There are a number of challenges we face in current business operations: profitability, service quality, customer relationships, brand loyalty, productivity, and market confidence. Management need to take a step back to look at the bigger picture in order to achieve a balance between business as usual and business change.
Although we must keep pace with the rapidly progressing technical side of security, we must not neglect the engagement with and development of our people as part of a blended approach to risk mitigation and that essential feeling of safety we must deliver.
We are beginning to see more specialisation in the industry as security personnel develop and innovate within their niche areas, which creates more attractive and diverse career opportunities for new talent.
In the year ahead I believe we will see the security industry push forward to become more commercially risk aware through more rigorous planning supported by technology, as well as demanding higher standards in terms of compliance and governance.
Peter French, MBE, CPP, FSyI CEO SSR Personnel
The underage, alleged baby- faced terrorist living with his mother, perhaps demanding a ransom from a
corporation; arrested in Northern Ireland, who may well bring down TalkTalk, a company with seemingly archaic computer systems, would have been easy to defeat if just the basic encryption of data had been their policy. We see businesses with their roots in bricks and mortar, who have generically grown and acquired, but have maintained legacy systems that are their Achilles heel.
Generation Y onwards are pretty adept at technology, they have developed kiddy script code that can challenge many IT departments and want the challenge of knocking off the Bank of England or corporations that hold people’s data. It forms an anti-establishment agenda with our Millenials, we do it because we can. Anonymous individuals joining up, sharing research online, just like being at the coffee point in the office. So they have the skills, they just need the criminal financiers who can develop the scripters’ networks.
This channel is here for life, although constantly changing: in 2013 WhatsApp was channelling 4 million messages, less than 12 months later that had grown to 50 million every 60 seconds, and looks to double in 2015.
The masses of expenditure on cyber protection are just a drop in the ocean, compliance driven through regulation and huge fines is now a $20 billion per year industry. Governments will have to be at the forefront of this battle. Laws will have to be negotiated
© CI TY S ECURI TY MAGAZ INE – WINT ER 2015/16
with some pretty lawless countries. For the first time, the US Justice Department is bringing hacking charges against another country. Five members of the Chinese military are alleged to have stolen trade secrets from five American companies and the United Steelworkers, attacking with just a desk and a computer. This is the landscape for 2016, optimism whilst taking greater care.
James Crouch MD Universal Security Systems
The Insider Threat will become of increasing concern in the year ahead.
It’s not all about terrorism,
the intent could be purely criminal: to steal or exploit the information or intellectual property they have access to. It is an insidious threat since it comes from your fellow employees or contractors.
Frequently these individuals are not acting alone. In some cases, sleepers can be put in place and left dormant for months, if not years, then activated when required. Their controllers could be in the business of commercial espionage, looking for the right opportunity to steal or carry out sabotage.
Another modus operandi is for criminal or terrorist organisations to place a controller in your business who identifies and targets vulnerable people with financial or other personal problems. The internal controller can blackmail them into carrying out criminal activities, such as infiltrating your IT systems.
The solution is to train staff to look out for individuals who may be at risk or who may already be acting in a criminal way, and to put in place processes and procedures for escalating their concerns. It’s important this is done in a sensible and sensitive way so as not to impact the morale of the business or innocent members of staff. However, it is vital to identify those people who are putting the business at risk.
Paul Stanger Sales Director KM Security
The threat from terrorism still remains a real and serious issue to us all, as events this year have shown.
Acts of terrorism can take many forms, from major attacks inflicting large scale violence, with far-reaching consequences, like those seen in Tunisia and Paris, to more minor incidents that are designed to inflict superficial damage. Nonetheless, both of these types of terrorism need to be discussed and thought about seriously within the workplace and when travelling to and from your work destination.
www. c i t y s e cur i t yma ga z ine . com
The cyber threat poses an “invisible” face of terrorism and in today’s world of widespread internet access and social media use, the organised, and sometimes not so well organised, perpetrators of these atrocities have a very real and far reaching audience to drum up support and recruitment.
Terrorism and cyber terrorism will be a constant problem, not only for the next year or two, but far beyond. But with MI5, the Police and other government organisations continuing to advise companies, and individuals, of the current perceived threat, everyone can assist in cracking down on the groups that deliver these awful acts of war!
Emma Shaw, MBA, CSyP, FSyl, FCMI Company Director Esoteric
Terrorism and information security/cyber related crime continue to be a significant
global threat. This has been demonstrated by a number of incidents in the media such as the recent cyber-attack on TalkTalk and suspected terrorist incident on a Russian passenger flight.
Information, whether personal or professional, data or conversational, is ever more valuable. Cyber-enabled and economic crime will continue to increase. This is largely, I believe, due to the continued increase in technology and innovation and our move to a technologically advanced environment, both personally and professionally. The use of personal smart technology will continue to increase, and, therefore, the trajectory of incidents will also increase. Criminals and others will continue to use traditional means to facilitate attacks through social engineering and more traditional methodology as well as identifying weak spots in technology and exploiting them. Latest statistics support this theory. In 2015, for example, there were 38% more security incidents detected than in 2014. Theft of hard intellectual property increased 56% in 2015.
The private security industry continues to play a vital role in mitigating these risks, particularly as public sector resources continue to be limited. A number of public/private partnerships have been successfully developed and it is important that these continue. I anticipate that intelligence sharing will develop over the foreseeable future enabling the private sector to support both clients and police in a more informed way through intelligence sharing platforms. Strategic coherence in public/private partnership working will be critical.
> 9
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36