Protecting your property requires a many layered approach.

Unfortunately if you follow police reports for your local area it becomes quite clear that break-ins occur all too frequently.

To blame is almost always poor security, I am referring to doors, windows, and any other access points to a house.

Solving such issues are relatively simple, although sometimes costly, still what are a few hundred Dollars or Euros compared to a break in.

There are many ways to increase the security of your home, of course the weaknesses, not the strengths of a house will be taken advantage of, so an expensive lock and door and a simple large window next to it provides little security. The goal is to assess where the weaknesses are and how best to resolve these issues.

A combination of approaches to reduce the short comings of the individual components; door, lock, alarm, good windows, good neighbors, not posting holiday plans online (Social media).

This involves gaining the cooperation of an individual to give, do or ignore something.

There are many forms of this disreputable behavior, in this digital age, the speed and success of the attacks has become quite alarming.
  • A tainted present - Getting something apparently for free, with hidden costs, financial, information or unwilling participation in illegal activities - i.e. Virus.
  • Phishing - The falsifying of a companies or persons identity to obtain money, identity or information.
  • Mimic - I.e. Identities themselves as technical support, offers assistance, obtains credentials, information, to reduce or remove security measures.
  • Piggyback - Uses another's legitimate identity or person to gain access to physical or electronically protected resources. I.e. walking through a door someone opened with their access card.
  • Brute force - The use of simple measures to gain access through repeated attempts until success or detection.
  • Diversion / obfuscation - Avoiding detection by providing a distraction, confusion
  • Exploit - Using a known weakness to override a security measure. I.e. Security time planning is known or a password is "admin".
  • Manipulation - Influencing others with the goal of obtaining information, cooperation or money.

The removal of the "person" from the processing of information and transactions has led to security breaches going unnoticed.

It is vital that access to a system generates an audit trial that will be evaluted and acted upon.

It is important that the access of a system is secured properly, I.e. Token based passwords, high security locks, as well as the proper use of these devices.

Surveilance of access attempts needs to be appropriate, suitable for analyis and handled strictly within clear guidelines for its use.

A simple example is the securing of a storage unit with a "good lock" and then putting its key in a key box on the wall next to it. Most key boxes can be opened in a matter of seconds without leaving any indication of that they have been opened.


I will not divulge here how to open these locks, but can provide demonstrations regarding the weakness of certain locks as part of a security audit.

I can however suggest better locks and key boxes, for example, "a euro profile cylinder like the Abloy Protec2 or Keso 4000," or "lever tumbler locks / double-bit high security locks which are used commonly in safes"

This is an enterprise level platform for E-Mail, Calendar, Global address books, Applications, Internet content on any device. A very mature and sophisticated product.

When only only the best is good enough.

When only only the best is good enough.

Protecting your information requires a many layered approach.
  • Physical security, appliances, software and employee guidelines, are all important factors.
  • Awareness, compliance, monitoring, auditing and reporting are essential.
  • There are several good companies out there depending on your needs, for example Kaba.
Douglas Bryant






Company
Telephone
E - Mail