How To Manage An Experienced Manager

The key to managing an experienced manager in your operation is to monitor their results. If they are getting the results that you expect of them, stay out of their way. If they are not getting the results, you had better take over – at least until you sort out what is stopping production. When you hire a manager to look after a section of your business, it is a waste of time for you to continue doing the job you hired … [Read more...]

The ASIS International Australia Conference 2017

The ASIS International Australia Conference 2017 is the premier gathering of security professionals. The conference provides an established platform for education and business exchange, addressing the key trends and issues facing security professionals locally and globally. Key topics Terrorism Cyber-Security Behavioural techniques Security Management Emergency Management The conference is a great … [Read more...]

Teaching Sales Staff To Respond Effectively To EAS Alarms

Most readers are familiar with electronic article surveillance (EAS) systems and their utilisation as a fundamental loss prevention (LP) tool. A recent article stated that approximately 80 percent of American retailers utilise some EAS tools, but only 44 percent of LP professionals describe it as effectively executed. This article focuses on addressing one of the biggest downfalls when utilising EAS systems – the lack of … [Read more...]

My Memories Of September 11

This article has little to do with aviation security other than September 11 was an aviation security event and I was sent to New York to manage Qantas’ on-ground response. My experience was minor in the scope of the events and restricted to Qantas operations, but it was a defining time. This article is dedicated to Qantas JFK Airport Manager Joe Ward and the JFK Qantas staff on duty on September 11, 2001. They were all … [Read more...]

A Strategic Approach To Physical Security

By Tony Haddad Physical security assets are often high-value assets of significance to an organisation, and are costly to procure and maintain. When seeking to secure budget approval of a new security system, the typical business case will focus on the cost of installation. The client will traditionally document the requirements, at times with the assistance of a specialised security consultant, and these requirements … [Read more...]

Genetec Announces Mission Control—Situational Intelligence and Decision Support System

Offering Will Empower Organizations to Confidently Manage Both Routine Operations and Unexpected Incidents Genetec Inc. (“Genetec”), a leading provider of open-architecture, IP security solutions recently announced Mission Control, a Decision Support System (DSS) that will provide security professionals with new levels of situational intelligence, system visualization, and incident management. Designed to work … [Read more...]

Honeywell puts building controls in occupant’s hands

Mobile software application enables building occupants to tap into Internet of Things capabilities to address common building issues including temperature settings, access control. SYDNEY, Nov. 15, 2016 – Building occupants long have grappled with whom to call when their work area is too cold or how to gain access to a facility when they forget their access card at home. Honeywell (NYSE: HON) announced a new mobile … [Read more...]

GLOBAL THREATS DRIVES HOLOGRAM 2017 GROWTH, SAYS TRADE BODY

The IHMA’s Dr Mark Deakes says there will be continuing demand for authentication and brand protection holograms in 2017 CONTINUING demand for effective security devices to meet global threats will drive growth for authentication and brand protection holograms in 2017, says the industry trade body. Next year marks 70 years since the first commercial hologram was developed and the International Hologram Manufacturers … [Read more...]

What VIP Close Protection Staff Think Of Their Employers

Close personal protection (CPP) is usually provided by police to government VIPs and occasionally to persons at risk from politically motivated violence. Celebrities also employ CPP or bodyguards who either have protective security backgrounds or are employees of security companies. They obviously have to work closely with those they protect and it often becomes a career job if they get on well with the person being … [Read more...]

External Risks And Shocks – How Resilient Is Your Organisation?

The fact that today’s businesses are global is not news, but the extent of the globalisation of trade and commerce – and the risks it presents – are far from understood. In an increasingly interdependent world, organisations are often on the frontline when it comes to systemic shocks, catastrophic events or unanticipated political upheaval. The recent Brexit referendum in the United Kingdom produced a far from united … [Read more...]

That Girly Touch: Why Many Attempts To Attract Women To Cybersecurity Might Actually Achieve The Opposite

The problem is familiar. Cybersecurity is still a male-dominated field. Women make up only 10 percent of the global cybersecurity workforce. The field is missing out on a lot of capable people and women are missing out on an interesting, well-paid career path. There have been numerous initiatives trying to change the situation, but fighting existing stereotypes has proven to be hard. The underlying problem: society … [Read more...]

The Cost of Security

Security is expensive, particularly bad security. The following is an example from friends who attended an outdoor event as vendors where they had paid a considerable fee to trade until 5pm each day. On this occasion, at 4.30pm each afternoon, the hired security guards would start shepherding the patrons out the gates and quite forcibly advising the vendors that they had to stop trading by 5pm, including the food and … [Read more...]

Three Fatal Mistakes Most Risk Consultants Make

Warning: this article may upset some conservative risk managers. Risk management in modern non-financial companies is very different compared to five years ago. The level of risk management maturity, for lack of a better word, has grown significantly. As more and more companies across the globe are looking to implement robust risk management, the demand for risk management consultants is also growing. Unfortunately, not … [Read more...]

The Myths About IP Versus Traditional Access Control

As the popularity of IP (Internet protocol) CCTV continues to grow, manufacturers, integrators, consultants and, most importantly, clients are increasingly looking at IP for their other security system solutions. The IP electronic access control technology, while not as mature as its CCTV counterpart, is becoming more common as manufacturers try to emulate the successes of IP CCTV. As with the initial introduction of IP … [Read more...]

Who Is Next In Line?

Two conversations recently brought home the need for succession planning. The first, a friend’s remark regarding an industry meeting he had attended, “I looked around the room and realised we were all old men.” Second, a call from another friend to tell me that he had cancer. If those in the industry are indeed engaged in the art of security, the industry should be able to look ahead, plan for the future and … [Read more...]

Leadership by Example

Although I didn’t think soat the time being drafted into the US Army while living in America was the best thing that could have happened to me. I was 19 years old and had just finished high school with the intention of going on to university in California when Uncle Sam called. During my 3 month Basic Training course I quickly learned self-discipline, self-reliance and developed a grudging admiration for the leadership … [Read more...]