What Are My Access Control Options?

Steven DepoloWhat is access control?  In the simplest of terms it can be explained as a means to allow or deny entry to or exit from a designated space.  Think of the kinds you likely use on a daily basis, a key to lock or unlock your front door or an electronic gate that lets you into the parking garage at work.  But what does it mean, what are the options when it comes to business integration and security systems, and why might your facility need it?  As licensed security systems providers our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We have extensive knowledge and experience in creating comprehensive security systems that often include some form of access control.

Before looking at the different types of access control available it is important to understand why it may be necessary in the first place.  In most cases access control is used as a layer of protection.  What warrants this added layer of protection is subjective.  It could be company assets, valuable materials, sensitive or confidential information, medication (assisted living or healthcare facilities), staff and employees, or any combination of these items.  Regardless of what needs protection, the point is it warrants reinforcement.

The most simplistic and ubiquitous form of access control is a door lock and key.  While this system is effective at creating a temporary barrier, it is not sophisticated enough to prevent a break-in on its own.  Consider how easy it is to lose a key or duplicate one for that matter.  An experienced burglar or criminal could easily pick a standard lock.  This is why many companies turn to more advanced technologies typically provided in conjunction with a comprehensive security system.

An access control system (ACS) consists of the user being issued a “credential” which is then used on an electronic reader typically at the point of entry or in close proximity.  A credential can consist of any predetermined physical item like a plastic ID card or token that is embedded with the appropriate access information.  When it is swiped, tapped, or within range of the electronic reader, access or exit will be permitted.  According to SecurityMagazine.com, “A credential is presented to an electronic reader that gathers information stored on the credential and compares it to preset parameters and information stored in the ACS computer.”

A fairly common form of access control is using a keypad and PIN number or code.  When used individually this type of technology is not always effective.  PINs can be easily stolen by an onlooker observing you entering it.  Wear and tear on the same digits on the keypad can also be a dead give-away to someone looking to gain entry.  When used in combination with other access control methods a keypad can become more effective as an added layer of security.

One of the most secure and pervasive electronic technologies being implemented in the access control industry today is proximity technology.  How does it work?  Basically a plastic card or token (fob) is embedded with an electronic chip and antenna.  The internal chip is coded and when presented within range of the electronic reader the code is transmitted.  If the code is recognized and verified by the reader access will be granted.  The obvious downfall of this type of system is if you were to lose your card/token or if it were stolen.

Looking toward the future a less popular form of access control is sitting on the back-burner.  Biometrics.  According to Steven Hausman biometrics involves, “analyzing physiological and/or behavioral characteristics of the body, both classes of which would be presumably unique to an individual, and thus more reliable than traditional methods of verifying identity.”  This could be anything from fingerprint to vocal recognition.  This technology isn’t as widely used as some of the more traditional forms of access control because of its cost and reliability issues.  Although it may be difficult to replicate physical traits, it can be done.  The television show “Mythbusters” proved that fingerprints can be replicated using latex and ballistics gel.  While this technology may have some kinks to work out, it’s something to keep an eye on in the future.

There are many viable options when it comes to access control integration.  When combined with a comprehensive security system access control technologies become more effective at deterring crime.  A comprehensive system includes not only access control but video surveillance, fire alarms, burglar alarms, and alarm monitoring.  Our team at Perfect Connections, Inc. has been providing access control and security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand you have many concerns when it comes to the security of your business, and we are here to help guide you through the process from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steven Depolo-Flickr-Creative Commons

Why Custom Is Best

Installing a security sy9677247879_a39e3e702c_zstem can be one of the best ways to protect your business from unpredictable threats like fires and burglars.  Did you know that not all systems are the same?  That’s right there really isn’t a “one size fits all” solution when it comes to securing your workplace, nor should there be.  Why?  Because no two businesses are exactly the same.  Therefore, doesn’t it make sense that a security system should be tailored to a facility’s individual needs?  A healthcare facility wouldn’t have all the same security needs as a retail store, right?  Right.  So how do you go about finding the right system for your business?  Your best option is to hire a licensed professional in the security system field who has extensive knowledge and experience.  At Perfect Connections, Inc. our team has been customizing security system solutions for businesses throughout northern and central New Jersey for the past 23 years.  We understand your business is unique and requires personal attention versus a one-stop solution.

