it’s personal
of protection that enables clients to go about their daily activities with virtually no intervention while maintaining complete peace of mind. This may be as simple as a phone app which provides location details so that security professionals can attend to a client as soon as they are needed, even in low-pressure situations where surveillance is not otherwise required.
Technology is also playing a part in minimising unnecessary contact between security teams and clients. For example, video calls can sometimes be used to supplant or supplement face-to-face meetings, such as security briefings, as well as reducing the need to travel and physically interact with colleagues and clients.
Rapid temperature-testing technology, in the hands of trained security professionals, can identify those at risk of infection, providing the necessary intervention with compassion and decisiveness to keep clients secure.
In-built security
Consulting with security experts will ensure a client’s long-term security. Moving to a new house or redesigning a home is a stressful process for anyone, but working with security experts can take a huge weight off anyone’s mind. These experts can provide intelligence about security and risk factors in the local area and will be able to provide guidance on the most effective means through which to create a home that is as secure as possible.
These measures, based upon the key tenets of Secured By Design, work to create ‘defence in depth’, layering measure upon measure to deter and deny assailants entry into a property without the impression of a ‘fortress’. Oftentimes these measures can be small or medium-sized – perhaps bolstering security conscientiousness or increasing the layers of soft-contact required before being able to gain entry – but are incremental. Not only can this physically stop or delay threats against the target, but it displays an outward impression of dignified but strong security which can deter opportunistic criminal attacks.
Carrying out a home security assessment remotely may prove particularly challenging and it may be considered that a physical review remains the only real viable option. In these cases, security professionals can employ the required measures to keep themselves and
Knowledge, experience and intelligence sit at the heart of effective personal security.
their clients safe, including the use of PPE, exemplary hygiene measures, and social distancing measures employed throughout the assessment.
Advice and guidance can also be given on more technical aspects such as cybersecurity. The cost and sophistication of cybercrimes are increasing year on year and people-based attacks have seen the greatest rise in numbers.
Spending on cybersecurity is also increasing. Cybercriminals will target personal computer systems, smartphones and digitally encrypted physical security defences, such as gates and home alarm systems. Consultations on what interventions are the most effective can be invaluable.
Peace of mind
It is important to understand that personal security is totally unique. Businesses will implement security measures according to their cost-benefit risk analysis. Many will accept a certain degree of loss due to the difficulty of preventing it. However, this is not the case with personal security, where even a low level of risk may be intolerable. Personal
© CI TY S ECURI TY MAGAZ INE – SUMMER 2020 www. c i t y s e cu r i t ymag a z i n e . com
security is not only about safety but also ensuring peace of mind, and this is what highly professional and experienced officers are trained to do.
Ultimately, personal security solutions must be highly tailored to the individual. These services should begin with a consultation with the client and an in-depth risk assessment to understand the objective risks and the client’s own needs. Security should provide peace of mind so that clients can go about their lives as normal, without fear or other worries.
Darren Read Managing Director Amulet
www.amulet.co.uk
>
15
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36