Success
Thank you for your request. A Wilson Security representative will contact you shortly.
Failure
Your enquiry could not be sent at this time. Please try again later, or alternatively contact Wilson Security on 1300 945 766 or via email at contact@wilsonsecurity.com.au.
Captcha
Please enter the text from the image

 

 

Developing and Implementing Best Practices for Access Controlhttps://www.wilsonsecurity.com.au/blog/Pages/Developing-and-Implementing-Best-Practices-for-Access-Control.aspxDeveloping and Implementing Best Practices for Access Control ​ Access control is a critical part of any organisation's security overlay. Your initial line of defence against unwanted entry, access control is not only your first chance to defeat potential intrusion but can also be a powerful deterrent for less committed hostile actors. Proper access control measures limit the need for responses by personnel or other security systems such as video surveillance, reducing the risk to assets and minimising the resources required to successfully protect your people and assets. Defining what access control means for your organisation and how best to implement it in a safe and effective way can be difficult. It requires considering questions about the value of certain assets; the risk posed to those assets; where you've fallen short in protecting these assets; and the extent to which your current security measures adequately protect against these risks. You also need to weigh this against the level of inconvenience that your staff are willing to accept as well as the health and safety implications of certain measures. Wilson Security has worked closely with building owners, corporate tenants and facilities managers to develop comprehensive security solutions for businesses across a range of industries, so we understand the importance of access control and the different ways measures can be deployed. Read our blog and make better informed security decisions for your business today. Identifying the role of access control Because of the potential to deter, defend against or even completely defeat potential threats access control should have a central role in your organisation's security plans. While it can be a powerful first line of defence, there are limitations and these need to be clearly understood in order to be effective. The best forms of access control require that you first understand the ways in which people interact with your property. This means taking the time to identify where a restricted asset or area is, who should be able to access it, and when they should be permitted to access it. Our experience has taught us that effective access control measures err on the side of caution; take an exclusive approach that eliminates everything barring a few select acceptable access scenarios. Once you've defined the acceptable window of access, you can begin to determine what falls outside of that. Referred to as the principle of least privilege or 'need-to-know', this conceptual shift means that you're likely to end up with a smaller pool of people who are able to access the asset, naturally limiting your risk. Taking a layered approach to security Once you've determined the few acceptable access scenarios for your asset, it's time to start developing measures that prevent access in unacceptable scenarios. Access control is a broad area of practice that can involve everything from automated systems to manned solutions. Especially for larger, high value or more complex properties, multiple interconnected access control measures may be required to achieve the right level of security. This reflects the principle of layered security – deploying multiple security systems concurrently and consecutively in order to slow or halt any unauthorised access. A simple example can be seen at many buildings with allocated carparking– the installation of staffed checkpoints allows scrutiny of visitors coming in via a certain route, but it's useless without a fence or other physical barrier that stops people from simply avoiding the checkpoint all together. Similarly, a person who has skimmed an access card for your building is going to have little problem getting past key card locked doors, but investing in multi-factor authentication – such as requiring the simultaneous entry of an access code or submitting to a biometric scan – can severely limit the potential for damage. In all of this, it's important to not lose sight of your regulatory requirements such as providing safe fire escapes for all personnel. Working with an experienced and professional security company when devising your solutions ensures that you're balancing convenience, safety and security without compromising on any. Building the right systems There's no one size fits all access control solution, as the material facts and security requirements of each property will differ sharply. The right solution comes from close study of your needs and your own vulnerabilities, and a thorough understanding of the appropriateness of each access control system. View our blog terms and conditions here Access control is an essential part of every business’ security. Wilson Security makes you aware of some of the considerations in our latest blog.Retail2018-12-18T16:00:00ZTrue
