search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
FOCUS


Current affairs


Its publication comes at a time when, after


20 years of declining crime, the Home Office has published statistics showing that this has reversed. The latest police figures point to an overall increase in crime of 14%, following a similar increase in the previous period, with more crimes featuring the use of weapons. Simultaneously, the figures for cyber based crime and fraud continue to mount. Most crimes in the built environment are of course acquisitive crimes. Such crimes do not occur through accident or bad luck. They happen when criminals reason that the potential reward trumps the risk taken. So, no matter how impulsive or bizarre the offender’s decision had been, the fact that a financial loss was incurred points to the failure of the owner to manage that particular security scenario. Of course, owners can’t be blamed if they


have accurately assessed a particular risk scenario, yet decided that the risk and its consequences were sufficiently remote to be accepted. Provided, that is, that a careful and structured risk assessment had been carried out. One should have sympathy for the owner having to strike the correct balance when formulating a security strategy to protect the assets of the organisation.


52 MARCH 2018 www.frmjournal.com


If the assumption is made that securing the assets will be a relatively straightforward process – albeit possibly expensive – the assessor will probably be disabused. Some investment of time in understanding the issues and what can be expected of the huge range of security products and services is unavoidable.


Assess the risk


By their own admission, the providers and installers of security products and services are often not the best equipped to determine the customer’s security requirements. Someone, if not the owner – perhaps an employee or adviser – must take on the job of assessing the risk, determining the organisation’s risk tolerance and formulating a security strategy. It is that individual for whom this handbook aims to provide practical support during the process. Readers familiar with that process can use the publication to be updated on particular elements of premises security where things have moved on. Those who are tasked with formulating a security strategy from scratch, yet are less familiar with the


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60