Subscribe to weekly updates

More blog posts

Hospital Medication Security: A Guide to Protecting Controlled Substances

Controlled substances, including opioids, sedatives, and other high-risk medications, are tightly regulated due to their potential for abuse and addiction. Improper handling, theft, or loss of these...

5 Best Practices for Security Convergence

In a few short years, ‘convergence’ has gone from just a buzzword to a supposed fad to the new normal way of operating in the security world. This article explores security convergence, what it means...

Step-by-Step Guide to Implementing a Fleet Key Management System

Managing a vehicle fleet is a demanding job. Every day, fleet managers deal with vehicle reservations, responding to emergency requests, and trying to keep their maintenance schedules on track. And...

15 Best Practices for Effective Business Equipment Protection

Businesses increasingly rely on high-value equipment to boost productivity and maintain a competitive edge. But here’s the thing: the value of that equipment isn’t always just the cost of the device...

What is Operational Technology (OT)?

This article explains what Operational Technology (OT) is and how it relates to Information Technology and smart technology. It also offers some tips on how to integrate all of these technologies...

What is a Muster Point? — Does My Company Need One?

Agood emergency plan should guide every part of your company’s response when disaster strikes. All of those parts need to work together like a well-oiled machine to ensure the safety of your people,...