Posts in Security & Surveillance

The Arguments For And Against Facial Recognition

October 11th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The Arguments For And Against Facial Recognition”

“Privacy vs. higher-level security. Are the benefits worth the risks?”

– Glenn Baruck, DigiTek Security


The use of facial recognition security and the development of new and more sophisticated equipment continues to grow. This expanding technology is deployed by law enforcement and in use at airports, schools, and SMBs. While growth continues, the technology has also become a hot-button issue with privacy advocates.

This article by Joel Griffin for “Security INFOWATCH” sheds some light on the issues and the insights from professionals in the field.

Learn More about DigiTek Security.

Guidelines for Setting Camera Field of View

August 8th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Guidelines for Setting Camera Field of View”

“While it may seem simple, setting up a security camera’s field of view is critical to its overall effectiveness in protecting your business or home.”

– Glenn Baruck, DigiTek Security


Security cameras are a useful tool in protecting your business or home; however, setting them up correctly significantly affects their usefulness. One important aspect of setting up a security camera is its field of view. Getting the proper field of view for your specific application takes a bit of skill and some patience as well. Forget about the rules you follow when taking a photo or recording video for entertainment purposes and remember what you need these cameras to “see.”

This article by ERIC OLSON for Security Infowatch provides you with some critical guidelines that will help ensure that you get your cameras set up correctly to see the whole picture.

Learn More about DigiTek Security.

How To Avoid The Most Common School Security Design Mistakes

August 8th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “How To Avoid The Most Common School Security Design Mistakes”

“If you are responsible for or concerned with physical security in your school or facility, this article, and related webinars could help you avoid critical mistakes.”

– Glenn Baruck, DigiTek Security


Having good security equipment is only part of the equation, as pointed out in this article by Ray Bernard for SECURITYINFOWATCH. Shortcutting proper security design in the rush to “do something” can have devastating consequences for educational and other types of facilities. According to Bernard, there is a typical security design mistake that occurs in many types of facilities, but the impact of it can be significantly higher on schools, whose incident response requirements are greater than many other organizations.

Check out this valuable article and the links to related webinars to learn more about the most common security mistakes. While much of what is covered is common knowledge among trained and experienced security design consultants, security practitioners and others responsible for facility physical security risk management it may be helpful to you when implementing a new system or updating your current one.

Learn More about DigiTek Security.

The Rise Of Insider Threats: Key Trends To Watch

July 16th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The Rise Of Insider Threats: Key Trends To Watch”

“Internal cyber attacks are on the rise and must be taken seriously. How do organizations prevent them? Get the latest insights here from TechBeacon.”

– Glenn Baruck, eDot


When it comes to security threats, companies have to prepare for a variety of issues. Insider cybersecurity threats have always been a concern but are becoming more prevalent as systems continue to be more interconnected. In a recent study conducted by Cybersecurity, Insiders showed that 53% of the organizations experienced an insider attack themselves. As these numbers continue to grow, 64% of organizations surveyed said they are now putting their focus on detecting insider threats and preventing attacks from happening. Also, 86% already have or are working on creating a program to prevent insider attacks.

There are many new developments in this fast-paced area, and keeping up with the latest best practices can be a challenge. This recent article by Yuri Martsinovsky for TechBeacon gives a good overview of what is happening and touches on some of the latest preventative measures companies are employing.

Read more

Learn more about eDot.

When Your Apps Are Dormant, You Become A More Likely Target For Crooks

June 20th, 2019 Posted by Security & Surveillance, Technology 0 thoughts on “When Your Apps Are Dormant, You Become A More Likely Target For Crooks”

“Don’t forget about those dormant apps on your devices! They are a gateway to thieves looking to steal your information and more.”

– Glenn Baruck, Chicago Voice & Data


You know those banking and e-commerce apps you haven’t opened in months? It might be a good time to check-in with them and make sure no one else is using them either. According to forthcoming research from DataVisor, a California-based startup specializing in fraud detection, sixty-five percent of accounts that experience an account takeover attack – when an outsider logs in with a victim’s own username and password – have not been accessed by their true owner in more than 90 days.

Don’t be fooled by the 90 statistics; data also showed that while 65 percent of the affected accounts hadn’t been accessed in 90 days, 80 percent belonged to users who hadn’t logged in to their page in more than 30 days.

These fraudsters are very sophisticated and target dormant social media account information as well. Check out the 411 in this article by Jeff Stone for cyberscoop.

Learn More about Chicago Voice & Data.

Meeting Compliance Regulations For Controlled Access With Security Entrances

May 24th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs) 0 thoughts on “Meeting Compliance Regulations For Controlled Access With Security Entrances”

“Physical security and meeting compliance regulations begins with a solid plan for controlled access with security entrances.”

– Glenn Baruck, DigiTek Security


Whether it’s HIPPA laws for medical records or FSMA regulations that apply to our national food supply, many regulatory compliance laws include guidelines or recommendations for physical security to limit access to sensitive areas. To comply, organizations must take the necessary steps to reduce the risk of intrusion, and, they must prove that they have taken reasonable actions. That’s where security entrances can play a lead role; preventing unauthorized intrusions and helping organizations meet these regulatory requirements. If you are challenged with meeting any of these regulations, this article by Pierre Bourgeix for Security Magazine is a great place to learn about the best way to structure your security entrances.

Learn More about DigiTek Security.

Archives