Crime prevention - Expert commentary
There was a time when one of our biggest challenges was securing our physical assets, whether that was our people or our property from crime. We researched and deployed the very latest in video solutions, intrusion systems, fire alarms and access control devices, all in an effort to keep the bad guys out and the good guys safe, along with protecting our facilities from break-ins, robberies and countless other crimes. However, times are changing. No longer must we only be concerned about keepin...
Atlanta’s new $1.5 billion stadium, home to the NFL Atlanta Falcons football team and MLS Atlanta United soccer club and site of the recent NCAA national college football championship, is protecting fans, personnel and athletes from terrorists and errant drivers from using vehicles as weapons. While the threat of terrorists planning to attack soft targets, such as stadiums increases, stadium security professionals, such as those at the new Mercedes-Benz Stadium, must look for the weak poi...
While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilized the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones For Effective Surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate...
PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organizati...
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of havin...
Fly-tipping – the illegal act of dumping large amounts of waste on unlicensed land without authorization – occurs on both private and business land and can be a real annoyance to those in the UK. Items that fall under the banner of fly-tipping include tyres, mattresses, beds, garden waste, and construction rubbish. Unfortunately, the property owner will be responsible if somebody dumps their rubbish. Although this seems unfair, following some basic steps will help handle the proble...
Until recently, data laws have differed from one country to the next. This meant that for those organizations conducting business or protecting assets abroad, they needed to localize both their infrastructure and policies dependant on the country they were operating in. However, with the impending arrival of the EU GDPR (General Data Protection Regulation), which comes in to force on the 25th May this year, all of that will need to change. Data Management In CCTV Surveillance Surprisingly, des...
2017 was an incredible year for VuTeur and the industry as a whole, as security has become a primary focus for stakeholders, now more than ever. VuTeur introduced its proprietary IRIS (Internal Real-time Intelligence Software) technology this year, which is part of its emergency management and asset protection solution. IRIS leverages real-time location services (RTLS) technology and utilizes the existing WiFi infrastructure in a building to create a personal, mobile safety...
2017 saw an opportunity for the economy to have a strong stock market, which provided companies confidence to invest in and update their infrastructure. This included many replacing older access control systems and moving to more integrated solutions for better connectivity between all security-related systems. We anticipate commercial businesses to invest in infrastructure, which will include security systems and technologies. Each year there is an increase in random violent incidents, w...
The most important trend that developed in 2017 was the increasing focus on cybersecurity. As more and more devices move to the Internet of Things (IoT) model to provide added convenience and intelligence, the ability of hackers to use those devices to infiltrate systems – and the need for oversight to protect organizations – has also increased. Another trend we saw was an increase in the number of compliance and audit requirements related to physical security. An example of this i...
The air travel industry has evolved from one commercial passenger on the first commercial flight in 1914 to an estimated 100,000 flights per day. According to The International Air Transport Association (IATA), the total number of passengers who flew in 2017 is expected to reach 3.7 billion. But it’s not just people who fly. Each day, more than $18.6 billion of goods travel by air, which represents one-third of all world trade, by value. Meanwhile, the aviation industr...
This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous Authentication Experience Demand grew for unified identity and access management systems supporting both cards and cellphone devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuo...
This Active Shooter infographic summarises information about trends among active shooter incidents, and outlines how an organization can develop a plan before tragedy occurs, including: Statistics on the numbers and types of recent active shooter incidents. A profile of common traits among active shooters. How to prepare beforehand, and what to do when the police arrive. How organizational planning ensures maximum preparednes...
We predicted last year that more vendors would introduce copies of Arecont Vision’s multi-sensor 180-360 degree panoramic and adjustable-view multi-sensor cameras in 2017, which came true. More vendors now offer their own 1st generation copies of the pioneering technology we introduced in 2006. We’ve continued to lead this market, introducing new 5th generation single-sensor and multi-sensor cameras that are used by customers worldwide. The SurroundVideo Omni G3 with Remote Setup c...
Last year, Genetec predicted that cybersecurity would be taken much more seriously as the Internet of Things (IoT) opened more doors for hacking and network take overs. We also predicted that that there would be an increase in the adoption of Software as a Service (SaaS), expanding choice and convenience from new ownership models via hybrid (on-premises and Cloud) and Cloud-only models. Cyber Accountability Awareness 2017 was also a year of awareness about ‘Cyber Accountability’....
During 2017, we’ve enjoyed stable economic growth for a number of years now; we’re not running into as much resistance for security entrances as we did, say, seven to nine years ago. Hardening Perimeters Against Active Shooters Compared to other security products such as cameras and card readers, security entrances are a big investment and considered somewhat of a luxury: during downturns we’re among the first to hit the “cutting room floor.” Now, however, fueled...
