Discount Offers

SIA Licensed Security Tie Pin Badge K4S® Exclusive Design

End Date: Friday Feb-9-2018 19:04:15 GMT
Buy It Now for only: £5.75
Buy It Now | Add to watch list

Combat Trousers Security Bouncer Police Security Door Supervisor

End Date: Sunday Feb-18-2018 16:47:09 GMT
Buy It Now for only: £19.19
Buy It Now | Add to watch list

Security bouncer door supervisor bomber jacket coat Medium

End Date: Sunday Feb-18-2018 16:06:16 GMT
Buy It Now for only: £51.83
Buy It Now | Add to watch list

SIA Security Notebook SIA Approved Door Supervisor

End Date: Tuesday Feb-13-2018 11:03:35 GMT
Buy It Now for only: £9.94
Buy It Now | Add to watch list
Visit Today : 1
Visit Yesterday : 1
This Month : 23
This Year : 23
Total Visit : 24477
Hits Today : 2889
Total Hits : 4162016
Who's Online : 1


C4 calls in security experts after presenter suffers online abuse

Cathy Newman subjected to vicious misogynistic abuse after interview with psychologist

Cathy Newman interviewed Jordan Peterson on Tuesday . Photograph: Channel 4

Channel 4 News has called in security specialists to analyse threats made to presenter Cathy Newman1 following her interview with a controversial Canadian psychologist who has attracted a following among the alt-right . Ben de Pear, the editor of Channel 42 News, said Newman had been subjected to vicious misogynistic abuse . Having to calling in security specialists was a terrible indictment of the times we live in , he said. Newman interviewed the psychologist, Jordan Peterson, about gender on Tuesday .

A video of the full 30-minute interview has been watched more than 1.6m times on the Channel 4 News YouTube page3 and has attracted more than 36,000 comments. Peterson rose to prominence in 2016 when he released a video lecture series in which he said that his right to free speech meant he would not use gender-neutral pronouns for transgender students at the University of Toronto . He was in the UK promoting a new book called 12 Rules for Life: An Antidote to Chaos. The combative Channel 4 interview led to praise for Peterson and criticism for Newman on some right-leaning sites. James Delingpole, a Breitbart columnist4, said the interview marked a pivotal victory in the culture wars and that the weaknesses of the regressive left have never been more cruelly or damningly expose . Douglas Murray in the Spectator5 said: I don t think I have ever witnessed an interview that is more catastrophic for the interviewer.

Newman has faced a wave of abuse and threats online, including on Twitter . There is no suggestion that Peterson, Delingpole or Murray are behind the threats or instigated them. De Pear said on Twitter on Friday: Our Channel 4 News on-screen journalists expect to be held to account for their journalism but the level of vicious misogynistic abuse, nastiness, and threat to Cathy Newman is an unacceptable response to a robust and engaging debate with Jordan Peterson.

Such is the scale of threat we are having to get security specialists in to carry out an analysis . I will not hesitate to get the police involved if necessary . What a terrible indictment of the times we live in.

Newman retweeted De Pear s posts . In response to Murray s column – in which he said Newman should get Channel 4 to remove the video from the internet because of how catastrophic it was – she said earlier in the week: Always grateful for advice from Douglas Murray but I won t be suing or taking out a super-injunction . I thoroughly enjoyed my bout with Jordan Peterson as did hundreds of thousands of our viewers . Viva feminism, viva free speech . Stay tuned Douglas. Channel 4 News said: Following her interview with psychology professor Jordan Peterson broadcast earlier this week, our presenter Cathy Newman has been the target of unwarranted and unacceptable misogynistic abuse and threats.

As journalists in the public eye, our presenters expect criticism, but we will not tolerate this level of abuse towards our staff .

We have taken immediate steps to ensure Cathy s safety and security and continue to offer her our full support on this matter.


  1. ^ Cathy Newman (
  2. ^ Channel 4 (
  3. ^ Channel 4 News YouTube page (
  4. ^ James Delingpole, a Breitbart columnist (
  5. ^ Douglas Murray in the Spectator (

Security Manager – Parkdean Resorts

Security Manager - Parkdean Resorts

Amazing opportunity available at Brynowen Holiday Park, which is part of the largest operator in the UK. Parkdean Resorts has over 70+ award winning holiday parks in the UK which provide amazing lifestyle and leisure experiences for thousands of guests throughout the year. We are currently recruiting a Security Manager to join the team at our stunning Brynowen Holiday Park.

Reporting to the General Manager, you will be required to create and maintain a safe environment for owners and holiday makers. Your key responsibilities will include:

  • Ensuring a maintained security presence at all times in order to create a safe and secure environment.
  • Maintaining effective records of all security activity with particular reference to investigation of incidents and accidents and witness statements.
  • Ensuring that a professional and effective control of site entrances, monitoring visitors, staff and customer activity and proactively discourage on-site intruders.
  • Ensuring that the park is patrolled on foot and by vehicle on a regular basis to monitor noise levels and subdue and possible situations that are likely to cause disturbance.
  • Ensuring that all new team members receive training and induction allowing them to excel in their roles.

The successful Candidate will:

  • Hold current SIA (or equivalent) certification.
  • Have outstanding customer service skills, with the ability to resolve queries.
  • Ideally have previous experience of working on a Holiday Park
  • Have experience of conflict resolution.
  • Hold a full driving licence.

