Is VoIP Secure?

Is VoIP Secure?

The VoIP service provider looks at security as follows. They want to make sure that their network is secure, their revenue is protected along with their customers. When you sign up for VoIP do not get the false sense of security that everything VoIP is good. Also understand that you will not be able to place a call from everywhere. Even today VoIP still has some reliability and security issues however with that said these issues are being addressed due in part to the increasing demand for this technology.

As we know the broader issue of security is a hot topic these days both on and off the Internet, as a consequence security is being addressed by the industry, global standards bodies and governments, therefore we can expect some serious scrutiny in the issue of secure VoIP. VoIP is equally vulnerable to security risks as traditional IP data networks or any other data that is being sent over the internet.

Just as hackers use software to infiltrate security holes with data transfer, they cam also use this same software to get at your voice data. While this may not be a big issue if you are talking with you child from camp, the contrast can be said when discussing sensitive information while doing business.

So make sure that if you are considering a VoIP provider that they provide security and redundancy so you do not have to worry about the physical requirements and support of your phone system. Secondly you want them to address these issues of security. Ask them if they have separate lines for voice traffic. Ask them what measures they take to secure their networks. You can also ask them if they can Combine a VPN (Virtual Private Network) to your VoIP? This can prevent unauthorized access to your phone system

Moving forward into the future VoIP security will continue to be a major concern, just because it's well known that information that passes over the Internet can potentially fall into the wrong hands. As much as it's becoming a concern just as equally are additional resources have been dedicated to these security loop holes. Remember ask lots of questions and get the best service you can for your needs.

Source by Paul Hegarty

How to Use Google Chrome for Secure Web Surfing by Default

How to Use Google Chrome for Secure Web Surfing by Default

If you have ever shared a log on or computer for your web browsing you'll know how annoying it can be to have secure web surfing. Organize a surprise party or weekend away and then a list of hotels appears in your partners browser next time she logs on. It's almost like you share a common surfing history in the house.

Let's face it sometimes you do not want your kids to visit all the same web sites as you!

There's nothing ground breaking in Chromes Incognito mode but it's a very useful feature. Switch to Incognito mode and your web surfing instantly becomes a little more secure.

This is how you can use Chrome for secure web browsing, simply right click on the Chrome Shortcut on your desktop, select properties and you should see the shortcut menu appear.

1) Right Click on Chrome Shortcut on Desktop
2) Select Properties
3) On Shortcut menu add the following to target shortcut menu -incognito

Therefore every time you start Chrome using that shortcut now you will be in 'incognito mode'. If you just want to use this mode occasionally then you can select a 'incognito' windows from the file menu.

All the web sites you visit are now not recorded in your history, all cookies are deleted when you close. There's no trace of the web sites stored on your computer at all. Most of the browsers offer similar functionality now but most have to be done manually (so people forget). Overall I guess Firefox with it's multitude of plug-ins and open source model will hopefully produce the ultimate secure browsing. I'll have a look at these options in a later article.

Of course, it's a long, long way from real secure web surfing, we still use HTTP which means your browsing is in clear text. Your browsing history and IP address are also stored on the web site you visit, on the ISP logs. But it is a start and at least can keep your PC holding a huge list of your web browsing.

Source by Jim Rjindael

PSU Jobs- Secure Present and Safe Future

PSU Jobs- Secure Present and Safe Future

There are many questions that arise when it comes to choosing between options of private and PSU jobs. PSU jobs are chosen by most of the people. There are various reasons for people choosing these jobs. Some reasons include flexible and good work, pension plan and most importantly job security. The private sector jobs benefits only those people who wish to earn money quickly. A secure present and a safe future are provided by public sector units. This is due to pension scheme which these jobs have.

Getting PSU jobs is very easy. But one has to do a lot of preparation for cracking various rounds involved in selection process. Most of the public sector unit jobs exam includes written tests that are followed by interview round. Then lastly, there is a physical test. Major benefits of the public sector unit jobs include transportation allowances, housing allowances, promotions on time, regular increments etc. There is no firing due to the medical allowances and economical slowdowns. There are various public sector vacancies in various sectors like medical, education, banking, railways, telecom etc.