As every home is different and each family has different security needs, the same is true for every business.  There are many factors that go into creating the right system for your facility.  For example the location and demographics, local fire codes and regulations, facility size and type, building/facility access, number of employees, local restrictions, and more.  A business in the middle of a city is going to need a different security system than one located in an industrial park in the suburbs.  This is why it is vital to have a security systems expert do an in person assessment of your facility’s needs before pricing becomes part of the equation.  Don’t fall for the security system company that says they can give you a quote without ever having stepped foot in your facility.

What are the main ingredients for a security system?  At Perfect Connections, Inc. it is our belief that any comprehensive security system includes fire alarms, burglar alarms, access control, surveillance, a monitoring service, and carbon monoxide and smoke detectors.  There are variations on how some of these components are installed and what products are used.  For example there are many different forms of access control.  Access control can be anything from biometrics-which typically analyzes physical human traits like a fingerprint-to smart card readers that require a swipe or tap of a programmed card or fob.

Again, the type of access control that would suit your business best, really depends on what your specific needs are.  Maybe you run a healthcare facility where only certain employees are allowed to access medication supply rooms.  Maybe the best solution in that situation is issuing swipe cards to those specific individuals, or maybe a coded lock would work better.  These are the types of things you want to discuss with your security systems expert.  They will be able to advise you on what system would work best.

Monitoring your alarm system can be varied as well.  While it’s pretty standard to sign a contract with a monitoring service, there is the option to self-monitor as well.  Self-monitoring works by allowing you to access your security system via a smartphone or mobile device.  This type of monitoring could be set up to alert you directly if there is any activity detected at your facility.  The disadvantage to a solely self-monitored system is a slower reaction time and having to constantly be vigilant.  Imagine you don’t have your phone on you and an alarm is triggered at your facility, who’s going to contact the local authorities?  Fortunately, with a monitoring service you don’t have to worry about reaction time because someone is constantly keeping watch.  Even if you opt for a monitoring service often times you can still have the ability to self-monitor at your convenience.  The combination of both gives you the advantage of not having to worry about checking in constantly and the convenience of doing so when you need/want it.

Surveillance is a key component to protecting any business.  How surveillance equipment is set up will vary business to business.  Some facilities may require more or less coverage than others.  Some businesses may be at a higher risk for crime or theft than others as well.  For example Plato’s Closet in Des Moines, IA is susceptible to shrinkage due to clothing, shoe, and accessory theft.  This particular location of Plato’s Closet had a shrink rate of a little over 1 percent, but after they installed 19 IP (Internet Protocol) cameras that rate fell to .8 percent.  The quantity, type, and location of surveillance cameras will depend on an individual business’s needs.

Whether you run a recycling, retail, or healthcare facility protecting your business is a top priority that shouldn’t be left to just anyone.  You need a licensed security systems expert who will assess the risks associated with your business and customize an appropriate solution.  Our team of licensed professionals at Perfect Connections, Inc. understands you’ve worked hard for what you have and we want to help you keep it secure.  We have been providing customized security system solutions to businesses throughout northern and central New Jersey since 1992 helping you connect and protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Nuclear Regulatory Commission’s photostream-Flickr-Creative Commons

What’s Your Business Missing?

Missing puzzle pieceWhile businesses have a lot to offer, many are lacking the protection they need.  No I don’t mean stowing an arsenal below your cash-wrap, but rather an effective security system and security features.  At Perfect Connections, Inc. we can help you protect what you’ve worked so hard for.  If you run a business in central or northern New Jersey, let us assess your security risks and provide a custom solution to fit your needs.  Many don’t know what they are lacking and how it can be rectified, our licensed professionals can help in that arena.  Don’t fall victim to preventable disasters find out what a comprehensive security system can do for you and the health of your business.

What’s lacking?

