Investing in Access Control

Steven DepoloWhat is access control?  In the simplest of terms it can be explained as a means to allow or deny entry to or exit from a designated space.  Think of the kinds you likely use on a daily basis, a key to lock or unlock your front door or an electronic gate that lets you into the parking garage at work.  But what does it mean, what are the options when it comes to business integration and security systems, and why might your facility need it?  As licensed security systems providers our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We have extensive knowledge and experience in creating comprehensive security systems that often include some form of access control.

Before looking at the different types of access control available it is important to understand why it may be necessary in the first place.  In most cases access control is used as a layer of protection.  What warrants this added layer of protection is subjective.  It could be company assets, valuable materials, sensitive or confidential information, medication (assisted living or healthcare facilities), staff and employees, or any combination of these items.  Regardless of what needs protection, the point is it warrants reinforcement.

The most simplistic and ubiquitous form of access control is a door lock and key.  While this system is effective at creating a temporary barrier, it is not sophisticated enough to prevent a break-in on its own.  Consider how easy it is to lose a key or duplicate one for that matter.  An experienced burglar or criminal could easily pick a standard lock.  This is why many companies turn to more advanced technologies typically provided in conjunction with a comprehensive security system.

An access control system (ACS) consists of the user being issued a “credential” which is then used on an electronic reader typically at the point of entry or in close proximity.  A credential can consist of any predetermined physical item like a plastic ID card or token that is embedded with the appropriate access information.  When it is swiped, tapped, or within range of the electronic reader, access or exit will be permitted.  According to SecurityMagazine.com, “A credential is presented to an electronic reader that gathers information stored on the credential and compares it to preset parameters and information stored in the ACS computer.”

A fairly common form of access control is using a keypad and PIN number or code.  When used individually this type of technology is not always effective.  PINs can be easily stolen by an onlooker observing you entering it.  Wear and tear on the same digits on the keypad can also be a dead give-away to someone looking to gain entry.  When used in combination with other access control methods a keypad can become more effective as an added layer of security.

One of the most secure and pervasive electronic technologies being implemented in the access control industry today is proximity technology.  How does it work?  Basically a plastic card or token (fob) is embedded with an electronic chip and antenna.  The internal chip is coded and when presented within range of the electronic reader the code is transmitted.  If the code is recognized and verified by the reader access will be granted.  The obvious downfall of this type of system is if you were to lose your card/token or if it were stolen.

Looking toward the future a less popular form of access control is sitting on the back-burner.  Biometrics.  According to Steven Hausman biometrics involves, “analyzing physiological and/or behavioral characteristics of the body, both classes of which would be presumably unique to an individual, and thus more reliable than traditional methods of verifying identity.”  This could be anything from fingerprint to vocal recognition.  This technology isn’t as widely used as some of the more traditional forms of access control because of its cost and reliability issues.  Although it may be difficult to replicate physical traits, it can be done.  The television show “Mythbusters” proved that fingerprints can be replicated using latex and ballistics gel.  While this technology may have some kinks to work out, it’s something to keep an eye on in the future.

There are many viable options when it comes to access control integration.  When combined with a comprehensive security system access control technologies become more effective at deterring crime.  A comprehensive system includes not only access control but video surveillance, fire alarms, burglar alarms, and alarm monitoring.  Our team at Perfect Connections, Inc. has been providing access control and security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand you have many concerns when it comes to the security of your business, and we are here to help guide you through the process from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steven Depolo-Flickr-Creative Commons

Layers of Security

One of the most important techniques to protecting your home is creating layers of security. It’s not very difficult for a burglar to get past one line of defense.  The more difficult it is and the longer it takes a burglar to break into your home, the more likely they’ll run away. Neighbors are also more likely to spot someone breaking in if you are able to slow any potential thieves down. Adding additional layers of security can easily mean the difference between staying protected and a potential robbery.

