Although this article was written for the International Association of Healthcare Safety and Security (IAHSS), these concepts apply to almost any organization. To put it simply, if you have security technology, you should have security standards. If you’re a member of IAHSS, you can access the entire original article here. Have you ever seen a situation where there seems no …
Technical Assessments – Standards
Our first post reviewed enclosure conditions and installation practices found in technical assessments. We then discussed the importance of the appropriate installation and conditions of field devices. In this third installment, we are going to discuss one of the best ways to avoid the conditions previously discussed. It’s also how to begin cleaning up the messes that you do find. …
Technical Assessments – Field Devices
In this second installment, we will be looking at field devices. This information comes from practices we have found when conducting a technical assessment. Multiple hardware components make up a security system. The term “head-end” equipment often refers to the server-based computers, client monitoring stations, and security panels. The “head-end” hardware devices communicate with the “field devices” of a particular …
Technical Assessments – Installation and Maintenance Issues
This is the first of three blogs concerning the installation and maintenance practices we have found when conducting technical assessments. There are three principal parts of an integrated security plan: people, processes, and technology. As a result, each of these components serves to augment the effectiveness of the other. Looking at technology, there are dozens of electronic security management systems …
Video Management Optimization with IP Cameras and Video Settings
The Problem Recently, one of our clients with a very large video management system (VMS) noticed they were not getting a full 30 days of online video storage from a particular security camera video server that they recently installed. This client has multiple servers spread throughout multiple facilities. The majority of the other servers were performing well and were obtaining …
What is GDPR and does it affect me?
GDPR is the General Data Protection Regulation adopted by the European Union (EU) in 2016. This just became enforceable as of May 2018. Does it affect me? The short answer is “Yes”. This law may affect you if you have an enterprise class system that collects and shares data around the world. What is GDPR? In a nutshell, GDPR is …
Managing Global Integration of Systems
During the last several years, we have seen many companies expanding within their own organization or through mergers and acquisitions. Growth of any kind challenges the expansion of systems utilized within the company or organization, such as network infrastructure, payroll systems, and other technology. One area that is always a challenge is the security systems that protect the organization. Card …
Installation and Neatness, It Does Matter
I have been in this business for over 30 years, and I am still surprised sometimes at what we find when we are asked to perform an assessment of a security system. The picture is a great example of what not to do, however there are companies out there that continue to install systems this way. I am not exactly …
Maintaining Security Management Systems
It is not a secret that most departments within corporations and governments including local, state, and federal have been asked to reduce their budgets by a certain percentage every year since the economy took a turn for the worse. This has been a challenge – especially for security departments. How do you maintain the level of security needed today with …