In this Edition - 4Q 2014
Call for Authors
U.S. Security Associates Officers Prevent Devastating Damages
The Future of Security Training
White Paper on the Contract Security Industry
ASD Reports - The Global CyberSecurity Market 2014-2024
Home Depot Confirms Payment Systems Breach in U.S., Canada

Test Your Knowledge

Certified Protection Officer Examination Questions

Chapter 3:
Role of the Professional Protection Officer

1. Which of the following best describes the professional protection officer’s primary job function:

a. Arresting criminals and reducing crime in the workplace.

b. Protection of assets and people.

c. Driving patrol cars and protecting the secured perimeter.

d. Protection of the corporate brand.

2. When designing a security program, there are several key security tactics that are imperative. Which of the following is one of those tactics:

a. Training non-protection employees to protect themselves and report hazards and threats.

b. Installing basic level protection officers.

c. Installing intermediate level protection officers.

d. All the above.

3. There are several major roles that protection officers fulfill. Which of the following is not one of those roles:

a. Management representative.

b. Intelligence agent.

c. Compliance of enforcement agent.

d. None of the above.

4. Playing the “what-if” game helps prepare the officer for response to an event as if they have seen it before. This is part of the ongoing risk assessment that protection officers perform on a daily basis:

a. True.

b. False.

5. Professional protection officers must adhere to a strict set of accomplishments if they want to achieve a status that is recognized by others that they are in fact a “professional” in security. Which of the following is not one of those achievements:

a. Follows a code of ethics.

b. Supports and works with colleagues.

c. Checks with superiors before making appropriate decisions.

d. Is loss conscious.

6. The protection officer must always prioritize his or her attention to the most critical resources to be protected. Which of the following is an example of that priority list:

a. People, Information, Assets, Reputation, and Environment.

b. Assets, People, Information, Reputation, and Environment.

c. Reputation, People, Assets, Information and Environment.

d. None of the above

7. Simply stated, in any given organization, the core function of the protection officer is to do all the following except:

a. Prevent all possible hazards from becoming threats.

b. Assure the continuity of the protective cycle.

c. Mitigate threats in order to decrease the probability and potential consequences of any occurrence.

d. Apply adequate amounts of insurance to transfer risks created by threats.

 

Answers:

1. B

2. D

3. D

4. True

5. C

6. A

7. D

 

 

 

 

 

Call for Authors!
We would like to extend an invitation to all IFPO members to submit articles for inclusion in our quarterly newsletter. Articles contributed by our members will help us to continue putting together a quality and informative newsletter each quarter.

Interested members should submit their articles in a word document and email them as an attachment to Sandi J. Davies at sandiifpo@earthlink.net


U.S. Security Associates Officers Prevent Devastating Damages
ATLANTA, Georgia – September 2014 – Businesses today rely on security officers to protect people and property and to deter many forms of crime. But oftentimes, the risks that are entirely unexpected have the greatest potential to produce catastrophic losses. This proved true recently at the national headquarters of one of America’s oldest veterans assistance and advocacy organizations, where officers from contract security company U.S. Security Associates patrol the premises.

The facility’s executive director extended his thanks to the security officers for “the recent discoveries and prompt reporting of several after-hours maintenance issues.” In a formal letter of appreciation for the officers’ diligence and attention to detail, he states that these issues “could have resulted in substantial property damage if they had gone unnoticed.”

Read the full article


The Future of Security Training
Professional Security Officer Training - Solutions in e-Learning

by By Lonny Wilder Vice President, Public Safety Professional Security Training Network Target Solutions

The private security industry is large, fast-growing, and global. Unfortunately, it is also plagued by high turnover, poor training, and lax oversight - all of which put the public at risk. Adding fuel to the fire is the unprecedented increase in the proliferation of security breaches and the ever widening threat to virtually every sector of public health and infrastructure. Also unprecedented is the meteoric shift in the vast landscape of professional security officer training. It is not only raising the bar for private and public security stakeholders but offers the expanded promise of significantly improving targeted objectives to protect lives and infrastructure.

Private security is one of the fastest growing occupations in the U.S. There are approximately 1.1 million private security officers working in the United States - far outnumbering American police officers. Some 600,000 private security officers are outsourced, working for specialized security companies hired by clients to secure their premises. As a direct result from the prolific growth, the need to provide vetted and viable training has never had a higher calling.

click here to learn more


White Paper on the Contract Security Industry
Our good friend and highly regarded security acquisition expert Robert H. Perryreleased his Sixth Annual White Paper which is a must-read for owners of contract security companies, as well as Private Equity Groups looking to make investments in this sector. This White Paper is a comprehensive report, updated for events through July 31, 2014, that covers topics such as:

  1. Defining the Market - Services the typical contract security company offers and the plans for expanding the menu. New insights into the matrix of the "Largest Companies" list.
  2. Recent Important Developments in the Contract Security and Electronics Industries.
  3. Mergers and Acquisitions - the most active buyers and the multiples they are paying.
  4. News on happenings around the world affecting the contract security industry.
  5. Margins - 2013/2014 margin trend for the small, regional and national contract security providers.
  6. Multiples - Why 2014 and 2015 may be a good time to sell. How "Obamacare" may affect the market for selling companies.
  7. Outlook - What's making owners think about selling now. What's keeping owners from putting their company up for sale.

Click here to download the White Paper


ASD Reports - The Global CyberSecurity Market 2014-2024
The Global Cybersecurity Market 2014-2024 report, provides readers with a detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry participants, analysis of industry leading companies, and key news.

Key Findings

  • The global cybersecurity market is expected to experience a CAGR growth of 4.62% during 2014-2024
  • North America, followed by Asia Pacific, are expected to be the largest cybersecurity markets with a cumulative market share of more than 50%
  • The network security segment is expected to dominate the cybersecurity market with a share of 35.1%
  • Increased dependence on information technology and the dynamic nature of cyber threats anticipated to drive the market over the forecast period

This report analyzes factors that influence demand for cybersecurity activities, key market trends, and challenges faced by industry participants.

Click here to print the order form for The Global Cybersecurity Market 2014-2024 report


Home Depot Confirms Payment Systems Breach in U.S., Canada
September 09, 2014 Written by  Marley Jay for the Associated Press

NEW YORK — Shares of home-improvement retailer Home Depot sank before the opening bell Tuesday after confirming that its payment systems had been hacked, potentially exposing millions of shoppers who used credit and debit cards at its more than 2,000 U.S. and Canadian stores.

The breach could turn out to be one of the biggest in history. Home Depot did not say how many cards might be affected, but the largest U.S. home improvement chain did say late Monday that its investigation into the breach goes as far back as April.

The news comes nearly a week after a website that focuses on cybersecurity reported on Tuesday a possible hack of Home Depot's data. The company said later that day that it was investigating the potential breach.

"We apologize for the frustration and anxiety this causes our customers, and I want to thank them for their patience and support as we work through this issue," Chairman and CEO Frank Blake said in a press release.

click here to read or download the full article