House with lock-Ts_pasha

The first line of defense is your exterior. Make sure your exterior is well maintained and looks occupied, even if you’re away. Unmowed lawns, newspapers on the porch, and mail piling up are all signs that no one is watching the house. Motion detector lights and well trimmed bushes/hedges protect you from people sneaking onto your property.  If you need to leave a spare key outside, make sure it is well hidden and not in commonly checked places (under the mat, in the mailbox, under an out of place fake rock). For the most effective security, external weatherproofed security cameras with a 24 hour monitoring company can provide a high level of protection.

Your house itself is your next line of defense.  About 85% of burglaries take place with the thief entering through the front or back door.  About 60% of break ins are accomplished using force. Replace hollow doors with solid-core doors, add a dead-bolt, and reinforce the door jamb with metal. Adding a security film to windows will make them much more difficult to break. Most importantly, make sure all windows and doors are locked when you leave the house, even for a quick trip to the store. 30% of burglaries occur through an unlocked window or door.

Inside your house is the most critical line of defense. Use thick drapes and keep valuables out of view so burglars can’t see inside what you have inside your house. Electronics and jewelry are often the most sought-after items for criminals. Identify theft is also one of the fastest growing crimes. Make sure these valuable assets are protected – a large heavy Internal motion detectors, glassbreak detectors, and video cameras on an alarm system provide a comprehensive defense against potential burglaries.

While the physical barriers to a burglar getting in is extremely important,  another aspect  to remember is the psychological defenses. Signs and stickers that an alarm system is installed in the house are great deterrents. A dog is also a very large reason many potential burglars would avoid a house – even if you don’t have one, making it look like you do by posting a sign or leaving a leash outside can help. Audible alarm systems are not just to alert you or neighbors to a potential intruder, but also to scare away anyone that has made it into your house.

 

Beware of Cookie Cutter Systems

As we all know, every business is different. Each business has its own unique challenges when it comes to ensuring complete protection and safety. Unfortunately, we’ve seen numerous examples of people believing they were protected by “one size fits all” systems, when all they really do is provide a false sense of security. This year, one out three businesses will go bankrupt from theft. More than $3 billion dollars in damages will be assessed from business fires Are you able to take the risk that a cookie-cutter system will be able to defend against all the unique problems you face in your day-to-day business?

There are a number of factors that must be taken into account when designing a security system that works for your business. What are the local ordinances and laws that require compliance? How many employees do you have? What other types of buildings surround your business? Hospitals can require certain types of security systems, while manufacturing facilities will require a completely different system.

200248699-001

Many larger security companies are willing to give you a quote on a security system sight unseen. We’ve seen so many problems arise because of this. Many times, these systems won’t work when you need them to – an incident won’t be recorded because a camera was not pointed the right way, or storage was full. Vulnerable entrances left unprotected. Valuable property not monitored properly. There is often fine print that will lock you in to high cost monitoring for extended periods of time, coupled with pricey charges if you need to end your contract early.

Surveillance systems are not the only part of a comprehensive security system though. At Perfect Connections, we believe a complete security system also includes fire protection, access control, burglar alarms, and carbon monoxide detectors, along with 24 hour monitoring. Fire alarm codes differ from town to town. Each company’s access control needs will be different. Burglar alarms and carbon monoxide detectors add important layers to any security system, protecting your property and employees.

With today’s technology, these systems can not only be monitoring 24 hours a day remotely, but can also be viewed with any smartphone or computer. Automatic notifications can be sent to alert you when something at your business happens. Climate controls can be set remote to help save costs on heating and cooling.

When you’re looking to install or upgrade a security system at your business, remember to make sure you’re getting a system that fits the needs and challenges your business faces on a day to day business. While a cookie cutter system may be a bit more affordable than a custom security system, the extra protection and peace of mind you get from knowing that your security system is tailor-made for your business is well worth the investment.

