Cutting Edge Security Solutions for the Inland Empire and Southern California

Edge Security Systems is one of the Inland Empire's leading providers of residential and commercial security, industrial security, commercial business surveillance, foreclosed property surveillance, Video Verification, remote video monitoring, cctv systems, alarm systems. Providing "Cutting Edge Security" solutions.



Wednesday, November 24, 2010

6 Steps to Protecting your Family Online

Safety is a term that covers such a wide range of human activity that we sometimes lose sight of its meaning when it’s too close to us. Let’s take our kids safety on the internet for instance. Protecting your family on line these days is just as important as keeping them safe on the way to and from school. While the internet can be a dangerous place, it’s just too important a resource to avoid. Kids need internet access because the advantages far outweigh the disadvantages, but as parents we need to protect young minds. Of course, the problem is that kids think they know everything already—and some of them do—so we have to protect them without getting in their way.
Here are some tips to keep your kids safe on the internet:
1. If possible give the kids their own computer. Children will invariably and inadvertently download viruses and spyware, so why risk your main computer—which probably has valuable financial data on it? If they have their own and it gets infected, you won’t risk your data and you can easily just restore the operating system.
2. Whenever possible use Apple computers. Apple computers are just not prone to spyware and viruses like Windows PCs because they represent much smaller numbers. You won’t have to worry so about getting infected. If you are contemplating a purchase buy Apple. They cost more yes, but you can get some great deals on Apple’s own web store in the refurnished area and there are good buys on eBay—expect to pay around $500 for a decent Intel based later model.
3. Always place the computer in a common area of the home where the kids will be less likely to visit sites you don’t approve of. They won’t like it when they get older, but for younger children (5-12) it’s a must. As you develop standards for your children starting at a young age then when they get older they will be better prepared for having it in their room.
4. Always use a router on your home network. A router is a box that goes between your DSL line or cable modem and acts as a firewall to protect all your computers from direct attack. Routers are very inexpensive these days--$50 to $100 max and provide a lot of valuable features (like wireless wi-fi) and protection against hackers and worms.
5. Use a service called OpenDNS to filter web sites and prevent your kids from going to dangerous porn sites and other places you find objectionable. Basic OpenDNS is free, you can sign up for a free account and use it to filter out up to 25 web sites you don’t want your kids to go. The OpenDNS site has instructions and tutorials on how to set it up, but you basically redirect your computers (or even better your router) to use 208.67.222.222 and 208.67.220.220 as your DNS servers. (All sites on the internet actually use number addresses called ‘IP addresses’. When you type in a name your computer or router looks up that name on a DNS server, which is like a phone book and then sends you there.) OpenDNS intercepts requests for objectionable sites and prevents your kids from going there. To activate OpenDNS, go to network properties, uncheck the ‘Obtain a DNS address automatically’ and then type in the numbers listed above. Reboot and you’re protected!
6. ALWAYS install all updates from the manufacturers! Whether Apple or (especially) Windows, make sure the system is being updated. Updates are mostly to fix serious security flaws and ‘holes’ in the operating system. Now that Apple and Microsoft are doing a much better job in keeping their systems secure, the hackers have moved to other application like Adobe PDF reader to inject viruses on your computer—so make sure you keep those updated as well.
EDGE Security Systems
Ph. 909-660-EDGE (3343)
http://www.edgealarm.com/

Residential and Commercial Security Systems, Remote Video Monitoring, Virtual Guard Tours, Video and Alarm Verification, CCTV and Video Surveillance, Access Control, Sound, Paging, Voice and Data Cabling.

Saturday, October 30, 2010

What to do about Bomb Threats

What to do about Bomb Threats and how to reduce their nuisance value.


Document- instruct your receptionist – and all tenant receptionists to write down any bomb threats! The log should include the exact time the call was received, male or female caller, any specific details such as: was a certain tenant mentioned? How did they refer to your building (name or address)?

Video Cameras and recorder- it is vital to place cameras at the entrances to your building. This accomplishes two important things:
One, you’ll always know or be able to review who actually came and went. This will be invaluable if a bomb is actually ever found. You will also have a high level of confidence that no one actually planted a bomb is you never see anyone suspicious.
Two, you’ll be able to identify specific persons leaving or re-entering before and after repeated bomb threats. Most pranksters will know better than to use an internal phone so they will likely go out to a pay phone if they’re going to do this over and over. By cross checking the time of the bomb threat with who came and went right before and after you should be able to pinpoint suspects.

