Can the built environment be designed to reduce crime?
How can you reduce crime in the built environment?
Most cultures function within a set of rules that are developed to manage and effect the
behaviour of society.
Where behaviour is deemed unacceptable or anti-social, these rules are
often communicated as ‘laws’ and the concept of ‘crime’ is introduced. Historically, the desire
to prevent crime tended to focus upon the pressure that could be exerted by local communities on
those who might behave in a way that would be detrimental to either a member of or the community
as a whole.
GDPR - an opportunity or a risk to the Physical Security Industry?
Understand the new General Data Protection Regulation
On the 25th of May 2018, the European Union, General Data Protection Regulation (GDPR) comes into force across the EU.
Regulations have binding legal power throughout every Member State and come into effect on a set date. Directives can only define certain results that must be achieved but each Member State is free to decide how to interpret Directives into national laws.
Setting your security budget
How does your Organisation decide how much money to spend on security?
With an ever-increasing need to justify and account for all forms of business expenditure, how does
an organisation decide how big its security budget should be?
There is often pressure to deliver productivity improvements and this frequently results in the desire to
reduce costs. Cost-reduction measures can be implemented through traditional programs, such as outsourcing,
offshoring and strategic sourcing, but all too often they include other isolated cost-reduction activities
of the kind that can leave security budgets misaligned with either the level of security risk or the needs
of the business.
Aligning Your Risk Management Budget
Assessing an Age-Old Adage
A popular tenet of risk management that persists today states:
“One should never spend more on security than the value of the asset(s) being protected.”
This tenet was supported throughout the 1990s and early 2000s by many security scholars analysing newfound
vulnerabilities in the budding computer networks of governments, businesses, and other ‘modernising’