Important Summer Security Tips

Summer brings many wonderful experiences – long overdue vacations, day trips to the beach, holidays spent with family and friends, and lots more. But did you also know summer brings the highest risk of break-ins?

Here are some helpful tips to make sure your home is protected during the summer months.

  • Don’t Advertise That You’re On Vacation – As tempting as it may be to brag on social media about your upcoming vacation, thieves are becoming more clever and may be watching your posts. Be careful what you post online – anything that lets people know you’ll be aware from your home for an extended period of time is an invitation for someone to break in.
  • Timers – Technology today can help with many tricks to help make it appear as if you’re home. Timers can be set on lighting systems to turn lights on and off, both inside and outside your house, making it appear as if the house is occupied while you’re away. You can even have your radio or television turned on and off remotely.Vacation-Google
  • Pause Your Mail/Newspapers – The post office will hold mail deliveries for up to 30 days. A quick trip to the post office will ensure that stacks of mail don’t pile up at your house while you’re away, which is a big sign that no one is watching the house.
  • Helpful Neighbors – Ask neighbors that you trust to pick up your newspaper / mail (if you choose not to have it paused). Give them contact information if they don’t have it to use in case of emergency, and ask them to watch out for any unexpected packages that may arrive while you’re away.
  • Sliding Glass Doors – A metal rod installed in the track of a sliding glass door makes it more difficult for any potential thieves to dislodge the door and get inside.
  • Garage Door – If you’re going to be away for an extended period of time, disable the power to your garage door and manually lock it.  This closes down one more potential means of entry for any would-be burglars.
  • Landscaping Tips – If you’re going to be away for a longer period of time, arrange to have your lawn cut. Make sure your bushes and hedges are trimmed as well – the smaller the number of potential hiding spots, the lower the chance of someone breaking in.

In addition to all these tips, one of the bonuses of a home or business security system is the added functionality of environmental controls. With an integrated system, you can remotely control your thermostat to make sure you’re saving as much as possible on your cooling bill.

Tips to Prevent Shoplifting and Break-Ins

Helpful Tips to Prevent Shoplifting

Each year, shoplifting accounts for millions of dollars of loss for businesses all across the country. Some of the most common items stolen include watches, jewelry, music, books, clothing, and even car parts. While installing a security camera can help to identify suspects after the theft occurs, there are quite a few things a retailer can do to prevent shoplifting from taking place in the first place.

Some actionable tips that can help all types of retailers include:

• Greet customers as they come into the store.
• Watch for the customers who avoid eye contact, linger, are constantly looking for the employees, wander around the store or seem to be overly nervous.
• Make sure your employees keep moving and walking around the store.
• Maintain the store and keep it well-organized and clean.
• Restrict the use of the fitting rooms to only customers who request them.
• Install various anti-theft devices.
• Create a shoplifting policy and make sure to enforce it.
• Hire plenty of employees.
• Talk to other businesses in the area about suspicious behavior they may have seen.
• Keep items that are often stolen in plain view.

If you ever do suspect that a person is shoplifting, do not accuse them of this. Instead, just ask them if you can either help them or ring them up. Keep an eye on the person and contact security or a manager right away. You should never attempt to stop the person that’s shoplifting, and if they wind up leaving the store, try to provide a detailed description of the individual, as well as what they are driving.

4 Tips to Safeguard Your Business from a Break-In

Good business security offers peace of mind and helps to prevent acts of vandalism and robberies. Being able to protect your business from a possible theft and break-in is essential for creating a safe environment for your customers and workers – all while protecting your assets.

Below are 4 tips that will help you keep your business safe and sound:

1. Find vulnerable areas.
The first step is to take a walk around the building. Hunt for any damaged windows, doors or other locations where someone could get in undetected. Repair or replace any weak areas.