An incomplete security system is a bit like working on a puzzle with missing pieces.  There are essential features that should be included in a comprehensive security system.  Maybe you already have a security system installed at your business, but is it monitored?  What good is a security system if no one, except those in the area, is alerted when the alarm goes off?  Having a 24/7 monitoring service as part of your security system is crucial for the quickest response times.  Surveillance equipment can also help deter employee theft which is, “the fastest growing crime in America,” according to the FBI.  Employee theft costs businesses up to $200 billion each year.  Installing surveillance equipment not only in the main customer space, but in offices, storage, and inventory spaces can help decrease chances of employee theft and misconduct.

Other areas that tend to be overlooked or under-protected are doors and safes.  While a door typically locks, if it’s not sturdy and linked to an alarm, what’s preventing someone from kicking it in?  To protect your entries, exits, and interior spaces be sure that your doors are not only sturdy and alarmed but protected by some sort of access control.  Whether it’s a swipe card, key fob, passcode, or some form of biometrics, access control will help prevent unwanted entrants.  Safes that are out in the open and easy to grab or crack open provide minimal protection for whatever is in it.  If you’re going to store valuables or cash in a safe at your business be sure it’s secure either bolted to the ground or in a fortified room.

Inadequate protection from fire and carbon monoxide can be a killer for any business.  Having detectors and alarms may not be enough if they don’t communicate with emergency services.  It’s the same idea as the unmonitored burglar alarm, if no one is around to hear the detectors go off a fire could easily escalate to the point of no return.  For the quickest response time, fire alarms and detectors should be linked to a monitoring service that communicates with emergency services.  Proper fire alarms, smoke and carbon monoxide detectors should be an integral part of a comprehensive security system.  Your business is likely your livelihood, protect it.

There are few certainties in life, but taking initiative to protect what you’ve built by installing a comprehensive security system is guaranteed to help.  No two businesses are the same, therefore no two security systems will be the same.  At Perfect Connections, Inc. we believe in customizing security solutions for each individual business based on their specific needs.  As security systems experts we have been providing security solutions to northern and central New Jersey businesses since 1992.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Preventing Workplace Violence

Stop Sign-Michael GilViolence in the workplace is not a pleasant topic for discussion.  However, understanding the causes and how it can be avoided is essential for any business owner.  No company/operation is immune, but there are ways to help decrease the risks.  Workplace violence is not only damaging to its victims but the company as well.  In 2012 SHRM (Society for Human Resource Management) found that 36% of organizations in the United States reported incidents of workplace violence.  Damages are sometimes physical but can be economical as well, costing businesses $36 billion annually.

How do you define workplace violence, what does it mean?  According to SHRM and ASIS International (American Society for Industrial Security) workplace violence can be defined as, “a spectrum of behaviors-including overt acts of violence, threats, and other conduct-that generates a reasonable concern for safety from violence, where a nexus exists between the behavior and the physical safety of employees and others (such as customers, clients, and business associates) on-site or off-site, when related to the organization.”  It’s a scary but very real issue for every organization.  Being prepared is the only way to combat the unpredictable.  There are tactical and physical measures that can be implemented in the workplace to avoid violence.  At Perfect Connections, Inc. we believe in helping you prevent catastrophe.  Having a comprehensive security system installed at your place of business can provide multiple layers of protection for you and your employees.  If you run a business in Northern or Central New Jersey do not hesitate to find out what Perfect Connections, Inc. can do to help protect what matters most.

You might be wondering how installing a security system can help deter or prevent something as unpredictable as violence in the workplace.  Allow me to break it down for you.  There are multiple facets to an effective security system, an alarm is just part of it.  The key components are the alarm, access control devices, and video surveillance.  Of course there is the fire alarm component, but it’s not the main area of focus when it comes to violence prevention.

