DGA Security Blog
Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.
Access Control | Security Terms
By:
Isabel Leckie
June 8th, 2023
Tailgating refers to an action in which a person without a valid access credential enters an access control point by closely following another person who did present a valid access credential. The technique used in tailgating is simple but effective. The tailgater waits for an authorized person to scan their access credential into a secured area, such as an office lobby. They then quickly follow the authorized person through the door. Once inside the secured area, the perpetrator can cause damage to the business by stealing confidential information or sabotaging systems, among other things. Tailgating can be particularly difficult to prevent because it relies on human behavior. It is natural for employees to not confront or even hold the door open for those they perceive to be coworkers out of politeness. It is also challenging to detect since security cameras may not capture the act of tailgating. This is why educating employees about the risks of tailgating and enforcing strict access control policies is essential. One way to prevent tailgating is to train employees to be aware of their surroundings and to report any suspicious activity. Optical turnstiles can also be effective solutions to ensure that each person entering a secured area is authorized to do so.
Access Control | Video Surveillance | Fire Systems | Intrusion Alarms | Security Terms
By:
Isabel Leckie
May 25th, 2023
Integration in security refers to the interactivity between different parts of a security system. Here are some examples of what you can accomplish with an integrated security system.
Access Control | Security Terms
By:
Isabel Leckie
May 11th, 2023
Access control systems are designed to regulate and manage the movement of people. One of the essential components of access control systems is the portal, which refers to a physical barrier that controls entry and exit from one space to another. The portal is typically a door, gate, or hatch that is managed by a locking device like a key, code, card, or biometric authentication that grants access. The locking device may also have additional features, such as integration with video surveillance systems or intrusion alarm systems for a more intelligent security system. In addition to managing access, portals can also be used to monitor and record the movement of people whose historical records can be accessed from DGAConnect.
Access Control | Security Terms
By:
Isabel Leckie
May 4th, 2023
Bluetooth is a technology standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices. One type of Bluetooth technology that consumes significantly less power is called Bluetooth Low Energy (BLE). This type of Bluetooth remains in sleep mode unless a connection is initiated, which translates to much longer battery life. This is ideal for access control systems since it doesn't use as much power. BLE is the wireless technology used in mobile app-based access credential systems.
Access Control | Security Terms
By:
Isabel Leckie
April 27th, 2023
Even if your employees use the correct credentials to gain access to restricted areas, holding or propping the door open can create a security risk. This is why Door Held Open Alerts were created. This feature is part of an advanced physical access control system.
By:
John Kolb, CET, CPP
August 4th, 2020
As businesses everywhere are working their way through the Covid-19 pandemic, we’ve been getting calls from our clients to help them open their doors safely – and we mean that literally. We have been installing automatic door openers to create hands-free door entry systems for office suites, office bathrooms and more.
Access Control | Video Surveillance | Fire Systems | Intrusion Alarms
By:
Michael Reynolds
April 7th, 2020
When a business is temporarily closed or is rarely visited, it’s even more critical to make sure your business security and fire systems are working properly. Here are the top seven tips on how to optimize your business security and fire systems to keep your business assets protected — even when you are stuck at home.
Access Control | Video Surveillance
By:
John Kolb, CET, CPP
February 5th, 2020
As recently as a couple of years ago, commercial video surveillance and access control systems were closed systems that couldn’t share data with each other. Despite the many benefits of integrating video and access control, the cost and technical complexity made it impractical to integrate these disparate systems. But thanks to advances in technology, integrating video surveillance and access control systems is now possible.
By:
John Kolb, CET, CPP
January 7th, 2020
A well-designed access control system can do much more for your business than simply manage who can enter what doors during which specified times. First Person In and DoorStat are access control features that are often overlooked but can be very useful in streamlining your business operations, while mitigating physical security risks.
By:
John Kolb, CET, CPP
December 17th, 2019
For businesses that handle high-value assets, whether physical or intellectual property, there are areas that require extra security measures. Local Door Sounder, Door Held Open Alerts and Escort (also known as "Two-Person Rule") are effective ways to layer additional security elements to your physical access control system. While financial services firms, banks, jewelry businesses, cannabis growers and operators most frequently request these advanced features, they offer useful applications in many different types of businesses and buildings.
By:
Michael Reynolds
December 10th, 2019
Even if you have business-grade network connectivity in your facility, network outages do happen. It’s important to understand what happens to your access control system when the network goes down to ensure the continuity of your business operations and the safety of your staff.
By:
Michael Reynolds
November 22nd, 2019
The most time-consuming aspect of installing an access control system is wiring. Every electric strike, maglock, and credential reader is hardwired to an Access Control Unit (ACU) that is typically installed in the IT room. Unfortunately, we see cable wiring mistakes all too often when we survey customer sites.