2. Use video surveillance (CCTV). This is perhaps the most important component of good business security. Having video surveillance allows you to see what is going on. With today’s CCTV systems, you can have live access to your cameras, day or night, from wherever you are (as long as you have access to the internet). And, if a break-in does occur, you have the evidence necessary to catch the culprit. This will also help protect your business from employee theft.

3. Use access control card systems. There are likely some parts of your business where you have rather expensive assets or sensitive information. When you install an access card control system, you will be able to limit some rooms to only authorized individuals. If someone were to break-in, they would have a hard time getting into these locked areas.


4. Advertise your security system. Once the security equipment has been installed, be sure that you post stickers and signs all around letting would-be burglars know about the system.

 
When you secure your business as outlined above, you’ll have peace of mind knowing your location is safe and sound.

Questions to Ask When Searching for the Right Security System


 

Picking the right security system for you business or your home can be difficult. There are so many different options from brands to levels of protection that a system offers, and it can be hard to figure out which security system will be right for you. So what kind of things should you ask when deciding on a system? Here are a few:Robber-Cartoon

  1. What is it that I want to protect?
  2. What level of security will I need for what I am trying to protect?
  3. Will just an alarm system suffice? Or do I want to have a camera system as well?
  4. How much do I want to spend on a security system?
  5. How many people will need to have access to the system?

 

These are just some of the things that you will want to consider when looking into a security system. Another thing to look for when installing a system is a company that offers the things you are looking for. Perfect Connections, Inc. provides many different types of systems and can help you answer these questions to decide what system would be best for you! So, if you live or run a business in Central or Northern New Jersey and would like to find out more about what system would be right for you, please call 800-369-3962 or simply CLICK HERE.


Image from CheckPoint Security

 

From Analog to IP: Making the Switch

If you’ve had a surveillance system installed within the past decade it’s more than likely that it’s either an analog or IP (Internet Protocol) system.  So what’s the difference?  Analog typically refers to an older technology that doesn’t use Ethernet protocol.  IP includes “IP-addressable items,” the cabling, and network equipment used to connect all components to an Ethernet networked system.  As people transition to a fully digital IP system there is some overlapping of the two technologies creating hybrids. Making the switch from analog to IP isn’t always as daunting as it may seem and there are options that make the transition easier over time.

So why make the switch from analog to IP?  For one, a fully digital IP system will have improved performance over an analog system.  Many IP cameras are equipped with features like, “advanced digital signal processing, optical zoom lenses, wide dynamic range, on-board analytics and auto image stabilizers…” These features in conjunction with high resolution megapixel cameras provide better coverage and the ability to cover more area with less cameras.  Being able to expand or re-configure, also referred to as scalability, comes easily with an IP system.  This is an advantage to any organization especially one that plans on expanding or renovating in the future as the initial investment cost isn’t lost in the process.

With IP surveillance systems comes advanced analytics.  That means footage can be monitored, recorded, interpreted, archived, and retrieved by the central server as well as peripheral devices.  How is this beneficial?  It helps when looking for specific recordings as a search can be initiated versus having to view hours of useless footage.  If an alarm is activated this type of intelligence can be used to zoom in on what is setting it off which cuts down on time looking for what it might be.

There’s also a flexibility that comes with converting to an IP system.  It makes system integration easier when it comes to adding features like access control, alarms, and extra cameras.  You also have more of a reason to store a higher volume of footage with an IP system because the image quality is clearer and be accessed easily.  Having an IP system allows for ease of software upgrades which helps keep it relevant.  In that sense IP is worth the initial up front cost as it is more adaptable to future technologies and won’t require extensive re-cabling and labor in years to come.

Does this mean you have to completely abandon your analog system all at once?  Not necessarily.  As each system is different the only real way to tell what will need to be done is to hire a security systems expert to do an in person assessment of the current situation.  One option might be to use the existing analog equipment and simply add converters to the camera and network switch ends of the cabling.  This creates a sort of hybrid system where you’re using existing coax cable from the analog system but the converters allow you to add IP cameras; they don’t have to rely on your company’s network and can still be recorded on your DVR, NVR, or VMS (Digital Video Recorder, Network Video Recorder, and Video Management System).

