Many investigators actually have very poor interview skills – here’s how to conduct an interview the right way to gather the information that you need.
We often confuse the concept of identity with the card that carries it, but in reality, “identity” can reside on a mobile phone, a USB stick, or some other medium.
The development and deployment of video surveillance technologies continues to gain momentum, and keeping pace with this success are the powerful advances being made in camera imaging.
Security technology and applications are evolving at an accelerating rate, driven by the recognition of the need for stronger security measures to create safer environments. Still, in every facility there will be a large number of physical keys that are in use and they must be considered when implementing or upgrading a security system.
Security managers have many responsibilities and concerns. While keeping their buildings safe and secure is certainly one of them, it need not be a complicated matter.
Security Officers may be some of the most difficult employees to motivate. Many, by their own admission are either finishing out their careers, waiting for a better opportunity, or just plain lazy.
Today’s vital business information now fills datacenters instead of file cabinets. These facilities are critical to the operations of almost any company or government agency.
Today, security is of utmost importance at the nation’s colleges and universities. Events such as the Virginia Tech shooting in 2007 remind administrators, parents and students of the stark reality that considering the safety of all individuals who visit, work or attend classes at college campuses is essential.
Hospital and healthcare settings offer many ways to use video surveillance. The security needs of these institutions reflect the life-or-death work they do and also a volatile environment where emotions can run high.