Achieving effective security over perimeters and outdoor areas often comes down to detection accuracy and solution cost. While there are a number of options available for perimeter security, thermal video analytic cameras have become a strong contender for best-of-breed in this arena.
The biggest threat to a company's intellectual property doesn't come from the outside; it comes from within. According to a recent study, the U.S. Chamber of Commerce estimates that 75% of employees steal from the workplace.
An emerging methodology with technological roots – flash mobs – enables individuals using social networking sites (e.g., Facebook.com, Twitter.com, or Meetup.com), instant messaging and email to gather at a particular location, date and time and carry out legal or criminal activities (e.g., sabotage, robberies, and beatings).
To avoid any major misunderstanding about expectations, you should be clear at the outset of what you expect a record retriever to do for you. Below are ten critical aspects of a search that we think are essential to review before you place an order with a public record retriever.
While counterfeiting may not be the “world’s oldest profession,” given its ancient roots and its ubiquity across geographic and cultural boundaries (counterfeit coins were as common in Roman times as Canal Street knock-offs are today), it clearly deserves a place as one of the humanity’s most persistent paths in pursuit of illicit profits. But just because counterfeiting is enduring does not mean that it is unchanging; many of the same macroeconomic drivers, fashion trends and new technologies that inform our preferences at the shopping mall also drive the behavior of the astute counterfeiter. So as the newspaper headlines continue tell us that bad economic times may stay with us for a while, it is worth considering how a challenging economic environment can impact the behavior of the counterfeiter and what brand owners can and should do to fight this threat.
Failure to maintain an egress as well as failing to protect people from smoke and fire are all too common, yet easy to discern. Better yet, all are preventable through improved staff performance or implementing affordable solutions.
Here is a list of ten typical life safety violations along with solutions that can help keep facilities safer for visitors and staff.
The U.S. House of Representatives Subcommittee on Economic Development, Public Buildings, and Emergency Management recently held a hearing in response to newly introduced federal legislation (H.R. 2903 and H.R. 2904). This legislation would set the stage for congress to reauthorize the Federal Emergency Management Agency (FEMA) and two of its expiring programs, while establishing a clear framework for the modernization of its public alerts and warning systems.
Many large organizations are beginning to add the position of chief security officer (CSO) to the C-suite. This is great news as it highlights the benefits and importance of a well-designed security unit as a business function. However, some recent trends suggest that some organizations still may misunderstand the impact and role of security.
This month in Security magazine: Mike Matranga has been labeled brash, tough, outspoken, emotional and controversial. But when it comes to school security, he doesn’t care what people think of him. He is 100 percent undeterred by anyone who may question his methods when it comes to keeping schools and students safe at Texas City ISD.