There are many people who show their interest in public sector unit jobs. They are advised to go through the employment news sections in newspapers as well as the online job portals. Online job portals are the easiest and the best way to keep oneself updated about the latest vacancies in PSU jobs. A person can get regular updates via email and this is the biggest advantage of online job portals. But this can happen only if one subscribes to the receive email service. One can also get a lot of information about the jobs in other sections of the country as well. Online job portals are very advantageous. Following are their benefits:

•    Hassle free and easy information about the job.
•    It is very easy to download application forms when appropriate links are given
•    Previous papers and sample papers are given by many job portals thus making the preparation for examination easier.

The advantages of PSU jobs.

•    The job boards are very good as compared to inward jobs.
•    The employed hours are inferior.
•    One can get many retirement benefits.
•    One can get a reputed relation in society like magistrate, official, commissioner,  bearers and inspectors.

Disadvantages of public sector unit jobs

•    There are many downfalls of the public sector unit jobs. A low salary is offered by these jobs in comparison with the close employers.
•    The opportunities for career maturation are very few. The promotions are very standard. There is lot of oldness seen in these jobs.
•    The public sector unit jobs are often perceived as very inferior jobs.
•    Another disadvantage of these jobs is the nature and routine of these jobs. The jobs are very monotonous and they often lead to complacency.
•    The opportunities for work maturation are very less.
•    There can be no plasticity and creativity due to various rules and regulations.
•    Environment is unprogressive.

Source by preeti011

VoIP Security – How Secure Is It?

VoIP Security – How Secure Is It?

With the advent of VoIP technology, the question of VoIP security comes to mind for many who are afraid that their conversations are being listened to by people they do not even know. Although this is certainly a possibility, so far there have not been any widespread reports of this occurring. It might surprise you to know that your phone conversations on your landline and your cell phone can also be tapped into, just in a different way.

Since VoIP conversations are converted to digital data and then transmitted in the form of data packets, just like traditional data packets that can be intercepted and listened to. This may be a bit disconcerting to hear, but in many cases the security breaches the user from themselves. If making calls using a computer, there could be malware present that is sending these packets to a server over the internet. Once there, the hackers then listen to the conversation.

Why would someone thousands of miles away want to you hear your conversation? Well, people that write intrusive software or malware are generally only trying to gain one thing, your private information. Although we benefit from new technologies such as VoIP, unfortunately so do would be thieves. It's not out of the reality of possibilities for malware to be written to "listen in" to your conversations and retrieve the data based on recognized key terms such as "pin number". If you called your bank and spoke with a bank employee, your private information could get into the wrong hands.

This sounds like a frightening prospect, but there are ways to combat the theft of your voice conversations. Encryption is key to prevent anyone from having unauthorized access. This way the conversation is encrypted when it's converted to digital data which renders it useless to anyone who might try to gain your information. They can still get the data, but since it's encrypted they would have no way to listen to it. For older style phone systems that use digital phones, for someone to listen to your conversation they would have physically be at the location to "tap into" the line. VoIP conversations can be intercepted from anywhere in the world which is why encryption becomes so important.

It goes without saying that the data network itself should have the protection of firewalls. Firewalls are the gatekeepers of a network and will allow or deny traffic depending on the configuration. The firewall serves to act as the main entry point for data. By relying on a firewall, the need for each individual device to have its own security is delegated and administrating security on the network becomes more simplified. Unfortunately, the firewall becomes yet another point through which data packets must pass. Since all of the packets enter and leave the network through the firewall, congestion can become heavy and a bottleneck created. Some networks are configured to have two firewalls one for standard data and one for VoIP data. This way the firewall specific to voice traffic can be configured with the appropriate security settings that would apply only to VoIP packets. It is also recommended that a firewall maintain the QoS or routing priority information on the packet header. VoIP traffic must have priority through the network to maintain higher voice quality during phone calls.

