 
                    
                                        
		            
                    Cybersecurity was found to be the top technology used by healthcare facilities.
                    
			            - By Sydny  Shepard
- Mar 06, 2018
 
            
                
	                 
                    
                                        
		            
                    One of the ten attacks can create "artificial choas" by sending a fake emergency alert to cell phone users.
                    
			            - By Sydny  Shepard
- Mar 06, 2018
 
            
                
	                 
                    
                                        
		            
                    A survey found that website users creating passwords were more likely to opt for a stronger password if they knew how weak their choices were.
                    
			            - By Sydny  Shepard
- Mar 05, 2018
 
            
                
	                 
                    
                                        
		            
                    The suspected shooter is still at large, and is considered to be armed and dangerous. 
                    
			            - By Jessica  Davis
- Mar 02, 2018
 
            
                
	                
                    
                                        
		            
                    The growth of technology is everywhere. What’s next for the security industry? I think the next innovation poised to transform the security industry will be deep learning or artificial intelligence (AI), which is a system that learns by looking at masses of data. 
                    
			            - By Ralph  C. Jensen
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Most of us are using biometric technology in some way, shape or form whether that is at work or in our personal lives. If you are not yet using it, you will be soon. 
                    
			            - By Mark   Clifton
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    When we use the term “wireless” to look at access control technologies—or, truly, any security system—the reality is that we often use it as a catch-all term for the many technologies on the market that work in some way to wirelessly communicate with one another. 
                    
			            - By Peter  Boriskin
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    The safety and security of visitors and staff and the protection of the Musical Instrument Museum's extensive collection is an essential aspect of fulfilling its mission. With an active facility during both day and evening hours, the museum sought to upgrade its outdoor security surveillance system to improve the quality of the images around the clock.
                    
			            - By Sydny  Shepard
- Mar 01, 2018
 
            
    
                
	                
                    
                                        
		            
                    The challenge of accurately tracking who has worked, and for how long, has exasperated employers for centuries. It is easy to see why—payroll is the single largest cost for most businesses. 
                    
			            - By Mohammed  Murad
- Mar 01, 2018
 
            
                
	                 
                    
                                        
		            
                    Perimeter protection has been part of the human psyche since the dawn of mankind. Over the millennia we’ve evolved from crude barriers of sticks and rocks to fortified walls of concrete and stone to electrified fences and high-resolution surveillance cameras.
                    
			            - By Joe  Morgan
- Mar 01, 2018