Tag: mobile

The Importance of Warehouse Security

Uncategorized

In April 2019, police arrested four Amazon employees for stealing $100,000 worth of Apple Watches. This wasn’t an isolated incident, but endemic to a massive problem in terms of warehouse and cargo theft in the US. Even Canada reported thefts of this nature, i.e., at $27 million in the first half of 2018 alone (with many issues still underreported). 

Thus, there’s no doubt that business owners must take warehouse security seriously. Failing to do so would result in both less revenue and direct losses.

In this article, we’ll outline four specific reasons why warehouse security is essential.

The Importance of a Warehouse Security System

Keeping Employees Safe

Peace of mind from internal theft — and stopping internal threats at large — is essential, but your employees are also your assets. They deserve a safe working environment. 

To provide that environment, you should install access control systems and a 24/7 digital video surveillance system. With access controls, you can restrict access to the facility to only staff as well as restrict additional portions in your warehouse to only specific authorized personnel.

Don’t Let Warehouse Theft Eat Into Your Bottom Line.

Protect Your Assets Today.
This move will help limit internal theft by reducing the number of people with access to assets as well as limit the chance of outside of intruders leaking into your facilities. 

With a 24/7 surveillance system, you can deter potential crime by showing a would-be criminal that you are watching them. You can also audit incidents after the fact.

Managing Visitors

A warehouse takes in a stream of trucks every day to fulfill its function. By installing security measures, such as access control and video surveillance, you will also be in a position to better manage these trucks and other outsiders.

First, the benefit of access control is that it restricts what access outside contractors have at your facility. Second, the surveillance system enables you to deter (or if need be, catch) any potential collusion between malicious insiders and outsiders. 

On this note, it is a best practice to keep outsiders and warehouse employees separate where possible. For example, the holding area for delivery drivers could be in a different location from where your inventory staff operates. The idea is that you should augment your security systems with processes such as this, to close-off all vulnerabilities.

The Importance of Warehouse Security

Also, you might have clients relying on your warehouse. In this case, an integrated and professionally-installed security system will build client trust in your company. 

Shielding Assets from Theft or Damage

Be it prevent theft from outside or to deter employee theft, a vital goal of any effective security system is to keep your assets safe. This could include your warehouse’s inventory, equipment, and the facility structure itself. 

In addition to thwarting internal theft with video surveillance and access control, you can employ several measures to shield your warehouse from external threats too.

For starters, you can fence the perimeter of your warehouse and, in turn, restrict entrances and exits to the facility with access control measures and on-site security staff. 

Moreover, you could also equip every entry point with alarm-based intrusion detection. The moment someone tries breaking-in or tampers with the system, the system will sound-off.

Don’t Be Caught Unawares. Learn Strategies and the Importance of Business Security From These Blogs:

With a central monitoring station, the alarm system will alert your on-site security staff as well as off-site personnel. In fact, a central monitoring station will also help you deal with false alarms — if an alarm goes off, your managed provider can notify you before escalating the issue. But if the alarm is serious, your provider will notify law-enforcement. 

Complying with Regulatory Requirements

Finally, security is also a regulatory requirement in various industries and regions, and that may apply to your warehouses. In Canada, for example, marijuana producers must abide by Health Canada’s regulations, which include specific security requirements. 

Failing to abide by controlled substance laws would not only put your warehouse at risk of crime, but it would also land you in hot water with regulators. 

Like any commercial security system, you must conduct a professional security audit of your warehouses before investing in security systems. 

Security Audits Stop Theft Before It Starts

Logixx Security provides comprehensive security plans for warehouses keep you covered.
The right way to approach this would be to consult a professional physical security services company, especially one with experience in transportation and logistics. They have a strong understanding of your threats, vulnerabilities, and security best practices. 

Logixx has over 47 years of focused security experience. We’ve provided T&L companies with robust security systems, enabling them to cut cargo theft and other inefficiencies. Call us today to provide maximum protection to your warehouses.

The Importance of Warehouse Security

SSI Taps Logixx Security For Their Top 75 Global Market Leaders Program

Uncategorized

In their October 2017 issue, Security Sales & Integration Magazine (SSI) unveiled their list of the Top 75 Market Leaders among commercial security providers, and Logixx was pleased to feature prominently in the mix. 

The list was broken down into 12 major industry verticals as well as an ‘other’ category featuring various sectors. As an award-winning security company, Logixx was featured in three of the top 12 and took the lead position in the Medical Marijuana field thanks to our 41% market share growth in 2016-2017.