There are several places within the network where it is appropriate to implement firewall protection for added VoIP security. The first is in front of the IP phone system itself. This protects the phone system from any attacks that may originate from with the local area network and provides additional protection. VoIP traffic from remote workers should also be closely monitored to ensure that viruses, worms or other digital nuisances do not travel to the IP PBX via the VPN connection. Lastly, monitoring should occur on the carrier side to monitor for attacks from the carrier network itself. This is true even if the trunk is not connected to the internet.

There are several ways to configure multiple firewalls so that one is specific to VoIP traffic while the other handles other data. They can be set up in line with the data firewall being the first line of protection and the VoIP firewall immediately behind it or the data firewall can handle data traffic on its own while still processing VoIP traffic after it has been filtered by the VoIP firewall. The last configuration is one of both the data and VoIP firewalls sitting behind a router where the data firewall and the VoIP firewall filter data exclusive to their individual purpose. Regardless of the configuration, having a separate VoIP firewall is another layer of security protecting both your voice conversations an IP phone system.

VoIP is innovative technology which time has come. With the proper configuration and security settings, VoIP telephony can be just as secure as telephony using circuit switched routing. VoIP security is easily achieved with planning and appropriate security measures.

Source by Steve Mike Levy

Secure Utilization of Portable Step ladders

Secure Utilization of Portable Step ladders

Ladders are utilized significantly in the construction industry. However, a great number of slips transpire when people are working on ladders. Furthermore, when working with a step ladder:

  • The working area and activity is limited
  • The hours involved in dragging and installing ladders is commonly underrated whenever planning your job
  • The working posture on ladders is generally awkward (the necessity to stretch out laterally, work beyond shoulder levels and get up on narrow steps for some time) and may trigger musculoskeletal issues.

Because of this, you should look whether or not an lifting work platform or scaffolding is going to be less hazardous and significantly more reliable.

Step ladders must typically only be employed as a way of access to or egress from a work space. Every job undertaken from a steps should be easy task of limited length of time including painting a downpipe, repairing a gutter or performing small-scale electrical installations

Before beginning work

1. Ascertain the problems, evaluate the pitfalls and arrange the work

Take distinctive notice of:

  • Power lines or many other electrical problems
  • Individuals doing work underneath or traffic pedestrians below
  • Vibration caused by nearby passenger cars, fixed or mobile plant
  • High winds as well as other significant atmospheric condition
  • Unstable, slippery or bumpy areas
  • Fragile or unreliable vertical support

2. Favor the most suitable ladder for the project

Opt for a step ladder taking into consideration the following:

  • Elevation of task

To illustrate: If utilizing an 2.4 metre step ladder will mean you will need to do the job above the third top step, go with a 3.3 metre ladder.

  • Height above landing

In case working with a ladder to access an operational platform or roof structure, ensure the top of the step ladder is 900-1100mm above the significant foundation or roof structure.

  • Material

Aluminium, metal or solid wood scaffold boards with totally exposed cable reinforcement within the stiles shouldn’t be put into use close to power lines or any other electric power hazards.

Hardwood step ladders should not be exposed to temperatures greater than 66°C for very long hours.

Talk over with the developer or other accredited individual if step ladders are to be utilized in a corrosive conditions.

  • As a support for planks

Only industrial graded trestle and trestle-backed step ladders ought to be utilized to support a plank utilized as a work platform.

Only industrial rated extension ladders or single ladders fitted correctly with scaffold brackets and used according to the manufacturer’s instructions should be used to support a plank used as a work platform.

  • As access to a surface

If a series of ladders are used to gain access to a surface, landing platforms should be provided at every 6 metre interval.

Portable single and extension ladders should not be used:
– in access areas or inside the arc of swinging doorways, and
– on working platforms to gain height over the protected edge.

3. Set up two ladders if needed

Produce safe access and egress for workers or for the movement of materials – use separate ladders for ascent and descent if crucial.

