off

Saving Time, Saving Money: A Risk-Based Approach Towards Cyber Security

If you’ve glanced at the opinion columns of security industry publications of late, you’ve probably seen the term ‘risk-based’ floating around, as in ‘the time is now for a comprehensive, risk-based approach’ or ‘a risk-based approach to security is...
Posted On 23 Jun 2019
off

Be Prepared and Plan for the Worst: How to Communicate in a Crisis

Be prepared and plan for the worst. That’s the maxim for managing communications in a crisis, as indeed it is for all contingency planning. For its part, security communications planning is a strategy designed to help management make better decisions. Only preparation and...
Posted On 12 Jun 2019
off

The Insurance ‘Win-Win’: Assessing The Benefits of Water Leak Detection

The latest figures issued by the Association of British Insurers (ABI) outline that ‘escape of water’-focused insurance claims pertaining to commercial and domestic property are costing insurers no less than £2.5 million every day. Across a four-year period, this...
Posted On 12 Jun 2019
off

Cloud-Based Access Control: Improving Security in More Ways Than One

Access control has always been at the forefront of building security. Traditionally, access control systems have come in the form of conventional lock and key methods, electronic systems or a combination of the two. Today, cloud-based systems are changing the market landscape,...
Posted On 11 Jun 2019
off

Managing Industrial and Organisational Lockdowns

In this modern day and age we all expect to be safe while we’re at work. For their part, employers have a Duty of Care to do whatever is reasonably practicable to protect the health, safety and welfare of their employees and visitors while on their premises. The Health and...
Posted On 06 Jun 2019
off

Converged Security: The Centre of Attention

In today’s high-risk and high-threat environment, there’s a very real and immediate need for a converged security approach that actively unifies the monitoring of both physical and cyber security events through a single platform. Here, James Willison and Sarb Sembhi outline in...
Posted On 05 Jun 2019
off

Voice Biometrics: Authentication Technology Speaks for Itself

Traditional login systems have enjoyed a remarkable longevity, writes Piergiorgio Vittori. Today, though, they’re no longer fit for purpose. The problem is not with the concept of the username and password combination. Rather, it’s that the system relies on the...
Posted On 02 Jun 2019
off

The Dawn of Intelligent and Predictive Security

When did your business last undertake a security risk assessment? How do you evaluate threats or vulnerabilities? Are there any gaps in your security measures? Do you have full confidence in the security technologies that your business employs? Omar Abu-Rish explains why, as...
Posted On 29 May 2019
off

Surveillance Camera Day 2019: Join The Conversation…

Two years ago, the Surveillance Camera Commissioner launched the National Surveillance Camera Strategy for England and Wales. It’s broad in reach with no less than 11 work strands drawing in expertise from across the surveillance camera industry from different backgrounds –...
Posted On 29 May 2019
off

Retail Security: Using Technology to Boost Protection and Enhance The Bottom Line

Britain’s hard-pressed High Street retailers are in a position whereby they require real and tangible assistance in order to combat rising crime-related losses. Here, Trevor Wallace argues that the solution lies in technology that simultaneously boosts bottom line returns on...
Posted On 21 May 2019