How do analytics play a part in supporting the value of security service?https://www.wilsonsecurity.com.au/blog/Pages/Analytics-supporting-value-of-security-service.aspxHow do analytics play a part in supporting the value of security service? ​Big data. It’s a buzz word that is here to stay, and for good reason. Referring to extremely large data sets that have previously been too complex for average analysis platforms, ‘big data’ now allows us to sift through huge amounts of information to identify actionable insights. It’s in these insights where the value of security service really comes into its own. Until the advent of big data, security analytics focused on looking at previous security events to inform future strategies. Now, by assessing wide ranges of information, security analytics can monitor data in real time and produce new and predicted patterns that security providers can use in risk assessment, security scaling, procedure refinement and proactive security behaviours. Using analysis for risk assessments In the past, security strategies and risk assessments were based on assumed knowledge of behaviours, past events, established patterns and the expertise of security professionals. But as modern threats continue to diversify thanks to advancing technology and savvy opportunists, risk analysis has needed to become more agile in its ability to adapt to real time and predicted threats. Modern risk assessments allow security firms to take insights from data analysis to address a range of vulnerabilities including Hazard and event risks Operational and physical Rrisks Technology and informational risk Market and economic risk The data that feeds this information comes from a huge range of sources, and has been fuelled by a few key changes in recent years such as Advances in cloud computing and its impact on how people, businesses and governments interact An increase in the use of wireless and wired security systems and corporate networks Increasing use of mobile devices used by organizations in the management of crisis response and crisis, individual safety and emergency response on company premises Advancements in the technology of video analytics Leveraging controlled access technology and security systems to fuel analysis Cloud computing and wireless technology have opened an incredible opportunity for private security analysis to offer far more than simple security. By analysing data gained from access control infrastructure, security analysis can deliver valuable insights to businesses about their daily operations, traffic flows, vulnerabilities, emergency situations and procedures and much more. These insights enhance the level of service and ROI of security, giving businesses the ability to make informed decisions far more quickly. The range of applications for security data analysis is extensive, with every industry able to take real advantage of the insights available to them. This is especially so when there is an innovative and integrated security solution at play, combining multiple technologies such as video analytics. Video Surveillance changing the game The capabilities of video surveillance have far surpassed simply giving extra eyes to security. Now, thanks to advances in video analytics, security surveillance cameras also offer the opportunity to incorporate technology such as facial recognition and behavioural analysis. In addition to immensely improving security service, this analysis can play a huge role in business development. For example, not only can facial recognition identify suspicious individuals, it can also provide data on the demographics frequenting businesses or organisations, helping to improve service and security at the same time. Similarly, behavioural analysis can inform a retail business of shoplifting hotspots aiding loss prevention, while also mapping out traffic flow that can be leveraged for strategic merchandising. Scalable Security The real value of data analysis, however, comes into play in facilitating scalable security. Data analysis can alert security services when behavioural anomalies occur. Not only does this improve security response rates, it also gives security services the ability to scale up your security strategy in alignment with business growth. Work with a company that leverages state-of-the-art analytics technology and processes to continually improve your business’ security strategy. Speak with one of the Wilson Security team today and find out how we could help protect your assets against the threats of tomorrow. View our blog terms and conditions here ​Big data. It’s a buzz word that is here to stay, and for good reason. Referring to extremely large data sets that have previously been too complex for average analysis platforms...Technology2018-07-04T16:00:00ZTrue
Why The Right Personnel Are Essential For Finance Securityhttps://www.wilsonsecurity.com.au/blog/Pages/The Right Personnel-Are-Essential-For-Finance-Security.aspxWhy The Right Personnel Are Essential For Finance Security With an increasingly complex range of threats to counter, businesses of all kinds need to take a smarter approach to their security. This need is heightened in regulated industries, and especially so in the finance sector. Not only is the industry the number one target for theft, finance businesses are also expected to provide a superior standard of service to their customers, many of whom are high net-worth individuals (HNWIs). To succeed in the marketplace, a finance business must balance the need for a robust defence of their assets and information with the subtlety and customer service-focus expected by their customers. Achieving both goals without compromising on client satisfaction or operations security is a challenge. In this article we'll examine the range of threats and concerns facing a member of the finance sector, and offer a few potential starting points for building your own security response. Increasingly sophisticated threats As the most visible piece of financial