4. Check the condition of the step ladder

  • Check the ladder every time you use it.
  • Report any flaws straightaway.
  • Never make temporary improvements. The ladder have to be taken out of service and fixed by a qualified individual.
  • Never use a ladder you suspect is quite unsafe or not befitting the work.

Ladders also have to be examined:

  • When obtained and before being employed for the 1st time,
  • After drops or impacts, and
  • Included in regular and documented maintenance processes.

5. Wear the suitable gear & check it before you use it

  • Fully enclosed, slip resilient footwear.
  • Gadgets for securing your tools – belt, lanyard, zippered pouch.
  • A safety headgear if an individual is working higher than you, if you could hit your head or make contact with an electric risk.

6. Make sure the ladder is supported, strong and level

Base support:

  • Ladders should be placed on a firm and level footing. Make use of a plank or board under the feet to stop them sinking into soft ground. Be sure that the plank is steady and it is much wider as opposed to thick.

Vertical support:

  • If an extension ladder is placed against framing or brittle material, a support needs to be placed up against the stiles at the top to distribute the load.
  • If an extension ladder is placed against a pole or tree, it has to be fitted with a pole chain, strap or hoop.
  • If in doubt, make use of a help and support individual to carry the step ladder from beneath.
  • Prior to climbing, test the ladder’s stability by jumping on the lower rung.

7. Set the ladder at a slope of approximately 4 in 1

  • For every metre in height, the ladder feet should extend from the vertical surface by about 250mm.

8. Position the ladder for safe work

  • Put the ladder so you may work facing the ladder and the task without tilting over to the side or over-reaching.

9. Be aware above

  • Watch out for utility lines, other electrical hazards or rigging when putting the ladder into position or relocating it.
  • If you must work in close proximity to utility lines or other power dangers, observe the correct RTA procedures.

10. Watch out down below and around you

  • Contain and sign post your workplace and put in place TCPs and VMPs if appropriate.
  • Never work closer than 1.2 metres to traffic.
  • Secure your tools.

11. Clear the work area

  • Clear the space around the base of the step ladder of devices and materials.

Safe use of ladders

A ladder should not be utilised as a replacement for guys, braces, struts, beams, skids, bridges, ramps or gangways or for any other use not constructed by the manufacturer.

1. Three safe points of contact

  • Either one foot and two hands or two feet and one hand at all times.
  • Have both of your hands able to grip the ladder when climbing. Have tools in a tool belt, holster or pouch – not your hands.
  • Should the ladder is not really risk-free enough to permit you to maintain three points of contact (either by lashing and/or by a support person underneath), consider utilizing an EWP to perform the function.

2. No higher than the third stop step

  • Don’t work any more than the 3rd top step.
  • Go with a lengthier ladder or seek for a less dangerous way to do the task – eg utilising an EWP.

3. One ladder, one individual

If a 2nd individual does need to be on the ladder (emergencies only):

  • Just one single individual to transfer each time
  • Use a steeper base angle than 4 in 1
  • Lash extension ladders in placement

4. Transferring the step ladder

  • Don’t ever `walk’ the step ladder to reposition it.
  • Eliminate equipment from the ladder prior to relocating it.
  • Look out above for power lines, various other electric threats or rigging.

5. Don’t use a ladder to climb to an alternative ladder

6. Don’t leave a ladder unattended in a public site

Source by Martin G

Secure Your Boat With the Proper Alarm System

Secure Your Boat With the Proper Alarm System

The boating season is in the height of activity and docks and marinas have come to life. Now is the time to look into how a boat alarm system can prevent theft and help supervise your vessel for loss of shore power, high bilge water, extreme temperatures, movement and unauthorized boarding.

The systems that are designed from the ground up just for the marine environment are the most dependable. Many companies offer modified home or business security systems as boat alarms. These systems are not able to stand the test of time in the harsh environments we use our boats in. They also utilize equipment that was never designed to detect violations in or on boats.

