Page 36 - the SyI Quarterly 10
P. 36
Security Community
Institute Community
employee passes used remotely can be vulnerable to theft and the loss of these devices can often lead to an
increased risk of data theft.
Security threats and the best Conflict and Harassment
Altercations can take many forms including conflicts between employees, or issues with voyeurism or
harassment from within or outside the business.
THE FUNDAMENTALS OF GOOD SECURITY
Here is a reminder of the key elements that need to be in place, in order to achieve good security to help
practice to stay one step ahead stay ahead of the threats.
Regular risk assessment and planning
With regular risk assessment and planning the foundation of good security, it’s important to consider
whether the organisation’s risk assessments and plans are up to date.
Noah Price, Head of the G4S Academy, provides an overview of the security Have there been any changes in the assets that need to be protected? People, property, information
threats faced by many businesses and organisations, as well as a useful or reputation? Have the threats to these assets changed or evolved and are there any new or changed
reminder of what makes good security, to help stay one step ahead. vulnerabilities?
Does the security plan still protect the assets with appropriate integrated security solutions, or are there any
Terrorism weaknesses or gaps?
With the current threat to the UK from terrorism rated as ‘substantial’,
meaning that an attack is likely, terrorism is one of the biggest security Regular testing
concerns for many. In the same way that businesses use penetration testing to test cyber security, physical security should be
Attacks could potentially occur at any location. Preventing them is tested against various scenarios.
challenging, with the target usually an individual choice that cannot always Table-top exercises can be an excellent way to identify possible weaknesses and ensure preparedness in
be anticipated. advance of a real incident. They should use relevant scenarios and identified threats to help test mitigation
Activism plans and training.
Activist groups that could pose a threat include Extinction Rebellion, Insulate Britain and the anti-vax Training
movement, with the likelihood of an increase in activity through Spring of 2022. With threats constantly evolving, it’s more important than ever to focus on training. Organisations benefit
hugely from thinking about training in a more holistic way. While security officers must receive training that is
Covid-related Protest relevant to their customer’s assets, procedures and identified threats, clients can also benefit by encouraging
Protests against Covid vaccinations are carried out by a wide range of different groups and individuals. their employees to take part in relevant security training and by involving the security team in their own in-
According to an investigation by The Times, some anti-vaxers are turning to extremist beliefs and advocating house training.
violence against healthcare workers.
Working in partnership
Urban exploration The best security solutions will be achieved when security providers and clients work together, sharing
The trend for people to trespass into buildings to explore, climb and post videos of their activity, poses a desired outcomes, plans and information as part of an iterative process. This close collaboration can also
significant threat. lead to cost and time savings.
Risks include physical danger to the climber on a business’s property, legal action against the building’s
owners if the intruder is injured or killed, disruption to business operations, particularly if an evacuation Developing a security culture
is required and damage to property. As content is usually posted on social media, there is also the risk Developing and sustaining an effective security culture is a vital part of an organisation’s personnel security
of reputational damage and of hostile reconnaissance being available to organised criminal gangs and regime. Getting the culture right will ensure that employees are security-conscious and think about how to
terrorists. protect the information and assets that they have access to at work.
Insider threat Insights, shared information and best practice
Insider threat can take many forms. It could be: Good security utilises insights and shared information, while also using best practice from first responders.
● A ‘deliberate insider’ that obtains employment with the intent of abusing their access. Balancing security and customer service
● A ‘volunteer/self-initiated insider’ who obtains employment without intent to abuse their access, but In addition to providing an excellent security service, security officers must be friendly, reassuring and well-
at some point, decides to do so trained in communication skills.
● An ‘exploited/recruited insider’ who obtains employment without intent to abuse their access, but at
some point, are exploited or recruited by a third party to do so Taking advantage of new ideas and new technologies
● An ‘accidental insider,’ who by their actions might inadvertently leak information or provide other With threats constantly changing, organisations can benefit from new approaches. Adopting emerging
types of access, either because they haven’t received adequate training, or because they have been asked technologies, may improve security, while also making it more efficient, welcoming and reducing costs. .
to undertake an action that they don’t recognise as being something they shouldn’t do.
Accidents, fire, natural disaster. Accidents can happen at any time, and there is also the chance that Building integration in security
organisations could be affected by fire, flood or another natural disaster. Finally, security that is integrated, or planned holistically, is likely to work better, because it has been designed
to ensure that there are no gaps to be exploited.
Covid Physical security will work best when expertise, security professionals, technology and data analytics are
Covid is a threat to security on many levels, from risks associated with new ways of working to potential staff considered together. In the same way, physical security should not be considered in isolation, as it is
shortages. The pandemic has led to significant changes in ways of working and this has made cyber security, intertwined with personnel security and cyber security.
as well as physical security, a real challenge for many organisations.
Noah Price is Head of the G4S Academy UK&I, which is responsible for sharing specialist threat and security
Theft knowledge. It provides regular, free security bulletins on potential threats. For more information https://www.
Many organisations focus on securing physical items and equipment. However laptops, dongles, and even g4s.com/en-gb/what-we-do/academy
36 37