blog-header

Securing Keys, Assets & People - News, Tech and Trends Blog

Top 10 Equipment Inventory Management Practices to Follow

By Shannon Arnold on Aug 25, 2020

How many different pieces of equipment are used by your business every day? We don’t just mean things like screwdrivers and wrenches—what about laptops? Handheld scanners? Specialized instruments?

Continue Reading

8 Business Loss Prevention Strategies That Work

By Shannon Arnold on Aug 18, 2020

Business owners outside retail sometimes dismiss loss prevention as a challenge just for retail stores. But every business can benefit by implementing loss prevention strategies that protect their inventory and accounts.

Continue Reading

How to Keep Track of Equipment Inventory

By Shannon Arnold on Aug 6, 2020

It’s amazing how many hidden costs you uncover when you look into how your business manages its equipment. For businesses of any size in any industry, streamlining how you track and manage your equipment is an excellent way to protect your bottom line.

Continue Reading

10 Elements Your Company Equipment Damage Policy Should Cover

By Shannon Arnold on Jul 28, 2020

No matter how many safeguards you put in place, some of your business equipment will inevitably be damaged. It might be due to an employee’s honest mistake, because they ignored instructions, or it could even be the result of a malicious act, but damage is going to happen. This makes a company equipment damage policy an important tool for protecting your organization’s finances and maintaining productivity.

In this blog post we'll talk about the top 10 must-have elements you need in your company equipment damage policy:

  1. Objectives and Scope
  2. Definitions
  3. Roles
  4. Company Responsibilities
  5. Employee Responsibilities
  6. Policy Exceptions
  7. Communication Process
  8. Consequences
  9. Compensation Process
  10. Links to Related Forms

Continue Reading

Ultimate 2019 Real Time Location System (RTLS) Tech Guide

By Shannon Arnold on May 29, 2019

It seems like two or three new wireless technologies are announced every year. And most are touted as the perfect tool to run a Real Time Location System (RTLS).

Continue Reading

How Key Management Systems Ground Commercial Security

By Ralph Goodman on Mar 7, 2017

Key management systems have become essential parts of commercial security protocols. They open new levels of security that were previously inaccessible to many business owners. These systems make it possible to organize access levels to a plethora of things which include, but are not limited to, warehouses, restricted facilities, and equipment.

Continue Reading

Need Better Asset Protection? Decide With This Quick 3-Step Appraisal

By Shannon Arnold on Feb 22, 2017

Determining the correct amount of protection to give your assets and facilities can be difficult. Ensuring you use only the most cost-effective security solutions requires you to first have a good understanding of your unique security threats and operational needs.

Continue Reading