What is Motion Detection and How Does it Work?

Motion_detectorWhen you think motion detectors (or sensors) you might picture a heist scene from the movies where a thief has to perform acrobatics in order to avoid a web of alarm triggering laser-beams surrounding a priceless gem.  While that narrative is not necessarily complete fiction, it’s not exactly how motion detection is implemented in the real world.  In modern day applications security system integrators use motion detectors to sense unwarranted movement within or outside of a home or facility.  Motion detectors are typically implemented as an essential part of a comprehensive security system meant to help detect an intruder.  There are different types of detectors and their applications are not necessarily synonymous.

Our licensed team at Perfect Connections, Inc. has been protecting homes and businesses throughout northern and central New Jersey with comprehensive security systems for the past 23 years.  We know one of the best ways to halt an intruder is immediate detection that triggers the alarm system.  Motion detectors do just that.  When they detect motion they communicate with the central alarm panel triggering an alarm, ultimately notifying your monitoring service of a disturbance; and before you know it help is on the way.

What are the different types of detectors?  In general there are two types of motion detectors, passive and active.  Within those two categories there are different detector technologies.  Passive detectors sense energy changes within a specific boundary whereas active detectors emit energy to detect motion.

Passive infrared (PIR) is a common technology that detects heat.  If there is disparity between the temperature of the protected area and an obstructive object (intruder) the sensors will be tripped and an alarm will be triggered.  This technology is not immune to triggering false alarms especially if automatic temperature compensation is not employed.  A PIR detector should have automatic temperature compensation to help stabilize the detector in variant temperature conditions.

Microwave (MW) is an active detector that emits microwave pulses and reads the reflection of a moving object.  This type of detector can cover a larger area than a PIR but it can be susceptible to electrical interference.  MW detectors do not recognize the boundaries of walls so they can trigger false alarms set off by random exterior motion.

Then there is Dual Technology detectors which employ a combination of active and passive sensors.  This could mean the combination of PIR and MW technology.  These types of detectors are less likely to set off false alarms as both types of sensors would have to be tripped in order for an alarm to be triggered.  However, that doesn’t mean these detectors are infallible.

Prior to the creation of PIR and MW detectors, motion detectors were not held in the highest regards by system integrators and end-users alike due to their high false alarm rates.  Before PIR and MW there was ultrasonics and photoelectric beams.  Ultrasonic detectors would send out high frequency tones and then interpret the reflections for any disruptions.  Photoelectric beams would send a light beam to a receiver that if interrupted would initiate the alarm sequence (picturing that heist scenario?).  These types of detectors were particularly susceptible to unpredictable movements as they didn’t have the technology to discriminate accurately.  While these motion detectors are not as widely used today they are by no means obsolete.

As technology progresses and the notion of wired installations becomes less and less appealing, wireless systems are taking off.  It’s no different with motion detectors.  Most can be installed wirelessly making their applications less laborious and diverse.  Many security system components have been developed to include interior motion sensors as well, like surveillance equipment and access controls.  For pet owners, there are motions detectors that can be setup to ignore regular motion from pets of a certain size.  Proper installation is crucial to the effectiveness of a motion detector therefore it should be done by a licensed professional.

Comprehensive security systems are what protect your home and business from external and internal threats.  It’s important to consider motion detectors as part of a comprehensive system.  They provide a layer of security that can’t be duplicated, sensing an intruder at the first sign of a break-in.  As licensed security system integrators, our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and homes throughout northern and central New Jersey since 1992.  We help protect what is most important and give you a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by CHG (Own work)-Google-Creative Commons

What Makes A Security System A System?

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that a security system should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing comprehensive security solutions to homes and businesses in northern and central New Jersey for the past 23 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons

What Is Web-Based Access Control?

Scott Lewis-smart lockThe technological climate is swiftly changing the way we connect and interact with the physical world.  Endless runs of cable and spaghetti wiring is becoming an antiquated notion with the development of wireless internet based equipment.  This is evident in the way some security system integrators are approaching system design and installation.  As industry professionals, our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey for the past 23 years.  It is our goal to not only provide innovative security equipment, but implement components that are effective and make sense within a specific organization.

