{"id":14,"date":"2011-03-06T11:54:26","date_gmt":"2011-03-06T11:54:26","guid":{"rendered":"http:\/\/futureriskmanagement.co.uk\/?page_id=14"},"modified":"2016-04-14T14:05:38","modified_gmt":"2016-04-14T14:05:38","slug":"integrated-solutions","status":"publish","type":"page","link":"https:\/\/futureriskmanagement.co.uk\/?page_id=14","title":{"rendered":"Integrated Solutions"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><strong><span style=\"color: #000080;\">Making the Jigsaw Pieces Match the Picture on the Box Lid!<\/span><\/strong><\/p>\n<p><span style=\"color: #000000;\">In commerce and industry, the original conception of security was that of protection of property, but in the circumstances of recent years with the increasing appreciation of risk and governance factors, threats of cyber terrorism and the need to demonstrative cost-effectiveness, it is no longer sufficient to adopt a &#8216;piecemeal&#8217; approach to the acquisition of security assets and services.<\/span><\/p>\n<p><span style=\"color: #000000;\">It is essential that organisations appreciate that security will fail at the junctions where manpower, technical security systems, physical security features and procedures meet. True integration of all facets of security can only evolve from a<strong> &#8216;solutions&#8217; <\/strong>approach to the implementation of security programmes and only if the proposed strategies and objectives are informed by the management of identified, assessed and agreed risks.<\/span><\/p>\n<p><span style=\"color: #000000;\"><a rel=\"attachment wp-att-213\" href=\"http:\/\/futureriskmanagement.co.uk\/?attachment_id=213\"><img loading=\"lazy\" title=\"Jigsaw\" width=\"200\" class=\"alignright size-full wp-image-213\" src=\"http:\/\/futureriskmanagement.co.uk\/wp-content\/uploads\/2013\/01\/Jigsaw.jpg\" alt=\"\" height=\"233\" \/><\/a><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times;\"><span style=\"color: #000000;\">Security, as an operational function in the U.K. is often passed around between departments like an orphan between what appear suitable foster parents; human resources, health and safety,<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: 'times new roman', times;\"> <\/span><\/span><span style=\"font-family: 'times new roman', times; color: #000000;\">facilities <\/span><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"color: #000000;\">management, or even the<\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"color: #000000;\"> M&amp;E <\/span><\/span><\/span><\/span><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\">d<\/span><\/span><span style=\"font-size: medium;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\">epartment,<\/span><\/span><\/span><span style=\"font-size: medium;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\"> <\/span><\/span><\/span><span style=\"font-size: medium;\"> <\/span><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\">if the<\/span><\/span><\/span><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\"> security<\/span><\/span><\/span><span style=\"font-family: 'times new roman', times; color: #000000;\"><span style=\"font-family: 'times new roman', times;\"> solution on a site leans<\/span><\/span><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"color: #000000;\"> more towards systems. With the changing parentage comes inconsistency, a predilection to emphasise<\/span><\/span><\/span><span style=\"font-family: 'times new roman', times;\"><span style=\"font-family: 'times new roman', times;\"><span style=\"color: #000000;\"> the parent department\u2019s own specific expertise and a resounding lack of security knowledge. Security fails in these hands because it is not \u2018solutions\u2019 based. Purpose and strategy lose any primacy over administrative function and providing the illusion of effectiveness is maintained, tested by whether security personnel are fully occupied, with whatever duties, no \u2018strong light\u2019 is ever shone on the true<\/span> <span style=\"color: #000000; font-size: medium;\">operational functionality of security.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times; color: #000000;\">To achieve real cost-effective security, it is essential that all proposed security provisions are assessed for operational functionality and ultimately purchased on the requirement to satisfy an identified need and not on the basis of<\/span><span style=\"color: #000000;\"> a technical feature or competency. We have worked within too many organisations where the installation of technical systems and physical security assets have simply created the &#8216;illusion&#8217; of security.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Making the Jigsaw Pieces Match the Picture on the Box Lid! In commerce and industry, the original conception of security was that of protection of property, but in the circumstances of recent years with the increasing appreciation of risk &hellip; <a href=\"https:\/\/futureriskmanagement.co.uk\/?page_id=14\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"onecolumn-page.php","meta":[],"_links":{"self":[{"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/14"}],"collection":[{"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14"}],"version-history":[{"count":20,"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":263,"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/14\/revisions\/263"}],"wp:attachment":[{"href":"https:\/\/futureriskmanagement.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}