By combining key features into one comprehensive solution you will not only secure your business, but help prevent loss and potentially life threatening situations.  You can limit who can enter certain areas of your facility by implementing some form of access control i.e. a card reader, key fob, or biometric scanner.  This will help stop intruders, a disgruntled ex-employee, or and employee’s spouse from getting onto the premises.  Video surveillance throughout a facility would be helpful in keeping an eye on who is coming and going on a regular basis.  Cameras can be set up to watch specific areas and/or provide overall coverage throughout the premises.  Utilizing a monitored surveillance system will ensure that someone is keeping watch over your business even when you can’t be there.  Tying these features into a monitored alarm system will help notify you, your employees, and the authorities of any disturbances.

A comprehensive security system along with a contingency plan that is communicated to the entire staff is about as prepared as anyone can be for the unexpected.  Some companies may choose added security features such as physical security guards, it really depends on personal preference, the business, and recommendations from security professionals.  Increased lighting in parking lots/garages, requiring ID cards for employees and visitors, metal detectors, and check-in desks or stations are added security measures that can help your company avoid disaster.  Keep in mind there is no one-stop solution for all businesses/facilities.  A hospital will have different security needs than a salvage yard/facility.  While no system is infallible, here at Perfect Connections, Inc. we provide top notch products and service to help prevent potential catastrophe.  If your business is located in Central or Northern New Jersey don’t hesitate to contact our team of professionals for an in person assessment.  We will provide a customized security system solution that fits the needs specific to your type and place of business.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Michael Gil-Flickr-Creative Commons

Are The Children Safe?

Daycare-USAG HumphreysWe live in a fast paced society, everyone is constantly on the move.  This effects every aspect of our lives including the family dynamic.  The stereotypical roles of male worker and female caregiver have significantly shifted in light of economic growth, expansion of civil rights, and the need for dual income.  In fact, women today constitute 47%, nearly half, the total workforce in the United States.  As both parents enter the workforce, who will care for their children?  Those who are lucky have family or close friends that help provide care, but in most cases parents rely on daycare or childcare facilities.  Parents entrust the lives of their children to licensed caretakers throughout the day to watch over and protect them so they can earn a living to support the family.  Childcare and daycare facilities have become a home away from home for an increasing number of infants, toddlers, and young children.  This begs the question, what is being done to ensure their safety at these facilities?

As a daycare facility owner/operator, you know there are certain state laws and licensures you must adhere to.  However, the law cannot provide protection from the unpredictable external/internal dangers at a facility.  How do you prevent total strangers from entering your facility?  How are the local authorities contacted in case of emergency?  How can you keep an eye on what is happening throughout your facility?  These questions are a concern not only for facility owners but parents as well.

There are proactive steps you can take to safeguard the children you care for and your facility.  Installing a comprehensive security system that includes alarm monitoring, video surveillance, and access control will significantly decrease the chances of a potential disaster and provide peace of mind to you and your clients.  Like any other business, you should have a security assessment conducted to find out where your weaknesses are and how to address them.  Let the experts at Perfect Connections, Inc. help you safeguard your business and the little ones you care for.  As industry professionals, we have been providing business security systems services to Northern and Central New Jersey for the past 22 years.

Challenges Daycare/Childcare Centers Face

While you maintain a reputable care facility for your clients, you cannot deny the potential threats to the security of your business.  Keeping intruders and deviants out is a top priority.  This may sound obvious, but without proper access control a door is just a door, and that alone will not necessarily stop an intruder.  It’s not only access control you have to be cognizant of, but fire safety and code compliance, child abduction, employee behavior, and emergency planning, all while keeping track of the kids.  Daycare and childcare facilities are typically not required to have a security system, however, the benefits of installing one far outweigh the cost.

Playground-Carl WycoffUnlike material objects, children are irreplaceable.  They are the link to our world’s future, shouldn’t they be the most protected?  Of course!  You’re probably thinking about all the reasons you don’t need a security system, like your business is in a safe area nothing could happen; or you always lock the entry once all the children have arrived, you even have the required smoke and carbon monoxide detectors.  Well, what about who is watching the hallways?  How are police and emergency responders notified?  What about other access points?  How is the playground protected and monitored?  How do you know your employees are actually paying attention?  These are the types of questions/concerns parents will have, or at least be thinking about when they are looking for a facility to care for their child.  What can you do?

