Page 37 - the SyI Quarterly 10
P. 37

Security Community
  Institute Community









        employee passes used remotely can be vulnerable to theft and the loss of these devices can often lead to an
        increased risk of data theft.
 Security threats and the best   Conflict and Harassment
        Altercations can take many forms including conflicts between employees, or issues with voyeurism or
        harassment from within or outside the business.

        THE FUNDAMENTALS OF GOOD SECURITY
        Here is a reminder of the key elements that need to be in place, in order to achieve good security to help
 practice to stay one step ahead  stay ahead of the threats.

        Regular risk assessment and planning
        With regular risk assessment and planning the foundation of good security, it’s important to consider
        whether the organisation’s risk assessments and plans are up to date.
 Noah Price, Head of the G4S Academy, provides an overview of the security   Have there been any changes in the assets that need to be protected? People, property, information
 threats faced by many businesses and organisations, as well as a useful   or reputation?  Have the threats to these assets changed or evolved and are there any new or changed
 reminder of what makes good security, to help stay one step ahead.  vulnerabilities?
        Does the security plan still protect the assets with appropriate integrated security solutions, or are there any
 Terrorism   weaknesses or gaps?
 With the current threat to the UK from terrorism rated as ‘substantial’,
 meaning that an attack is  likely, terrorism is one of the biggest security   Regular testing
 concerns for many.  In the same way that businesses use penetration testing to test cyber security, physical security should be
 Attacks could potentially occur at any location. Preventing them is   tested against various scenarios.
 challenging, with the target  usually an individual choice that cannot always   Table-top exercises can be an excellent way to identify possible weaknesses and ensure preparedness in
 be anticipated.   advance of a real incident.  They should use relevant scenarios and identified threats to help test mitigation
 Activism   plans and training.
 Activist groups that could pose a threat include Extinction Rebellion, Insulate Britain and the anti-vax   Training
 movement, with the likelihood of an increase in activity through Spring of 2022.  With threats constantly evolving, it’s more important than ever to focus on training. Organisations benefit
        hugely from thinking about training in a more holistic way. While security officers must receive training that is
 Covid-related Protest  relevant to their customer’s assets, procedures and identified threats, clients can also benefit by encouraging
 Protests against Covid vaccinations are carried out by a wide range of different groups and individuals.    their employees to take part in relevant security training and by involving  the security team in their own in-
 According to an investigation by The Times, some anti-vaxers are turning to extremist beliefs and advocating   house training.
 violence against healthcare workers.
        Working in partnership
 Urban exploration  The best security solutions will be achieved when security providers and clients work together, sharing
 The trend for people to trespass into buildings to explore, climb and post videos of their activity, poses a   desired outcomes, plans and information as part of an iterative process. This close collaboration can also
 significant threat.   lead to cost and time savings.
 Risks include physical danger to the climber on a business’s property, legal action against the building’s
 owners if the intruder is injured or killed, disruption to business operations, particularly if an evacuation   Developing a security culture
 is required and damage to property. As content is usually posted on social media, there is also the risk   Developing and sustaining an effective security culture is a vital part of an organisation’s personnel security
 of reputational damage and of hostile reconnaissance being available to organised criminal gangs and   regime. Getting the culture right will ensure that employees are security-conscious and think about how to
 terrorists.  protect the information and assets that they have access to at work.

 Insider threat  Insights, shared information and best practice
 Insider threat can take many forms. It could be:  Good security utilises insights and shared information, while also using best practice from first responders.
 ●   A ‘deliberate insider’ that obtains employment with the intent of abusing their access.  Balancing security and customer service
 ●   A ‘volunteer/self-initiated insider’ who obtains employment without intent to abuse their access, but   In addition to providing an excellent security service, security officers must be friendly, reassuring and well-
 at some point,  decides to do so  trained in communication skills.
 ●   An ‘exploited/recruited insider’ who obtains employment without intent to abuse their access, but at
 some point, are exploited or recruited by a third party to do so  Taking advantage of new ideas and new technologies
 ●   An ‘accidental insider,’ who by their actions might inadvertently leak information or provide other   With threats constantly changing, organisations can benefit from new approaches. Adopting  emerging
 types of access, either because they haven’t received adequate training, or because they have been asked   technologies, may improve security, while also making it more efficient, welcoming and reducing costs. .
 to undertake an action that they don’t recognise as being something they shouldn’t do.
 Accidents, fire, natural disaster. Accidents can happen at any time, and there is also the chance that   Building integration in security
 organisations could be affected by fire, flood or another natural disaster.  Finally, security that is integrated, or planned holistically, is likely to work better, because it has been designed
        to ensure that there are no gaps to be exploited.
 Covid     Physical security will work best when expertise, security professionals, technology and data analytics are
 Covid is a threat to security on many levels, from risks associated with new ways of working to potential staff   considered together. In the same way, physical security should not be considered in isolation, as it is
 shortages. The pandemic has led to significant changes in ways of working and this has made cyber security,   intertwined with personnel security and cyber security.
 as well as physical security, a real challenge for many organisations.
        Noah Price is Head of the G4S Academy UK&I, which is responsible for sharing specialist threat and security
 Theft   knowledge. It provides regular, free security bulletins on potential threats. For more information https://www.
 Many organisations focus on securing physical items and equipment. However laptops, dongles, and even   g4s.com/en-gb/what-we-do/academy
 36                                                         37
   32   33   34   35   36   37   38   39   40   41   42