infrastructure, ATMs pose a tantalising target for would-be thieves. Brute force attacks on ATMs are becoming less common as thieves develop more advanced tools. While as recently as 2009 Australia was experiencing a spate of high-profile attacks on ATMs in Queensland, Tasmania and New South Wales using explosives, gas and vehicles, nowadays attacks take a much subtler approach. A watershed moment in the shift of the threat away from physical intrusion into the ATM came at roughly the same time as the peak in ATM bombings and gassings in Australia, with the discovery of the Skimer malware family in 2009. Developed by the hacking collective of the same name, Skimer was the first malicious program that could be installed from a USB flash drive onto an ATM, and subsequently used to either force the machine to dispense cash or to surreptitiously gather bank card details for later usage in fraud by the attacker. Thefts linked to Skimer and similar malware-based attacks saw thieves steal millions from both the bank itself and from its customers. While many skimming schemes have shifted away from requiring physical interaction with the ATM to remote penetration of the bank's network, financial institutions still need to invest in security measures that can recognise and respond to physical tampering with the machine separate and apart from their network security considerations. Banks have invested heavily in a range of skimming countermeasures in order to boost customer confidence and reduce losses relating to credit card theft. This has involved changing the way the machine reads the card. Equally, ATM manufacturer Diebold has attempted to solve the problem at the hardware level, developing a machine that requires the card to be inserted sideways. Referred to as ActivEdge, this technology pairs a reader to a single ATM, ensuring that fraudulent readers can't be installed. Beyond compliance – a customer service-focused approach to security There's still a need for a human role in protecting a bank against theft. Even as banks invest in countermeasures such as additional CCTV cameras providing live streams of the ATM area back to control rooms within the facility or duress buttons in customer service areas, and fly up screens for tellers, there needs to be someone behind those to respond to those duress calls or suspicious activity. The challenge comes in delivering this service without unsettling or disturbing the customer. Fundamentally, even law-abiding citizens don't like being subject to enhanced security measures. Just ask any frequent flier about airport security screening to gain an idea of this. But in a world where hostile actors are increasingly subtle and stealthy in their methods, how does a company provide a comfortable and unobtrusive experience for their customers while still comprehensively defending themselves against theft? This dichotomy is at its clearest when considering the world of private banking, where clients are likely to be HNWIs and the risk for high-value thefts is at its highest. The solution is in a fundamental shift in the role of security personnel. Where traditionally a client would be guided to their safety deposit box or to a protected part of the building by a bank employee and their behaviour watched over by one or several static security guards who observed the client without interacting, now many institutions are merging the roles. Referred to as concierge security, this involves training security-qualified personnel in customer service and alternative conflict resolution methods. The reasons why are threefold The client/potential hostile actor is under the closest possible scrutiny as the nearest person to them is always security trained The institution is able to significantly cut labour costs as many – if not all – of the static security guards can be dispensed with The institution is able to achieve a higher level of customer satisfaction as legitimate clients no longer feel like their bank does not trust them. The success of this method has flowed out of private banking into the broader financial sector, and has influenced the way that many institutions manage their security. The focus across the board is now on providing field staff with the right training around customer service, concierge and conflict resolution. This change in approach to different scenarios has allowed organisations to enhance their security to better deal with increasingly sophisticated threats, without imperilling their relationship with their existing legitimate clients. It's no longer about how many armed bodies an institution can fit into a room. To succeed in a more complex and multi-dimensional world, a financial institution needs to invest in the quality of their security personnel, not just the quantity. Considering concierge security as a framework can help organisations to tread the line between a heavy-handed security-focus and an approach that sacrifices safety at the expense of providing a seamless customer service experience. Discuss your finance industry security or concierge requirements by speaking to Wilson Security today. View our blog terms and conditions here With an increasingly complex range of threats to counter, businesses of all kinds need to take a smarter approach to their securityBanking2018-06-19T16:00:00ZTrue