Access control has always been a top security concern for any establishment.  Whether it means using a lock and key, card reader, or fingerprint, it’s a means by which your business is shielded from unauthorized personnel.  As an integral part of a comprehensive security system, access control mechanisms need to function on the same level as their system counterparts.  Meaning software and technology updates/applications should apply across the board without disrupting the system as a whole.  IP (Internet Protocol)/web-based technologies are making the advancement of security system components more attainable and desirable to both end-users and system integrators.  This is evident in the continuing migration from analog based surveillance to IP.  Web-based technology is not exclusively transforming surveillance, but security systems as a whole, including access control mechanisms.

What does web-based/IP access control really mean?  Your typical access control system is made-up of software, card/badge readers, controllers, and credentials.  In many existing systems today, the software has to be updated manually or on site, the readers and controllers have to be supplied with wired power, and credentials typically constitute a fob or swipe card.  With web-based or IP access control everything from installation to software updates changes.  Much like many IP surveillance cameras, web-based access control systems are connected to a company’s internet network.  Access control that operates over a network opens the door (pun intended) to increased scalability, installation flexibility, remote system access and management, reduction in the need for traditional power outlets, and cost efficiency.  This creates a more open platform for system management and integration.

In the not so distant past access control systems would be designed with products from a single manufacturer.  While this may seem like a good idea, think about what happens if products are discontinued or the manufacturer goes out of business and no longer supports your system.  You’re left with having to start from scratch which is not only a hassle but costly as well.  With web-based access control, components don’t necessarily have to be supplied by one manufacturer.  Being able to source readers, controllers, and credentials from different manufacturers benefits the end user and security integrator by limiting the cost of repair or replacement, as well as creating a smoother transition between software updates and system upgrades.  The technology and software behind these products are becoming more universal which leads to better overall system operation and integration.

The flexibility of web-based access control systems far surpasses physical access controls used in the past.  You have the option to secure multiple entry points at a singular site or across numerous sites nationwide, even worldwide.  Unlike traditional systems, multiple sites can be controlled, updated, and managed from a singular location either on site or remotely over a secured network.  In this sense web-based security features help with system management consolidation; streamlining operation processes making the day-to-day more convenient.

One of the most desirable features of web-based access control systems is the reduction of required cabling.  Depending on the application, readers don’t necessarily have to be wired directly to the network.  This cuts down on cabling and labor costs.  It also provides flexibility in situations where cabling may not be an option, such as installations in historical buildings.  Same is true about the energy supply to readers and locks.  In the past it may have been difficult for integrators to place access control equipment because of a lack in electrical outlets or supply.  Now, with web-based access control equipment, often times power can be supplied through a direct network connection known as PoE (Power over Ethernet).  PoE connections provide power and data to a connected device through a singular cable.

According to Bill Moran, vice president of Sales for Red Cloud Security, “Web-based access control offers features and functionality that enhance an organization’s security posture. From one consolidated screen, administrators can view and manage alarms, video surveillance, facility maps, and identities including photo and personnel details.”  He also points out that in the event of a triggered alarm or someone forcing their way through an entry point, the network can be suspended while cameras at the scene can be accessed for live streaming.  This is where the idea of a comprehensive security system comes into play, where all of the components are easily accessed and essentially working together.

Web-based security features are transforming the way end-users and industry professionals perceive security in general.  In a world that continues to become more and more connected through technological advancement and the IoT (Internet of Things), it only makes sense that the infrastructure of the physical world should follow suit.  Web-based access control is just another step in the direction to a more convenient and secured future.  At Perfect Connections, Inc. our licensed professionals are always looking for and researching technologies that better serve our customers.  Our team has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey since 1992.  We help you connect and protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Scott Lewis-Flickr-Creative Commons

How Does Home Automation Affect Home Security?

Smartphone-Phil CampbellAs the technology driven world continues to evolve, our lives are becoming more and more connected.  Virtual distances are shrinking.  This has been happening since the inception of the internet.  You no longer have to fly across the world to have a meeting, you simply login to a virtual meeting where you can talk “in-person” via video chat.  Although it may be imperfect, technology has certainly had an impact on all of our lives in one way or another.

Our lives are saturated in advanced technological gadgets, everything from our cars to our smartphones, why should our homes be any different?  It used to be enough having a home security system that would alert the authorities in an emergency, but why stop there?  Home automation, or the “connected home,” is quickly becoming an integral part of a comprehensive home security system.  It’s a driving force that is changing the way homeowners and system integrators perceive “home security.”