When you research the systems that are designed just for the marine environment, the difference becomes visibly and sensibly clear. Easy to install, very low power draw, simple to use and functional for all the things you want protected on your vessel, is what you get with a marine security system. They are extremely affordable also, as you are not paying for features you will not be using in the home security platforms.

These systems can be used as a stand alone attention getter, sounding siren and flashing vessel lights or they can easily be monitored by adding a cellular or satellite communicator that is also designed just for boat alarm systems.

We have developed a website where you can learn all about the finest boat and yacht security alarm systems available at If you have any additional questions when doing your boat alarm research, I will be available to answer all of your questions.

Source by Matthew F. Lombardi

About Motorhomes – three ways to secure your motorhome or RV

About Motorhomes – three ways to secure your motorhome or RV

RV’s are expensive, high ticket items – there are a number of considerations in securing your investment. Motorhome and Recreational Vehicle theft is on the rise worldwide as criminals become better at both stealing these vehicles and disposing of them. The main elements of securing your vehicle include locks, alarms and tracking devices.

Locking your campervan – you need to ensure that the all vehicle doors lock effectively. This includes cab doors, habitation area doors and external storage doors (particularly if there is internal access to the storage area). If parked up, either on camp site or over winter in storage, you might consider a wheel clamp locking device – extremely effective in deterring thieves. Another effective visual deterrent is a steering wheel locking device – this can be a bar-lock, circular-lock or even a chain and padlock can do the job. Manufacturers such as Fiamma provide extra locking devices designed to be installed on the outside of the vehicle. I’ve even seen owners use their seat belts wrapped arounf the door handles to provide extra cab door security.
Traditional vehicle alarms can be the most effective form of security for your motorhome. Many homes come pre-fitted by the manufacturer with an alarm. The siren is usually housed under the hood and it is activated upon opening a vehicle door. Often a key component of the alarm is a window sticker advertising the fact that this vehicle is alarmed – the bad guys usually move on the the next vehicle. Engine immobilisers are fitted on most modern RV’s and motorhomes – this prevents activation of the engine without a genuine key assigned to that vehicle, by manufacturer.

Motorhome tracking devices or RV tracking devices are the latest form of protection for motorhome owners. A number of providers allow the owner fit a concealed tracking device in their vehicle that sends a tracking signal, identifying the whereabouts of the vehicle. These can be purchased for a one off fee or on a monthly basis. There are advantages and disadvantages to displaying the external sticker – do you want to alert the bad guys ?

Finally – the best security of all often comes in the form of good practice and motorhome maintenance. Simple habits like always locking all doors when the vehicle is unattended are effective in not sigalling your vehicle as an easy target. Never leave valuables on display in your vehicle. Never leave windows open. For further information about motorhomes and recreational vehicles and how best to secure them – visit

Source by Myles Long

Hotel Security: Top 5 Tips To Staying Safe and Secure In Hotels

Hotel Security: Top 5 Tips To Staying Safe and Secure In Hotels

Whether guests at a seven star hotel or a seven dollar hostel there are certain things that travelers need to consider when staying in overnight accommodation. Here are our top 5 tips for staying safe and secure in a hotel environment.

1. Room to Improve: If you have the option to pre-book a room or choose where in a hotel to stay think about a few things.

  • What floor to stay on – the general consensus is between the 2nd floor and 6th floor. This way people can’t easily gain access to your room windows but fire fighters can reach with their ladders.
  • The risks of the area – Are you staying in a hostile environment? If there is a risk of IED’s, car bombs or suicide bombers think about getting a room at the back of the hotel or the opposite of where cars can drive up to the entrance. Perhaps even away from the general lobby area.

If you are not happy with the location of your room, ask to move to a different one.

2. Fire first:

This is a saying we use to remind travelers that as soon as you arrive at your hotel spend a few minutes to ask yourself, what if there was a fire or other emergency?

As soon as you get into your room, place your bags on the bed and exit the room. Look for your nearest fire exit and nearest fire extinguisher, picture reaching these in the dark and count either steps or number of doors between your room and the these points. You may have to find these in the dark or when there is smoke blinding you. Don’t stop there, check the fire exit and ensure it is in fact a viable option. Then when you are happy head back to your room.