Using Innovative Security to Improve Retail Servicehttps://www.wilsonsecurity.com.au/blog/Pages/Using-Innovative-Security-to-Improve-Retail-Service.aspxUsing Innovative Security to Improve Retail Service ​ The way customers interact with products and the way they want to experience shopping has changed. Gone are the days of a few security guards out the front of the store checking your bags as you leave. Security is evolving and becoming less overt, while technology advances become a central consideration for businesses that wish to stay protected. This shift has created a security scene that is now home to innovation rather than purely man power. The challenge within the security industry is to not only to alter the way retail shoppers view security but also how businesses interact and utilise their protective services. A shifting perception The retail scene has always needed to employ individuals to help protect against theft. With items being small enough to put in your pockets, security personnel were needed to help guard a business’s property. This service from security was based on obvious physical deterrants which went directly against a positive customer experience. As companies have focused more on customer experience and interaction, security has had to change to be more sophisticated and targeted. This shift has led to the innovation of concierge security, which aims to provide a more complete experience to a business. Highly trained and mobile, they can help a business by being on the move and visible. This also helps to create a shopping experience where customers feel safer as security is present should they feel threatened or unsafe. A more versatile role The role of security as merely a means of checking customers as they leave the store is outdated. Modern security and loss prevention officers should know about the businesses they are protecting. This is not just so they can better protect where they work but also to help aid customers. Adopting more of a hybrid role, security guards may also act as a greeter or point of contact for customers looking for information. These responsibilities and interactions with the public can help to create a relationship between customer and business as well as an added level or personality that can help grow a brand’s reputation. The increased use of technology Despite the obvious benefits of a physical security force being able to protect products and customers, there are alternatives. Remote security creates a seamless shopping experience and may be an option for your business. Without loss prevention officers present, shoppers may feel less watched and more relaxed during their shopping experience, which may increase their time in store and willingness to buy. The technology that makes this happen is video camera surveillance which can aid in monitoring those who enter and exit the store. It can also record what they do while they are inside which can help to identify any potential threats. Another way businesses with high value products can protect their stock is RFID tagging. This technology allows the products to be tracked when they are moved, even within the store. RFID tagging allows a store to immediately know if a product has left the store without being paid for and an alert is raised. This sophisticated protection is the future, and stands to benefit both consumer and business alike. Security of the future No matter what security overlay is right for your business the use of technology and a more adaptable, personable security force can help to revolutionise your business. Whether you stock high end items or just need protection to help deter theft, security is changing to fit within your individual business’s needs. Security is a requirement rather than option as time goes by, that’s why securing the right security company for your business is imperative to its continued protection. For more information about how we can help with your retail security solution, contact us and speak to one of our consultants. View our blog terms and conditions hereAs time goes on, the way customers interact with products and the way they want to experience shopping changes. Gone are the days of a few security guards out the front of the store checking your bags as you leave.Retail2018-07-09T16:00:00ZFalse
What Separates Wilson Security from The Rest?https://www.wilsonsecurity.com.au/blog/Pages/What-Separates-Wilson-Security-from-The-Rest.aspxWhat Separates Wilson Security from The Rest? ​ Wilson Security is one of Australia's leading private security providers, delivering a broad range of services to a diverse client list. What makes us different is our twin dedication to continuous innovation and ongoing compliance, delivering a service that responds to threats intelligently while still adhering to industry regulations. A devotion to innovation The world is evolving, and security must evolve with it. New threats to your organisation’s people, assets, reputation and profitability are emerging every day, so you need a business that understands how to move to confront them. At Wilson Security, we pride ourselves on delivering a service that grows and develops alongside your organisation’s need and capabilities. Whether you’re reaching into new markets or expanding your existing operations, we’re here for you. Our flexibility and focus on innovation can be seen in our close partnerships with many leading Australian companies. For example, in Commercial Real Estate a small development of four townhouses will require a drastically different response than an 80-floor office or apartment building, but when you partner with Wilson Security, we’re able to provide the service your latest project requires. Depending on the design of the building itself, the nature of the occupants, the application for which the building is being used and the entities in the surrounding area, we’ll recommend a variety of solutions drawing on our