Threshold
Logo for: Threshold Visitor Management Systems

About this blog

We write articles mainly about visitor management, which helps you to know who is (or has been) in your facility. It is just part of an organization’s physical security processes that protect people and property within and around a building or campus.

Categories

Search

Meet the bloggers

Paul Kazlauskas About me › My posts ›

Andrew Jones About me › My posts ›

Blog

Small schools can improve security in affordable ways

Monday, April 10, 2017 by Paul Kazlauskas

Placeholder It’s no secret that school budgets are tight all across America. Resources may decline, but it seems requirements never do. This is especially true in the area of security. Many small or rural schools feel they are at a competitive disadvantage because they don't have the same grant-writing resources and expertise as bigger or more urban districts. Their concerns came up during a recent conference call hosted by the U.S. Department of Education and the National Rural Education ...

Read more 

4 reasons why a company visitor management system makes good security sense

Monday, April 3, 2017 by Paul Kazlauskas

Placeholder Electronic visitor management systems (VMS) are an electronic version of the visitor sign-in sheet (or visitor log book) used in buildings for years and are being implemented more frequently in the business world. While more expensive than a traditional log book, the VMS offers a more efficient and full-proof sign-in process. It is the most secure way to sign-in visitors that come to your office and a very affordable way to improve the visitor management and security of your company. 1) ...

Read more 

Increase security with visitor badges that "expire"

Wednesday, March 15, 2017 by Paul Kazlauskas

Placeholder Any time you encounter strangers at your place of work, you may wonder who they are and what they are doing there — especially if they aren’t wearing an I.D. badge. Some places require visitors to wear a visitor badge, and some don’t. Likewise, some places require employees to wear an I.D. badge, while others don’t. At best, not identifying visitors arouses employees’ curiosity and, at worst, leaves people and property exposed to potential harm. Let’s ...

Read more 

7 inexpensive tools to increase office security

Wednesday, March 1, 2017 by Paul Kazlauskas

Placeholder High-tech security solutions seem to always get the most buzz. The most sophisticated, state-of-the-art, modern solution is what gets attention from the media and people at large. The “newest and greatest” security systems, cameras, and access control systems continually try to sell you on all the bells and whistles they offer. But what if you don’t need (and can’t afford) the latest and greatest high technology security solution? The good news is there are ...

Read more 

An intruder in the operating room

Tuesday, February 21, 2017 by Andrew Jones

Placeholder In the past two years, we have written about the security challenge known as "tailgating." This is the practice of following an authorized person into a restricted area or past a certain checkpoint. (This is also sometimes referred to as "piggybacking.") It’s time for a follow-up. Earlier this month The Boston Globe published a story about an intruder in the operating room at Brigham and Women's Hospital in Boston. She then tried to infiltrate two other hospitals in the ...

Read more 

«  previous  |  17 18 19 20 21 22 23 24 25 26  |  next  »Displaying posts 106 – 110 of 178