The Leading Resource on Physical Security Systems, Technology and Best Practices for Professional Security Systems. This blog is intended for End-Users who are responsible for securing their Facility that protects People, Products and Information.
Episode 4: Interview with a Security Camera Hacker… In this Episode of the Security In-Focus Podcast we discuss with Alissa Knight Cybersecurity Evangelist and Certified Ethical Hacker the steps hackers to take to Infiltrate CCTV Systems, The Vulnerabilities of Commercial Security Cameras, the Convergence of Cyber and Physical Security Systems & What Advise do Hackers have for IT Managers in Securing their video surveillance systems.
In this Episode of Security In Focus Podcast we discuss what it takes to Secure a Major Healthcare Facilities. How Hospitals use technologies like Access Control & Visitor Management Systems to Secure their Patients while not Restricting Access to Doctors. The collaboration a Security Professional Must Have with other Departments to Improve the Culture of Security and much more…read more
Card access systems A security system that allows users to access doors with an electronic keycard ( a plastic card that has a magnetically coded strip scanned in order to operate a mechanism) instead of a traditional key. Card access system controls the access at...read more
There are a large number of reasons why everything from small offices to large corporations should be utilizing this simple and effective security tool. The future success of a company often heavily relies on…read more
Security Managers or IT directors who are responsible for securing people, places, and inventory should be prepared before they hire a commercial security system integration firm to install their CCTV system. As a security manager or IT director, you have a unique...read more
In this episode, we discuss Door Access Control Systems Past, Present, and Future. Terminator 2 was released in 1991 and showed several times where (John Connor) infiltrated proximity card readers in seconds at Cyberdyne Systems- Fast forward to 2019 what Access Control System Vulnerabilities still exist? Is the OSDP Protocol the future and where are we going with Mobile Credentials and Facial Recognition for secured entry? All this and more with my special Guest Michael Glasser Certified Ethical Hacker & Physical Security Expert from Glasser Security.read more
Educational facilities require a secured learning environment. Implementing efficient School Security is a top priority to ensure the safety of students, teachers, staff, and others within the school premise. This task requires a balance between creating a welcoming...read more
A recreational Cannabis legalization bill and taxation act (CRTA) was approved by Gov. J.B. Pritzker’s after the Illinois House voted to pass the comprehensive measure on July 25th 2019. "This will have a transformational impact on our state, creating opportunity in...read more