Posted by Deggy on 4/26/2019
Personnel are one of the most effective resources in security but the most expensive as well. They provide subjective decision-making in deterring, detecting, denying, delaying and defending and can yet cover other duties. Patrolling optimizes the security officer resource.
|
Posted by Deggy on 4/25/2019
After you have completed your risk assessment and have uncovered vulnerable areas, you must put together a Security Plan in order to mitigate and manage the potential risks indicated. Strive for the best plan within your budget.
As the risk assessment, the security plan is an ongoing process. If something happens -- a car robbery, for example -- it does not mean that you have no defense/barrier against that particular threat. It does mean, however, that whatever defense you do have has proven to be insufficient.
|
Posted by Deggy on 4/24/2019
Before making any decision related to the security of your organization, assess all possible risks and make a recording of your findings.
This will back up your security plan and also provide legal defense for the defined measures. If your organization does not have a written risk assessment, it must do so. If it does, a good practice is to review it from time to time.
|
Posted by Deggy on 4/19/2019
When speaking of security, one’s primary duty is to prevent bad things from happening, and yet, if needed, be prepared to defend your security posture in court.
Overall, you must protect whatever needs be protected, your security posture included. To do that, a written security plan is mandatory.
|
Posted by Angie S. & Tavares D. on 3/26/2019
In the wake of mass digitalization, security risks are increasing at an exponential rate. The security industrial complex is in full swing. Security experts have begun to rely on evolving technologies to combat security risks both in the digital and physical world.
Here is our list of the most important technologies in the security market in 2019.
|
Posted by Angie Santiago & Delmo Tavares Sobrinho on 1/22/2019
Certifications are stamps of approval that allow professionals to sell themselves as being highly qualified, knowledgeable, and experienced individuals in their fields. As a result, doctors have them, attorneys have them, and now professionals in the security industry are also obtaining them to provide proof of their excellence in their fields.
|
Posted by Angie Santiago & Delmo Tavares Sobrinho on 11/21/2018
...making your customers see value in your performance is not only essential to keeping them happy but also for ensuring they stay onboard and refer your services to others. The most important way to communicate your performance to your customers is by sending them regular Security Summary Reports (SSR)
|
Posted by Angie Santiago & Delmo Tavares Sobrinho on 8/27/2018
Recently, the practice of BYOD has witnessed an increase in corporations. The most common instance is the use of smartphones, which are invariably owned by most employees in a typical organization. The theme of our discussion is that it may not always be a bright idea to use your devices on the job, for a number of reasons. The practice of enabling employees to use their devices has many risks attached to it. The responsibility is on their employers to discourage such an exercise and urge caution.
|
Posted by Angie S. on 5/1/2018
A step-by-step guide on how to download and install the Deggy Control 2018 software from www.deggy.com
|
Posted by Michelle J. on 4/12/2018
The role of a security guard is important for protecting private property and the people who reside or work on the premises they guard. However, there are several risks that security guards often face that security managers should consider to avoid liability or injury. Here's a look at three of the most common.
|
Posted by Michelle J. on 12/14/2017
The role of a security officer involves the primary goal of protecting the property of the employer. These security guards are frequently positioned as the first line of defense for businesses and homes against external threats, intrusion and vulnerabilities to the property and its dwellers. However, security guards wear many hats, as there are a number of responsibilities they must fulfill that private security company managers should note.
|
Posted by Michelle J. on 10/16/2017
The demand for private security guards is climbing and even surpassing that of law enforcement. More than 1 million security guards were employed as of May 2016. In contrast, only 120,000 law enforcements officers were employed full-time. However, private security guards do not have the same rights and obligations as law enforcers do.
|
Posted by Angie S. on 8/31/2017
A step-by-step guide on how to Register (create a name) and Program (associate that name to an unregistered Pen's serial number) a Deggy Steel Pen.
|
Posted by Michelle J. on 7/24/2017
Employee turnover isn't limited to any one industry. It affects almost every industry and is a considerable issue among most businesses, including private security companies. And it's understandable - the national annual turnover rate of an average private security firm exceeds 100% and can even trend as high as 400% for smaller startup firms. This beats typical employee turnover rates of 15 percent. That's why it's important to understand the causes of employee turnover when it comes to your security guards, and the steps you can take to prevent it.
|
Posted by Michelle J. on 5/22/2017
The ability to track your employees may come with inherent legal risks. Here's what you need to know...
