Posts in Security & Surveillance

Guidelines for Setting Camera Field of View

August 8th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Guidelines for Setting Camera Field of View”

“While it may seem simple, setting up a security camera’s field of view is critical to its overall effectiveness in protecting your business or home.”

– Glenn Baruck, DigiTek Security


Security cameras are a useful tool in protecting your business or home; however, setting them up correctly significantly affects their usefulness. One important aspect of setting up a security camera is its field of view. Getting the proper field of view for your specific application takes a bit of skill and some patience as well. Forget about the rules you follow when taking a photo or recording video for entertainment purposes and remember what you need these cameras to “see.”

This article by ERIC OLSON for Security Infowatch provides you with some critical guidelines that will help ensure that you get your cameras set up correctly to see the whole picture.

Learn More about DigiTek Security.

How To Avoid The Most Common School Security Design Mistakes

August 8th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “How To Avoid The Most Common School Security Design Mistakes”

“If you are responsible for or concerned with physical security in your school or facility, this article, and related webinars could help you avoid critical mistakes.”

– Glenn Baruck, DigiTek Security


Having good security equipment is only part of the equation, as pointed out in this article by Ray Bernard for SECURITYINFOWATCH. Shortcutting proper security design in the rush to “do something” can have devastating consequences for educational and other types of facilities. According to Bernard, there is a typical security design mistake that occurs in many types of facilities, but the impact of it can be significantly higher on schools, whose incident response requirements are greater than many other organizations.

Check out this valuable article and the links to related webinars to learn more about the most common security mistakes. While much of what is covered is common knowledge among trained and experienced security design consultants, security practitioners and others responsible for facility physical security risk management it may be helpful to you when implementing a new system or updating your current one.

Learn More about DigiTek Security.

The Rise Of Insider Threats: Key Trends To Watch

July 16th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The Rise Of Insider Threats: Key Trends To Watch”

“Internal cyber attacks are on the rise and must be taken seriously. How do organizations prevent them? Get the latest insights here from TechBeacon.”

– Glenn Baruck, eDot


When it comes to security threats, companies have to prepare for a variety of issues. Insider cybersecurity threats have always been a concern but are becoming more prevalent as systems continue to be more interconnected. In a recent study conducted by Cybersecurity, Insiders showed that 53% of the organizations experienced an insider attack themselves. As these numbers continue to grow, 64% of organizations surveyed said they are now putting their focus on detecting insider threats and preventing attacks from happening. Also, 86% already have or are working on creating a program to prevent insider attacks.

There are many new developments in this fast-paced area, and keeping up with the latest best practices can be a challenge. This recent article by Yuri Martsinovsky for TechBeacon gives a good overview of what is happening and touches on some of the latest preventative measures companies are employing.

Read more

Learn more about eDot.

When Your Apps Are Dormant, You Become A More Likely Target For Crooks

June 20th, 2019 Posted by Security & Surveillance, Technology 0 thoughts on “When Your Apps Are Dormant, You Become A More Likely Target For Crooks”

“Don’t forget about those dormant apps on your devices! They are a gateway to thieves looking to steal your information and more.”

– Glenn Baruck, Chicago Voice & Data


You know those banking and e-commerce apps you haven’t opened in months? It might be a good time to check-in with them and make sure no one else is using them either. According to forthcoming research from DataVisor, a California-based startup specializing in fraud detection, sixty-five percent of accounts that experience an account takeover attack – when an outsider logs in with a victim’s own username and password – have not been accessed by their true owner in more than 90 days.

Don’t be fooled by the 90 statistics; data also showed that while 65 percent of the affected accounts hadn’t been accessed in 90 days, 80 percent belonged to users who hadn’t logged in to their page in more than 30 days.

These fraudsters are very sophisticated and target dormant social media account information as well. Check out the 411 in this article by Jeff Stone for cyberscoop.

Learn More about Chicago Voice & Data.

Meeting Compliance Regulations For Controlled Access With Security Entrances

May 24th, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs) 0 thoughts on “Meeting Compliance Regulations For Controlled Access With Security Entrances”

“Physical security and meeting compliance regulations begins with a solid plan for controlled access with security entrances.”

– Glenn Baruck, DigiTek Security


Whether it’s HIPPA laws for medical records or FSMA regulations that apply to our national food supply, many regulatory compliance laws include guidelines or recommendations for physical security to limit access to sensitive areas. To comply, organizations must take the necessary steps to reduce the risk of intrusion, and, they must prove that they have taken reasonable actions. That’s where security entrances can play a lead role; preventing unauthorized intrusions and helping organizations meet these regulatory requirements. If you are challenged with meeting any of these regulations, this article by Pierre Bourgeix for Security Magazine is a great place to learn about the best way to structure your security entrances.

Learn More about DigiTek Security.

Campus Security End Users Security Camera Systems Survey Results: 2019

May 23rd, 2019 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs) 0 thoughts on “Campus Security End Users Security Camera Systems Survey Results: 2019”

“From fights and thefts to foiling an infant abduction, it looks like surveillance cameras have found a useful home helping to improve safety in schools, universities, and healthcare facilities.”

– Glenn Baruck, DigiTek Security


Do you want to learn a lot about video surveillance cameras and their effectiveness in schools, universities, and healthcare facilities? If the answer is yes, then you’re in the right place! Check out this recent article by Rodney Bosh for Security Sales & Integration, that provides an excellent summary of their SSI sister publication Campus Safety’s 2019 Video Surveillance Survey. The material is chock-full of successes, challenges, and insights from the professionals who have these systems in use.

“Respondents were very forthcoming with praise for their security cameras, with many saying they used their video systems to investigate thefts and fights,” Campus Safety Editor-in-Chief Robin Hattersley-Gray writes.

Bonus alert…you can read the complete survey results from a link in the article itself!

Learn More about DigiTek Security.

Archives