systems means lights, heating and air conditioning can be automatically switched on or off as buildings become occupied or unoccupied, thus reducing energy use.

Further efficiencies can be realised by consolidating physical and logical access control and integrating them with other services. As a result, employees could use the credential they access the office with – whether it’s a card, key or biometric authenticator – to pay for food in the canteen or enter the adjoining car park, too.

Integration with other business functions, such as HR, can streamline back-end administration, while cross-site standardisation is useful for large organisations with multiple offices.

Increasingly, access control can also be integrated with visitor management systems, making the check-in process more seamless and restricting visitors to the areas they need to access and the times they need to access them.

CCTV video analytics for retail business intelligence

Video analytics software, which uses deep learning algorithms to make sense of CCTV footage, has powerful security functions that vendors have repurposed to generate business intelligence.

It can, for instance, automatically identify and track persons of interest, highlight people or objects that fit a certain description, send alerts when pre-defined behaviors are detected, and detect suspicious packages.

In retail, similar capabilities can realise operational insights that inform decisions – on staffing, procurement and store design – that optimise the customer experience and boost sales.

Video content analysis can, for instance, measure footfall and where it is concentrated, something usefully presented in heatmaps.

The routes customers typically take around the store and where they tend to linger – measured by ‘dwell time’ – can help retailers optimise store layout, product lines and even pricing (imagine the conclusion you might draw, for instance, from a long dwell time around particular products but comparatively unremarkable sales figures).

Supported by proximity and people-counting thresholds, staffing levels can be tweaked to reflect peak periods and reduce crowding and queuing at checkout counters, fitting rooms and bathrooms.

Consider the resource efficiencies yielded by determining bathroom cleaning schedules by through-traffic rather than arbitrary intervals.

The ability to monitor shopper numbers and density also has a powerful application in relation to Covid-19 guidelines on limiting headcounts or enforcing social distancing.

Stores can learn how their customer demographics break down by age and gender, too, which can inform marketing and procurement decisions.

However, functionality that analyses individuals’ characteristics will raise understandable privacy concerns – something vendors have, thankfully, taken into consideration.

Data privacy mechanisms

Mindful of GDPR and equivalent data protection regulations in force around the world, reputable technology providers have ensured that retail-focused applications only ever convey information about shoppers as a group, not as individuals.

CCTV systems more generally should be privacy-protecting by design at every stage – capturing, storing, sharing and deleting data.

Among the most important privacy features is dynamic anonymisation, which ensures anonymity by default, with operators only unmasking individuals suspected of criminal wrongdoing.

Even more reassuring from a privacy perspective – and most relevant for non-security applications like monitoring footfall or for hazards – is permanent masking, where data subjects are anonymised with no possibility of reversing the process.

Redaction, meanwhile, is used post-hoc when individuals featuring in footage relevant to a criminal investigation are anonymised if they’re not under suspicion themselves.

Upgrade your security systems with ESA Risk

For advice on physical security or to enquire about a free security risk assessment, please contact Liam Doherty, Security Consultant at liam.doherty@esarisk.com, on +44 (0)343 515 8686 or via our contact form.

New SIA top-up training a welcome addition

At the start of this month, the Security Industry Authority (SIA) announced that all licensed security guards and door supervisors will need to complete new top-up training (raising performance standards) and to hold a first aid qualification to renew their licence.

The training includes “updated counter-terror training and advice for emergencies and incidents”. As security personnel are very often the first on the scene at major incidents, anything that improves their ability to respond effectively should be viewed as a positive step.

The SIA has outlined 4 key drivers behind the updates to its qualifications, stating that the changes are being made “to make sure that people working in the private security industry can keep the public safe, follow new working practices, understand recent changes to the law and make the best use of new technology”. Practical elements of the qualifications’ assessments will now “include searching, dealing with conflict, report/statement writing and using communication devices”. The new training also includes “refreshed physical intervention training” for door supervisors.

As the SIA’s Acting Chief Executive, Michelle Russell, notes in the announcement: “These changes reflect the extensive feedback and input over the last 3 years from those on the ground involved in working to keep the communities they serve as safe as possible.”

Russell also references the importance of “operatives hav[ing] the knowledge and skills to deal with common risks, especially in safety critical areas.” We welcome any developments that add skills and professionalism to the security industry. We share a common goal with the SIA “to protect the public and raise standards in private security.”

The changes will be rolled out over the next 3 years, as current licensed security guards and door supervisors are only required to complete the top-up training once they come to renew their licence.

Alongside the new training requirements, the SIA announced that Door Supervision licence holders will now have the flexibility to renew to a Security Guarding licence. “Operatives are advised to consider their day-to-day duties and how they are deployed before renewing.”

The changes follow updates to the public space surveillance (CCTV) course earlier this year, and an updated Close Protection qualification is expected to be launched on 1st April 2022.

The SIA is responsible for regulating the private security industry in the UK, reporting to the Home Secretary under the Private Security Industry Act 2001. The organisation’s duties include “the compulsory licensing of individuals undertaking designated activities and managing the voluntary Approved Contractor Scheme.”

Security services – including licensed security guards – from ESA Risk

ESA Risk’s security services – including professional concierge security and front-of-house services manned by highly trained security officers who are all licensed by the SIA – are provided through our joint venture with Marpol Security, a member of the Approved Contractor Scheme.

If you have a security need, we offer a free, high-quality assessment that can help you identify what services are critical for your sites. Whether it is a one-off service or the provision of long-term security arrangements, we are equipped to respond to your needs with a range of services that will safeguard you and your business.

For more information, contact Liam Doherty, Security Consultant, by email, via our online form or by calling +44 (0)343 515 8686.

Deep dive for the answers you need
Or contact us on +44 (0)343 515 8686 or at advice@esarisk.com.

Deep dive for the
answers you need

Lawyers, accountants, advisors, investors, senior
management. You name them, we help them find the answers
they need. Ready to discover how we can help you?