BLOG
5 Cool Things Your Security System Can Do Via a Single, Intuitive User Interface
Trying to decide what to get the entrepreneur who has everything this holiday season? How about peace of mind his or her property and assets are protected, courtesy of a single, intuitive user interface? Thanks to state-of-the-art tech, managing and tracking your...
Understanding Multiple SCIF Compliance Mandates
It stands to reason that the world’s Top Secrets would require somewhat more attention than a deadbolt and a cranky Doberman. Sensitive Compartmented Information Facilities – or SCIFs – are where government personnel and politicians hunker down to discuss and/or...
7 Ways Visitor Entry and Management Systems Create Safer Environments
Visitor entry and management systems are your commercial property’s first line of defense, tracking who is entering your facility, when, and for what reason. Important information is also collected and compiled by such systems, including the duration and frequency of...
Ward Off Real Life Monsters with Intrusion Detection Systems
If you think about it, even Dracula’s castle had a moat. And if the world’s most infamous and feared vampire was taking precautions – shouldn’t your business do the same? Additional security, of course, is on everyone’s mind as we head into the final days before...
What is Crime Prevention through Environmental Design?
Use your environment to your advantage. That’s the idea behind Crime Prevention Through Environmental Design. Originating in the 1960s, Crime Prevention Through Environmental Design – or CPTED – was based, in part, on the “Broken Windows Theory” that suggests one...
Thwart Halloween Hijinx with These Small Business Security Tips
For most people, Halloween is a fun and exciting time to play pretend and foster the imagination, while enjoying a few good scares in relative safety. But occurrences of vandalism, trespassing, and break-ins are all too real, and tend to spike around Oct. 31. This is...
Government Cracking Down on Contractors’ Security Preparedness
Foreign hackers are targeting U.S. contractors, and widespread security breaches have resulted in the theft of economic, military, and technological secrets. Now, the government is drawing a line in the sand. Contractors not complying with cybersecurity guidelines set...
Secom Welcomes Two to Sales Team
Columbia, Md., Sept. 25, 2019 – Secom, LLC is proud to announce two new additions to its sales team, Badi Joyce and Victoria Yassem. Victoria hails from an alarms and contract security background. A graduate of Towson University, she has three years’ professional...
4 Ways Implementing Access Controls Can Help Your Company Save Money
Do you know how and when your facility is being utilized? Professionally installed access controls for your property can help you keep track of every visitor, every access point, and every corner of your business – including the coffers. Here are just four ways...
Ask These 6 Questions Before Hiring a Security Professional
Criminals don’t hold down 9 to 5 jobs. They’re constantly on the prowl, searching for the smallest opportunities, seeking the most minute vulnerabilities – that will allow them to strike. This means the security measures you implement for your business or government...
How Big of a Problem is Proximity Card Cloning, Really?
Look, proximity card cloning is a thing. That’s no secret. Anyone with a credit card, PayPal account, or a spare $20 can purchase the right tools on Amazon or ebay, and how-to videos are abundant online. Not only that, but do-it-yourself kiosks are popping up in...
Preventing the Inside Job: 4 Ways CCTV Systems Curb Employee Theft
Sad, but true – employee theft is a significant problem nationwide, and retail businesses are far from the only companies affected. From office supplies to electronics to cash to data, approximately 75% of employees have admitted to stealing something from their...
Two Credentials Will Enter, But Which Will Win? Proximity vs. Smart Cards
There was a time when proximity cards were the big credential on campus. Like, literally on campus. They were (and, to great extent, continue to be) used at universities throughout the nation, as well as hospitals, industrial warehouses, and other secured venues. But...
The Cost of a Data Breach Could Sink Your Company
Think you’re too big for your breaches? Think again. Data breaches are getting larger and more debilitating, year after year. And organizations are not keeping pace with such escalation by establishing proper defenses. Add to that the increasing nerve and technique of...
Beat the Heat this Summer with Thermostat Controls for Businesses
Maryland’s excruciating heatwave continues, and AC-related bills are skyrocketing. Summer can get expensive for businesses, particularly those trying to balance a budget while keeping employees cool and productive at the same time. Fortunately, smart thermostat...