As a licensed security system provider, our professionals at Perfect Connections, Inc. are always looking for the best ways to protect your home.  We have been providing comprehensive security system solutions to residences throughout northern and central New Jersey for the past 23 years.  Technological advancement means we are constantly learning and adapting our solutions to best suit client needs.  That’s not to say just because something is new that it should be implemented, we do our due diligence before installation of any product including home automation devices.

Home automation products aren’t exclusively linked to home security.  In fact there is a plethora of automation devices that can be installed separate from a security system, often requiring a DIY (do it yourself) approach.  For example there are devices that can be attached to kitchen appliances that can be controlled by logging into apps on your smartphone.  However, rather than complicating our daily lives by having to download separate apps for everything in our homes, we have steadily been adopting technology in an effort to streamline and simplify.  When it comes to home security, with DIY solutions you’re likely not getting full coverage while simultaneously complicating processes.  Plus they often lack continuity and one of the most important aspects of a security system, monitoring.  Rather than separating the functions of a home security system and home automation, integrators and homeowners are combining the two creating more efficient and effective life safety and lifestyle systems.

One of the top benefits of home automation is convenience.  Capabilities include remote interaction with home devices and your security system.  Imagine being able to know the exact moment your kids walk through the front door while you’re at work or on your way home.  With home automation you’re able to set up custom notifications that will be sent to your smartphone, mobile device, or computer.  This means you can go on vacation and be notified of temperature drops in your home, package deliveries, or close the open garage doors you forgot about before you left.

Depending on your home automation application, often times you can log-in to your surveillance cameras, turn lights on and off, lock and unlock doors, control media (audio and video), arm and disarm your alarm system, all from the convenience of your mobile device.  When integrated with your home’s security system a singular control panel can be centralized to help avoid confusion that can result from having too many different operating mechanisms.

As a homeowner you might be asking yourself “how will home automation affect my security system?”  For the most part home automation is considered a promising and revolutionary approach to added home safety and efficiency, but as with anything, it isn’t perfect.  Any technology that operates over the internet inherently comes with the looming threat of hackers.  Why would someone want to hack a home automation or security system?  To state the most obvious, they’re likely interested in disabling your alarm system so they can break-in.  Other reasons could include wanting to cause general havoc by tampering with your lights or HVAC system, wasting energy for no other reason than driving up your utilities bill; for “fun.”

Fortunately there are ways to decrease the chances of being hacked, both on the user and integrator end.  In many cases home automation operates wirelessly over a home Wi-Fi network.  No matter how protected you think your network may be it should always be protected with encryptions and user authentication.  The same holds true for connected security devices and any device that transmits a signal.  There must be authentication between home automation devices, the security system, and whatever mobile device you are using to access them.  Otherwise your system is susceptible to third party hackers.

Take the case of Insteon home automation systems back in 2013.  Kashmir Hill, a Forbes Staff Writer, highlights the findings of David Bryan and Daniel Crowley, security researchers at Trustwave, and what they discovered is alarming (for lack of a better word).  They found that not only was there a lack of password protection on the consumer end, but that the Insteon products (now discontinued, for obvious reasons) themselves did not require usernames and passwords and were “crawl-able” (searchable) on the web.  This meant that anyone with a little know-how could access and mess with the connected Insteon products; unnerving to say the least.  Be sure to hire licensed professionals that fully understand the products they are installing and how they will interact with your home network.

While technology is imperfect and constantly transforming you can be sure if you hire a licensed security integrator with product knowledge and experience you’ll be setting yourself up for success.  A professional with industry knowledge will be able to ensure your system is as secure as it can be by using products that require authentication and that your network is encrypted.  As a licensed security system provider, our team at Perfect Connections, Inc. understands that securing a home and improving the lives of others doesn’t mean haphazardly throwing random products together just to get a job done.  We have been providing security solutions to homes throughout northern and central New Jersey since 1992.  Technological evolution is never-ending as is our commitment to providing the safest products and security systems available.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Phil Campbell-Flickr-Creative Commons

Should Surveillance Systems Share A Network With Office Computers?

Network-Norlando PobreWhether you are installing a new surveillance system or changing an existing one you need to consider the type of system and the operating implications associated with it.  The desire for advanced image quality, video analytics, ease of integration, and remote access has ushered in the era of IP (Internet Protocol) surveillance systems.  IP surveillance systems have opened the door to a more integrated security system and they provide increased scalability which is important to company growth and future adaptation.  This type of surveillance system typically relies on an internet network, and as they say “therein lies the rub.”

