Hazard 360 Ltd

Hazard 260 Ltd was established in 2014, the owner Alan Smith CPP, PSP, SQSS, DPI, Fsyl, has some thirty years’ experience in the field of Security Risk Mitigation and Security Training within the United Kingdom, Australia and the Middle East.

Regulatory Compliance

Hazard 360 Ltd works in strict alignment with BS8549:2006, the Security Consultant Code of Practice. The Security Institute and AISI International code of ethics.

Business Registration

Company Registered No: 8671851
HMRC Vat Registration No: 183944669

 Company Overview image
Company Culture image
Honesty & Integrity
At Hazard 360 Ltd we believe in demonstrating honesty and integrity and this is achieved by being transparent. We do not accept gratuities or commission from other service providers.

Mission Statement:
Hazard 360 Limited has a continuing goal to provide a professional, high quality, reliable and cost-effective service. Our ongoing intent is to fully accomplish this by supporting and working closely with our clients to build strong working relationships therefore ensuring their requirements are held with a high standard of skilled service and professionalism.

Our Vision and Goals:
To deliver a high-quality service backed-up with many years of ‘from the ground up’ expertise within the security environment.

Professional Memberships:
Member of ASIS International U.S.
Fellow of the Security Institute U.K.

Security Consulting

Learn More

Risk Control Framework

Learn More

Project Management

Learn More

Training Services

Learn More
  • Calne, Wiltshire, United Kingdom

What is a Security Survey?

A Security Survey is a thorough physical examination at a given point in time of a facility and its operations with respect to personnel and company assets.

It examines the risks these assets are exposed to, and reviews the measures that are in place to protect them and to mitigate liability. It identifies vulnerabilities and makes recommendations on how these can be improved.

This can be relevant for new locations or existing facilities, particularly after a loss or incident has occurred.

The objective of the survey is to produce a report based upon factual information, recommendations that allow the client to make sound financial decisions based on a cost benefit basis and (ROI) return on investment.

What is a Security Audit?

A Security Audit is different in as much that the survey is a process to assess whether an existing security system and procedures are operating to set of standards or criteria they were designed to. It evaluates the administration of the system, security awareness of employees, the management controls and compliance with standards. This is a valuable tool to give an accurate overview to the senior management.
The objective of the survey is to produce a report based upon factual information to demonstrate compliance with the current security posture of the premises.

What is a Qualitative Security Survey?

A qualitative analysis is more suitable when evaluating lower security applications. These facilities will have lower consequence loss assets and so will be better able to withstand loss or damage of an asset.
Some examples might include retail stores, apartment buildings, small businesses, and restaurants.

What is a Quantitative Security Survey ?

A rigorous quantitative analysis is required for protection of assets with unacceptably high consequence of loss, even if the probability of an adversary attack is low. This is a characteristic of high security systems typically found at pharmaceutical facilities, nuclear power plants, prisons, government and military installations, plus some museums, refineries, utilities, airports, telecommunications hubs and large industrial complexes. In each of these cases the loss of or damage to at least some of these assets can have high consequences.

What is an Operational Requirement Specification

An OPRS, is a document used to define the application of security  elements.

It is used to ensure that the correct equipment is being selected to meet the security objectives.

It curtails the over application of security elements as each element is specifically identified as to its type, purpose and security objective.

The OPRS is the client’s best friend - if used properly - as it prevents equipment being over specified, thus costing the client more money.

 1: ICO Registration

ICO Registration Certificate

 2: DPA Policy

Hazard Policy

 3: Info Sec Policy

Hazard Policy

 4: Website Policy

Hazard Policy

 5: H&S Policy

Hazard Policy.

10: Company Registration

Company House Registration Certificate