expertise in Patrolling and static guards Concierge security Access control Remote surveillance Additionally, we can provide a full range of risk based solutions including Consulting Risk assessment Control testing Project management As your needs change, so can our responses. Has a break-in exposed a weakness in your security system? Have financial or staffing factors emerged that could influence the vulnerability of the property? Is your property now required to provide around-the-clock access? Wilson Security delivers all services in accordance with the ISO 31000 Risk Management standard, operating alongside a continuous improvement model that allows fast, targeted responses to changing circumstances. When security considerations shift, rely on us to develop a multi-dimensional solution that addresses the needs of individual stakeholders. Our dedication to innovation extends to technology. We understand that in an increasingly digital world, purely analogue solutions will not suffice. That is why we’ve invested heavily in state-of-the-art technology, allowing us to provide faster, more effective and more precise responses to threats as they emerge, wherever they are in Australia. Our security services are delivered and monitored through the Wilson National Operations Centre, providing an exceptional level of security for private and commercial clients whether it be through tech based solutions or traditional manpower. Using a combination of offsite monitoring of video surveillance, remote access control and intrusion detection systems, we keep your property safe around the clock. Dedicated to compliance Ensuring your organisation is protected not only from physical threats to property and people but legal threats to your bottom line is a crucial consideration for any business-owner. A key part of this is working with a security firm that not only delivers an exceptional standard of protection for your assets and personnel but is fully compliant with Australia’s extensive state and federal regulations regarding private security. The consequences for overlooking this can be dire. Numerous security companies in have been found to be in breach of the principle of accessorial liability – a principle by which all parties in a professional relationship could be charged with breach of the Fair Work Act when only one has been directly involved in a contravention of the Act. This is most commonly seen when a security contractor transfers employees to a number of sub-contractor businesses, who then often pay below the award rate or in cash. This can be ruinous for the client of the original security company, as accessorial liability could see them liable for tens or even hundreds of thousands of dollars in back-pay and damages. Finding a company dedicated to compliance can have real, material consequences for your business’ finances. If you’d like to find out how Wilson Security could enhance the operation of your business, speak to one of our consultants today. View our blog terms and conditions here Wilson Security is one of Australia’s premier security companies. Find out what makes our services truly industry leading in our latest blog. Security Industry2018-06-26T16:00:00ZFalse
The Role of Private Security in Creating Safe Cities https://www.wilsonsecurity.com.au/blog/Pages/Private-Security-Safe-Cities.aspxThe Role of Private Security in Creating Safe Cities In 1989 New York City was considered a seriously dangerous place. The city was synonymous with gang violence, urban decay, and a society besieged with ineradicable street crime. To address the seemingly insurmountable task of restoring order to the streets, a privately financed venture was initiated in Midtown Manhattan to support the New York Police Department. Commercial property owners within the district agreed to self-impose a surtax to pay for security services. Trained security personnel were posted on the ground at commercial properties and proved to be instrumental in crime reduction and keeping order in the Midtown area. According to the FBI, in 1990 alone there were 527,257 recorded crimes in NYC, a number that was significantly reduced after the partnership with private security commenced. In the 16 years following there was 75% reduction in crime 73% reduction in murder 76% reduction in robbery 57% reduction in grand larceny What was once considered one of the most dangerous cities in the western world, was ranked by the Economist Intelligence Unit Safe Cities Index in 2015 as the 10th safest city in the world. The role of private security in creating safe cities is not, as many envision, about introducing private armies. Instead of supplementing police forces, private security instead adds resources to a public service, strengthening the ability and capacity for both public and private stakeholders to respond in crisis situations, aid in crime prevention, and provide evidentiary support within the justice system. From cutting edge technology, to communication innovation and trained personnel, private services play a pivotal role in reshaping and reinforcing public security. In an age where security risks are always evolving and there is a constant threat of terrorism, extra vigilance and dynamic response systems are vital, and that is where private security comes in. Using technology to create dynamic networks The rise in private security has introduced enormous technological capabilities throughout cities. With CCTV now common place, remote monitoring through private surveillance means there are more trained eyes monitoring and assessing public spaces. Private CCTV and remote monitoring provides a