Trusted by 500+ Businesses in Canada

Find out why Logixx is the go-to security services provider for some of the biggest names in the business
The verticals in which Logixx was recognized were:

  • Education
  • Industrial Manufacturing
  • Office Buildings
  • Other (Medical Marijuana)

SSI lauds these market leaders for looking beyond simply selling security products and instead focusing on providing complete solutions.

“The most successful providers are delivering tailored solutions that take into account the unique needs and qualities of a particular end user,” wrote SSI Editor-in-Chief and Associate Publisher Scott Goldfine

“I am excited about SSI’s new Market Leaders program as it highlights those dealers and integrators that epitomize this go-to-market model, and are reaping the rewards in their respective verticals.”

Here is how Logixx fared in the Market Leaders survey by industry vertical.

Learn about security from the best in the business:

Logixx’s SSI Top 75 Market Leader Results

Medical Marijuana (Top Spot)

Included in the Other Verticals category (along with Food & Agriculture and Datacenters), Logixx was selected as the Top Market Leader in the field of Medical Marijuana security.

SSI pointed out that our strategy is to help clients navigate complex regulations related to medical marijuana while ensuring that the systems we install are completely scalable.

Education (Top 17)

In the Education vertical, Logixx was included among the Top 17 Market Leaders, noting our industry best practices which include offering flexibility and scalability while investing in our education partnerships for future growth. 

Industrial Manufacturing (Top 15)

Logixx was selected as one of the Top 15 Market Leaders in Industrial Manufacturing. Our industry best practice of providing solutions that become a part of the production system is part of what has made us so competitive in this sector. 

Office Buildings (Top 26)

Finally, we were featured among the Top 26 Market Leaders in Office Building security. Noted in the industry best practices is our extensive consulting process with commercial building owners to not only understand their objectives but those of their tenants.

SSI Taps Logixx Security For Their Top 75 Global Market Leaders Program

Founded in 1979, SSI has grown to become one of the most influential and respected publications in the security industry. With over 50,000 subscribers in the field, SSI is uniquely positioned to provide market analysis, and Logixx was honoured to be included among the inaugural Top 75 Market Leaders program. 

Contact us to learn how Logixx can provide complete security solutions for your business.

SSI Taps Logixx Security For Their Top 75 Global Market Leaders Program

5 Ways to Ensure Your Home is Safe, Secure and SMART

Uncategorized

There are very few things a homeowner dreads more than the prospect of a break-in. It’s not only the threat to our property that concerns us, but the very idea that the sanctity of our home can be so quickly undone by an unknown intruder. 

That’s where the smart and secure home comes in. 

A safe home is one we can leave and feel comfortable that it has the tools to keep everything and everyone safe when we’re not around. A safe home is one where, when you hit the lights off at night, you feel secure no matter what were to happen. 

A safe home, therefore, is a smart home. One that uses the power of technology to create a protected home. 

While technology has in some ways opened us up to more risk due to the connectedness of every device, it too has offered a number of ways to not only protect against cyber-intrusions, but has also helped to create high-tech guards against low-tech threats, like a standard break-in. 

Using Devices to Protect Your Home

You can now employ all manner of devices in the effort to protect your home. Motion detectors, digital locks, wireless communication between you and your security devices, a direct line to authorities in case of unexpected intrusions – all these are staples of a safe home that provides security on unparalleled levels. 

Everyone has the right to feel safe and secure in their home. The devices and techniques in this piece will ensure that when you shut your lights off and lock your doors, sleep should be easy to come by knowing that your smart home is on watch.

For those looking to protect their homes, these devices below will not only give you stronger defences, but peace of mind as well. 

1) Multi-layered security 

Contingencies and fail safes are the bread and butter of maintaining a secure home. The idea is redundancy; where one defence may fail, two others are in place to pick up the pieces. 

That’s why multi-step locks and a security system can be essential to keeping your home secured at all times. Take the Honeywell Lyric Key Pad as an example. State of the art failsafe contingencies like those on offer at Honeywell Lyric will provide you with that extra bit of security to make your home truly a formidable defence.

Know What Devices You Need to Protect Your Home?

Logixx’s recommendations can help you make cost-effective security decisions.
Keys can be lost, stolen and fabricated, but with state-of-the-art keypads and other secondary backups, you can be sure that your house won’t be in danger due to house keys falling from your pocket on your walk home. 

It’s exactly these types of redundancies and back-ups that can help make your house safer. And with the number of options that new technology has provided, there’s never been a better time to go out and get safe. 

2) Let your devices watch for you

One of the key areas where a security system can succeed and people lag behind is in watchfulness. A security system will be constantly vigilant at all times, day and night, while you simply don’t have the time, energy or even the inclination to do so. 

Which brings us to a set of devices that can help keep you safe and make your home smarter: motion detectors, glass break and window sensors. 