The benefit to a hybrid system is you don’t lose out on the initial investment of the original system and it allows for easy add-ons, upgrades and replacements of IP technology.  The other option is to completely remove all analog devices and cabling and start over with a new IP system.  Sometimes IP systems can utilize existing analog infrastructures so that could be an alternative to starting from scratch.  Remember if you have an IT department at your facility it is important to include them in the process to ensure a seamless integration.

Whether you’re looking to upgrade to and IP system all at once or try the hybrid approach it’s key to include a licensed security systems expert from the beginning.  They can help guide you through the process from start to finish.  We understand that each facility is unique and requires individualized security solutions.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Dumpster Difficulties: How to Avoid Them

Most businesses and office buildings have a dumpster outside the building. While these are “accessible” to everyone, they are not for everyone to use. However, many people will throw their trash in dumpsters that they have such easy access to anyway, causing businesses to spend hundreds of additional dollars to get extra days of trash pickup. So how can you protect yourself from this expensive nuisance? Here are a few ways!

One way that you can prevent this from happening is to have your dumpster in an enclosed area. This will prevent people from dumping their trash in your dumpster because they will no longer have unrestricted access to it.

Another way to prevent this is to make sure that you keep your dumpster away from any high traffic areas. By keeping it out of plain sight, people often wont even know that it is there, and therefore wont use it to dump their trash. Something on the flip side of this that can help is to keep your dumpster in a well lit area. Doing this will often prevent people from illegally dumping in your dumpster because they know that they can then be seen.

Finally, a video surveillance system can be used to identify who is using your dumpster. Not only does the presence of a camera deter unwanted activities, but it can also help you to identify who is using your dumpster.

A combination of these options, or even just one of these, can be used to protect your dumpster from unwanted users, and save you hundreds of dollars in trash pickup.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image credit: Great Lakes Fence Co.

What should you look for in a video surveillance system?

Video surveillance systems can be beneficial for a number of reasons. They are often installed to prevent burglaries and vandalism, but can also be used to promote neighborhood or office safety, in addition to increasing peace of mind if used in a home environment. When installing a video surveillance system, whether it is for your home, your office, or for any other setting, there are a number of things to consider. First, you need to think about the area that you want to keep any eye on, as well as the type of surveillance system and cameras you want. All of these factors will help you to decide what kind of system is best for your situation.

The first question you want to consider is how many cameras do you think that you will need? Think about the size of the property you are looking to protect, and the perspective that a camera will you give you in various locations. Additionally, you need to consider what the areas are that you want to cover. If there are outdoor areas, you need cameras that can stand up to weather, whereas for an indoor setting you would not need to look for weatherproof options, which can often be more expensive. You also need to consider the time of day that you will be using your system: daytime, nighttime, or both. All of these factors play will play into your decision about what kind of camera you will need.

Security Camera

After deciding what types of cameras you need for your space, you will want to think about the specific places that you want to have your cameras to be that will give you the best and widest ranges of visibility. These places will likely be at entrances and exits to the building, near garage doors, and by exterior or unattached buildings. If the video surveillance system is for a place of business, you will likely want to consider what areas typically have high traffic, and target these areas for camera installation.

Something else to consider when thinking about a video surveillance system is how you want to set up your data storage system. There are many options where you can save video footage onto a hard drive, and other options that save to this data into a cloud for storage. Along with this you will want to consider how much storage you think you will need. This will depend on two factors that affect the amount of data your system will use: both the quality of videos, and how long you plan to save video footage for. One final thing to consider is whether you will want to have access to a camera’s live feed, or if you will only want to be able to go back and look at footage when necessary. This will also contribute to the amount of storage space you’ll need, as well as help you to determine if your system will need the capability to connect to the Internet. This will also help you to determine if you want to have an analog camera, or an IP camera.