Access Control – it’s difficult to control who come in and where they go if all doors are accessible by everyone. Card access systems take the error out of  controlling access because it allows people with proper credentials access but keeps doors locked where safety and security are needed.

Restrooms – it’s always a good idea to keep these locked at all times- as well as storerooms, janitor closets, phone rooms, electrical rooms, etc. If unmanned areas are not accessible it’s much more difficult to actually plant a bomb.

Meetings – meet with your tenant managers and discuss how they feel about bomb threats. Explain the facts and invite participation. Chances are one of them will be invaluable at discovering the source of the bomb threats (since it’s almost certainly one of their employees or someone they let go.)

Patterns – If the bomb threats occur in the afternoon, during good weather, it’s almost certainly a present employee. They want a break or want to go home. If the threat occurs during bad weather and/or at odd times, it’s very likely it’s an ex-employee who wants to make it miserable for their ex-employer!

Resolution – unfortunately, the perpetrator will almost never be caught. Generally they grow tired or bored and stop on their own. If you have video and observe someone you think it doing it and someone asks them about it, that’s usually enough to scare them into stopping. That’s why video systems can be so valuable in cutting short repeated threats.

Unless you catch a suspect in the act of making the call it’s very difficult to prosecute- although most police department take bomb threats very seriously these days. If the culprit is not too bright and makes some mistake they could get into a great deal of trouble with the police. The best thing for the building management is to take every step to assist them in making a mistake and hope for the best.

Take a minute and schedule your FREE 36 Point Security Audit. Fill out the form on the right of the screen. We will identify the risks that threaten not only your security and safety but also your day to day functions. This will help you increase productivity, and overall the bottom-line.

Edge Security Systems
909-660-3343
http://www.edgealarm.com/

Ps. Ask us for a FREE Copy of Bomb Threat Procedures when you call.

, , , , , , , , , , , , , , , , ,

Understanding Risks of a Retail Business in the Inland Empire

Understanding Risks of a Retail Business

Perhaps of all the types of facilities and business’ covered in this guide, retail presents some of the highest risks and the toughest problems to solve. If the product you’re selling is highly desirable- for example, small consumer electronics; then the problems are multiplied many times.
For the sake of clarity, let’s divide our retail business into segments by the types of merchandise we carry- small electronics must be treated quite differently then large consumer items like refrigerators. Let’s begin with the easiest and work our way up to the really difficult high risk situations.
TIP: One aspect of any type of retail business which must be of concern to all managers and owners is record keeping. Always keep a copy of your business and financial records at home or another safe location other than your business!
Before we go into the specific retail classes let’s look at intrusion and fire alarms:
Burglar Alarms
The intrusion market is very competitive so there is no need to spend a lot of money to get a good system. Beware of being talked into buying too much protection however. Typically, the alarm company will lease the system to you and roll the equipment cost into the monitoring fee. They will usually require you pay the installation fee up front and then the monitoring fee annually. Full service during business hours should be included in this cost. The fee should cover all maintenance including labor and equipment replacement.

The only exception to this would be emergency after hours service calls and damage to equipment caused by negligence or unforeseen circumstances like lightning or water leaks. Always get it in writing however, and make sure you’re clear on what is covered and what isn’t.

Alarm contracts generally are for FIVE years so make sure you understand what you’re signing. The long contract length is required so that the alarm company can recover their equipment investment. You can try to negotiate a shorter length but expect the price to go up considerably. An alternative is to pay the entire cost of installation labor and equipment cost up front and then simply contract for the monitoring only which should be considerably less- often as little as $10 per month.

So what should you get in a simple intrusion system? A typical system consists of a control panel, a keypad for arming and disarming and detection devices. The system communicates to the central monitoring station by phone lines. Most of the time you can use a phone line you already have but many alarm companies prefer you install a dedicated phone line just for the alarm. This is not bad advice. Although it increases your total monthly cost, a dedicated line reduces the chance the alarm control won’t be able to get through to the central station. Obviously, if the intrusion system can’t dial out and deliver the alarm message, the central station won’t be aware you have an alarm condition.

Newer systems (and more advanced monitoring companies) now offer “internet” monitoring. Instead of the traditional phone line they use broadband internet access such as DSL or cable. Some systems continuously monitor the condition of the line and can warn if the connection is lost. These are highly recommended because of their speed and security. The cost is usually very much in line with dedicated voice phone lines. Plus if you already have internet access, the alarm transmission is essentially free.