In a situation where an assailant is attempting to break into your house, you’ll want to know as soon as possible and have your smart home react to the unwanted presence. 

One of the best ways to accomplish that is to make sure that your house is outfitted with a variety of sensors – from devices that detect glass breaking to motion detectors – that keeps would-be assailants at bay.

5 Ways to Ensure Your Home is Safe, Secure and SMART

Take for instance the Honeywell SiX Motion Detector which alerts you when a presence of 80 lbs. or over is detected stalking through your home.The 80 lbs. trigger is also great for allowing your pets to run around unencumbered, while an intruder won’t be as lucky. 

The ability to obtain information as soon as it becomes available and therefore more readily react is critical in a situation where a person is attempting to break into your house. 

These sensors provide exactly that type of instant feedback by giving you real-time updates on any and all abnormal behaviour around the points of entry in your house. 

These updates can take on a variety of forms, from direct communication line to authorities, like in the Honeywell SiX door and window sensor, or real-time updates via an app, your home will be covered from all angles. Other products are able to provide situational awareness through the use of video monitoring end direct texting.

Let technology fill gaps in your home security. These modern-day devices will serve as the technological first line of defence for your home and family. 

3) Keep your tech updated

As mentioned at the onset of this piece, while security technology has a number of ways to help us combat the age-old physical threat of an intrusion on our houses, a new and developing area in home-defence comes in the online realm. 

While all these devices mentioned here are great ways to ward against straightforward attacks, they all carry that crucial vulnerability: wireless connection.

Ensure Your Home is Safe

With hacking having never been more prominent not only in terms of frequency, but also in the sheer amounts of trouble that can be caused by a person with a keyboard and malicious intent. 

As such, it is integral to your home defence plan that your house’s connectivity is never compromised. One way to accomplish that is to make sure that your programs, devices and all other electronics that could potentially provide a way in for an attacker are all up to date with the latest and best software tech. 

In the online defence against hacking, the walls are constantly being redesigned in order to best suit the needs of those it defends. Instead of mighty, static fortresses being erected in the online space, we’re instead dealing with fluid bulwarks constantly being retooled, reconfigured and improved in order to match a similarly changing threat. 

As such, ensuring your devices are always running on the latest and most secure software is a top priority when looking to prevent online hacks. The improvement we’ve seen in Z-Wave technology is a perfect example of an update coming to the rescue,and you’ll find the latest Z-Wave tech included on a number of Honeywell Lyric products. 

4) It needs to be user-friendly 

You don’t have time on the weekend to deal with shoddy interfaces and technical headaches; you definitely won’t have time to futz with button placement on a screen in the event of an emergency. 

That’s what makes usability so crucial in this product more than most, and something that Honeywell Lyric excels at. Your smart home could be the Fort Knox of smart homes, but if you don’t know how to use it effectively or, worse yet, aren’t able to use it in a dire time of need, then what you’ve got is little more than fancy window dressing.

Home security begins with an action plan. Logixx is here to help.

Learn about security solutions that fit your budget.
Being able to operate your devices and all the security measure you’ve put in place in a speedy manner is one of the best ways to keep your home smart and safe. 

Honeywell Lyric provides training on their systems and also has a wealth of online information and videos to help familiarize the user with their devices. 

A smart home does not mean a complicated one, and the online resources coupled with the training provided will allow you to have your house secured, safe and smart in no-time, and with little fuss. 

Not to mention that older, less developed technologies can be an eyesore. You want your home to feel like a secure fortress, but you don’t necessarily want to have it looking like one. 

Today’s smart home protection devices are sleeker, more affordable and more functional than ever, making now one of the best times to upgrade your home security system. 

5) Find the setup that’s right for you 

Knowing what you are and aren’t comfortable with is another key pillar to having a safe, secure and smart home. 

If you want to feel secure with the innovative Z-Wave integrated locks on external doors, sophisticated security cameras and strategically placed sensors, there’s no better place to get started than Honeywell Lyric. 

In the end, you need to be comfortable with the devices you’re using. Finding the right smart and secure home solution for you and your loved ones is key in order to not only be safe but feel safe. Learn more about our residential security solutions or give us a call to find out how we can secure your home.

5 Ways to Ensure Your Home is Safe, Secure and SMART

Components of An Access Control System

Uncategorized

As the facility security space continues to advance, card access systems are fast becoming an access control staple for many businesses. In fact, the market for these types of security suites is currently over $16 billion! 

If you’re thinking of installing a card access system at your facility, then it’s important that you understand the basics of this popular security technology. You want to ensure that you are, in fact, setting up the best variation for your business. 

Below, we examine each component of a standard card access system. They work cohesively for optimal functionality and security. 

