How do you set a “Risk Appetite”?

Setting a risk appetite involves identifying and defining an organization’s tolerance for risk in pursuit of its objectives. The process usually involves the following steps: Identify the organization’s objectives: The first step is to identify the organization’s objectives, such as growth, profitability, innovation, or customer satisfaction. This step provides a clear understanding of what the organization is trying to achieve and what risks it is willing to take to achieve Read more…

A Unique Approach to Scaling Security Projects

Are you scaling security projects and drowning in candidate applications and admin whilst juggling spreadsheets, to an impossible deadline? We will shortly be launching a hiring application for you. “Oh dear, not another one!”… Yes. But we take a different approach: Marshal is a network, comprising a centralised talent pool. Our “Recruitment Projects” is an invitation only service that enables you to scale your hiring – from single roles to Read more…

Your Quick Guide to Establishing a Manned Guarding Security Company in the UK

Setting up a manned security company in the UK involves several steps, including obtaining the necessary licenses and permits, creating a business plan, registering your company, and hiring employees.  Here is a general guide on how to set up a manned security company in the UK: 1. Obtain necessary licenses and permits: To operate a manned security company in the UK, you will need to obtain a license from the Read more…

A Safety & Security Solutions Snapshot

The Safety & Security solutions landscape is hugely diverse and innovative. Here’s a snapshot of just some more of the offerings passing through the Marshal Feed: Drone Security Services and Premium Executive Protection Level 3 Fire, Emergency & Security Systems (FESS) Apprenticeship (UK) Security Awareness Training and Simulated Phishing Platform HSE Safety Training Solutions: Height, Sea Survival, Fire, First Aid Advanced fiber optic monitoring sensors and integrated technologies, enabling critical Read more…

What should a First Response Emergency Care (FREC) Course Cover?

The First Response Emergency Care (FREC) course is a pre-hospital emergency care training program. It is designed to provide individuals with the knowledge and skills necessary to respond to a wide range of medical emergencies. The course typically covers topics such as: Basic Life Support (BLS) including Cardiopulmonary Resuscitation (CPR) and the use of an Automated External Defibrillator (AED) Airway management, including the use of suction and oxygen therapy Management Read more…

Mass Communications in Crisis Management – Are Current Products Effective?

Two-way mass communications tools can play an important role in crisis management by providing a means for quickly and effectively disseminating information to a large number of people, as well as receiving feedback and updates from them. Some examples of how these tools are used in crisis management include: Email: In a crisis, emergency management officials can use email to quickly send out alerts and updates to a large number Read more…

How do you locate potential threats to the privacy and security of your organization?

Technical Surveillance Countermeasures (TSCM) sweeps, also known as “bug sweeps,” are conducted to detect and locate any hidden electronic devices or bugs that may be used for unauthorized surveillance. The goal of a TSCM sweep is to locate any potential threats to the privacy and security of an organization, individual, or location. The process for conducting a TSCM sweep typically involves several steps: Planning and Preparation: Before the sweep, the Read more…

What makes a good Security Risk Management Consultant?

The foundation of good security consulting is a strong understanding and knowledge of security principles, best practices, and industry standards. This includes knowledge of risk management, incident response, and disaster recovery. Additionally, a good security consultant should have experience in the industry, including a thorough understanding of the latest security technologies, tools, and solutions. Strong analytical and problem-solving skills, the ability to communicate effectively with clients, and the ability to Read more…

Maximise the Pros and Reduce the Cons in Security Industry Tradeshows

Tradeshows can be a valuable marketing and networking opportunity for businesses, but they also have some potential drawbacks to consider. Here are some pros and cons of participating in tradeshows: Pros: Tradeshows can be a great way to showcase your products or services to a large number of potential customers in a short period of time. They can provide an opportunity to network with other industry professionals and establish new Read more…

Keeping Business Travellers Safe Just Got Easier. Here’s How.

Business travel has been coming back strongly since the easing of COVID restrictions – but challenges remain. There are several primary considerations for secure business travel, including: Personal safety: Consider the safety of your destination and any potential risks associated with your trip. Research local laws and customs, as well as the political and social climate of the area. Physical security: Protect your personal belongings and sensitive materials, such as Read more…