Due to location, accommodation is available for the correct candidate along with further development opportunities in this forward thinking company. To apply for this opportunity, please email a CV and Covering Letter in the first instance

Job Type: Full-time

Salary: 18,000.00 to 18,500.00 /year

Required experience:

  • Security: 3 years

Required licences or certifications:

  • Current and valid SIA accreditation
  • Full UK driving licence

Visit link:
Security Manager – Parkdean Resorts

Ten trends that will change business cyber security protection in 2018

2017 once again proved that the cyber threat landscape is complex and constantly changing, dictating the need for comprehensive and responsive defences that step up to the real challenges that organisations face . AI-aided attacks, increased regulation and the exponential growth of endpoint and IoT devices present the opportunity for entirely new forms of risks to emerge, ever changing the face of cyber security . Darren Thomson, EMEA Chief Technology Officer at Symantec explores the key trends and threats to anticipate in the coming year.

The Cyber Cold War Escalates As international tensions continue to go digital, much of this will remain unknown to the world stage . Nation states won t be able to publicly peacock their cyber arsenal to intimidate or dissuade their enemies, at the risk of revealing their attack vectors and exploits .

This underground warfare is already poised to be a major geopolitical weapon for world powers and rogue states in 2018, escalating the already high stakes and potential for destruction . Industries, critical infrastructure, supply chains and people will be the pawns in an escalating modern war unlike any before it. The Rise of Mass Social Engineering

Mass social engineering will also become a crucial weapon in modern warfare, with machine learning and AI leveraged to construct more complex and highly targeted lures against citizens and organisations . The more mature use of data and analytics will see social media attacks conducted at a more impactful level, with the potential for high-profile impact leading us to question who and what we can trust . While fake news is likely to remain part of the picture in 2018, be prepared for social engineering to take new guises.

Infrastructure as a Priority Target Stuxnet and Dragonfly already demonstrated the destructive potential of a targeted cyber attack against infrastructure, from banks and hospitals to transportation and even energy providers . These attacks typically exploit basic gaps in cyber defences, yet have the potential to have substantial, lasting damage to our world .

2018 could be a turning point: will organisations and businesses step up to the urgent need to address these major vulnerabilities, or will we see a landmark attack on a nation s critical infrastructure? The Dawn of Criminal AI and Machine Learning No cyber security conversation today is complete without a discussion about AI and machine learning . So far, these conversations have been focused on using these technologies as protection and detection mechanisms . However, this will change in the next year with AI and machine learning being used by cyber criminals to carry out attacks . It is the first year where we will see AI versus AI in a cybersecurity context . Cyber criminals will use AI to attack and explore victims networks, which is typically the most labour-intensive part of compromise after an incursion. The Financial Trojan Gold Rush Financial trojans were some of the first pieces of malware to be monetised by cyber criminals .

From simple beginnings as credential-harvesting tools, they have since evolved to advanced attack frameworks that target multiple banks, and banking systems, sending shadow transactions and hide their tracks . They have proven to be highly profitable for cyber criminals . The move to mobile, application-based banking has curtailed some of the effectiveness, but cyber criminals are quickly moving their attacks to these platforms . Cyber criminals profits from financial trojans are expected to grow, giving them higher gains as compared to ransomware attacks. Supply Chain Attacks Become Mainstream Supply chain attacks have been a mainstay of classical espionage and signals-intelligence operators, compromising upstream contractors, systems, companies and suppliers . They are highly effective, with nation-state actors using human intelligence to compromise the weakest links in the chain, as well as malware implants at the manufacture or distribution stage through compromise or coercion. File-less and File-light Malware Explodes

2016 and 2017 have seen consistent growth in the amount of file-less and file-light malware, with attackers exploiting organisations that lack in preparation against such threats . With fewer Indicators of Compromise (IoC), use of the victims own tools, and complex disjointed behaviours, these threats have been harder to stop, track and defend against in many scenarios .

Like the early days of ransomware, where early success by a few cyber criminals triggered a gold-rush like mentality, more cyber criminals are now rushing to use these same techniques . Although file-less and file-light malware will still be smaller by orders-of-magnitude compared to traditional-style malware, they will pose a significant threat and lead to an explosion in 2018. Smart Devices Held to Ransom

Ransomware has become a major problem and is one of the scourges of the modern Internet, allowing cyber criminals to reap huge profits by locking up users files and systems . The gold-rush mentality has not only pushed more and more cyber criminals to distribute ransomware, but also contributed to the rise of Ransomware-As-A-Service and other specializations in the cyber underworld . These specialists are now looking to expand their attack reach by exploiting the massive increase in expensive connected home devices . Users are generally not aware of the threats to Smart TVs, smart toys and other smart appliances, making them an attractive target for cyber criminals. IoT Devices Will Be Hijacked and Used in DDoS Attacks In 2017, we have seen massive DDoS attacks using hundreds of thousands of compromised IoT devices in people s homes and workplaces to generate traffic . This is not expected to change with cyber criminals looking to exploit the poor security settings and lax personal management of home IoT devices . Furthermore, the inputs and sensors of these devices will also be hijacked, with attackers feeding audio, video or other faked inputs to make these devices do what they want rather than what users expect them to do. IoT: A Critical Backdoor

Beyond DDoS attacks and ransomware, home IoT devices will be compromised by cyber criminals to provide persistent access to a victim s network . Home users generally do not consider the cyber security implications of their home IoT devices, leaving default settings and not vigilantly updating them like they do with their computers . Persistent access means that no matter how many times a victim cleans their machine or protects their computer, the attacker will always have a backdoor into victims network and the systems that they connect to.

Darren Thomson, Chief Technology Officer, EMEA at Symantec 1

Image Credit: Methodshop / Pixabay


  1. ^ Symantec (