How is your duress system performing? Take this quick test

Tuesday November 10th, 2015 in Physical & Electronic Security

Duress systems have featured heavily in each of the risk assessments we have completed recently. The most common factor with all of them has been how poorly they have been considered being implemented. And this is a real concern.

We have developed a quick checklist to help identify what you need to do for your system to perform better.

Read More

Latest App allows Security Guards to be more mobile

Tuesday November 10th, 2015 in Latest Security Technologies

Security guards are an expensive resource.

Here in Australia, it costs well over $300,000 a year to have a 24/7 security presence and much more for larger sites where multiple guards may be required.

The latest App by Gallagher which is specifically designed for the Apple iPhone, immediately allows security guards to be more mobile and spend more time on patrol performing security functions.

Read More

CCTV Monitoring – The elephant in the room

Tuesday November 10th, 2015 in CCTV Surveillance

Watching CCTV may sound like good fun for some, but soon enough it becomes quite mundane.

The challenge with actively monitored CCTV systems is ensuring that operators remain focused at all times.

Research indicates that after 12 minutes of continuous video monitoring an operator will often miss up to 45% of screen activity.

Read More

Mobile duress devices – Safety watch

Wednesday October 7th, 2015 in Latest Security Technologies

The next generation of these devices are now coming to market with a much higher level of intelligence.

What the manufacturers are doing now is adopting the principle first explored by Dick Tracy in 1946 and more recently by Apple, by making 2-way communications wearable in the form of a duress smart watch.

Read More

The convergence of security disciplines

Wednesday October 7th, 2015 in Physical & Electronic Security

The term “convergence” has become a bit of a buzz word in security as a result of physical security technologies becoming more akin to information security technologies and the cross over between the two disciplines.

This was always going to happen and as a result, we are seeing a noticeable shift in the global physical security market.

Read More

Innovative use of CCTV – Latest Porsche billboard

Monday October 5th, 2015 in CCTV Surveillance

In May this year, we provided an example of how CCTV in conjunction with facial recognition technology was being used to heighten awareness of domestic violence.

To demonstrate the versatility that CCTV can bring to business, here is another example of billboard advertising by luxury sports car manufacturer, Porsche.

Read More

Security Risk Assessment – 5 Signs that you may need a second opinion

Monday August 31st, 2015 in Security Risk Assessments

The accepted best practice for identifying risk is through the undertaking of a security risk assessment.

The risk assessment process is tightly structured to ensure that all visible risk is identified. Once completed, the risk assessment will shine a light on where risks exist, allowing you to put a strategy in place to mitigate those risks.

Read More

Thermal cameras and their uses

Monday August 31st, 2015 in Latest Security Technologies

Applications for thermal CCTV cameras don’t come up all that often. Firstly, because they can be very expensive – costing in excess of $10,000. Also, because the applications for them are not fully understood or appreciated.

Read More

How real is the risk of terrorism to Australian businesses?

Monday August 31st, 2015 in Counter-Terrorism

If we take a broad look Terrorism and Australian businessesat the trends that have shaped Australia, many will have originated from overseas. This can apply to nearly every facet of our daily lives – from how and where we shop, to the music we listen to and the clothes we wear. Even many of our manufacturing and business processes have been influenced by overseas trends.

So it is only reasonable to assume that from a crime perspective, we can anticipate what topics and issues will be visiting our shores by looking abroad.

Right now, it’s terrorism.

Read More

Secure mobile communications – Is our data secure?

Sunday August 2nd, 2015 in Latest Security Technologies

In manman-talking-on-smartphoney businesses, as much effort is put into securing sensitive information as it is into keeping our people and property safe and secure.

Keeping our data protected is of critical importance for any number of reasons.

Read More