We would like to invite you to an opportunity to take advantage of a couple of FREE GIFTS….
First – I have a Free Guide to Loss Prevention. This a 160 page Guide on things you can do to help prevent crime.
Second – We can provide you a FREE Security AUDIT of your Home or business.
Take a minute and fill out the form on this screen so you can take advantage of these FREE GIFTS. There is no obligation… Don’t be a statistic. Fill the form out now…. We will see you soon.

Edge Security Systems
909-660-3343
http://www.edgealarm.com/

, , , , , , , , , , , , , , , , ,

Employee Theft and “Sweet hearting” | Inland Empire

Employee Theft and “Sweet hearting” | Inland Empire

Employee Theft and “Sweet hearting”We previously mentioned that more losses are caused by employees than by burglars and that 87% of losses come from employees and 46% of employee theft occurs right at your checkout.
Besides just outright stealing cash from the register, employees often steal with
accomplices- friends and relatives. Sweet hearting is the act of ringing up less than the actual price of an item when an accomplice is shopping. A friend comes in and brings say $25 worth of product to the register but only $5 is actually rung up. Often the employee will use “No Sale” or “Void” to do this but smarter ones will use a known UPC (Universal Product Code – a barcode) they keep somewhere on their person (or near the register) for this purpose.
This type of employee theft can be detected and documented using POS interface to security video systems. Such systems interface into your POS data stream and capture information on each transaction and then either overlay it or match it up with the video recording. A camera is important to document the transaction, establish the wrong product was rung up and identify the accomplice.
Not all employees are dishonest- some are hired that way! Professional thieves often take jobs at retailers desperate for good help, just to steal. Once on checkout duty, their accomplices will come in and the theft begins. One brazen method is to have the accomplice come to the register with a basket of goods. The employee / thief then dutifully rings up every item and bags it- except they ring them as returns! Anyone observing the transaction would think nothing is amiss- unless they saw the POS data along with the video.
These systems can be very simple or very specialized depending on the size of your business and your needs. A one cash register system is very inexpensive but will only document limited exceptions (voids, no sales, cigarettes, etc.) and will require more effort on your part to manage.
Larger systems can gather data from multiple registers and use computer software to analyze the data. These can be very powerful and allow exception reports to be generated on virtually any register transaction- for example, cigarettes less than $1.00. When combined with video you will have a complete picture of day to day operations. Most of these systems can also be used to manage multiple stores from one central location.
In all cases, a video camera directed at each register will provide many benefits including possible detection of employee stealing cash, employee efficiency and productivity (how many people are in line), and even customer interaction.
Take a minute and schedule your FREE 36 Point Security Audit. Fill out the form on the right of the screen. We will identify the risks that threaten not only your security and safety but also your day to day functions. This will help you increase productivity, and overall the bottom-line.

Edge Security Systems909-660-3343
http://www.edgealam.com/


Residential Security, Commercial Security, Industrial Security, California, Inland Empire, security systems, CCTV and Video Surveillance, Access Control, Sound, Paging, and Telephone Systems, Voice and Data Cabling, 24 Hour UL Monitoring
CCTV
Remote Video, Video Verification, CCTV, Closed Circuit TV, Video Surveillance, Video Verified Security Systems, Wireless Security Systems, Commercial Business Surveillance, Foreclosed Property Surveillance, Copper Theft Crisis
ACCESS Control
rfid, fingerprint, biometrics, security software, access control, id card, keyless entry, employee recognition, security door, identification card, id badge, photo id, photo id card, proximity sensor, radio frequency identification, keyless entry system,