The term “smart city” gets thrown around a lot nowadays, but as different technologies that strive to be defined in this way are adopted by different countries globally, the meaning of this phrase gets lost in translation. The simplest way to define a “smart city” is that it is an urban area that uses different types of data collecting sensors to manage assets and resources efficiently. One of the most obvious types of “data collecting sensor” is the video ca...
As a grocery store or supermarket owner, it is very hard to fight theft. Shoplifting and retail theft may not seem like a major deal, but to the small business fighting for survival, it has a big impact on the bottom line. A disadvantage of traditional tools for fighting shoplifting is that they are most effective when the shoplifter is caught red-handed. Once the shoplifter has concealed the stolen product in his or her clothing or bag, it is very hard to see whet...
The number of security cameras in use today is growing exponentially. At the same time, resolutions are getting higher and higher. These two factors are placing heavy demands on servers and storage equipment. Of course, the capacity of these systems is also increasing, but that alone does not make the equipment truly suitable for the most demanding applications - such as camera surveillance. A video stream is not comparable to 'normal' data, for which storage systems are usually designed. This a...
The threat of international terrorism has changed the way the domestic security industry thinks about protection, just as much as it has for national security services. While violent attacks and terrorism were once predominantly aimed at government, military or political establishments, an uncertain global political climate means the ability to rapidly lock down facilities has risen to the top of any organization’s security wish list. In reality though, just how easy is it for most organi...
Crime is preventable and safeguarding your businesses through the use of technology is essential. Whether you want to avoid burglaries or common vandalism, you need to comply with the General Data Protection Regulations to protect your brand’s identity. Security should be one of your main focuses and with the help of 2020 Vision, providers of access control systems, we look at some of the most efficient items that you need in place to protect your property. 1) Deploy Video Surveillance&n...
In the digital age, speed has never been more critical. Customers expect an instant response to a query. Executives expect sales data on their tablets in front of them in real-time. A site manager at an oil refinery needs an instant alert about a defective valve. An IT manager expects to know about a phishing email before it hits his employees’ inboxes. The 'need for speed' is impacting the physical security sector too. Customers increasingly expect their security systems to identify and...
After a lot of studying and getting ready for what seems like an endless stream of exams, teachers and students alike will enjoy having some much-needed time off — whether it’s just for a weekend, a break during the school year or the long summer holidays. Schools that are left empty for a sustained amount of time obviously increases the risk of arson attacks, thefts and vandalism. Staff members at an establishment should therefore work through this checklist before they leave the c...
Today ‘terrorism’ has become a word we use and hear every day. The goal of terrorism is a media product - information delivered to nearly every house in the world. So, the weapon of terrorism is information. Therefore, the way we defend and prevent terrorism must also be based on intelligent processing of information - and an early awareness of potential threats and effective preventive action may eliminate most attacks. Video analytics, automated surveillance and AI decision-making...
In a world where hacking and denial of service are everyday threats, many feel that it is about time for the world of the Internet of Things (IoT) to undergo a reality check over its strategy and promotion before disaster strikes, reputations are lost and investors pull up stakes and run for the hills. What Is New About IoT? Having made, lost and then re-made my fortune in and around the industry over the past 20-plus years, I cannot help but smile over the level of hype &md...
There have been many changes in the healthcare environment over the past decade. The Affordable Care Act has been established, severe weather events are on the rise, violence along with active shootings continue to increase, behavioral health patients present treatment challenges and hospitals continue to consolidate to increase purchasing and service capabilities. Over the next decade, healthcare will continue to transform. Emphasis will be on financial reform, violence response, emergency prep...
Nowadays, there is a lot of hype around data and its utility for almost any industry – from security and law enforcement to business operations and retail. While we are inundated with information about data and its significance to business success, technological development and fulfilling the promise of the Internet of Things, we don’t always get practical feedback as to how to obtain this valuable data from the resources available to us. Security teams feel this challenge acutely....
Workplace violence (WPV) cannot be 100% prevented. However, we know from experience that well-placed preparedness and prevention measures can significantly diminish the probability and severity of potential workplace violence. A prime example comes as an outgrowth of the multiple “going Postal” shootings at the U.S. Postal Service (USPS) by employees or ex-employees (mostly in the 1990s). Out of necessity, USPS implemented a comprehensive workplace violence program throughout t...
For many frequent flyers, the relationship between flyers and the Transportation Security Administration (TSA) has been at times, turbulent. For the better part of the last two decades, going through airport security has been met with groans over long wait times as flyers are encouraged to get to the airport earlier and earlier. TSA Lean Six Sigma Tactics Reduce Wait Time However, the tide may be turning a bit, as recent reports have shown a decline in TSA’s wait times, which can be att...
In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organizations will suffer...