range of benefits including Deterrence of criminal behaviour Fast reporting and response of suspicious behaviours Supporting police in civilian crime as evidence Asset and people protection Increase detection and response in medical events Communication Capabilities Not only does CCTV and remote monitoring increase the ability to detect security events, advanced communication technology gives private security the ability to activate immediate response for the surrounding areas. For example, if there is a terrorist event detected in one area, advanced security communication can initiate building lock downs and emergency security responses in surrounding areas. These communication and response capabilities are also vital for keeping the community safe during severe weather events or environmental emergencies. Building Safe Spaces for the Whole Community While terrorism and overt criminal activity is undeniably a real and present threat, it is only one aspect of creating a safe city. In assessing and ranking cities according the safe city index the Economist Intelligence Unit explains “perception of safety among city residents is one of the indicators used to build the index and this falls under the category of personal safety”. With such a complex, dynamic and culturally diverse society, the visible presence and daily interaction with private security plays an essential role in creating the perception of safe spaces, and instils an understanding of an active security presence throughout the city, a huge deterrence for unacceptable behaviour. Security in Education Facilities Security in education campuses play a huge role in providing a safe space for culturally diverse communities. With the health of the Australian education sector largely depending on revenue from international students, ensuring our secondary educational campuses are safe and appealing is essential to the vitality and growth of our communities and economy. Special care must be taken by companies to balance security with accessibility – children may not be willing or physically or legally capable of submitting to enhanced security measures, so often inventive approaches must be taken to ensure they are adequately protected. These could involve specialised access control procedures timed to arrivals, foot and bicycle patrols around the perimeter of the school, and secure student transport solutions. In all cases, attention must be paid to how the security measures could potentially negatively impact the students’ education, either by intimidating them or simply slowing their progress around the school. Security in Health Care Similarly, health care facilities are frequented to a huge cross section of the community and have an integral role in the health and wellbeing of our cities. Integrated private security solutions ensure both public and private healthcare facilities are safe and welcoming to the entire community, while keeping staff, patients, and visitors safe in high risk environments. The extreme diversity of hospital patients means that security companies need to have broad and detailed plans in place in order to achieve the result clients are looking for. Companies must also be aware that health care security comes with dual goals – protecting the hospital and patients from outside actors and protecting the hospital from its own patients. Different responses will suit different threats – for example, RFID tracking of tools and drugs can work to prevent theft by patients and staff but will be less useful for determined external threats. Concierge security can be useful for helping to create a non-threatening environment for patients, potentially deescalating situations before they ever truly become threats to staff or assets. Using Innovation and Training to Serve the People As part of these integrated security solutions, compliant private security providers invest in the training and professional development of security staff. Moving beyond static guards, leading private security suppliers invest in ongoing training to equip multi-skilled personnel to fill roles including concierge and customer service. Not only does this increase the value of service for businesses and government organisation, it creates a more trusting and engaged security environment, and safer cities. To read the NYC case study Click here View our blog terms and conditions here In 1989 New York City was considered a seriously dangerous place. With upward of six murders per day, the city was synonymous with gang violence, urban decay, and a society besieged with ineradicable street crime...Security Industry2018-06-24T16:00:00ZFalse
Empowering Community with the Reconciliation Action Planhttps://www.wilsonsecurity.com.au/blog/Pages/Reconciliation-Australia.aspxEmpowering Community with the Reconciliation Action Plan ​ Empowering Community with the Reconciliation Action Plan In April of 2017, Wilson officially launched its Reconciliation Action Plan (RAP). Developed in line with the parameters set by Reconciliation Australia, the RAP aims to transform the way our company interacts with the traditional owners of this land, enhancing our relationship with Aboriginal and Torres Strait Islander communities around the country. For a company as large as Wilson to undertake a task as expansive as reconciliation required extensive planning and the involvement of people at every level of the company. The RAP represents a formal commitment on the part of Wilson to contributing to closing the gap between Aboriginal and Torres Strait Islander peoples and non-Indigenous Australia. We aim to empower First Australians through developing