search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
What’s really new in security technology CONTINUED


You can reduce the risk of a catastrophic cybercrime event


W


ith the recent epidemic of WannaCry ransomware infections, the expectation


that every year more than 65% of companies will be hit by some form of cybercrime, and mandatory compliance with the EU’s General Data Protection Regulations due by May 2018, companies are having to consider more effective ways of managing the threat to data.


Simply hoping that your company’s critical information is secure is no longer an option, and smart companies are now taking a holistic approach to e-security risk.


Typically this involves integrating into their IT systems the ability to monitor for new threats in real-time, while automatically auditing for policy breaches – this is like having a burglar alarm on your data – and with increasingly sophisticated monitoring and response technology, the ability to intervene when an event begins, rather than after it hurts.


There was a time when such systems cost hundreds of thousands of pounds and were only affordable by big corporates, but there are now security tech companies able to deploy low-cost but highly effective Data Collectors within an SME’s IT domain set up to monitor for new threats, and automatically report policy breaches to a designated Central Hub. This approach is made all the more attractive as it does not require the SME to punch a big ‘incoming’ hole through their existing firewall, and integrates seamlessly with any existing security technologies.


But is this the answer to all threats? Well, the honest answer is ‘no’. Any company determined to protect itself against the evolving threat of cybercrime will only be successful if they adopt a 360-degree business risk management approach as described in ISO 27001, with the new technology acting as a powerful immune system.


Mike Britnell Co-founder & Director, BeCyberSure


Cyber Resilience Guidance


Understanding the need to protect customers from the risk of product-related cybercrime, the BSIA has recently convened a new working group: the Cyber Security Product Assurance Group (CySPAG), which aims to provide education and guidance on best practice in cyber resilience to product manufacturers, installers and users. The group’s initial discussions focused on the increasing connectivity of security systems and how the growing links to home and business networks can leave individuals and


18 © CI TY S ECURI TY MAGAZ INE – S PRING 2017


companies vulnerable to cyber attacks. Paul Phillips, Technical Manager at the BSIA and convenor of the group, explained: “Any single system can be subject to a number of vulnerabilities at different stages of its life- cycle, so its resilience depends not only on initial product design but also on proper installation and configuration as well as responsible use and maintenance by the end customer. Our primary objective is to provide best practice guidance at every stage, from design and testing to installation and maintenance.”


Technology alone is not the panacea


A


dvances in technology are of course of paramount importance and recent


developments in CCTV, access control, facial recognition systems etc. are of massive benefit in the fight against terrorism. However, technology alone is not the panacea, for it is only through the intelligent use of such systems by highly trained and motivated security officers that meaningful results can be achieved.


Effective cyber security not only requires manufacturers and installers to be robust in their protective measures, but also needs businesses and individuals to be more vigilant when it comes to online security.


James Kelly Chief Executive, British Security Industry Association (BSIA)


Real-time control of doors now a reality


M


odern systems can now offer real-time control, with doors scheduled to


automatically unlock during certain times of the day. Capabilities such as allowing a door to remain unlocked for a certain amount of time after the door has been opened from the inside are also available.


These systems can also provide an audit trail for any lock, key or system user, at any time – making a proper investigation of any breach not just feasible, but straightforward.


Furthermore, as any lost access card can simply have its access rights revoked, there’s no longer any need for the expensive, time- consuming process of changing the locks when someone loses a physical key. Audit trails can now be generated at the touch of a button, another saving on the substantial cost – in both staff time and money – of administering a mechanical master-key system.


A clear benefit to wireless access control technology is also that no wiring or cabling is involved, meaning no electrician or core drilling is required. Plus, the latest battery- operated systems means maintenance simply involves typically changing a standard lithium- ion battery once every two to three years.


David Hodgkiss National Sales Manager, ASSA ABLOY


www. c i t y s e cu r i t yma g a z i ne . com


We have seen a real willingness from our officers to do more and today, private security firms are increasingly engaged with law enforcement agencies in ways that extend far beyond the ‘traditional’ view of what security officers are employed to do. A good example of this is at Paternoster Square in the City where our security team actively carries out joint patrols with City of London Police during Project Servator deployments. Furthermore, the Paternoster Square Security Forum brings together a host of security managers from the area who, collaboratively, help keep the City safe.


The police recently launched ACT – Action Counters Terrorism. The campaign focuses on the critical role the public can play in defeating terrorism by reporting suspicious activity and calls on communities to act on their instincts to help prevent atrocities taking place in the UK and overseas. Individual incidents, when seen in isolation, may seem meaningless, but when pieced together in the round by Counter-Terrorism specialists, they paint a bigger picture. It is therefore up to us all to ensure that our concerns are acted upon and reported. But more than this, we can share our knowledge with family and friends to explain how important even the smallest piece of information could be and to give them the confidence to act.


Last year, the Anti-Terrorist hotline received over 22,000 calls from the public, and the information received directly assisted in over a third of the most high-risk investigations. This highlights the power of the individual if they can be persuaded to trust their instincts. As stated, we are urging our security officers to personally spread the word: to tell their friends and families about what they do, and the role they play as part of the wider security ‘network’. We hope that by explaining how simple vigilance can make a difference, we can all ultimately contribute to saving lives and defeating terrorism.


Dave Mundell Managing Director, Axis Security


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39