Security training - Expert commentary
As the vaccine roll-out proceeds, people across the UK are counting the days until we can get back to some kind of ‘new normal’. Just as we’ve seen in education and healthcare, the return to the workplace and other public spaces will be accompanied by enhanced sanitisation and social distancing measures. To make the return as swift and safe as possible, those of us involved with managing, building and constructing buildings should consider how we can help facilitate and suppor...
Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offi...
The Security industry’s role in maintaining safe workplaces has never been more critical. Yet, individual security officers remain likely to drop shifts at the last minute and with greater frequency in the current climate, with illness, lockdown, self-isolation and home-schooling all common reasons for being off. Having a reliable bench with relief officers on hand has never been more important. Sorting drops internally (as opposed to using agency officers) is no longer nice to have to im...
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic imp...
With the postponement of tradeshows and events due to the effects of COVID-19, Vanderbilt and ComNet have taken their high quality, innovative solutions online, directly to their customer base. Through an Online Events and Training resource, you can stay connected with the brands’ top resources and products, as well as join upcoming product webinars hosted by their in-house experts. With a majority of the world currently working from home, businesses must respond to this changing landscap...
When we popped the champagne to celebrate the start of a new year in January, not many could predict that less than three months later, we’d be facing a global pandemic and the economic challenges that a worldwide lockdown would bring. In conversations over the last several weeks, reports from integrators have vacillated between being flush with work or fearful that projects were drying up — without a whole lot in the middle. But in these conversations, a central theme has emerged: d...
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutio...
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emot...
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military c...
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated pu...
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-a...
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each o...
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anythi...
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminar...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and...
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focu...
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem...
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West...
With the recent tragic events in Florida, it’s evident that schools require more tools to help ensure their students’ safety. With that, school and municipal officials all over the country are looking for more advanced ways to combat gun violence. While there is no perfect solution for the myriad of threats and emergencies with which our schools are confronted, many have looked to technology to help improve communications before, during and after incidents. For schools across the...
Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualisation and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being l...
Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. Th...
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge t...
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many...
In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organisations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global ente...
PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisat...
Over the past year, we’ve heard a lot of big buzzwords in conversations at different conferences, meetings and events. Deep learning, artificial intelligence and cybersecurity are hot topics, and these trends will undoubtedly define the landscape over the coming year. Other issues, mostly IT related, are also making their way into more and more surveillance-focused conversations and to me, none is more complicated — or beneficial — than hyperconvergence. W...
What a year it’s been! 2017 has been a monumental period of product innovation and growth for Pivot3. The company experienced a more-than-50-percent increase in bookings from Q2 to Q3 this year, including a record number of million-dollar orders. We also saw deals supporting multiple use cases more than double, and experienced continued growth in the video surveillance market, driven by new product enhancements and contracts worth more than $1 million. We have also in...
The demand for security consultancy services has increased as recent terror events have highlighted the need for effective and proportionate mitigation measures. Security training has seen an increase in demand, especially for technical courses in the areas of access control and CCTV. Security management training has also risen, except in the oil and gas sector where demand dropped significantly; this is attributed to the suppressed oil price. However, recently there are sig...
Economic recovery has enabled companies to continue global expansion efforts. We’re seeing substantial growth with our enterprise clients – 45% year-over-year increase – and sound growth with our local markets – 14% year-over-year increase. Both existing and new clients are upgrading their current security infrastructure and investing in the development of long-term solutions. Convergence of physical security and IT security continues to trend. Threat...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download