Access Control System Components

Components of An Access Control System

Internal Systems

Cables and Wires

Your system’s cabling might be unexciting, but it’s an integral component as it ensures that the system sends a signal to the door to lock or unlock. 

Backup Batteries

You need these in case your main supply unit fails; the batteries will keep your security system active until your main system comes back online. 

Power Supplies

You must ensure your access control system is properly drawing from your main power supply system. In addition, you should take steps to prevent tampering (e.g., the intruder attempting to cut the electrical wiring that connects the system to your facility’s power supplies). 

Entry Point Systems

Access Control System Components
(Source: DepositPhotos)

Doors

The specific door requirements will vary based on your industry and security needs. You can acquire doors of varying depths, materials (e.g., steel, wood, etc), and sizes.

For some facilities, having door status monitoring on doors that are not card reader controlled is desirable. 

These monitored doors are connected to the access control system for monitoring purposes only and are installed with a door position switch that then reports to the access control system server computer when it is open and/or closed.

Monitored doors can be configured to trigger a variety of notices such as sounding alarms, turning on lights, etc. The parameters and triggers can be defined on a door-by-door basis through the access control system software.

Turnstiles

If you’re installing turnstiles, you must ensure they meet your industry’s required standards (e.g., a specific ISO grade, height, etc).

Curb Incident Rates by Installing an Access Control Suite That Deters Would-Be Intruders

Push to Exits

You can install a push-to-exit button that requires the user to manually press it in order to open the exit door. It’s an effective way for preventing unintentional door movement. 

Sensors

Besides a manual push-to-exit button (that requires the user to press in order to open the door), you can also have a motion-sensor based system to make it an automatic process.

Elevators

Many business facilities are multi-level and access credentials could range by floor. You can design your system to provide security control for all or some levels. However, you must install card readers in the cab of each elevator.

Locks

Electronic door locks are often used to either replace traditional key and lock systems or to add additional locking automation – enhancing security.

These electronic door locks and alarm systems are prominently used for cars, but are increasingly being used for homes and businesses. Electronic door locks allow the door to automatically lock and remain locked until someone presents the proper credentials.

Unlock the Best Security Solutions for Your Home or Business

Logixx Security provides cost-effective recommendations to protect what you value most.
If the door remains open for too long, an alert is sent to the proper personnel. This helps ensure people who do not have the proper credentials are prevented from entering the premises.

Credential Verification Systems 

Control Panels

The main purpose of control panels is to unlock the door upon receiving the right key code, card or some other credential verification. It also serves as a hub for managing your user credentials. 

In most instances, you can efficiently manage access control systems from simply one central workstation with the access control system software installed. 

However, for some businesses, it might be ideal to have the ability to manage the system from multiple workstations. This kind of setup may be particularly beneficial for larger security system environments with multiple people managing the access control system.

Today, you can operate many access control systems through access control software.

Components of An Access Control System

The access control system software is the component that ties all the other ones into a comprehensive security system. The software is what facilitates the interaction between the security system and the business owners, employees, and authorized visitors. 

Access control system software varies in their intricacies but they all essentially do the same thing: allow users to enter their credentials, create permission properties and procedures, and review accountability information of the overall security system.

Readers

An integral component of a card access system is the card reader itself. 

The card reader is programmed to receive and process the necessary information when a person uses the device to request access.

Often, businesses and facilities use proximity card readers that work when an access card is swiped within a few inches of the reader. The reader then analyzes the identification information stored on the card and gives or denies access based on credentials. 

There is a range of different types of access control card readers including battery operated key card access systems and key card access wireless sets.

Biometric Credentials

In tandem to assigning physical credentials (such as key FOBs or cards), you can also assign them using the user’s fingerprint or retina scan.

Access Control System Components

Keypads

Instead of assigning credentials to cards or biometric signatures, you can also assign them to key codes. You would basically give each employee a unique code and, in turn, vary rights to each one based on the employee’s access requirements, security clearances, etc. 

Augmentative Access Control Systems

Video Intercoms

Be it for support or additional identity verification, you can also install a video intercom system to enable the receiving party to speak to and/or view the person trying to enter the area. 

Video Systems

Be it for additional verification or to audit an incident, you can also pair your access control suite to your CCTV or video surveillance system. This way, you will have secondary confirmation of the person using a particular passkey or key card. 

Next Steps

Access control systems and their various components continue to advance to provide top-notch security for all types of facilities and businesses. At Logixx, we provide a suite of services and support for facility access control security systems.

We’ll Help You Save Time in Provisioning
& Revoking Access to Your Employees.

With 47 years of experience in security management for a range of brands and businesses, we have unprecedented expertise in new technology and keeping businesses secure. 

