Verified Security Blog



Pictures of Suspect in Rash of Car Burglaries

Pictures of Suspect in Rash of Car Burglaries

bad guys are at it again.  This time, there has been a rash of car burglaries in Gwinnett County.  The police are saying that they have linked 21 burglaries to one person and they are now trying to find him.  This is the link to the article with more details:

The Future of Crime

The Future of Crime

ay is the first Monday of the new year.  As I think about what this year will bring, I try to find opportunities to challenge my current thinking and assumptions.  I came across a TED video that I thought was interesting as it provides a different perspective on the future of crime.

Control Your Thermostat from Anywhere

Control Your Thermostat from Anywhere

last few mornings have been a bit chilly here in metro Atlanta.  This got me thinking about the great flexibility we have with the security and automation products that are now available to us.

Take Care of Your Security Systems

Take Care of Your Security Systems

come to 2013!  Since we have entered a new year, it is a good time to evaluate your plans for maintaining your security systems.  As with any electronic systems, security systems need care and attention to stay in good working order.  Here are some questions you should answer as you think about your systems:

Monitoring For More Than Security

Monitoring For More Than Security

n most people think of security system monitoring, they think of monitoring of door and window sensors and motion detectors for intrusion detection.  But, monitoring can be used for so much more.

9 Billion Dollars Lost to Return Fraud Every Year

9 Billion Dollars Lost to Return Fraud Every Year

, the National Retail Federation reported that 9 billion dollars are lost to return fraud every year by retailers.  What is return fraud?  According to a recent article in the online version of USA Today, return fraud is defined as “a crime where people exchange stolen goods for cash, use counterfeit receipts or bring back items that have already been worn or used.”

More Than a Card Reader

More Than a Card Reader

many of you who use access control systems to manage the traffic coming and going to your facility, you may think of your system as a group of card readers.  When cardholders arrive at the office, they present their cards to the readers and are granted access to your building.

Unlock Doors with a Smartphone?

Unlock Doors with a Smartphone?

re is a new technology that is slowly making its way into the world of traditional door access control.  The technology is called Near Field Communication or NFC.  Some newer smartphones are built with NFC chips inside of them which will allow those phones to control devices just by holding the phone near a NFC reader.

Access Control Without Software

Access Control Without Software

I discussed in this previous blog post, there are easier ways to manage your card access control system.  In that previous post, I discussed an option for managing your access control system with just a web browser instead of having to use a Windows-based software package for the management of your system.