Once you have thought through this criteria and made decisions about what you think will work best for you and your space, you will be ready to look for a video surveillance system!

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image credit: Ricco Security

How The IoT is Changing Physical Security

Jonathan Briggs-Network CableOur world is constantly changing and evolving.  Progression is an inevitable force that influences the way we live our daily lives.  This is especially true of advancements made in the techy devices we interact with on a daily basis.  Everything from our smartphones to our security systems.  It’s the manner in how we interact with all of these devices that is driving innovation and product design.  The internet and networking of devices is creating a connected environment that offers ultimate convenience and changes how we perceive the potential of security systems.

At Perfect Connections, Inc. our licensed integrators provide comprehensive security systems to businesses and homes throughout northern and central New Jersey.  We believe in installing quality systems that are in line with the best technological advancements the market has to offer.  This doesn’t mean we use the trendiest devices for the sake of being “trendy,” it means evaluating current products that will add value and provide a platform for future adaptation.  With the Internet of Things (IoT) it’s imperative to implement devices that are not only relevant but can stand the test of time, within reason.

The definition of the IoT can be summed up as, “the interconnection of uniquely identifiable embedded computing devices within the existing internet infrastructure without requiring human-to-human or human-to-computer interaction.”  This means devices that are able to “talk” to one another via an internet connection without third part interference.  An example would be a motion detector that automatically uploads a video clip to an authorized smartphone when it senses movement.  The IoT is influencing changes in security system components like video cameras, access controls, recording equipment, fire and burglar alarms, locks, and monitoring services.  The devices themselves are evolving but so is the manner in which end users and system operators interact with them.

A higher level of remote connectivity to security systems and their components is a result of the IoT.  End-users can now login to security systems and their devices via an app on their mobile device.  This would allow the business owner who is away on vacation to periodically check-in on the day-to-day by logging into their surveillance system on their smartphone.  The homeowner who forgot to lock their doors and arm their system can now do so remotely via a mobile device or computer.  Automated notifications can be setup to send an alert when an alarm is triggered, someone tries to gain entry without proper access credentials, when a camera or motion detector capture movement within their range; the possibilities are extensive and continue to be developed.

According to Steve Hausman, president of Hausman Technology Keynotes, we are still at the beginning of the “IoT revolution.”  Some research suggest by the year 2020 there will be over 30 billion wirelessly connected devices in operation.  With everything becoming more and more connected one has to wonder, what are the risks?  In this highly connected world, there is a plethora of data being recorded, stored, and shared but who has access and rights to this data?  Therein lies the problem.

As with anything connected to the internet, the risk of being hacked or stolen is inherent.  In the security world this would be a problem for IP cameras, cloud storage and recording solutions, networked access controls, and basically anything running on or connected to an internet network.  With that in mind, industry professionals and developers are continuously working on solutions to prevent and minimize vulnerability.

Hausman says, “Security standards need to be established and enforced at the design and manufacturing levels.  As the IoT evolves, we can also expect that society will not only adapt to its usefulness but come to expect that appropriate safeguards be implemented to ensure both privacy and security.”  Today, those “safeguards” are being provided by licensed security integrators who understand the risks associated with system automation and the IoT.  Often times this means strong encryptions for not only the network, but the connected devices as well.

The IoT isn’t something that’s going to disappear.  Its presence in the security industry will continue to shape the way manufacturers develop products and how they are implemented by security integrators.  As licensed professionals our integrators at Perfect Connections, Inc. provide comprehensive security system solutions to businesses and homes throughout northern and central New Jersey, and have been doing so for the past 23 years.  Our team has witnessed decades of advancements in the industry.  We realize it is our duty to continue our own education as well as offer knowledge to our customers when implementing new technologies and component counterparts.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Jonathan Briggs-Flickr-Creative Commons