Monday, June 27, 2011

Providing ATM users with safety tips

ATM users should be advised about what steps they can take to reduce their risk of getting robbed. While it is unlikely that providing safety tips will prevent any particular robbery, the larger purpose is to change ATM users' habits. Safety tips can be provided through mailings to cardholders, signs posted at ATMs, messages printed on ATM receipts, messages displayed on ATM screens, safety presentations, and public awareness campaigns. Listed below are some standard safety tips for ATM users:
awareness campaigns. Listed below are some standard safety tips for ATM users:

- Be aware of your surroundings, especially between dusk and dawn. If you notice anything suspicious—a security light out, someone loitering nearby—consider coming back later or using a supermarket or convenience store ATM.

- If using the ATM at night, take someone with you.
- Park in a well-lit area as close as possible to the ATM.
- At a drive-through ATM, be sure the doors are locked and the passenger windows are rolled up.
- If you withdraw cash, put it away promptly; count it later, in private.
- Put your ATM card and receipt away promptly; never leave your receipt at the ATM.
- Keep your PIN secret—don't write it down, and don't share it with anyone you don't trust absolutely. Your PIN provides access to your account.
- Shield the keypad when entering your PIN to keep it from being observed.
- Avoid being too regular in your ATM use—don't repeatedly visit the same machine at the same time, the same day of the week, for instance.

ATM users should further be advised to close any vestibule doors securely and not to open doors for others. In addition, signs at ATMs should state that the site is being surveilled by cameras.
Some victims resist during robberies either to protect their valuables or because they believe the offender is about to get violent. Some succeed in preventing the robbery through resistance, while others get injured or killed.

Offenders want to get the crime over with quickly so they can escape. Any delay increases their nervousness and, therefore, the likelihood they will become violent. Robbers are usually highly agitated and easily perceive the victim's actions as threatening. Drug and alcohol use will obviously influence their emotional state. Some use violence immediately to preempt any resistance. In cases with multiple offenders, the risk of violence increases because each offender is also concerned about appearing tough and in control to the other(s).

As with other violent crimes, victims should assess the particular situation, taking account of nearby assistance, weapons they are threatened with, offenders' behavior and emotional state, their own defensive abilities, and their own psychological need to resist. Given an imperfect understanding of why robbers become violent, compliance is usually the safer course of action for victims, and the best advice for police to offer. Widespread victim compliance, however, undoubtedly leads some offenders to perceive lower risk and, therefore, increases their ATM robbery rates.

Monday, June 13, 2011

How Kids Can Stay Safe on the Internet

In 2005, the U.S. Senate passed a resolution designating June “National Internet Safety Month”. The resolution asked safety organizations, educators, law enforcement, civic leaders, parents and others to increase awareness of safe online practices. National Internet Safety Month focuses on ensuring that everyone who utilizes the Internet, including families, parents and children, understands the dangers posed by and uses the Internet as safely as possible.
Allowing kids to go online without supervision or ground rules is like allowing them to explore a major metropolitan area by themselves. The Internet, like a city, offers an enormous array of entertainment and educational resources but also presents some potential risks. Kids need help navigating this world.

You can’t watch your kids every minute, but you do need to use strategies to help them benefit from the Internet and avoid its potential risks. By exploring the Internet with your kids, you greatly expand its capacity as an educational tool. By providing guidance and discussion along the way, you increase kids’ online skills and confidence along with their ability to avoid potential risks. And you might be surprised by what kids teach you at the same time.

According to the U.S. Department of Education, 23 percent of nursery school children in the United States use the Internet, 32 percent of kindergartners go online, and by high school 80 percent of children use the Internet.

Browsing the Internet…

Browsing the Internet is like having the world’s largest library and entertainment system at your fingertips. Kids are able to read stories, tour museums, visit other countries, play games, look at photographs, shop, and do research to help with homework.

Potential Risks
·         It is hard for kids to distinguish reliable sources of information from less reliable ones. Some believe because information is posted online it must be true.
·         Kids may come across websites containing adult images or demeaning, racist, sexist, violent, or false information.

Tips to Minimize Potential Risks
·         Choose search engines carefully. Some are specifically designed for kids, and others offer kid-safe options.
·         Tell kids when they come across any material making them feel scared, uncomfortable, or confused to immediately tell you or another trusted adult.
·         Help kids find information online. By searching the Internet together you help them find reliable sources of information and distinguish fact from fiction.

Using E-mail…

Adults and kids use e-mail to communicate rapidly and cost-effectively with people all over the world. E-mail transmits messages, documents, and photographs to others in a matter of seconds or minutes.

Potential Risks
·         Anyone using e-mail is vulnerable to receiving “spam,” messages from people or companies encouraging recipients to buy something, do something, or visit a particular website. Spam may be sexually suggestive or offensive in other ways.
·         Kids are able to set up private accounts through free Web-based, e-mail services without asking permission from parents or guardians.
·         Senders sometimes disguise themselves, pretending to be someone else — a friend or acquaintance, a well-known bank, a government agency — for illicit purposes. This is known as phishing.

