Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

25 Most Influential 26th Bonus: Metrics Win Goes to the Dog

By Bill Zalud
December 1, 2006


McGruff, that is. When Security Magazine asked thousands of security executives and top law enforcement officials to give us the names of who they feel has been most influential in the profession, the name of McGruff the Crime Dog came up a lot.

So Security Magazine dug into this crime-biting animal just in case we were barking up the wrong tree.

Talk about influential – The "Take A Bite Out of Crime" dog has huge recognition and effectiveness numbers.

  • Adults who know McGruff are significantly more likely to take a range of security and safety measures that make them less vulnerable to crime.
  • An independent evaluation found that better than one in five adults acted on the messages in the communications (public service advertising) part of the campaign, at a net cost to taxpayers of just 2.9 cents per person.
  • Children (more than 75 percent) see McGruff as a reliable, friendly, caring source of valuable messages across a range of safety and crime prevention topics. Adults (almost 60 percent) see McGruff as a reliable source and a help in communicating with their children.
  • Thousands of enterprises and their security departments work in their communities with McGruff since his invention in 1980.

His messages have changed over the years from urging personal, family and home security to more broadly based crime prevention concerns. During the mid-1990s, McGruff and his organization, the National Crime Prevention Council, addressed the effects of gun-related violence on children in the schools, on the street and at home. Current issues include identity theft, cyberbullying, bullying, youth violence prevention, volunteering, school safety, Internet safety and telemarketing fraud against seniors.

There are 4,000 active McGruff costumes in use across America. McGruff has a classy Corvette, a monster truck in Arizona, and a wiener wagon in Florida. But most of all, he likes to ride in patrol cars assisting law enforcement. He is unique – both a brand and an icon for public safety. The investment by the U.S. Department of Justice, Bureau of Justice Assistance in its support of this campaign has produced more than $1.5 billion worth of public service advertising and more than $300 million worth of reproduced, locally claimed educational booklets and brochures.

Crime prevention is a collaborative effort that requires the cooperation of citizens, law enforcement, the business community, private security, faith-based groups and all levels of government.

Here’s what McGruff told me: “Today crime remains at historically low figures. A look at national crime statistics gathered by the U.S. Justice Department’s Bureau of Justice Statistics tells us that violent crime rates have declined since 1994. Robbery rates set a similar record decrease. Many people once driven inside their homes, behind locked doors, are back sitting on their porches, enjoying their parks and walking to their corner stores. Across the country, in one town after another, crime rates have plummeted. It’s not like that everywhere, of course, but progress has been made.”

SIDEBAR: Most Vulnerable Make Strongest Business Case for Security

Companies most attuned to security issues are those with the most exposure to a broad range of security risks, according to a survey by The Conference Board, sponsored by the U.S. Department of Homeland Security.

The Conference Board report Navigating Risk: The Business Case for Security is based on a survey of 213 senior corporate executives not specifically responsible for security or risk matters and not chief information officers. The survey was designed to gauge the role and influence of security managers among general senior executives.

The surveyed companies most concerned with security are companies in critical infrastructure industries (including energy and utilities, chemicals, and transportation), large corporations, multinationals with global operations and publicly traded companies. Not considering security directors themselves, the executives most supportive of security matters are those in risk-oriented positions, such as CIOs, risk managers and compliance officers.

But there is a strong disconnect between the level of support for security initiatives and the level of influence over security policy within the companies surveyed. In general, the most supportive executives were not the most influential, and the most influential executives were not the most supportive. In addition, most senior executives surveyed reported that they have little direct responsibility for most aspects of security. An area with a lot of dotted-line relationships, senior executives are often heavily involved in specific security decisions even though they are not directly accountable for them.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Parkway; parking lot security, security liability, access control, parking garage security

    Determining Responsibility in Parking Lot Security

    See More
  • Passengers purchase the RFID bag tags which provide convenience and unique services for passengers as well as operations data for airlines.

    Just How Versatile is RFID Technology?

    See More
  • ip feat

    Measuring the Next Step in IP-Based Access Control

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing