Honeywell plans to spin off its Homes product portfolio and ADI global distribution business, as well as its Transportation Systems business, into two stand-alone, publicly traded companies by the end of 2018.
The risks from carbon monoxide exposure rise when the temperatures drop and fuel-burning equipment gets turned on for warmth. With the clocks falling back on November 5, it’s the perfect time to schedule a security maintenance check of all devices systemwide.
Recently, you may have heard about the “Krack” Wi-Fi vulnerability that has the potential to affect literally every connected device on the planet. What really is Krack? Could it affect your business operations? If so, what should you do about it?
The challenge for the security guard industry has always been: How do we hire the best and the brightest, even though we can’t pay them as much as we need to? How do we attract qualified people? Security officer firms that need to hire a lot of guards to staff a new or expanding contract […]
Certain facilities have an “invitee relationship” with the public, and they actively encourage people to use their hotels, bars, restaurants, movie theaters, or nightclubs. Beyond just the hospitality industries, other public facilities include hospitals and medical clinics, stores and malls, churches, libraries, and parks. Security managers and their officers need to know how to use […]
In this era of mass attacks, cyberattacks, hacking, and the challenge of providing necessary security improvements without breaking the budget, it can help to prioritize your must-haves. This requires thinking beyond the usual (and expensive) security approach of “more guards, gates, fences, cameras, and lights.”
How do you install new security devices or systems in a building you don’t own or operate? How do you get the landlord’s buy-in to make important changes to your part of the building? How do you keep your employees safe in a facility with multiple access control points and a shared lobby or reception […]
When it comes to security systems, policies and procedures, and equipment, we tend to take for granted what works right up until it fails. It’s critical to continue testing, evaluating, and event-stressing the systems we have in place to protect employees, clients, customers, company assets, and the entire scope of the property.
Cyberattackers often try to gain entry to critical IT systems through the various electronic entry points and backdoors left by the programmers who created them. Some hackers take the human approach, which can be much simpler, and attempt to get password and network access information by calling employees directly and impersonating their IT colleagues.
It’s easy to get complacent about how U.S. Postal Service (USPS) mail and packages from various delivery companies come into a facility. The process of how these items are collected, screened, sorted, and delivered can become routine until there is a problem, hazard, or something dangerous is discovered.