Learn more about our services or give us a call to find out more about how we can help meet your access control needs.

Components of An Access Control System

Why use smartphones as security credentials?

Uncategorized

It’s easy to forget your keys and access cards behind when vacating an office or leaving your desk to grab a coffee, but what is the one item most people take with them everywhere they go? Their smartphones. 

Using a smartphone is the easy answer to security credentials to ensure proper access control to your building. 

Smartphones are powerful tools that play a massive role in our world, and a prime example of this is the use of smartphones as secure access credentials in business, commercial, and recreational institutions. The technology that makes this type of access control system possible is called Near Field Communication (NFC).  

Technically, Near Field Communication (NFC) is not new technology in access control solutions. It’s been around since 2004 and has been increasingly popular in the card access arena since 2011. The fact that it is extremely convenient for users has been a major reason for this increase in popularity. 

In 2012, HID Global systems partnered with the internet provider, Good, to implement an NFC access control system pilot test in their headquarters. The results speak for themselves; 

  • 80% of participants said they preferred the technology over standard access control cards 
  • 83% said that physical security in the building improved

Why use smartphones as security credentials?

Current access control management issues include assigning and managing access control badges in a high volume environment. This is a daunting and time-consuming task for security staff. 

Utilizing a cloud-based portal to centrally manage the access control system streamlines the administration process and reduces the hours involved in creating and managing this system on a daily basis.

Product Overview

HID’s OMNIKEY 2061 Bluetooth reader allows for secure log-on and hands-free operation, ideal for organizations with open work environments where customer information may be at risk.

The ability to support Bluetooth ensures for backwards compatibility and ease of use through quick connection to PCs and handheld devices.

Supporting virtually any contact smart card, HID’s OMNIKEY fully supports ISO 7816-3 for T=0 or T=1 protocol supporting cards, EMV 2000 Level 1, as well as Microsoft® WHQL.

Smartphones are Incredibly Powerful Tools in Security Monitoring

Logixx keeps your security moving.

Benefits:
  • Centrally managed access control system for quick set-up and administration
  • 90% of the HID Global pilot program participants said NFC access was easy to use and convenient
  • Manual card removal is not necessary, meeting hygiene requirements in controlled facilities
  • Staff prefer to use newer technology due to its “cool factor”

Cost

The set-up fee and annual cloud management subscription are costs one must consider when implementing this type of mobile access control solution. 

Current systems will need to be retro-fitted, and it assumes that all staff carry a smartphone that is NFC enabled.

Using Smartphones For Security

The system itself is not necessarily cheaper than implementing a card system, but the investment is worth the benefits. It is a quick and easy access control solution that will never leave you looking for your keys or access cards again.

Let Logixx be your partner in protecting your assets, personnel, and business. We will provide you with a free consultation to evaluate your needs and design a cost-effective system that works for you. 

Contact Logixx today to learn more about the products and services we have available. Our specialists have worked with both small businesses and enterprise-level operations, and can custom tailor the ideal solution for you.

Why use smartphones as security credentials?

The Importance of Commercial Security Systems

From enabling you to quickly respond to a potential break-in to deterring would-be malicious insiders from stealing your patents, today’s commercial security systems serve many critical functions. In this post, we examine each type of system to show how each one is important.

Access Control Systems

The central aim of access control systems is to prevent unauthorized people from accessing specific areas of your commercial building/property. 

In a retail environment, for example, you will not want shoppers to walk into the staff backroom, inventory room, or the cash vault. The store would restrict that access by locking each of those areas with a key-code/card that’s only available to its employees (and in some situations, only a subgroup of employees, such as managers or keyholders). 

There are no shortage of scenarios where access control systems are necessary, e.g., financial services institutions, pharmaceutical labs, manufacturing facilities, etc.

Video Surveillance Systems

The purpose of a video surveillance system is to deter, stop, and audit breaches.

The Importance of Commercial Security Systems

It deters threats by establishing presence, i.e., it shows (via a network of security cameras) the would-be perpetrator that they are being watched. The University of North Carolina’s Department of Criminal Justice & Criminology found that cameras, along with security signs, gave would-be burglars pause.

It stops threats by giving the security response team “eyes” of the situation, e.g., a control room could tell the security team where the perpetrator is going during the act.

It helps you audit breaches by providing a visual account of the situation, which you can look at to see who was responsible, identify vulnerabilities, and other critical steps to prevent breaches in the future. In some regions, the police will require your video footage for their investigations.

Alarm System Monitoring

The alarm-based monitoring system (also known as intrusion detection system) serves two critical functions: to deter threats as well as to alert you (and police) to a potential breach.