3. Fire second:

There was a tragic story of a whole family dying from a small fire within their home. They were sleeping with every door open and all the toxic fumes traveled freely throughout each bedroom killing the occupants as they slept. When fire fighters arrived they only found the pet dog alive as he was shut in a small utility room. The door had protected the dog from the fire and fumes. This story re-enforces the fact that a room can protect the inhabitants from smoke and heat for a considerable amount of time if done properly.

Fire second is a saying we teach our students. Once you have identified the fire exits and returned to your room, ask yourself again, what if there was a fire? If there is no escape from the exits then this room will be your citadel, your safe room.

  • Look at the window, does it open, what floor are you on? Can you jump? If not does it open to give you fresh air.
  • How does the door open and unlock. Is there a key? If so always leave it in the same place.
  • Is there a bath – in an emergency you can fill this up with water and use it to douse the door and walls.
  • If there is a fire and you cant escape then wet towels and block any gaps around the door.

If traveling to less developed countries or regions think about taking portable fire and carbon monoxide alarms. Both are cheap, small and easy to use and well worth the small amount of space they take up.

4. Double the Door

Your hotel room door is your best barrier to external risk. When inside your room make sure that you use all the locks provided. Do not open the door unless you are a 100% sure to whom you are opening it for. If there is a peephole, use it.

There a few great items on the market that can provide a second layer of door security think about taking these, as they are small and cheap.

  • Door wedge
  • Door lock ratchet

When you leave the room, use the peephole, make sure there is no one outside. When you come back to the room do not assume that it is secure. The majority of hotel room locks can be defeated quite easily, many people have access to the keys and it would be a mistake to assume that no one could have got in. Take caution, have a quick look around and then relax once you have checked and the door is locked behind you.

The Hamas chief Al-Mabhouh killed by Mossad in a Dubai hotel room made the mistake of assuming his hotel room was secure. Mossad used either a very simple and easily attainable machine to decode the electronic door or the tried and tested string and wire technique that can open many doors which have the tiniest of gaps between the door and floor.

It is not just the intelligence services that know these tricks, many criminals and attackers have the means and the motivation to go to these lengths.

5. Complacency is a dirty word:

  • If you hear an alarm, do not ignore it. React quickly and use your pre-determined exit. We do not mean panic and run out in your underwear screaming, but just make sure you do react. Get dressed, get your shoes on, stay calm, prepare to leave the hotel and take your room key, if there is a fire and there is no escape you may have to get back to your room, close your door behind you. Try and avoid using the hotels muster point or emergency gathering location. Sometimes hostiles will use an alarm to gather people in one spot before attacking or carrying out a secondary attack.
  • If you wake up in the middle of the night for no reason, check that there is in fact NO reason, take a few seconds to listen, look and sense if something is wrong. If nothing go back to sleep…
  • If you see smoke or fire when in a hotel do not assume someone else has reported it. Initiate a fire alarm or call the hotel. Especially when you are in your room call the emergency services as well, do not assume the hotel will call them. Hotels are unwilling to call the emergency services until they have checked out the incident themselves for fear of creating a false alarm. This can cause a significant delay. There have been many horror stories of deaths and injuries caused by these delays. Take control of the situation yourself.
  • Do not assume that because you are in a hotel you are safe. If you are in a lift and someone else comes in that you are unsure of wait for him or her to push a floor before you do. Make sure no one is following you towards your room.

Most importantly as with all of our advice, do not develop irrational fear, do not think that everyone is out to get you. Instead just increase your awareness, listen to your sixth sense and take the time to prepare for certain scenarios. Time spent preparing and planning is never wasted, it can also mean the difference between life and death.

Source by M Deane

The Ins and Outs of a Secure Truck Parking Lot and Drop Yard Gate

In a previous article I discussed the essentials for perimeter security of a secured trailer parking lot or drop yard. However, true perimeter security requires more than a formidable wall between the yard and the outside world. A secured parking lot must also have secure methods of getting in and out of the yard. This article will focus on the security necessary for the ins and outs of any secure drop yard.