Addressing The Issues

As no two facilities will be the same, no two security solutions will be the same.  Have a licensed professional assess the current state of your facility, and consider installing a comprehensive customized security system.  No system is perfect, but having one will help deter potential threats, help you manage the day to day of your business, provide peace of mind to you and your clients, and enhance whatever security features you may already have in place (like fencing).  By having some sort of access control, whether it’s a password activated keypad, key fob, or card reader, unwanted or unauthorized visitors will be denied entry creating a more secure barrier.  Some daycare centers have implemented biometrics as their means of building access, like at Playhouse Child Care Center in Minnesota.  Registered parents must use their fingerprints to gain entry and pick up their child.

Surveillance equipment is useful as it can help monitor specific areas within and outside your facility.  Obviously, cameras in the bathroom are not allowed, nor should they be, but having them in hallways, playrooms, at the entries/exits, and overseeing the parking lot and playground/outdoor play area will give you a better grasp on what people are doing and where/when they are doing it.  If an incident were to occur you would be able to utilize recorded footage to review the details of a specific event.  Recorded footage can be particularly useful to police and investigators.  Including a monitored alarm system that communicates with sensors and/or detectors, will immediately alert the local authorities of an emergency, allowing a quicker response time.  All security features are preventative, while they’re not 100% perfect, they will decrease the chances of disaster.

Whether you are considering a security system for the first time, or think it’s time for an upgrade, be sure to contact a licensed security professional to perform an initial assessment in person.  Our team of experts at Perfect Connections, Inc. will help guide you through the whole process, from initial assessment to final installation.  If your facility is located in Northern or Central New Jersey, do not hesitate to contact us.  Custom business security systems are our specialty and we have been providing service for decades.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credits: Image #1 by USAG-Humphreys-Flickr-Creative Commons, Image #2 by Carl Wycoff-Flickr-Creative Commons

Access Control

Protecting your business is a top priority.  You’ve done your homework, found a security systems professional, and are ready to customize a security system that fits your needs.  When browsing the vast array of available security system options you’ve probably come across the phrase access control.  What is it, and does your business need it?  In general, access control is exactly what it sounds like, it grants, denies, or limits entry and sometimes exit to an environment.  To get a little more specific, “Access control systems are physical or electronic systems which are designed to control who has access to a network” (wisegeek.com).

One of the most obvious and simplistic examples of access control is a door with a lock and key.  Being a business owner, you know it may take more than a door to protect you, your employees, and company assets from potential crime and danger.  Including an access control device, whether it’s a proximity card reader, keypad with password, fingerprint scanner, or a combination of these, as part of your comprehensive security system can help prevent costly and disastrous interruptions in your day-to-day business.  It can also keep you informed on who is coming and going, where your employees are going throughout the day, limit access to specified areas, and keep unauthorized people out.  Security systems companies like Perfect Connections, Inc. can provide a variety of access control solutions to better secure the integrity of your business.

Types of Access Control

As previously defined access control can consist of physical or electronic systems.  Today, many systems are a combination of both.  There are a few basic types of access control systems, that when used in conjunction with monitored alarms and surveillance can provide comprehensive protection for your organization.  Locks, readers, keypads, cards or fobs, and biometric scanners are some of the most common forms of authentication devices.  So what are they, and how do they work?

Locks

You’re probably aware of the general function and parts in your average door lock.  Typically there is a knob or lever that when turned releases the door latch from the strike plate on the wall.  Today, there are more advanced locking mechanisms that can provide better protection for your business.  Two of the more commonly known locking mechanisms are magnetic, or maglock, and electric strikes.  Magnetic consists of an electromagnet and armature plate; it works by a current passing through the magnet attracting the armature plate creating a locked position.  Maglocks are a durable and fast acting solution.  Electric Strikes either accept alternating or direct currents.  Like a standard strike, they accept a locking latch.  Unlike a standard strike, they can be configured to open without the use of a lever or knob turn, and are controlled by electrical currents.  These types of locks can be triggered by a readers that accept cards, key fobs, or keypads with passcodes, and biometrics.  It is important to remember that where you have locking doors, gates etc. egress and fired codes must be taken into account.  To be sure your locking mechanisms are code compliant, be sure to have them installed by a security systems professional.

