With so many companies closed and employees not in the buildings, it’s important that systems are checked regularly.
When people are able to return to work, they will want to step right back in where they left things – and have all systems “go.”
This is especially important for your HVAC, temperature controls and security systems. With the weather changing rapidly and spring trying really hard to come alive, temperature control systems must be checked and serviced, even while people aren’t in the building.
Security systems are also critical right now. Empty buildings can be a temptation to anyone looking to snag a few free computer monitors or office supplies. So having your systems checked and running properly is critical right now. You want to be sure that the systems protect your building and that only those who should be going in to check things are the people going in. So much of this can be done remotely, and we are more than happy to help.
These days, it’s not at all unusual to have to confirm identify before accessing an account or completing a transaction online. It’s not enough to simply input the username and password; you also must verify a code you received via text on a trusted device.
While this process known as two-factor authentication is encouraged
as a best practice online, it’s rarely mentioned as a best practice for in
person security. Gaining access to a facility is typically as simple as using a
key or swiping a card.
But shouldn’t we at least consider two-factor authentication for facility
security? I believe so.
It’s not hard to imagine a scenario where two-factor authentication
would be helpful. For instance, imagine an employee loses their key card or –
even worse – it’s stolen. If the thief acts quickly enough before the loss is
detected, he or she can gain access to a facility simply by swiping the card
and walking in the door.
Two-factor authentication would prevent that from happening. How? By
requiring two of three verifications of identity. We verify identity in three
1. What you know (a pin code)
2. What you have (credential like a card key)
3. Who/what you are (a biometric indicator, such as a finger print,
hand scan, face scan)
Imagine that the thief who stole the card attempted to gain access
to your facility by swiping it and entering the door. Two-factor authentication
would demand that they present either a pin code or biometric evidence in
addition to the credential. A PIN code would be a strong second step, but even
that can be stolen or even guessed. In addition, demanding a PIN code might
slow traffic flow and make the process inefficient.
What’s harder to fake is biometric evidence. It’s a lot more
difficult to steal someone’s face than it is to steal their key card.
What if video security cameras were integrated to enable facial
recognition in addition to credentials? The result would be a powerful,
efficient tool for maintaining facility integrity and keeping traffic flowing.
Interested in learning more about how you can integrate systems for
greater security and efficiency? Call for a consultation today.
It might seem fundamental, but controlling access to
doorways into and through your facility might just be the most important
security decision you make. Doors are the primary way people and goods move
through your building, and the ability to control when, where and how people
move through doorways is key to security.
How have you chosen to secure the doors in and through your
facility? Let’s review some basic tools:
Humans have been securing doorways with rudimentary pins and locks since the
technology first emerged in ancient Mesopotamia around 4,000 years ago.
Physical keys are simple and reliable; you must have the correct key to fit
into a correct lock to gain entry.
Some of the problems with keys are as old as the technology
itself. Keys can be lost, leading to costly replacement of both locks and keys.
Keys can also be duplicated fairly inexpensively, making it easy for access to
quickly become uncontrolled.
Other problems are fairly new. Keys don’t enable any level
of sophisticated tracking, which is a feature we’ve come to expect in the
modern world. They don’t reveal exactly who operated the key, when they
accessed the door, or when they left. They only allow a door to be locked and
Even so, a traditional key and lock may be an adequate
solution for doors which require some access control but don’t require a great
deal of sophistication.
work much the same as a physical lock and key, but rather than require a
physical key to open the user must enter the correct code to gain entry. Codes
can be shared among many users, making it simple to allow access to a number of
people. Codes can also be changed regularly, maintaining some level of access
control without the expense of changing locks and keys.
These same features can also be a drawback. Codes can be
distributed too widely, allowing access to the wrong people. Changing codes can
cause people who should have access to suddenly not have access.
Much as with traditional locks and keys, keypads don’t
necessarily track who has entered and exited a doorway.
Even with the limitations noted, keypads may be an adequate
solution for areas that don’t require a significant level of security but do
require broad access.
Keycards step up the sophistication considerably and solve a number of challenges
posed by traditional and keypad locks. Users present a unique keycard before a
reader at the door way. The reader scans the information encoded in the card
and verifies whether or not the holder of the card should be allowed access.
Keycards tighten access considerably and are easily
activated and deactivated without disruption to other keycard users. Keycard
systems also enable sophisticated tracking, allowing managers to gain valuable
insights into how people move through a facility.
Fingerprint scanning and facial recognition take security to an even higher
level, and overcome some of the challenges posed by loss, theft or damage of
other access control systems.
These options represent a broad range of solutions available
to secure doorways. Options are available along every price point and need, and
systems can be integrated and customized to fit your use case perfectly.
Need help navigating your way through access
control options? We have decades of experience and a expertise in the latest,
most innovative products. Call (800) 567-1180 for a consultation today.