Tips to Minimize Potential Risks
·         Talk with your kids about their e-mail accounts, and discuss the potential risks involved. Remind them to never share passwords with anyone but you, not even their closest friends.
·         Before you sign up with a service provider, research the effectiveness of its spam filters. You may also purchase spam-filter software separately.
·         Teach kids not to open spam or e-mails from people they don’t know in person. Remind them not to respond to any online communication in a sexually provocative way. Ask them to show you suspicious communications.
·         If your kids receive e-mail containing threats or material making them feel scared, uncomfortable, or confused, report it to your service provider. Your provider’s address is usually found on their home page.

Social Networking…

Social-networking websites allow kids to connect with their friends and other users with similar interests. Kids socialize and express themselves by exchanging instant messages, e-mails, or comments and posting photographs, creative writing, artwork, videos, and music to their blogs and personal profiles. Some 55% of online teens have profiles on a social-networking website such as Facebook or MySpace.

A survey of 10 to 17 year olds revealed 34% had posted their real names, telephone numbers, home addresses, or the names of their schools online where anyone could see; 45% had posted their dates of birth or ages; and 18% had posted pictures of themselves.

Potential Risks
·         Some websites and services ask users to post a “profile” with their age, sex, hobbies, and interests. While these profiles help kids “connect” and share common interests, potential exploiters may pretend to be someone else and can and do use these profiles to search for victims.
·         Kids sometimes compete to see who has the greatest number of contacts and will add new members to their lists even if they don’t know them in person.
·         Kids can’t “take back” the online text and images they’ve entered. Kids may post information and images that are provocative and inappropriate. Once online, “chat” as well as other Web postings become public information. Anything posted online may be saved and forwarded to an unlimited number of users. Remind kids once images are posted they lose control of them and can never get them back.
·         Kids have been reprimanded by their school administrators and families; denied entry into schools; and even not hired because of dangerous, demeaning, or harmful information found on their personal websites or blogs.

Tips to Minimize Potential Risks
·         Urge kids to use privacy settings to restrict access to profiles so only those on their contact lists are able to view them.
·         Remind kids to only add people they know in person to their contact lists.
·         Encourage them to choose appropriate screen names or nicknames — such as those that refer to sports and interests, but are not sexual, violent, or offensive. Make sure the name doesn’t include information revealing their identity or location.
·         Visit social-networking websites with your kids, and exchange ideas about what you think is safe and unsafe.
·         Ask your kids about the people they are communicating with online.
·         Insist your kids never give out personal information or arrange to meet in person with someone they’ve met online without first checking with you.
·         Encourage your kids to think before typing, “Is this message hurtful or rude?” Also urge your kids not to respond to any rude or harassing messages or ones making them feel scared, uncomfortable, or confused. Have them show you such messages.

Because we use the Internet in different ways, kids and adults may learn from each other. By talking about Internet use with your kids, you are opening the door to discussing the important issues of personal safety and helping them engage in responsible behavior.

Monday, June 6, 2011

What’s Key to Managing your Keys?

Security technology and applications are evolving at an accelerating rate, driven by the recognition of the need for stronger security measures to create safer environments. Still, in every facility there will be a large number of physical keys that are in use and they must be considered when implementing or upgrading a security system. Managing and controlling access to mechanical keys provides an extra layer of protection for personnel, property and facilities and can help achieve the goal of a safer environment.

Today's cost-effective key management systems offer state-of-the-art technology. They are fully integrated access control systems which communicate across the converged network and provide security management with a wealth of information that can be used to manage and improve the facility’s overall security operation. Systems can be configured to the exact needs of the facility with custom solutions that include multiple key modules, lockers, biometric access (i.e. hand readers, fingerprint recognition) and versatile installation options.

Securing and Accessing Keys

Using Millenium products ensures that you can do the following with your operator IDs and ID Badging:

  • Produce proprietary ID cards with photos for all employees and visitors with information customized to your needs.
  • Control your own custom photo ID badging for all employees, guests, and visitors.
  • Configure to allow tenants or departments to control access on their own premises.
  • Allow security staff to log on to any workstation or over the Internet with their secure password to have instant access to Millenium.
  • Choose what features are available to each operator in the system, from simply monitoring events, to changing user access profiles, generating reports, and other powerful features.
  • Know that all Millenium® operators must provide their password to log on to the system. Different operators may have different privileges, such as permission to view employees’ home phone numbers or other information.
  • Zero in on problem areas instantly with the live site map and react fast with an on-line listing of your emergency procedures.
  • Check out the high-quality Millenium products at and find the best one to fit your needs or your client’s needs.
Scalable and Modular Systems
Sophisticated key management allows for a wide range of configuration and installation options, including controlling access to other items which need to be secured. Security in the 21st Century is a 24-hour commitment. Millenium Xtra is at your fingertips to meet these important demands anytime, from anywhere you have Internet access. A highly advanced access control software system, Millenium Xtra runs directly from your browser. This means that the complete suite of access control functions is managed without needing specialized client software on local machines.
You don’t need dedicated workstations or a dedicated security network, just a PC, Web browser, Web or LAN/WAN connection. Any alarm event can be sent automatically to your text-enabled cell phone, PDA or e-mail address. Highly secure communication protocols and 128 bit SSL encryption options ensure access for authorized company security personnel only.
Maximizing the System
Today’s access control systems deliver ample testament to the bottom-line benefits of key control in a security plan and help to ensure that the dollars spent confront security threats while integrating seamlessly within the security system.