Should your surveillance system operate on the same internet network as your office computers?  The answer is not a simple yes or no.  The short answer being it certainly is a viable option, but it could depend on the size and type of business you run.  It’s also possible to set up an IP surveillance system on its own network but it may not be cost effective or necessary.  For these reasons it is imperative to consult a licensed security system professional when altering or adding a surveillance system.

When it comes to a company’s network there seems to be some trepidation about how and what devices can and should be allowed on it.  It’s understandable, a company’s network is often a basis for its everyday functions, but where does the worry come from?  A lot of it usually has to do with a communication gap between security integrators and IT professionals or end users.  At Perfect Connections, Inc. our licensed experts are able to provide clear and understandable information about the surveillance equipment we implement and how it will affect your company’s network.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  Our team has witnessed and been a part of the migration from mainly analog surveillance to IP.

Let’s discover the common concerns about network devices and how they can be dissolved, but first we’ll review some quick terminology when talking about networks.  LAN, MAN, and WAN are three basic types of networks you’ll likely hear about from integrators and IT professionals.  Local area networks (LANs) are typically found at most small to medium sized businesses as they cover a smaller more specific area.  In all likelihood your company operates on a LAN network.  Metropolitan area networks (MANs) cover a larger area and are usually present in cities and across large campuses.  Wide Area Networks (WANs) provide the most coverage, anything from expansive distances to the whole world.  According to Fredrik Nilsson, general manager for Axis Communications in North America, WANs are often comprised of multiple smaller networks including LANs and MANs.

All networks are comprised of some sort of cabling and equipment such as switches, servers, and hubs.  The most popular type of network configuration used with LANs is called star.  A star configuration allows all network devices to be connected to a central point where if one device crashes the rest will remain in operation.  However, redundancies are typically incorporated to account for the possibility of a central station crash.

Now that terminology is out of the way, what are some of the major concerns one might have when adding surveillance equipment to a company network?  One of the most common is bandwidth consumption.  This often stems from companies that have had to deal with employees streaming or downloading videos via company networks which eats into the available bandwidth.  According to James Marcella, director of technical services for Axis Communications, IP surveillance equipment is wrongly accused when it comes to bandwidth consumption.  He says most IP cameras today can be customized to fit a company’s network and storage guidelines.  To help limit their consumption surveillance can be setup on a Virtual LANs (VLANs) which Marcella says, “prevents video traffic from grabbing the lion’s share of bandwidth.”

Then there’s the ever-present question, “what about hacking?”  In our world where virtually everything is connected through the IoT (Internet of Things), it’s hard not to worry about who can access private information and how that information is being protected.  Having surveillance equipment on the same network as your company computers may seem scary, but in reality, more oft than not, there are procedures in place to prevent hacker access.

When it comes to adding network devices and keeping the network safe authentication protocol and data encryption are key.  According to Marcella authentication protocol protects the network at the physical port level.  If someone were to unplug a network camera and try to plug in their own device, all “traffic” to that port’s switch would automatically be shut down as the foreign device wouldn’t have the proper authorization.  Data encryption is essentially creating a password to your network whether it’s wired or wireless.  This prevents someone from getting into your network or freeloading on your company’s internet.  Encryptions can be highly effective as long as they are not something obvious or easily guessed.

Lastly, network storage is a top concern.  This is often directly linked to bandwidth consumption concerns.  Due to high image quality of IP camera recordings it’s not uncommon for businesses to store video footage for longer periods of time.  Fortunately, with IP surveillance systems you don’t necessarily have to store recordings directly on the network.  For smaller installations there is the option to utilize in-camera storage through internal SD cards (Secure Digital Cards).  Network Attached Storage (NAS) devices and cloud-based systems are other viable options.  In order to determine which method is best for your company an evaluation of camera quantity and storage needs should be conducted.

