Articles by Michael Fickes

Cloud Usefulness And Effectiveness For Physical Security

The great increase in the amount of data is driving physical security to the cloud Physical security is migrating to the cloud — because it improves the performance of physical security technology while holding down costs. “Essentially what is happening is that physical security technologies are growing more powerful and generating more and more data,” says Steve Surfaro, business development manager and security industry liaison with Axis Communications, wh...

Designing Buildings To Keep Government Employees Safe

Security is a big concern for local government buildings, but there are measures that can make a difference Back in August of 2013, Rockne Warren Newell, armed with a rifle and a handgun, stormed a township meeting in the Ross Township Municipal Building in Saylorsburg, Pa. Witnesses say he fired through a wall into the meeting room and then burst into the room itself, guns blazing. Three people died, and two sustained wounds before citizens attending the meeting restrained hi...

When Companies Expand Globally, Security Technology Takes On New Tasks

SWOT evaluates a company’s Strengths, Weaknesses, Opportunities and Threats (SWOT) in connection with a project Expanding into other countries with sales offices, manufacturing facilities and distribution centers can present a number of security risks. SWOT Analysis For Security Strategy Physical security technology can help to mitigate some of these risks. “The physical security technology used in international locations is similar to what we use here, but t...

Despite Benefit Of More Efficient 911 Responses, ASAP-to-PSAP Implementation Lags

ASAP-to-PSAP technology automates communications between alarm monitoring companies & PSAPs and dispatches emergency service In April 2015, Cary, N.C., adopted a technology called Automated Secure Alarm Protocol to Public Safety Answering Point (ASAP-to-PSAP), but currently they are among only a handful of emergency 911 call response locales that use ASAP-to-PSAP technology in the United States. Commander Scott Edson of the Los Angeles County Sheriff’s Department, sp...

SchoolDude Crisis Management App For Emergency School Situations

To guide people under stress facing emergency situations, SchoolDude developed the CrisisManager smartphone app Last year, SchoolDude asked administrators at several hundred K-12 schools and colleges how they communicated their emergency and crisis management plans to administrators and faculty. Seventy-nine percent said they sent their emergency plans out in paper binders. Cary, N.C.-based SchoolDude, an education enterprise asset manager, conducted the study to see if there...

Battling The $36 Billion U.S. Problem Of Retail Shrinkage Losses

Employees are the front line of defense — as well as the most economical defense — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...

Sounds Of Security: Convenience Stores Adding Audio To Reduce Crime

Audio systems can enhance liability protection. Recently, a large regional convenience store chain with units across the Midwest and South supplemented its video surveillance security system with an audio monitoring system. Retail stores with Louroe audio system: The technology has been installed in more than 700 of the convenience retailer’s locations. The Louroe Electronics systems feature omni-directional capability and sensitivity and pick up sound within a 15-foot...

Technology Advancement Requires Well-educated, Well-paid Security Officers

The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control center. The post of security officer was a minimum wage job requiring little more than a high school diploma, if that. Educated And Experienced Security Officers A Prerequisite No more. “Today, when we read our requests for proposal (RFPs), we’re...

Lower Costs By Getting Security Assessments Right

A comprehensive security assessment will tell how to plan and manage security in the facility A comprehensive security assessment will tell you how to plan and manage security in your facility. Without an assessment, you can only guess about security. For facilities with existing security programs, an assessment can also reveal whether the pieces of the system are working as they should. As a security director, can you do the assessment yourself? Sure, although a large school...

Designing Security Systems: Project Management Techniques

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...

Utilizing intelligence analysts to improve business

If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged to a group promoting the unification of North and South Korea and that South Korean President Park Geun-hye called the event an attack on the South Korea-U.S. alliance. You would want to know where in Seoul the attack occurred as well as many...

Learning To Use Visitor Management Technology In Schools

It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools.  However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...

Security’s New Job - Managing Supply Chain Risks

Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at least mitigate those risks. This article explains the need to identify and respond to risks involved in a supply chain. Manufacturers should make efforts and develop strategies to enhance supply ch...

When security breaks down, organizational resilience steps in

Organizational resilience takes all appropriate actions to help ensure the organization’s continued viability In this day and age, the traditional components of security officers, cameras, access control and alarm systems aren’t enough to protect a company or organization. No matter how good your preparations, security sometimes breaks down, and bad things happen. That can take a toll on a business. Today, security’s role extends to organizational resilience...