Readers

According to William Deutsch ikeypad & reader-7263255n regards to EAC (electronic access control), “In a modern EAC system, the readers are designed to recognize codes (something you know), credentials (something you have), or biometrics (something you are).”  Readers take the given information from the potential entrant and either confirm identity by allowing access or deny it for being false or incorrect.  They are the means by which information is processed and they can be installed on the exteriors and/or interiors of a facility.

There is a range of readers available including proximity readers and smart card reader; hiring a knowledgeable and informative security systems professional like Perfect Connections, Inc. will help you better assess your facility’s needs.  You may think the construction of your facility wouldn’t allow for the installation of a reader.  For example, if you have a fully glazed entry, where would it go?  Luckily, readers can be applied to architectural elements that are as minimal in area as window/door mullions.  Don’t let the architecture of your facility dictate your security needs.  As with any system, nothing is perfect; if someone were to steal a key fob and hack a PIN, the reader will not know the difference, and the intruder will gain access.  This is why having a comprehensive security system that includes surveillance and monitored alarms in conjunction with access control is best.

Keypads

Keypad technology typically consists of a small mounted panel that requires a password, PIN, or code, that when entered correctly, unlocks or grants access to electric or magnetic door locks, gates, and/or security systems.  This method of identity validation is simple, economic, keyless, and not uncommon.  The benefits of a keypad they can easily be recoded, they can be standalone or tie into central control stations to protect multiple entry points, and they will help deter opportunists.  Unfortunately, they are not infallible.  Codes, passwords, and PINs can easily be shared, and if there is no protective housing for the keypad, onlookers can easily view a code being entered, or see wear and tear on the buttons or screen that are used most (Dan M. Bowers).  Used by themselves can leave a facility susceptible to outsider access, but used in combination with other technologies like card readers, key fobs, and/or biometrics will increase their effectiveness.  Combining the keypad with another verification control can be called “two factor authentication,”  and it’s more secure than the keypad by itself.

Access Cards & Key Fobs (“Credentials”)200248699-001

Access cards and key fobs also commonly referred to as “credentials,” are a popular security measure for many businesses.  Access cards or RFID (Radio Frequency Identification) cards contain specific information that is transmitted to the reader when within a given boundary.  Sometimes the cards, which are typically the size of a standard credit card, have to be held to or tapped on the reader, or they can be set up to read the contained information from a specified distance.  The same type of information is stored and conveyed by a key fob key fob which is usually molded from plastic or resin, and is small enough to fit on a keychain.  This is a more secure option than the keypad by itself, as the cards and fobs are not easily replicated.  However, theft or loss of a card or fob can be problematic.  Just as with the keypad, including layers of protection through a comprehensive security system can make all the difference.

Biometrics

What is biometrics?  “Security Biometric is the science of using physical characteristics (fingerprints, eyes, hands) to identify a person and some of the products used in this system include fingerprint readers and retinal scanners.”  While this type of technology may seem a little unconventional when it comes to access control, its presence is becoming more evident.  The most common applications being fingerprint readers and hand geometry scanners.  The benefits of a biometric system include never forgetting the item that will grant you access because it is part of you, and it’s harder to forge.  One of the major drawbacks of a biometric system is the cost.  Also, once the data is collected from an individual and stored, it can’t be changed because it so unique.  Biometric security is controversial topic for many as it can be perceived as an invasion of privacy.  While it may be considered controversial to some, it can provide the necessary means of protection for others.

What Are You Doing To Control Access?

Whether you’ve been considering controlled access to your facility for a while, have an old system in place, or this is completely new territory for you, don’t wait another minute!  Contact a trusted security professional at Perfect Connections, Inc. to help guide you through the process.  From an initial assessment to final installation, you can rely on our exceptional team of security experts that has provided service to Northern and Central New Jersey for decades.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credits:  Image #1 by 7263255-Flickr-Creative Commons, Image #2 by IDenticardImages-Flickr-Creative Commons