Commercial Security Systems

These systems are typically installed on vulnerable entry-points, especially doors and windows. If someone breaks in through those (or tries tampering with them), the system will go-off with an alarm and tip you and law-enforcement off of the situation. 

In addition to law-enforcement integration, you can also combine your alarm-based monitoring system with your video surveillance system. For example, when the alarm goes off it will notify you of the situation and provide real-time live footage of the situation.

Today, the commercial security system offers many different options. However, to select the one that fulfills your requirements, you should speak to a professional security firm, such as Logixx, to identify your threats and define your needs so that you don’t overspend or miss critical gaps. 

Commercial security systems protect your assets all hours of the day. Logixx is here to help.

The Importance of Commercial Security Systems

Protecting Your Commercial Building

Uncategorized

Be it a store, assembly plant, office building or some other type of commercial property, protecting it from external theft (and malicious insiders) is necessary. The commercial security market is projected to grow to $376.34 billion USD by 2028.

However, the question of “how” to protect it can be vexing seeing there are many potential threats and, in response, many options in terms of security practices and technology.

In this post, we provide a basic roadmap to follow when protecting your commercial building.

Identify Your Threats

You must start by identifying threats.

This will depend on a wide range of factors, such as your industry realities, location, the nature of your product and service, and others.

Intruders Don’t Stop While You’re Off the Clock

Logixx’s state-of-the-art security solutions keep your business safe
For example, some businesses—such as research & development (R&D) and pharmaceuticals—are often at risk of malicious insiders, espionage, and theft. In other words, their threats come from outside and inside. In turn, you must ensure you install appropriate security solutions to not just respond to security issues, but ideally, prevent them by making the act difficult to pull-off.

One way to determine these threats is to conduct an assessment of your facility, preferably by a professional security company that understands your industry, products/services, etc.

Identify Your Vulnerabilities

Upon identifying your threats, you must now identify your vulnerabilities—i.e., the areas through which your threats could compromise your building.

This could include your main entrance as well as sub-entrances (i.e., doors to specific areas), the perimeter of your facility, the fact that you can’t post full-time security people at every area, the shipping and receiving area (or other areas where outsiders could enter), and others.

This is a crucial step as it directly informs the next one, i.e., selecting specific security systems to close those vulnerabilities and stop (and deter) the threats your building faces.

Protecting Your Commercial Building

Select Your Security Systems

Though your specific configuration will vary, commercial building owners generally deploy these as standard systems irrespective of industry, location, etc.

Visual Monitoring

This centers on a video surveillance system that clearly records and saves footage of key areas, such as the retail floor space or specific areas of the assembly site.

Access Control

To restrict access to the facility and/or specific areas in the facility (e.g., product storage room, a sensitive R&D lab, etc) buildings will install key code/card-locked doors.

Intrusion Detection

To alert the owner (or on-site security team) of a potential breach, buildings will also have alarm- -based intrusion detection systems on the doors, windows, and other vulnerable entry-points. 

Overall, you can’t underestimate the importance of commercial security systems for businesses

How to Protect Your Commercial Building

Not only is it an issue in terms of protecting your business from those who want to harm it, but in many industries, maintaining a certain standard is a compliance requirement. 

Don’t let intruders catch you without security. Contact Logixx today.

Protecting Your Commercial Building

Using the Cloud in Security

Uncategorized

The cloud is a central facet to today’s cybersecurity discourse, but that doesn’t mean that it’s not relevant to the more traditional—i.e., physical—security environment either.

In fact, the cloud is increasingly playing a vital role in powering modern physical security efforts, especially in the commercial and business security space. In this post, we will discuss how the cloud is affecting two foundational domains of physical security.

Video Surveillance

In terms of video surveillance, the cloud is affecting the space in three ways: 

  • disaster recovery;
  • scaling capacity to burgeoning data needs;
  • and integrating new technologies, especially video analytics. 

Keep All Eyes On Your Security

Logixx video surveillance and CCTV combines security cameras and monitoring, giving you peace of mind.

Though video storage might seem trivial to a family-owned restaurant, a large retailer with many different locations and, in turn, hundreds (if not thousands) of individual camera units will collect terabytes worth of data in a short period of time. 

To host it, the retailer would have to become an effective data hosting company itself, which is well out of its scope and capacity. So by storing that data in the cloud, it frees itself from buying, maintaining, and expanding a data center—instead, it just pays a flat-rate OPEX fee.

In that vein, should a disaster hit, the retailer can leverage the cloud to restore its archives as the task of maintaining redundant copies of the data is the job of the cloud service provider (i.e., via multiple data centers). In effect, the retailer can focus on its core strengths—selling goods.