When evaluating the security of any drop yard’s entrance points you should start at the physical characteristics of the gate. A secure trailer parking lot’s entrances and exits should be designed so that when they are closed they provide a physical barrier similar to the perimeter fence. Many inferior yards only have a stop sign and if you’re lucky a guard to yell, “stop.” However, such yards cannot be considered secure.

Once you have determined the physical barriers necessary to prevent unauthorized entrance and exit from the yard are present you need to evaluate the controls used by the yard. A secure truck parking lot should at all times, have on-site trained guards to ensure that only authorized entries and exits occur. A simple key fob or numeric pad controlling the gate should never be considered a secure lot. Also, the on-site guard should be controlling the entrance and exits of all pedestrians as well. Essentially no man or machine should be on the yard that is not authorized and has legitimate business being there. Only on-site guards can provide the security standard required to call a drop yard secure.

Having an on-site guard and physical barrier preventing unauthorized entry or exit is not enough for true security. The vehicle and pedestrian entrances and exits must be monitored one hundred percent (100%) by high definition CCTV. The use of high definition CCTV is important, as the system must be able to identify the vehicle or person entering or exiting. Where, remote staff is also monitoring the gate the CCTV must provide enough detail for the plates and trailer numbers to be recognizable for comparison with customer release forms.

The lighting at all entrance or exit gates must support the security of the yard. Therefore, it must provide adequate lighting for the CCTV to identify vehicle plate numbers and to identify facial features of any pedestrians. Nothing can render a sophisticated CCTV system useless like poor lighting. The proper lighting of the gate area not only assists on-site guards but also is crucial for a properly functioning CCTV monitoring system.

All the intimidating gates and high-tech surveillance systems will not prevent theft from a secure yard if the guards are lax. Properly trained on-site guards are crucial and cannot be replaced by fancy equipment. Do not get blindsided by technology and overlook the on-site staff of any yard you are assessing. True the technology may help find the thieves and may assist in recovering some of the stolen cargo, but a secure drop yard should prevent theft. That is the reason any trucking company entrusts its’ equipment and cargo to the yard.

Source by Dan Otting

What is the Difference Between Tailgating and Piggybacking Through an Access Controlled Secure Door?

Tailgating is when another person, whether an employee or not, passes through a secure door without the knowledge of the person who has gained legitimate access through the secure door. This is a similar concept to when there is a car following closely behind you on the freeway without your permission. You are being tailgated.

Piggybacking is when another person follows through a door WITH the permission of the person who has received access. If someone is hugging you or actually on your back, this is called “piggybacking”. Only 2 technologies are able to distinguish between 2 people hugging and 1 large person. Humans and 3-dimensional machine vision systems.

There are various methods of stopping tailgating and piggybacking through secure doors. At mission critical sites, 24/7 armed guards are often employed at significant expense. An alternative to an armed guard may be the installation of a 3-dimensional machine vision system that can differentiate between humans and objects. This is the same proven technology that has been employed for decades in the field of factory automation and robotics. Newton Security’s patented T-DAR technology is worlds most reliable system for detecting and preventing tailgating through secure doors.

The two types of entrances that are found in an anti-tailgating system are single doors and a set of 2 doors in a secure space which is called a mantrap.

A single door anti-tailgating system has the ability to alert sound and alarm, alert security personnel to an unauthorized intrusion. Since there is only one door, this cannot be a man trap.

A mantrap is a secured space with 2 or more doors. When 1 person enters the mantrap area the T-DAR 3-D machine vision system performs a dynamic scan, confirming that only one person is in the space. If another person enters the space, they are detected and since there are now 2 people in the space an alarm is sounded. The door on the secure side of space is locked so neither person can enter space. Both people must exit the mantrap before entry process may proceed.

Here is a pretty good demonstrations of a mantrap in action:

Source by Jeff A Sandine