Whether you are adding a new surveillance system or updating an existing one it’s imperative to consider the impact it will have on your company’s network, if any at all.  Always consult a licensed security system professional as they can help guide you or your IT department through the process from initial assessment to final installation.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We can help break down the communication barrier that sometimes creates apprehension when installing network devices.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Norlando Pobre-Flickr-Creative Commons

Changing Residential Access

Alan Cleaver-Key in doorThe days of struggling to carry 50 pounds of groceries while simultaneously trying to dig your house keys out of your pocket or purse, might be coming to an end.  As a homeowner your door locks have always been an essential line of defense when it comes to protecting your home.  While our everyday lives are saturated with technological advancement, it only makes sense that our physical structures should follow suit.  That being said, using a key to unlock your doors may be a thing of the past with wireless access control on the rise.

What is wireless access control?  Essentially, wireless access control in a residential setting means replacing the standard lock and key with a keypad, remote control, biometric reader, card reader, or Wi-Fi access.  Keys are no longer the only method for unlocking your doors, in fact, they become the back-up.  At Perfect Connections, Inc. our team of licensed experts have been providing comprehensive security solutions to homes throughout northern and central New Jersey since 1992.  We stay in touch with current technologies and how they might benefit our customers.  Protecting entrances is key (no pun intended) to the safety and security of any home, and we aim to provide the best solutions to each individual residence.

How does a wireless lock work?  Most traditional locks operate on some form of a “pin and tumbler” method.  This is when the serrated edge of an inserted key moves pins on the interior of the lock a certain distance allowing you turn the lock cylinder and open the door.  With a wireless lock (which typically operates on electricity or battery power) has “actuators,” which connect the cylinder or bolt to a motor within the door or frame.  The motor is electrically activated by a keypad, card reader, or wireless remote controller.  On top of that there are locks that work on Wi-Fi signals used in conjunction with your smartphone or mobile device, sometimes referred to as smart or automated locks.  Lastly, biometrics are sometimes used to control home access.  Typically a fingerprint or hand print is the credential required for such a system.

There are many advantages to a wireless locking system.  For one, you never have to worry about losing or forgetting your keys.  This eliminates having to leave spare keys outside or giving them to people who need access to your home.  Instead of using a key you can, depending on the type of wireless lock, give your visitor the access code or with an automated system you can unlock the door from your smartphone.  With a wireless lock there are no wires.  Typically this means an easier and seamless installation.  It’s a technology that would allow for a more ubiquitous integration that includes old and new construction homes.  Wireless locks offer a convenience and extra layer of security you can’t get from a standard door lock.

While there are multiple benefits to a wireless locking system, none of them are perfect.  With a regular lock you might lose your keys, with a wireless keypad lock you could forget your access code or the code could be hacked by a savvy burglar.  Fortunately, if you forget your code many keypad locks come with a physical key as a backup.  As for code hacking, it’s usually best practice to pick a random code, so don’t use a birthday or something easily guessed.  It’s also prudent- and some systems may require it anyway-to change the code every few months or after you’ve let an outsider use it.

The main drawback with a remote controlled lock is, just as with keys, you could lose the remote.  Unlike keys, a remote is usually programed by a computer.  Therefore, in the event that you lose the remote you can deactivate it from the convenience of a computer.  With a smart or automated lock you run into the issue of not always having a reliable Wi-Fi signal.  Then there’s the dreaded question of what happens when the power goes out?  As some of the wireless locks run on electricity, a power outage could be an issue.  However, many of these locks tend to have multiple redundancies in place including backup battery power.  The main deterrent when it comes to biometric locks is the price as they tend to be a fairly complex system that isn’t as pervasive in the residential market as the other technologies.

Whether you are building a new home or want to enhance the security of your current residence, wireless locks can reinforce your first line of defense and provide a convenience you can’t obtain with conventional locks.  As with any security device or installation you should always consult a licensed security systems professional, especially if you’re looking for full system integration.  At Perfect Connections, Inc. our team has been providing comprehensive security system solutions to homes throughout northern and central New Jersey for the past 23 years.  We help you connect and protect what matters most, offering a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alan Cleaver-Flickr-Creative Commons

Security System Outdated?

Old Tech-Steve JurvetsonMaybe you’ve had a home security system installed years ago or perhaps you recently moved into a new home with an existing alarm system.  Whatever the case, how can you tell if your home security system is still valid?  There are some tell-tale signs that you may be dealing with an antiquated system.  However, if you have a security system and are concerned it’s not as relevant as it once was the first thing you should do is contact your security system provider for an assessment.  As a security systems expert, our professionals at Perfect Connections, Inc. understand the importance of maintaining a functional security system and keeping up with advancing technologies.  Our team of professionals have been providing comprehensive and customized home security systems throughout northern and central New Jersey for the past 23 years.  We can help assess the validity of your alarm system and offer solutions specific to your security needs.