Finally, the cloud enables businesses to use new technologies, such as video analytics, with their video surveillance systems. They can ‘train’ their surveillance systems to conduct facial recognition, read license plate numbers, pick-up abnormal activity, etc. 

Access Control

Like end-user identity management, having to manage the keycodes or biometric password data of hundreds—or thousands—of employees is not easy.

Cloud Technologies in Commercial & Business Security Systems

However, with the cloud (and physical security-based identity management systems), one’s business can rapidly provision and deprovision keycodes and access to specific locations in minutes, instead of days or hours. 

In addition, you can see logs of who entered a specific site and when, enabling you to more effectively conduct an audit or forensics situation. Finally, the data to drive all of this is in the cloud, so in case of a disaster, you can promptly recover it. 

Overall, though the cloud has its benefits, leveraging it in a physical security context requires expertise in many areas. Not only can a mistake in the process result in overspending, but it may leave gaps in your physical or cyber domains, or both. 

Thus, you should start by calling a professional security company with experience in these areas, such as Logixx Security.

Using the Cloud in Security

Hiring the Right Security Personnel

Uncategorized

Be it a small business or a major corporation, security guards are an important asset for any company when it comes to protecting its property and assets. In 2021, the market for security services in the U.S. ballooned to $48.14 billion.

Uniformed security guards are an integral part of any security strategy as they provide a noticeable security deterrent and manage daily security work (such as registering outside guests). They can also respond to onsite security risks in a timely manner. 

However, though security guards play a major role in protecting your business, you can’t rely on them alone. They need the support of an integrated security system. Below, we’ll show you how to hire a security guard and use them in combination with a security system.

How to Recruit Security Guards

A common misconception when seeking a security officer is that your business will be doing the ‘recruiting’ itself. Generally, unless your company is a security services provider, you’ll rely on a security agency to recruit and provide the guards.

To ensure that you’re getting the right personnel for the job, you should look into each company, by asking the following questions:

Hire the Right Security Guard

1. Is the security guard company in good standing?

Your security guard services company will be responsible for protecting your employees and other business assets. You should make sure that they’re trustworthy by checking their references, and ensure their experience lines up with your needs. 

2. Did the company do background checks on its guards?

Since you’ll be providing these guards clearance in your company, you must ensure that they’re trustworthy. For a start, you should ensure that your services contractor conducted background checks on each of the people they’re sending to your business.

These checks don’t have to be limited to just criminal. In some industries, such as finance and insurance, you might need to extend this to credit and others (this is case-by-case). 

3. Did the company properly train its guards?

Your contractor should have also provided training to its guards. At the minimum, you’re looking for Occupational First Aid and WHMIS (Workplace Hazardous Materials Information System).

In some situations, such as warehouses and other large sites, you’ll need to ensure the guards are trained in residential patrol training and vehicle patrol techniques.

Criminals are Looking to Catch You Off Guard

So Install a Security System That
Kills the Element of Surprise

Support Your Guards With an Integrated Security System

As noted earlier, security guards are not an end-all-be-all solution. They’re just one piece to a wider security system that also includes video surveillance and other measures. 

Even the best security teams can’t directly monitor every part of your facility, especially during off-hours and holidays when they’re generally the only people onsite. 

In these situations, an integrated security system not only makes up for limited numbers of guards onsite, but it makes your security teams much more effective. 

Hiring the Right Security Personnel

Your security system should include the following:

1. Video Surveillance System

A video surveillance system allows you to monitor any area of your facility 24/7. You can even assign security personnel to view the footage in real-time. This allows the team to have its eyes on every area without having to post people everywhere.

2. Access Control

By restricting access to sensitive areas in your company to only vetted employees, you can reduce the scope for your security guards.

You can protect certain areas of your facility with locks that require key codes, cards, or specific biometric signatures.

If the chances of an outsider or intruder getting into a sensitive area are small because of a key card system, that’ll reduce risk. In case of a breach, an access control system also lets you audit the issue by seeing who entered and when.

3. Alert System Monitoring Services

You can integrate alarm systems to your entry points, such as windows and doors. If there’s tampering or a break-in, these alarms will go-off and alert your onsite security team to respond quickly. With a managed service, you can even call law-enforcement to reinforce your security employees.

How to Hire the Right Security Guard

Next Steps 

Just as security guards need an integrated security system to carry out their work effectively, you need security guards for quick response and resolution.

However, this article only scratches the surface. No two businesses or organizations are the same in terms of their security risks and needs. You need to identify a lot of factors to ensure that you’re spending on security effectively. 

Avoid waste in your security spending by finding and closing every gap in your facility. Our team will put every dollar you spend towards avoiding theft and breaches. Contact Logixx today. 

