Browse by topic
Subscribe to weekly updates
Risk mitigation

Battle-Tested: 7 Access Control Best Practices

It's not if, but when your organization will suffer a security breach. Whether they’re large or small, or protecting from internal or external attacks, every organization must remain vigilant. Even the NSA, arguably the most secure US federal intelligence agency, failed to stop Edward Snowden from releasing an estimated 1.7 million sensitive...
Read more
Access Control

Access Control Card Readers: Choose the Right Technology for Your Business

One of the core security needs for any business is to control who can access the business’s buildings and assets. Card readers are one of the most popular choices for conducting access control. Formerly only within the reach of enterprise security budgets, new, lower-cost access control systems are increasingly the preferred choice for businesses...
Read more
Access Control

Top 10 Equipment Inventory Management Practices to Follow

How many different pieces of equipment are used by your business every day? We don’t just mean things like screwdrivers and wrenches—what about laptops? Handheld scanners? Specialized instruments?
Read more
Physical security

10 Elements Your Company Equipment Damage Policy Should Cover

No matter how many safeguards you put in place, some of your business equipment will inevitably be damaged. It might be due to an employee’s honest mistake, because they ignored instructions, or it could even be the result of a malicious act, but damage is going to happen. This makes a company equipment damage policy an important tool for...
Read more
Physical security

5 Steps to Create a Business Theft Prevention Plan

Every business eventually has to deal with theft. You shouldn’t feel overwhelmed about this, though; it’s a manageable problem.
Read more
Risk mitigation

Manage Sick Workers Better With This 3-Stage Framework

Federal and local governments have issued a wide range of public health guidance to prevent the spread of COVID-19. But it has largely been targeted at individuals. Guidance for businesses hasn’t been as forthcoming.
Read more
Access Control

Temperature Screening: Everything You Need to Know

Organizations across North America are figuring out how they can safely reopen. There is a lot of uncertainty about what the coming months and years will bring, but public health officials are starting to offer concrete guidance on managing the risks of COVID-19.
Read more
Access Control

5 New Uses for Mobile Credential Access Control

Real Time Networks recently announced its new partnership with VIZpin. We’re really excited to offer VIZpin’s mobile credential access control technology as an authentication option in our KeyTracer and AssetTracer management systems!
Read more
Access Control

Ultimate 2019 Physical Security Credentials Guide

Digital and physical attacks remain on the rise. That makes the authentication methods that your organization uses to secure its assets and facilities more critical than ever.
Read more
Access Control

Electronic Access Control: A Computerized Gatekeeper

Plenty of folks have had the experience of being "buzzed" through a door. It happens like this: After checking your ID or recognizing your face, a receptionist presses a button. You hear a buzzing sound indicating that the door is now open. (And by the way, if you’ve never seen the old “door buzzer” skit with Carol Burnett and Tim Conway, open a...
Read more