Tips: Prevent Lock ‘Bumping’

If your home is protected with an ordinary lock, it may not do you much good, says the National Crime Prevention Council.

Thieves have caught on to an increasingly popular technique called “bumping.” It is easier than traditional lock picking, which requires manipulating the pins inside the lock with small tools.

All that is needed for bumping is a “bump key” that is specially manipulated to pick the lock without other tools.

The National Crime Prevention Council wants homeowners to be aware of the prevalence of bumping, especially because there are many “how-to” videos online demonstrating how easy bumping is.

This is a huge problem because usually there are no signs of a break-in when bumping is done.

This means insurance companies may not cover it because “you probably left your door open.” Installing high-quality locks is a good defense against home burglaries, according to the National Crime Prevention Council.

“Not all locks can be bumped; consumers just need to know the differences,” said Clyde Roberson, director of technical services at Medeco Security Locks. “Consumers should consider using quality high-security locks for their home or business in order to have adequate protection from bumping and other forms of lock attack.”

The National Crime Prevention Council also recommends consulting a professional locksmith or security provider for advice on which locks protect against this and other forms of lock bypass.

Reduce Your Risk

  • Use high-security locks to mitigate the risk of bumping.
  • Consult a professional locksmith for questions about your current system or recommendations on a new locking system.
  • Use patent-protected keys to protect against unauthorized duplication.
  • Be sure to lock your doors when you are away from the home.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3