Maintaining an effective alarm system isn’t just about running annual tests, it’s making sure it progresses as you, your home, and technology press forward.  It’s not like buying the newest IPhone just to keep up with trends, it’s making sure the technology you’ve invested in is providing the best protection.  If you’ve had a security system for a while and can’t remember the last time the software was updated, or if updating isn’t even an option it might be time for an upgrade.  Outdated software may leave you susceptible to hacking and viruses, plus you may not be getting the most out of your system.  You don’t want to pay for a system that’s subpar right?

Another sign it might be time for an assessment or system upgrade is the dependence on a singular keypad for control.  In today’s fast-paced world we often have the need for convenience.  Is it convenient to have to drive home from work because you forgot to arm your security system?  Is it convenient to have to make it to the security keypad to punch in your pin while your arms are chalk-full of groceries?  No, so why not look into interactive services or home automation?  With home automation you no longer have to worry about forgetting to arm or disarm your system because you can do it from your mobile device from virtually anywhere.  You could access your surveillance system through an app on your mobile device, allowing you to view what is going on real-time at home.  Other advantages to an interactive system is the ability to adjust your thermostat and lighting from afar.  As Alarm.com puts it, “Using a smartphone to manage an interactive home security system is like having a remote control for the system right in your pocket.”  This added technology will save you time, money, and lots of headaches.

How was your security system originally installed?  Was it hardwired?  While there is nothing necessarily wrong with a hardwired system it’s important to consider current technology benefits and how your system compares.  Just as our phones have become wireless many industry professionals are installing wireless security systems with cellular capabilities.  Why?  For one there’s no need to tear open walls, which is costly and laborious.  Technology has advanced to the point where wireless capabilities have become more effective and ubiquitous making them more viable, dependable, and available.  When comparing wireless to hardwired systems a noticeable difference, aside from the wires, is the continuity of service.  With a wireless system you don’t have to worry about burglars cutting wires to disable your system because there are none.

Lastly, a common sign of an antiquated security system can be low-res (low-resolution) cameras.  While cameras alone can sometimes deter an intruder from attempting a break-in, what good is a surveillance system that offers fuzzy picture quality if a break-in does occur?  The purpose of a camera is being able to record quality footage to positively identify intruders and sometimes their vehicles if need be.  Clear footage can be a helpful tool for law enforcement and in court.  Effective cameras can also be used to monitor the arrival of packages, expected and unexpected visitors, interiors and exteriors, remote properties (i.e. barns, sheds etc.), and distant areas of your property.  Fortunately there is a vast array of high-resolution cameras available today.  Your security system company will be able to provide the best solutions for your specific needs.

Whether you’re unsure your current security system is functioning optimally or if you’re looking into home security for the first time, contact a specialist.  They will be able to assess your current security situation and provide customized solutions.  Our team of experts at Perfect Connections, Inc. has been providing custom home security systems throughout northern and central New Jersey since 1992.  We can help you update an outdated system and offer comprehensive systems for new installations.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steve Jurvetson-Flickr-Creative Commons

Securing Your Home During a Renovation

construction-19696_1280Home renovation is an exciting and fulfilling prospect for many homeowners.  Whether you’re adding on or adjusting an existing space it’s imperative to make sure your home is protected during the process.  While renovating your home is rewarding for you and your family, you don’t want it to be a “rewarding” process for would-be thieves and criminals.  Our experts here at Perfect Connections, Inc. understand protecting your home is a top priority, especially during a renovation when it is more vulnerable.  We’ve been providing security system solutions to northern and central New Jersey homes since 1992.  If you are renovating and considering a home security system or adding on to an existing one don’t hesitate to call on our professionals.  Having a security systems expert involved from the get-go is essential for seamless integration and full protection.  We understand the renovation process can be dubious at times, the following tips can help remove some of the hassle and uncertainty.

Hiring the right contractor

When it comes to your home and family you can never be too careful.  You wouldn’t hire a babysitter without doing your research first, the same holds true for finding the right contractor.  A background check is a great way to tell whether or not the company you want to hire is reputable or not.  Here’s the caveat, companies with bad reputations or failed business sometimes shut down and reopen under a new name (ACE Private Risk Services).  So how can you really be sure of who you’re hiring?  In many cases architects are involved in the renovation process, they should have good insight into which companies are trustworthy.  Ask your friends and family for referrals.  Use websites like Angie’s List to find out what other customers think about the contractor you’re interested in hiring.  Gain as much knowledge about the company/ies of interest before making a final decision.

