Stay Connected:

Get Blog Posts via E-mail

Your email:

Posts by category

Tyco Security Products Blog

Current Articles | RSS Feed RSS Feed

Security basics: Are you doing everything to keep your business safe and secure?


On the fast-paced, always changing road that is security technology, sometimes it’s a good idea to head for the nearest exit, pull into a rest stop and do an assessment of our priorities. Some might call that getting back to basics.

Security basics checklistAnd it is prudent to review the basics, especially in light of how what is “basic” about security has evolved over the years. With the rapid changes brought on by IT and IP, the focus is different today than it was five, 10 or especially 20 years ago. Additionally, in our post-9/11 world, we are faced with new threats that require a closer examination of not only the security products themselves but also the systems on which they run. Threats to data are just as real these days as are concerns about protecting individuals. And without a proper, periodic review of what you have and how best to use it, all the latest purchases of the best equipment won’t mean much if the cameras aren’t pointed where they should be or a lightning strike could wipe out power to the entire building without any backup.

Security professionals and integrators need to be savvy about all the related systems, such as networks and power, in addition to knowing how to install, maintain, and utilize cameras and access control systems.

So how does this process of assessment work? It begins by determining and then following a series of best practices related to the health of the physical security system, from visual inspection of cameras and doors to responding to error messages generated by the software and careful examination of system-generated reports.

Another part of basic best practices is to review how data is backed up and what scenario you are comfortable with.  Is it OK to lose a day’s worth of data, or just a few seconds? Like health insurance, backup is something you hope you never need to use, but it’s still critical to have it in place.

And then there is the issue of power integrity—if you lose power, how will you address that? Are you up-to-date with backup generators, surge protection or even the proper equipment so someone working on your system doesn’t damage it through electromagnetic or static discharge?

As part of the changing world in which we live, the basics now need to cover how we deal with visitors and account for personnel during emergencies as well as restricting access to classified areas.

Steve Lewis, product manager for Software House, presented, "The key security features you aren’t using but should be to keep your business safe and secure" webinar on May 23, 2012.



What underutilized security task do you perform that others may overlook? Let us know in the comments area.