Although this article was written for the International Association of Healthcare Safety and Security (IAHSS), these concepts apply to almost any organization. To put it simply, if you have security technology, you should have security standards. If you’re a member of IAHSS, you can access the entire original article here. Have you ever seen a situation where there seems no …
Seeing Security
This post was prompted by an initial project meeting and an annual tradition of watching a favorite movie around Christmas. During an initial project meeting, right after introductions, the Architect made a request. The Architect stated that the Client wanted all security devices to be invisible. In a previous conversation, I heard some examples of the measures to conceal devices. …
Do Your Homework before Moving to Smart Cards
First, let’s talk about the cards. There are a number of different types and uses for smart card technology. One of the most common is that of a banking-type card where the actual chip is visible. Think about your new debit card. When used, the chip makes contact within the device reading the information. This is a contact type card. …
The Security Strategy That Works for Two College Campuses
Above all, a security strategy is about integrating people, processes, and technology. Although there are some significant differences, these strategies apply to any other campus as well, not just colleges and universities. From the original article: Colleges and universities must develop a security strategy that protects the heart of their campus: students. Digital tools can help schools improve their physical …
It’s Beautiful, But Is It Secure?
Designing and specifying locking hardware for access control type doors has always been a challenge. In most cases interior doors – typically wood or hollow metal – can be equipped with an electric mortise or electric cylindrical lock. Exterior doors with mullions or store fronts are normally equipped with electrified panic devices, either rim style or vertical rods. Both of …
Physical Security for Data Centers
It’s no surprise that data centers are popping up everywhere, considering the growing need for cloud computing. Data centers offer services that allow you to store data on their servers. IT spends a lot of time securing these high-volume installation networks from attacks. It is important to you that your data center’s network security stays secure. But how important is …
Managing Global Integration of Systems
During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized within the company or organization, such as network infrastructure, payroll systems, and other technology. One area that is always a challenge is the security systems that protect the organization. Card …
Recorded Video – There When You Need It
Everyone knows that the electronic security world has changed dramatically over the last 10 years. In regard to video systems, when the time lapse recorder came out it was the latest and greatest invention for recording video. Security Directors and their staff felt comfortable and were assured that video was being recorded on the tape if they saw the red …
How to Choose an Integrator
A key component to choosing an appropriate security system is a vulnerability assessment or a security threat analysis of a facility. Once an organization’s security needs have been determined, an appropriate security system can be designed to meet those needs. Critically important to the success of these projects is the choice of a qualified systems integrator to install the necessary …