Access Control Revealed | Inland Empire

Access Control Systems Inland Empire, Riverside and San Bernardino Counties.
Access Control Card ReaderAn Access system does pretty much what the name implies- it controls access to a facility (or just a room). In order to accomplish this, the systems needs to be able identify the persons attempting to gain access. The identification can be by Card, PIN combination, or Biometrics (a unique human characteristic such as a fingerprint).
In order to control access, the system will also need a means of unlocking and locking doors. This is accomplished by electrifying the door locks. Standard locking hardware can be replaced with similar appearing locksets that have an electric solenoid. Electric strikes (the area in the door frame where the lock plunger goes) can be added. Or Magnetic (Mag) locks can be installed which consist of very powerful electro magnets which can hold the door closed with up to 2000 lbs of force.
Each of these solutions has advantages and disadvantages. One important aspect is to maintain ADA (Americans with Disabilities Act) compliance. Most jurisdictions require that any person be able to exit the building with no prior knowledge. Usually this is interpreted that the levers and push bars remain operational so a person can exit without doing anything out of the ordinary.
Mag Lock Edge Security Systems Locks
While electrified locks and strikes easily comply, mag locks present some challenges. Mag locks are typically used in situations such as full height glass doors where no other hardware is available. Since mag locks “unlock” by removing power, some means must be installed to allow people to exit electronically. This is generally accomplished by a REX (Request to Exit) detector. A REX is an PIR which looks for people approaching the door from the inside and releasing the mag lock when motion is detected.
Locks make up a significant part of the total cost of an access system- usually as much as 50%. Electrified lock sets are the most expensive, followed by mag locks, with electric strikes being the least expensive. As you might expect, the reliability of each is a direct function of the cost- strikes being the least reliable and easiest to circumvent.
It is highly recommended that whatever type of locks you install; do not distribute any hard keys! If anyone retains a mechanical key after the access system is installed, the access is essentially worthless. Also, using a key instead of the reader will cause a false alarm.

Edge Security Systems
909-660-3343
http://www.edgealarm.com/

, , , , , , , , , , , , , , , , ,

Graffiti prevention – Inland Empire

Graffiti prevention – Inland Empire

Graffiti costs tax payers and business owners in more ways than one! Some people may think that it’s just as simple as going down to the local hardware store and buying a paint brush and some paint. What’s teh big deal right? This allows the youth of america to express themselves. Well I beg to differ… Let’s paint a scenario – We’ll take a manufacturing business. Lets say that over the weekend some “taggers” came by and “expressed themselves” all over the building. So the production manager is put in charge to clean up the mess. The boss says, “go and get the supplies you need to fix this problem”. $500 later, he comes back with all the paint that would be needed for the job and paint rollers to boot. Then has takes five of the seven crew members to help clean up the mess. They fail to tell the supervisor was that one of the major accounts called while you were at the hardware store and placed a $200,000 order that had to be shipped out by the end of the day. So what seemd liek a small problem has turned into a huge problem. Combined, you lost wages of $500 for the crew members that were taken off their normal duties, your our your half a day of supervision of apx. $400. You spent $500 in materials and you lost a $200,000 order from one of your biggest clients.
Video surveillance, remote video monitoring and verified video can be a real positive solution to this issue. With early detection, the video feed can be transmitted to our central station where our trained operators can identify the situation and take immediate action to deploy the proper authorities. And because this is now a Verified event, it now becomes priority over the other alarms that were not verified. In short, there is a higher probability that the police will aprehend the intruder.
For a Free security evaluation of your home or business fill out the info on the form.

You can also reach us at 909-660-EDGE (3343). Edge Security Systems

, , , , , , , , , , ,

Introducing 2GIG Touch Alarm & Home Automation System

Edge Security Systems is proud to introduce the Inland Empire and Southern California region to 2GIG Touch Alarm & Home Automation System!


 
The Future of residential home security and home management is NOW! We our customers the latest and most advanced security and home management solution in the industry. 2gig introduces Go!Control, the first all-in-one security and home management system:
Color touch-screen interface
Intuitive, user-friendly interface is found on the Go!Control panel, your computer (internet) and web-enabled phone – providing you with access when and where you need it.
GSM (cellular) radio
The most reliable communication option available in the industry. No more concern with cut phone lines or the elimination of residential phone lines altogether.
Integrated two-way voice
Go!Control allows the central station to listen in and talk to you when a signal is received.
Built-in Z-Wave RF Protocol
You can now control lighting, HVAC, and other Z-Wave appliances in the home right from the panel, web-enabled phone, or the internet. No need for extra hardware—it’s all contained within the Go!Control panel. And this is just the beginning! Numerous money- and time-saving applications are currently being developed for 2gig’s Go!Control system.

=======> CLICK HERE FOR A FREE DEMO <========


Edge Security Systems, Residential Security, Commercial Security, Industrial Security, Commercial Business Surveillance, Foreclosed Property Surveillance, Inland Empire Video Verification, Inland Empire Remote Video Monitoring, Inland Empire CCTV systems, Inland Empire alarm systems, Inland Empire alarm contractor, Inland Empire Security Cameras, Inland Empire Access Control systems