When signing a contract be sure it delineates who is responsible for what and that the associated cost makes sense.  Sometimes contractors will low-ball the contract price and try to add cost later, blaming it on “unexpected” issues.  Ask the contractor directly for a review of their past or most current jobs, those with nothing to hide should be more than happy to abide.  After all it’s your home, you want it done right.  It is also important from a liability standpoint to be sure the contractor has insurance for his/her self and their workers, you don’t want to incur the cost of someone being injured on the job.

Utilize existing security features

If you have an existing security system in your home, use it to keep an eye on the renovation process.  Having remote monitoring access through your video surveillance system will allow you to check-in on your home while you’re away at work or can’t be there.  While you’re not out to purposefully incarcerate or accuse the people working on your home of being lazy, trying to rip you off, or stealing it is in your best interest to protect your property.  Many, if not most, contractors are reputable and diligent in their work, but nobody is perfect and unfortunately there are companies that do try to take advantage.

Take for example this story of a homeowner who was having the exterior caulking on his windows reinforced.  The hired contractor had quoted him for 8 hours of work.  The homeowner set up a wireless camera to monitor activity outside his home for when the contractor was scheduled to be working.  He was able to see when the contractor arrived, and the hours he spent sitting in his truck NOT performing the agreed upon work.  Ultimately, the contractor performed only 5 of the quoted 8 hours of work.  When the contractor was paid for the 5 hours he couldn’t dispute it as the homeowner had irrefutable evidence (story courtesy of iWatchLife.com).  Negative experiences aside, monitoring your home during construction can also validate the expertise a contractor has, giving you incentive to recommend them in the future.

In all likelihood if you have an existing security system, you’ll be adding on to it in the new space or at least altering it during the renovation process.  Including your security system provider from the beginning is a beneficial tactic.  If you have a hardwired security system, what better time to include the security provider than when the walls are already open?  It will save you from the cost of having to tear them open after the fact.  Plus, your security expert/s can address your concerns before construction starts and openly communicate with the other professionals involved.  Having that dialogue between the different professional services from the start will create a smoother and more productive process.

Securing the job site

Aside from hiring the right people to complete the job, you want to make sure the job site is adequately secured.  One of the most basic, yet often forgotten or disregarded ways to help prevent damage or loss is to lock your doors and windows.  While it may not stop someone from breaking in, it will certainly slow them down.  This will help control who has access to various parts of your home during the construction process as well.

Alert your security system provider of your upcoming changes, they’ll likely have suggestions on how to protect the exposed portions of your home.  Like preventing fire damage by installing temporary smoke detectors and fire extinguishers.  Confirm with your security system provider that your current fire alarm system will still function throughout the duration of the project.  Even having your security systems expert install additional, maybe temporary, surveillance equipment will help you keep an eye on what’s going on.

Keeping the job site clean and free of unnecessary debris should be part of the construction crew’s responsibility; it makes for a safer work environment and lessens the potential of property damage and injury.  It also helps prevent damage to products being used in the renovated space.  You don’t want to get charged for parts your own construction crew broke, right?

It can be easy to get caught up in the excitement of a home renovation project, but don’t let that be a reason to let your guard down.  Keep your home and family safe by doing your research and maintaining security.  Our team of experts at Perfect Connections, Inc. understand the value in protecting your home no matter what.  We have been providing comprehensive security solutions to residences in central and northern New Jersey for over 20 years.  Whatever you have going on, whether it’s a small renovation or substantial addition, don’t hesitate to call on our specialists for a security assessment.  You’ll be setting yourself up for success!

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Hardwired Vs Wireless

Wires-Windell OskayThe process of researching home security systems can seem daunting.  There are many factors you must take into consideration.  You have to choose which company you trust to perform the work, how much you’re willing to spend, and what type of system to have installed, to name a few.  The type of system you opt for can seem like a tricky decision, that’s why it is imperative to hire a licensed security professional to advise you on the best solution for your home.  There are two types of systems in terms of how they are installed, hardwired and wireless.  Sometimes a combination of both are implemented, it really depends on your specific needs.  Here at Perfect Connections, Inc. we provide security system solutions to Northern and Central New Jersey, and can assess an individual homeowners needs for either a hardwired or wireless installation.