It's vital to consider any legal consequences from invading your workers' right to privacy...
|
Posted by Michelle J. on 4/28/2017
Security guards are constantly in the line of danger when it comes to intruders or unruly individuals, and they're sometimes forced to take drastic measures when intruders become hostile. But using lethal weapons, such as firearms and knives, to defend themselves in these situations can actually leave both your company and security guards liable for injury if your security guards...
|
Posted by Eileen Ramos on 3/24/2017
Once tour quality has been optimized, it is then time to pass the results on, sending tour reports to your clients. With the Deggy System you can have personalized reports memorized for each one of your clients and have tem automatically and systematically sent by email.
|
Posted by Michelle Johnson on 3/13/2017
Your customers are the bread and butter of your business… Whenever you engage in a transaction with them, you're essentially entering into a contract… But you also want to set the correct expectations for your customers as well, and a service level agreement, or SLA, is an effective way to get it done.
|
Posted by Eileen Ramos on 2/10/2017
“Let the Deggy Pro Team handle your guard tour management needs”
With the Deggy Cloud Pro service, our Deggy Pro Team provides the registration of hardware, custom tour setup and report management.
- No need to setup
- Receive equipment ready to start using
- Receive reports by email
|
Posted by Francisco K. on 2/9/2017
Ensuring your software is as well-guarded as your physical assets takes some effort. Every corner of your software has to be evaluated systematically. Just as your guard tour solution ensures every corner is regularly patrolled, the OWASP (the Open Web Application Security Project) Top 20 list gives you a patrol map for your software to protect against bots.
|
Posted by Michelle Johnson on 2/3/2017
Working alone can be defined as when you work by yourself or away from the usual work site and do not expect another worker to come visit you for a while, and you're not visible or cannot be seen by another worker… However, security guards that work alone are at risk…
|
Posted by Michelle Johnson on 1/10/2017
While gated residential communities can offer more security than traditional subdivisions, it's a smart idea to take the necessary steps to prevent security breaches in the first place. Here are some safety tips to avoid security breaches, whether you're protecting your condominium units or gated communities…
|
Posted by Michelle Johnson on 12/28/2016
Whether you refer to them as unmanned aerial vehicles (UAVs) or drones, these devices are an important form of security to consider for the future of the security industry. Drones have been used commercially since 2014 and are estimated to provide over 100,000 new careers within the next 10 years in the United States. However, the Federal Aviation Administration or FAA's release of "Part 107-Small UAS (Unmanned Aircraft Systems)" officially created the commercial drone industry as of 2016. These rules have streamlined and simplified the process for acquiring required authorizations for using drones in commercial environments, ...
|
Posted by on 11/9/2016
The Deggy® Steel Pen, the most rugged guard tour collector, uses a lithium 123A 3V battery, and you can easily change it.
See how to change the battery by yourself. |
Posted by Michelle Johnson on 10/27/2016
The installation of security cameras in condominiums and gated communities has become commonplace. Research indicates that the growth rate of North American security camera installations is projected to nearly double by the end of 2016, from 33 million security cameras installed in 2012 to 62 million. Security cameras offer property managers and residents a sense of security, and they are frequently used to deter vandalism, violent crimes, and theft. They also keep track of everyone that enters or leaves the property.
While it's important for condo owners and residents to feel safe, it's also important to consider each individual's right to privacy. Here are a few factors you should know about the right of privacy when using surveillance cameras. |