Tuesday, 22 August 2017

Hotel Security & Terrorist Attack





Hotels in particular have been considered a soft target by extremist groups across the world, so what can hoteliers and indeed other hospitality businesses do in the way of a proportionate response to the increasing threat?
It is important to ensure that the response is proportionate and in particular a hotel needs to maintain a friendly and welcoming atmosphere in order to attract guests whilst doing all it can to protect them. There are also legal requirements under health and safety laws for companies and individuals who own or run hotels to consider a real possibility of a terrorist incident.
Terrorism can come in many forms, not just a physical attack on life and limb. Terrorism also includes threats or hoaxes designed to frighten and intimidate gold attacks designed to cause disruption and economic damage. It can include interference with vital operational, information or communication system, which can have an effect on the businesses ability to operate. Some attacks are easier to carry out if the terrorist is assisted by an 'insider' or by someone with specialist knowledge or access.
A compulsory action : 
You have to understand your premises, identifying the threats to it, and its vulnerability to those threats. Hoteliers should over the coming month review and test current safety arrangements, audit them and as a result improve planning and response. In particular you should ensure training; information and equipment are provided to all staff, and especially to those involved directly on the safety and security side. 
Supplementary security measures
You have to think about physical security, information security and personnel security. There is little point investing in costly security measures if they can be easily undermined by a disaffected member of staff or by a lax recruitment process. In the run up to a busy period it is easy to fall into the trap of being desperate for additional staff, and so be willing to circumvent normal background checks.
Before you invest in additional security measures, review what you already have in place. You may already have a good security system on which you can build. You should have measures in place to limit access into service or back of house corridors and vehicle access control measures into goods and service yards.
The staff may be unaware of existing security measures, or may have developed habits to circumvent them, e.g. short cuts through fire exits. Simply reinstating good basic security practices and regularly reviewing them will bring benefits at negligible cost. If you need additional security measures, then make them cost-effective by careful planning wherever possible. Try to introduce new equipment or procedures in conjunction with planned building work and remember that significant changes may require statutory consents such as planning permission or building regulations consents.
Re-examine your security measures
You have to regularly review and exercise your plans to ensure that they remain accurate, workable and up-to-date. You should be aware of the need to modify them to take into account any changes in your hotel. Rehearsals and exercises should wherever possible, be conducted in conjunction with emergency services and local authorities.
Be sure that your staff understand and accept the need for security measures and that security is seen as part of everyone's responsibility, not merely something for experts security professionals gold. Make it easy for people to raise concerns or report unusual activity and ensure that you investigate such comments.

Monday, 21 August 2017

School Security Training




Given the numerous mass shootings at schools that we have seen across the country, it only stands to reason that administrators are looking to integrate security features into any new school buildings or renovations. 
Beyond the practical benefits, these safety upgrades can also provide important peace of mind for those who attend or work at the school as well as parents and community members.
But these physical changes to buildings are only as successful as the security measures integrated into them and the training to support them.
School administrators must realize that preparedness occurs in three layers. The first layer is physical and technical security measures. The second is the development of policies and procedures to ensure those features are utilized as designed and intended. And the final and most important security layer is training. These layers are like the legs of a stool — you need all three to make a safety plan successful.
A key part of new construction or remodeling of schools to implement safety features is understanding the security needs behind different features and how those measures are best utilized in an emergency.
The three primary goals are deterrence, minimize loss, and notification. Physical
security can be a deterrent to criminal activity. Cameras are a good example of this. They can be
either overt or covert. Overt cameras are not hidden and a monitor may be visible to indicate
"we're taping and watching!" Overt cameras are part of a prevention plan.

Friday, 18 August 2017

Advantages of Surveillance cameras For Schools



Surveillance cameras have redefined security monitoring, surveillance activities and law enforcement measures. Due to the prevalence of theft and the threats from unscrupulous elements and wrongdoers that vulnerable youngsters, teens and young students face, school administrators, principals, supervisors and trustees have deemed it important to deploy surveillance cameras in schools in recent years. There are many advantages of investing in surveillance cameras for schools.
1-    General Safety and Security
Investment in surveillance camera systems by school districts ensures parents and guardians that the general safety and security of children are being addressed during schools hours and at all after-school extracurricular activities and programs.
2-    Crime Deterrent
The presence of highly visible surveillance cameras at strategic locations in buildings and public areas/premises of a school property prevents theft, vandalism and acts as a deterrent to thieves and criminals from indulging in illegal activities.
3-    Sexual Predators
One of the biggest threats that school children face is the threat of sexual predators and pedophiles hanging around unobtrusively on school campuses or in parking lots. Camera systems' footage is very useful in tracking down predators or helping inform police about threatening situations in real time.
4-    Prevent Bullying
New-generation surveillance camera systems have audio, voice and sound capturing capabilities. Teenagers bullying or harassing other students can be disciplined based on video and audio footage records.
5-    Emergency Evacuation
School security personnel manning surveillance camera systems in real-time can take quick action about evacuating children, faculty and staff in case of emergencies related to fire or other potentially dangerous situations.