Hiring the Right Security Personnel

How to Secure Access to Your Cannabis Dispensary

Uncategorized

Your cannabis dispensary is a major investment, and in many provinces, a timely one, thanks to both the legalization of recreational use and commercial sales by privately owned stores. 

Cannabis is a high-value commodity and, as such, may attract criminal activity.

Between robberies, break-ins and internal theft, you must recognize that your staff, customers and assets are at risk. As a result, you will need to take steps to significantly curb those risks.

One of those steps is to invest in access control measures.

The idea behind access control is to restrict access to your assets by installing high-security doors and other barriers as well as regulating who can access them and when.

How to Secure Access to Your Cannabis Dispensary

What is Access Control?

Access control is a security method that authorizes or revokes access to physical assets in your organization. In the case of cannabis dispensaries or stores, this would mean regulating access to your inventory, cash, and store (especially during off-hours and holidays).

The benefits of implementing access control are manifold:

1. The first is obvious—i.e., preventing outsiders from gaining access to your assets

For example, if your store suffers from a break-in, guarding your products with a 1.5mm+ metal door and commercial-grade locks could slow the theft long enough for the police to reach your store, or deter the theft entirely. 

2. The second is that it lets you keep track of who has access to your assets

In case of missing inventory, you can see who had previously entered the restricted area and when. You can also control who may access your assets (such as trusted staff) and revoke access to employees who leave your company.

Access Control Keeps Security Simple

One security system keeps your entire facility safe
Overall, access control is an essential piece of any credible security system, especially those in the commercial marijuana industry. It’s for this reason that it’s also a compliance requirement. 

Dispensary Entry Access Control Requirements

Under Bill C-45, the federal government left the creation of commercial marijuana markets to the provinces. In the provinces where privately-owned dispensaries are allowed to operate, such as British Columbia, Alberta, Ontario, and others, access control is a must. 

For example, the Alberta Gaming, Liquor and Cannabis Commission (AGLC) requires that retail cannabis stores to “secure perimeter entry points against unauthorized access”. Similarly, the Alcohol and Gaming Commission of Ontario (AGCO) requires that “all cannabis must be stored securely at all times and accessible only by staff…

In each of these cases, you must install metal doors with high-security dispensary door locking systems, and that too according to mandated technical specifications.

Secure Access to Your Cannabis Dispensary Doors and Entries

How to Install Your Dispensary Metal Door and Locking Systems

In Alberta for example, the AGLC requires that you install a 1.5mm hollow metal door with 1.9mm metal frames using tamper-proof hinges on every door except for the customer entrance. 

However, the customer entrance must still be “constructed of commercial grade material sufficient to secure against unauthorized access.

You must also equip all of your doors with non-residential locks and “tamper-proof” strike plates. 

The locking system itself must be at least 1.25 cm deep and cannot be managed by a master key. In other words, you shouldn’t have a single key or code that can unlock every restricted area; rather, you should have multiple keys or codes in-place to enable full access.

Don’t Let Your Cannabis Store Application Fail
Due to a Weak Security Plan

Your cannabis inventory must be stored in a separate and secured storage room.

The room itself must be built out of Flattened Metal Mesh. In addition, it must be protected by a hollow metal door that’s 1.5mm to 1.9mm thick. You must also have a 1.6mm steel sheet around the door frame inside of the room. Finally, the door must have a commercial-grade lock that is at least 1.25 cm deep and with tamper-proof hinges. 

You will find complete technical details on the AGLC website.

Finally, only authorized staff may have access to the cannabis storage room. You can implement those controls in a variety of ways, such as issuing smart cards, biometric identification (such as a fingerprint or retinal scanning), proximity identification, or mobile access. 

However, you cannot rely solely on securing your entry-points. You must also have a credible response mechanism to deal with crime, should it occur.

Secure Access to Your Cannabis Dispensary

For example, a video verification system would equip your store to directly alert you of potential activity at any time. You can view the live footage of your store from your phone or computer to confirm if there’s suspicious activity and then speak to our operators to alert law-enforcement. 

Next Steps

Navigating each province’s specific access control requirements isn’t straightforward. And with big markets such as Ontario rolling-out private retail markets on a gradual basis with only a few licenses at a time, you cannot afford to have gaps in your dispensary security system. 

It’s best to get the design and installation of your security system done correctly the first time, and there’s no better route than to speak to an experienced security systems company.

Logixx brings over 47years of experience designing and installing custom security systems for businesses with highly complex security needs. Besides understanding how security systems work best, that experience includes navigating dense regulatory and policy rules, identifying actual threats, and designing systems that protect your investments from harm. 

Contact us today and we’ll help you design, install and manage a security system that fully complies with your province’s requirements and protects your assets. 

How to Secure Access to Your Cannabis Dispensary