partnerships with communities and Indigenous-owned businesses, investing in sustainability to the benefit of our First Australian partner businesses and educating our own staff to create more welcoming, culturally aware workplaces. With the launch of the RAP, Wilson joins a community of more than 650 organisations including highly respected names such as KPMG, Rio Tinto and the Australian Government Department of Human Services. Our hope is that the implementation of the RAP will set an example to other companies looking to deepen their relationships with First Australians. Involving the right people To ensure that the Reconciliation Action Plan is constantly being steered in the right direction, Wilson drew on our own deep well of experience with the Aboriginal and Torres Strait Islander communities. Since 2014, Mr Edwin ‘Jim’ Mi Mi – himself a member of the Queensland Wakka Wakka tribe from Gayndah, South East Queensland – has served as Wilson Security’s National Indigenous Engagement Manager. He’s taken a significant role in the implementation of the RAP, leveraging his extensive experience engaging with cultural clans across Australia in areas where Wilson operates to forge stronger, deeper connections between our company and the local community. One of the most significant contributions to the RAP came through Mr Mi Mi’s family connections. His aunt, Hazel Cowburn, is responsible for the creation of the artwork commissioned by Wilson as part of meeting our obligations under Recognition Australia. Titled Spiritual Journey of Unity, it portrays her vision of the metaphorical journey of reconciliation that Wilson has taken as seen from the air. The artwork has been adapted for the livery of the Wilson V8 Supercar, and traditional owners with whom Wilson had previously worked as part of a mine site tender were invited as guests to the car’s first race. The event was a massive success, with the car being blessed in the pit prior to the race, and the race team already excited to welcome them back next year to present a whole new livery. Implementation Implementation of the RAP at the local level is the responsibility of ‘Champions’ – representatives from each state who have volunteered to be a vital link in the chain between the Working Group and local company representatives. The role of the Champions is to push forward the RAP on a day-to-day basis, coming to every project with reconciliation first and foremost in their mind. Every time they speak to a representative of an Aboriginal or Torres Strait Islander community, every time they go to tender and every time they communicate with the broader public, they should be thinking about reconciliation. On the road to greater things The Reconciliation Action Plan has already seen great strides being made across the board in education and community partnership. We’ve begun to build strong relationships with Indigenous businesses across the country, with great strides especially made in far north Queensland. Working with respected organisations such as Supply Nation, we’re looking forward to involving more Indigenous businesses in our supply chain, allowing us to both extend our service offering when we go to tender while providing crucial employment opportunities to Aboriginal and Torres Strait Islander peoples. This is only the beginning for Wilson and our Recognition Action Plan. Recognition Australia defines multiple different levels of RAP; Wilson is currently working on meeting the commitments of the ‘Innovate’ level – the second of four. While a final report is required upon completion of the RAP in April of 2019, our goal is to continuously work toward to the betterment of Aboriginal and Torres Strait Islander peoples within our organisation, across our partner network and in the communities in which we serve and operate. Currently, we want to set ourselves up for success so we can move on to greater and more involved Recognition Action Plans, allowing us to continue provide employment opportunities to First Australians everywhere. View our blog terms and conditions here In April of 2017, Wilson Group officially launched its Reconciliation Action Plan (RAP). Developed in line with the parameters set by Reconciliation Australia, the RAP aims to transform the way our company interacts with the traditional owners of this lanNews2018-06-05T16:00:00ZFalse
Biometric Security – What It Is & Who Needs Ithttps://www.wilsonsecurity.com.au/blog/Pages/Biometric-Security-What-It-Is.aspxBiometric Security – What It Is & Who Needs It For any business owner looking to enhance their access control procedures, biometric security is a key area of consideration. This move away from traditional security measures such as passwords and keys is not without reason. The past few years have seen supposedly securely hashed passwords cracked and sold on the internet – most notably 177 million LinkedIn accounts stolen in 2012 and sold in 2016 – and RFID and NFC contactless card skimming technology advance at a frightening pace. With the two most cost-effective and easy to implement methods of securing access to a company’s premises or assets seemingly losing the arms race against hostile actors, many are looking for an alternative. In this atmosphere, biometric measures look increasingly attractive. While often considered to be the gold standard in access control by lay-people, it is a complex and multi-faceted area of security that best serves businesses with a thorough understanding of their security requirements. Certain technologies may seem secure and simple to implement on paper but could have hidden vulnerabilities or productivity