Wednesday, 16 August 2017

How to Motivate Security Personnel




Security guards are hired for many reasons. However, it is very important that you look for a company that provides fully proficient guards. Generally it is believed that the company with a high turnover rate is not a good option to consider because constant turnover of security officers means that there is a high chance that a few or all the officers on duties are either inexperienced or new.
It usually takes six month to train a security guard which means that a company with more new security officers is not reliable as their guards will not be able to detect an unusual activity due to their unfamiliarity with the site. Furthermore they will be less likely to make a good decision in case of any emergency.
The security guard company is bound to take essential steps to retain their experienced security guards. However this is certainly not sufficient as there are a number of things that the client company should do to improve security guard retention. Both the client and the company has to work together to solve this problem.
Here are some of the suggested changes that you can make to keep the security guards motivated in working for you:
• Treating them with respect
• Get to know your security guards
• Providing clear directions to the security guards
• Show them your support when they are doing the right thing
• Acknowledge good performance
• Provide a healthy working environment

Indian Security Challenges




Governments of numerous nations make huge investment and provide good support for the border security. Still, border and maritime security continues to present challenges to governments around the world. The proper management of borders presents many challenges and includes coordination and concerted action by administrative, diplomatic, security, intelligence; legal, regulatory and economic agencies of the country to secure the frontiers and sub serve its best interests. India's land borders exceed 15,000 km which it shares with seven countries including a small segment with Afghanistan (106 km) in northern Jammu and Kashmir (J&K).
Wagah is a border town straddling the line between Pakistan and India, 29 km from the town of Lahore on the Pakistani side and 27 km from Amritsar on the Indian side. This is the only crossing point between Pakistan and India that is regularly open to foreigners.
The most attractive aspect of the Wagah Border is the ‘Beating the Retreat’ ceremony that takes place every evening. The ceremony starts at sundown and lasts for about 30 minutes to 45 minutes. The retreat includes the changing of guards and the retreat of the Indian and the Pakistani flag. The show is synchronized between the Indian Border Security Force (BSF) and the Pakistani Sutlej Rangers and has been conducted every day since 1959. The drill includes long and brisk strides, foot stamping and crisp salutes as each side tries to outdo the other with respect to the sound of the footsteps and speed. When the heavy gates are opened, there is an exhibit of furious looks and a show of anger that is staged. While there are thousands of spectators, there is complete silence during the ceremony as everyone looks in awe. The lowered flags are respectfully folded and carried back to the respective countries, after which the gates are slammed shut. 

Saturday, 12 August 2017

Responsibilities of the Traffic Marshal





A traffic marshal recently sustained a lost time injury whilst carrying out his marshaling duties. ... The Traffic Marshal is the eyes of the vehicle/plant operator, his/her primary responsibility is to guide vehicles and plant safely, ensuring contact is avoided with people or objects.
Being a traffic marshal is a little like being the eyes and ears of the driver of a large vehicle, particularly cranes. These vehicles are awkward to move and don’t allow the driver a good line of sight around him so a traffic marshal is instrumental in this safe movement. The marshal can use a number of ways to communicate with the driver, ranging from simple hand signals to a radio connection to give full and specific instructions.
The responsibilities of the traffic marshal therefore start with ensuring that the area around the vehicle is clear and safe before it begins to manoeuvre. The marshal will then walk in the front of the vehicle, clearing any obstructions from the vehicle’s path, while also looking out for anything that could cause an obstacle for its progress or even a distraction for the driver.
Once the path is clear, the marshal will then stand still in a safe position where the driver of the vehicle can see him and communicate with them, regardless of the means used. If there is a long distance movement involved, then the marshal will repeat the process, ensuring each section of the route is clear and that he can stand in a new position for the driver to watch.
While doing this, the marshal should also keep watch for other people in the area as well as other vehicles.

Thursday, 10 August 2017

Security Technique - Access control




Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.
There are two main types of access control: Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data. The four main categories of access control are:
• Mandatory access control
• Discretionary access control
• Role-based access control
• Rule-based access control
Access control technology evolves rapidly, so you always want to plan for a path forward with each installation. Ensure that you are using devices and systems that can be easily integrated and added on to. It will make your position much more seamless in the years to come.