According to safewise.com, “The network of sensors, plus the control panel, make up a self-contained system that may be wired or wireless.”  So what’s the difference between hardwired and wireless?  A hardwired system involves installing physical wires from the various alarm components (i.e. motion detectors, sensors, etc) to the central control panel.  The wires are typically hidden behind walls, which is why it’s beneficial to install this type of system in the construction phase of a home, if possible.  According to asecurelife.com, “most older home alarm systems rely on hard wiring where most new systems are gravitating towards wireless or hybrid alarm systems.”

A wireless system relies on radio frequencies to transmit and receive signals between the alarm devices and the control panel; kind of like how a cell phone works.  In fact, one of the major benefits of a wireless system is you have the ability to remotely control different aspects of your home via your mobile phone/device.  A hardwired system may require a landline to communicate with the monitoring service, whereas a wireless system doesn’t.  In this day and age, many homeowners are moving away from landlines all together, making a wireless system almost an indisputable choice.  An interesting article about the seaside New Jersey town of Mantokoling describes how the phone lines destroyed by Hurricane Sandy were not rebuilt at all.  Instead a wireless option was offered by Verizon.  Whether by choice or natural causes, wireless technology seems to be the trend of the future.

While the decision between wireless or hardwired might seem difficult, a specialist will be able to help you figure it out, and in some cases you may not have to choose; it might be dictated by the structure of your home or the area you live in.  Hiring an expert will not only save you time and aggravation, but provide you with a peace of mind knowing your system is appropriate for your home and that it was installed correctly.  If you live in Central or Northern New Jersey, don’t hesitate to contact our team of licensed professionals at Perfect Connections, Inc..  We’ve been providing residential security systems services for the past 22 years.  Our team is knowledgeable about the systems we install and the ever changing technology in the security systems industry.

Check out this brief list of the pros and cons of hardwired and wireless systems:

Hardwired Security System

Pros:

  • It’s a reliable system
  • Can be integrated seamlessly with new construction projects
  • They typically have backup batteries in case of power outages
  • Hardwired systems are less susceptible to electrical interferences from other devices
  • Alarm will sound if any wiring is cut
  • Will likely be installed by a licensed professional ensuring smoother integration

Cons:

  • Can sometimes be more expensive
  • May require tougher installation (drilling holes in walls etc.)
  • Makes relocation of system devices more difficult
  • Typically have longer more intensive installation
  • Can’t bring the system with you when/if you move

Wireless Security System

Pros:

  • Installation is fairly easy and quick
  • Devices can easily be moved, replaced, or updated
  • Can control parts of your home remotely from your mobile device (thermostats, lighting, etc.)
  • System maintenance is typically easy, in most cases systems will require battery replacement
  • Device software can be updated as it evolves
  • May be a more economical system
  • Devices are portable, making moving less of an issue

Cons:

  • Can sometimes be interfered with by exterior electronic devices (baby monitors, microwaves etc.)
  • Can sometimes be more susceptible to interference than a hardwired system
  • Technology evolves quickly making installed devices obsolete quicker
  • Devices can sometimes have sensory issues
  • Structural interferences can be an issue (brick walls, old construction etc.)

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credits: Image by Winell Oskay-Flickr-Creative Commons

Practical Use Of Wireless Z-Wave Lock

Here is a really good application of an interactive alarms system.

We recently installed a 2GIG GO! Control Interactive alarm system powered by alarm.com in an older couple’s home. They have had an alarm system for a while but decided it was time for an upgrade and had read about some of the features available today in our newsletters.

One thing that I never thought of, but my customer did, is access to the house by emergency personnel in the case of a medical or other emergency.  He wanted to make sure that a Z-Wave enabled lock was included with the system for the front door.

He had thought this through. If something happened and neither he nor his wife were able to reach the front door to let emergency responders in, he could unlock the door from a keypad or his phone to allow access. We also provided the central monitoring center with the code for the door (the Z-Wave lock has a numeric keypad on it) and they would give that number to the police department when dispatching.

The emergency responders could gain access. Problem solved.

Click here for us to contact you.

Sign up for our Email Newsletter  

52416_logo_final