costs that could lessen or erase their benefits to your business. As such, the decision to integrate biometric security devices into your premises is one that should only be made after close analysis of the risk profile of your business,both the capabilities of a given system ands well as your business’ needs and goals. What biometrics technologies are available? Biometrics is a broad field, encompassing a wide range of technologies, not all of which are suitable for commercial security. For example, one of the most commonly installed biometric devices – but one of the least commonly depicted in media – is the personal signature verification system. While being able to verify the handwritten signature of an individual is valuable for secure package delivery and remote conclusion of a contract, it is less useful for access control. More iconic technologies such as iris recognition, fingerprint authentication and voice recognition are often the first to be considered. While these may be seen as interchangeable – each capable of securing a door against unauthorised entry – they serve different purposes. As such, it is important to have a clear understanding of their individual capabilities and vulnerabilities. Compared to the lock and key, biometrics is a new security technology. Like any new security technology, it has had significant teething problems that have greatly diminished its effectiveness. Simple issues of accuracy remain a major issue with many kinds of newer biometric devices such as facial recognition cameras – the same input accurately presented could be rejected as a false negative because of improper calibration or simply not captured. This disconnect between the concept of biometrics and its reality can be seen in many people’s daily lives; many smartphone users will have experienced the frustration of not having their fingerprint recognised and needing to enter their back-up password in order to access their phone. Technologies with higher levels of accuracy such as iris recognition require expensive devices and are far from instantaneous, as the capture process requires the subject to hold their head still and look directly into the camera. Even the smallest movement could result in a poor-quality capture and necessitate a retry. Not a silver bullet Biometric security needs to be installed as a specific remedy, not a general one. The reason biometric security is not widely deployed is because most businesses are not exposed to the sophisticated kind of attacks that require these more complex solutions. For example, while many businesses use contactless access cards as part of their security regime and skimming technology has reached a level of sophistication where device are simple to use and highly effective – famously, in 2006 it was found that the then new British biometric passports could be cloned using a chip reader that cost less than $400 – these attacks are still a significant investment of time, energy and money on the part of a hostile actor. Skimming and duplicating an employee’s card in order to gain access to protected premises still requires skills outside of operating a basic piece of technology, such as the ability to surreptitiously get close to an authorised employee and breach a premises without being recognised as a hostile actor. Only a small number of businesses holding high value data or assets such as certain commodities or currency will be worth that kind of effort, making it an unnecessary expense for many. Beyond that, biometric devices may not even address the weaknesses in your security regime. If your problem is mostly internal leaking of data or employee theft, biometric security will not stop these people at the door. While biometric security can verify the identity of an individual, they cannot verify that those individual’s intentions align with those of the organisation. Additional considerations A biometric security device’s feasibility needs to be assessed against more than just the security benefits it provides to your business, but also against how it impacts the management of physical space in your building. Most applications of biometric security concern themselves with physical access control. As such, if your business is already struggling with slow movement from area to area and bottlenecks in thoroughfares, requiring employees to authenticate their fingerprints upon entry or stop for iris recognition could just deepen these issues, requiring substantial reworking of your office’s layout. Failing to consider this can lead to stop-gap solutions that undercut your business’ security – i.e. remedying long lines for the fingerprint authenticator by allowing people to pass through secured doors by using a keycard. There may also be legal ramifications attached to the capture and storage of employee biometric data. It is important to discuss all plans to implement biometric security measures with a lawyer versed in industrial relations and privacy law. Consider if your business truly requires biometric security, or if you could not keep your people and property safe with a more human solution. Wilson Security provides a wide range of virtual and onsite security services to businesses across every industry. Discuss your risks and requirements with one of our consultants today to help you build a solution that best meets your needs. View our blog terms and conditions here Biometric security is a technology that is gaining in popularity, but does your business need it? In this latest blog from Wilson Security, we examine the pros and cons of biometrics in the workplace. Technology2018-05-29T16:00:00ZFalse