Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Minor Details Can Lead to Major Expenses

By Joel Jensen
November 1, 2010

One of my volunteer activities is with my local fire department. As I was looking at my ID card recently, I marveled at its simplicity. It has what you’d expect on an ID card of this type: a logo, photo, name, title and a barcode. The barcode is associated with my level of training and the fire department. The barcode is there so when I scan in at a multiple agency response, the incident commander receives a list of who is there and what they are capable of doing. We also scan out when we are finished working, and thus the necessary records are produced for insurance billing and FEMA documentation. It’s a simple, but very easily duplicated method of authentication, but the card would be difficult to duplicate due to the security laminate, plus I’m wearing firefighter gear and arriving in a large fire engine. The majority of us in the enterprise need a bit more security in our credential solutions than that.

Most of us use some second form of verification and it’s typically an electronic solution. A common and popular solution is a card embedded with a RF proximity chip. There are thousands of devices that can read these cards, ranging from key cabinets to full featured electronic card access systems. Once the proximity card and associated hardware is installed at an enterprise level facility, the expansion of usage and the number of applications becomes viral. Card readers are mounted near doors, stand alone access devices are mounted on doors and entrances to parking ramps have card readers. This typically gets the attention of area businesses and they began offering discounts and incentives verified by an inexpensive prox reader. They’re everywhere! Some large corporations will partner with you and provide your card stock and printers and more incentives. It finds its way into standard construction documents and point-of-sale contracts...Viral! This is all great, right? Well, there are a couple of problems presented in this scenario.

Does any single entity or database track every location that is relying on that prox technology? Is there an audit trail of who paid for what device and why?

Take this scenario: a CFO has to reduce funding to the security department due to unforeseen economic conditions. The badging station manager informs the security manager that the organization is about to exceed the number of badges/IDs that can be issued with a current facility code – one of two pieces of information embedded in the prox credential – facility code and badge number. When a prox credential is presented at an electronic access control reader, for example, the system checks to see if the facility code is valid for the facility and if that badge number has access to the door in question. It’s another security feature of the credential. The security manager contacts the system administrator for the access control system and inquires as to how many facility codes the system can manage.

The only devices that a security manager may know to be in existence that rely on their prox ID cards are those that he/she can literally see on the software that manages the system and generates the credentials. They may not be aware of standalone security devices that were installed without consulting them, nor of the numerous contracts that the CFO has entered into as a value-added income stream. The system administrator advises the security manager that the system can handle 255 different facility codes at the same time. The security manager directs the badging station manager to order new cards with a different facility code and advise the system administrator of the code on order for programming the additional code into the system. Problem solved.

A bit later, as the new credentials are being issued in fairly large quantities, the security manager receives a call from the CEO that her card isn’t working in a downtown parking ramp located next to her favorite restaurant. The card doesn’t validate her discount at the restaurant, either. The security manager asks the CEO if she has recently gotten a new company ID card – she has. He asks: what parking ramp and discount at a restaurant? It’s now a cascading effect of non-compatible hardware that can not accept the new facility code. The CEO is not happy and the CFO is busy fielding calls from angry partners in that wonderful revenue stream.

The maximum number of credentials that can utilize one facility code and the number of facility codes a device can handle is such a granular piece of information that may only be known by your card stock supplier and was included as boilerplate language in numerous construction documents and contracts. No one really needed to know what that meant; it was just a question that came up once a long time ago.

Perhaps someone in your organization is aware of the limitations and parameters surrounding facility codes embedded in your credentials, but isn’t likely to be in the loop on the decisions that were made regarding the expansion of their usage. The viral expansion of the use of the technology resulted in numerous security enhancements, process efficiencies and even produced income! Yet, one tiny detail can turn that into a series of unexpected expenses.

Ask a few questions that this column may have generated to people within and outside of your organization. Would you want to be the security manager discussed here? I’d prefer to be the “hero” that caught this before it became a nightmare for my entire organization and, of course, for me.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ready to Tailgate?

    See More
  • Hello to the Future of POE

    See More
  • Open Dialogue to Keep Cost Down

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing