We are building a wealth of information to assist you in managing your security. If you are interested in seeing any particular subject here please contact us.
We've built a wealth of information to assist you in managing your security needs.
No matter how big or small your security system is, to keep it in good shape there are regular tasks you should perform.
One thing that is often overlooked is reviewing security users – staff and contractors who have access codes or cards to your premises. Removing ex-employees, old contractors and temporary access passes help to reduce the risk of unauthorised entry, and ensures there are no “grey” areas should an entry or incident occur outside of hours. We are all used to regularly changing our passwords on our PC network logins but we don’t do this for our security systems. This is also another area of risk. Staff may forget their code and “borrow” one off another staff member. Two people or more using the one code make it very difficult to ascertain responsibility.
It is good security practice to change codes regularly, depending on the size of your database you may do this periodically or complete sections at time over the year. How you go about conducting your audit will depend on what type of system you have, and if you have software on site or access the information through a keypad.
The first step is retrieving the current security user information from your security system. To do this you will need your security system master code. If you need help getting started here we have most user manuals on our website, or you can call us for help. Most systems we can access remotely, and upload this information and provide it in a report. Once you have your information you need to reconcile this with a staff list from HR as well as current contractors that may work on your premises, don’t forget to include the cleaners and any delivery contractors that may enter outside of your normal hours.
From there you can add / edit or delete as required. If you don’t have software for your security system you can either make a copy of your user list – you should only record the User Number, User Name and Card Number (if applicable), no codes. Otherwise NeXT Security can securely store that information for you.
There is one final step in the process if you are managing this yourself and your security system is monitored back to base. If your security codes or cards have access to turn on or off the alarm you should provide a copy of your User List to the monitoring centre. You only need to provide the user name and user number, don’t send the code. Just send it through on an email to firstname.lastname@example.org The monitoring centre will enter this in their database so if there is a need to identify an entry to your premises all the information is there on the report. If NeXT Security program your users for you then don’t worry, we take care of this too.
Storage for Video Surveillance
Any organisation running a video surveillance system has to decide how much video footage they will store. This is also commonly referred to as footage retention. Every organisation is different: some need 14 days and others up to 90 days. The most common duration storage by far is 30 days.
What does the NBN mean for my security system?
Do you own a security system that sends its alarms to a monitoring centre? If so, there’s a good chance your system sends the alarm through a standard phone line. This is commonly known as the dialler and it’s a 20-year old technology that communicates using a series of analog tones.
What is Video Analytics?
Video analytics works essentially as a server-based software system that filters your IP camera security footage for those things that you wish to tell it to look for.