Design CPTED From The Start – Don’t Try To Add It Later

CPTED focuses on designing crime prevention into buildings and campuses In recent years, jurisdictions across the United States have enacted ordinances or codes requiring the use of Crime Prevention Through Environmental Design (CPTED). Enforcement of these measures arises through required jurisdictional review and approval of CPTED measures in the design drawings. CPTED has emerged in recent years as an effective crime prevention and security technique that focuses on design...

Workplace Violence Is Declining, But Employers Still Need Guidance

While the number of incidents is falling, hundreds of thousands of workplace violence incidents still occur every year More than 572,000 people met with a violent crime at work during 2009. In addition, workplace violence caused 521 homicides in 2009. The Bureau for Justice Statistics (BJS) reported these numbers (the most recently updated) in a study of workplace violence between 1993 and 2009. That is a lot of violence. Surprisingly, though, those numbers show a significant...

Researching Security Trends

Research report from ASIS Foundation and University of Phoenix declared that cyber-security would rank as top security risk for next five years Check out the research available from the ASIS Foundation. It is proving to be right on the button.When the Guardians of Peace hacked Sony Pictures Entertainment late in 2014, they crashed the studio’s email, leaked films and scattered personnel data across the Internet.  By mid-December, four class-action lawsuits had hit...

How To Succeed At Security Outsourcing

To succeed at outsourcing, the relationship between the organization and the outsourcing company has to be an equal partnership Can you save money on security by outsourcing? Maybe, maybe not, according to William J. Powers III, CIPM II, CIPI. “Considering the way I approach outsourcing, I’m not sure if it saves money,” says Powers. As director of facilities at the Sterling and Francine Clark Art Institute in Williamstown, Mass., Powers oversees facilities,...

Efficient hospital security prevents possible mass shooting

Good security basics enabled a security response before the shooting started Mass shootings by emotionally disturbed individuals and terrorists have led authorities and security professionals to search for means of prevention. “Analyzing an actual incident in which a potential shooter was stopped seconds before becoming active can illustrate how solid security basics can help prevent catastrophe,” says Drew Neckar, CPP, CHPA, regional director of security with the...

“Phoning In:” Smart Phones Using NFC Can Replace Cards

NFC can strengthen security by turning smart phones into physical and logical access control credentials The trouble with access control cards is that people lose them, lend them to friends who use the cards, or lose them, or lend them to someone else. Losing a card is bad enough, but people that lose cards often make it worse: “When someone loses an access fob or card, he or she doesn’t always tell the security department right away,” says Paul Timm, pr...

Return On Investment For Today’s Security Cameras

Security cameras can earn a return on investment (ROI) that goes beyond security Today’s security camera technology can help speed entrance screening and provide video under very low light conditions. In each case, security cameras can earn a return on investment (ROI) that goes beyond security. One difference between today’s security cameras and older generations of camera technology is something called wide dynamic range or WDR. It is a feature that enables a ca...

Open Standards And The Digital Technology Revolution

Access control and alarm worlds are going digital and plugging into the network Open tech standards are integrating diverse security technology systems — and security people — into the corporate mainstream The digital technology revolution has begun to course through the public and private worlds of government and commerce, replacing old analog technology. Chief among the many benefits of digital over analog is the ability to integrate diverse technologies into si...

Meet Dave Tyson - ASIS 2015 President

Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...

Reliable And Improved Security Technologies Making Video Analytics Effective

Observers say improved analytic technology and better support technologies are making video analytics effective Video analytics and biometrics entered the security technology market some years ago accompanied by great expectations. Both generally disappointed security directors and end users. Manufacturers oversold video analytics as a tool that could monitor video for hours on end without losing concentration — something human security officers couldn’t do. Analy...

Getting Crisis Management And Emergency Planning Requirements Right

Think of crisis management and emergency planning as a  customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it? Developing and writing a corporate or organizational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...

Providing Security Jobs For Veterans

AlliedBarton actively seeks out and hires family members of veterans through employer assistance groups  AlliedBarton Security Services implemented its program to hire veterans five years ago. “Our CEO Bill (William C.) Whitmore announced one day that ‘we’re going to have a lot of American heroes coming home soon, and I want to give them jobs,’” said Jerold Ramos, Director, Strategic Recruiting and Military Liaison with AlliedBarton. &ldquo...

End User Security Focus: Managing School Visitors

The secure inner doors of the vestibule at the front entrance of Park and River Forest High School Most school visitors have legitimate reasons for coming to school. A frightening few, however, show up with violent or other illegal intentions. Today, school security directors are actively managing visitors with secured front door vestibules and visitor management software. Oak Park and River Forest High School, a single-school district serving Oak Park and River Forest, Ill.,...