Bullet Proof Vests – How Can They Protect Lives?

These high fiber vests are used by the police, military and for general public use. Note that Bullet Proof Vests or Ballistic Vests mean the same!

Ballistic vests have special in-built fibers that help provide safety, security and protect lives from bullets, shrapnel, and metal fragments amongst others. The core materials being used include (Kevlar, para aramid fiber) and there are different types of bullet proof vests which also include NIJ Level IIIA concealable undercover, canine, executive, flotation vests, etc.

NIJ Level III Ceramic and Polyethylene plates have much better in-built composition and have been accepted and seen to offer additional protection for the police force, military and other public users. These are often easy to wear and hide, and thus are commonly worn by journalists when carrying out undercover operations or working in riot environments. Ballistic vests with plates should be worn when around conflict regions and where there is need for serious covert operations.

There are certain specifications for bulletproof vests and these are shown by a system of numbers with NIJ. Such fundamental specs include:

  • Covert body bullet proof vest – These are also soft vests and fall within NIJ level Type IIIA
  • The Conflict bulletproof vest type – These are also soft vests with plates for body armor and fall within NIJ level Type IIIA
  • Where there is anticipation that serious armor piercing bullets will be utilized during an attack, the wearer should opt for NIJ level IV plates for full protection.

The following are questions you must ask & answer before choosing bulletproof vests or ballistic vests and their levels. These are very indispensable should you need to wear a ballistic vest:

  • What kind and style of weapons will I likely come across out there?
  • What is the kind, style and rapidity of the ammunition that will be used?
  • What standard is the ballistic vest verified and then how & who tested it? Is it dependable?
  • Is the bulletproof vest manufacturer/supplier recognized or approved by a professional body?
  • How heavy is the bullet proof vest and how well will it fit enough to wear in humid or hot countries for long periods of time?
  • How should the ballistic vest be cared for and properly managed? And then what happens if such vest gets wet?
  • How is bullet proof vest being measured to fit? Is it something with one size that fits all? If you are woman, do you require female shape vest plates?
  • And then when will it really require replacing?

What are ballistic vests made out of and how does it work?

Contemporary bullet proof vests are largely made out of dozens of layers of firmly woven material, mainly Kevlar. It is these layers that are sealed together into a durable vest-shaped sheet to help protect someone who wears them in case of a gunshot attack. Vests that permit for metal plates often provide extra protection! When a bullet or any form of shrapnel piece hits the ballistic vest, the impact produced disperses through the several layers of fibers within the vest.

Core Advantages of wearing bullet proof vests, ballistic vests:

  • They are great for delivering maximum safety, security and protection
  • Helps shield wearers’ lives from bullets, shrapnel, and metal fragments amongst others
  • Flexible and great tool for undercover operations or when working in riot environments

This clearly demonstrates how effective a bullet proof vest or ballistic vest could be in saving lives against bullets and shrapnel.

Hide Valuables Cleverly

Who isn’t worried about the valuables in their home? After all, it is a tricky job to keep them safe and out of reach of any thief or wrongdoer (because if we are smart, then thieves are no less). Regardless of the fact how hard one tries, there is always a risk involved with our collected fortune. If we go by the studies, most burglars states that after cash, valuables top their list and they are on a constant look out for these prized possessions viz. jewelry, diamonds, watches, and alike.

Thus, it is pertinent that we do some brainstorming and hide our precious things in places that housebreakers can’t even think of. Don’t leave things to chance and be very careful about where you place your wealth. Outsmart the crooks when it comes to securing and hiding your treasure trove!

This post will guide you through the best and worst places to hide your stuff. Take a look;

Worst places to keep your valuables

The ‘worst places’ here refers to the ‘most-common’ or ‘obvious’ points that would be searched by any thief in the first place. When an intruder breaks-in, he kicks off his mission by hunting at these places only:

Under the mattress

You think that you are sleeping on them, thus, burglars can’t reach them. Well the bad news is – thieves mostly break-in when you are away! Plus, this commonplace is well known to both, experienced and inexperienced robbers. This means that cash under your mattress is at high risk. So, beware of putting in anything there!

Drawers and cabinets

Another common mistake that most people commit is to put their high-priced items in a drawer and lock it! Well, the safe-crackers are smart enough to carry screwdrivers, hammers, and other devices to break down any number of locks that may be there. In such cases, you stand at double loss – valuables gone & drawers broken.

Toilet tanks

This was a clever place to hide valuables until the movies made it not-so-clever! The cracksmen might have taken the idea from the same movie from where you have learned the trick. So, what worked in the movie Godfather might turn out to be a bad idea for you! So, toilet tanks are a big No!

Best Places to store your Treasure

The places where the likelihood that a thief would search is very less, those places are considered as the best places for storage:

Lockers

The large and heavy safe-deposit boxes that can’t be moved easily are one of the best ways to protect the expensive things. Just ensure that these strong boxes are able to resist the tools that are generally carried by the thieves. A weighty case is not easy to move and the sturdy lock will elevate the security of goods to a whole new level. Thus, if you use them, the poor trespasser would be left with no other option than to go back home empty-handed!

Kitchen Containers

Keeping your fortune hidden in things of daily use (such as boxes in the kitchen) is perhaps a good idea. Usually, an intruder wouldn’t have that much of time to check each and every drum in the kitchen. Keep the vessel filled with valuable things among other containers having items of daily use such as sugar or rice.

Hollowed-out books

The criminals and would-be burglars entering your premises might not be that educated. Hence, the probability that they are not fond of books, and would stay away from bookshelves is pretty high. So, you got the right place where you can hide your diamond ring or important files. However, be sure to stock up your library with enough books so that it serves as a superb hide-away-place.

In addition to hiding the stuff cleverly in not so obvious places, it would be a good idea to take some security measures that will help in better protection of your dwelling and the valuables. You may also consider some foolproof options such as keeping most of your valuables in a bank locker and installing security systems at your place. It is a well-known fact that banks are the safest place to keep even the most expensive things and surveillance cameras are, of course, the great guardians!

How You Stand To Benefit From Parcel Lockers As A Retailer

Modern living can be very hectic with consumers having very little time to spare to go to retail stores to get the goods that they need. It is not a wonder therefore that online shopping has become very popular among consumers because it eases the process for them. With a click of a button, you can add as many items as you want in your cart and make the purchase and even have the items delivered to a most convenient place for you.

The introduction of parcel lockers has made the process even simpler for both consumers and retailers. They make it easy to deliver and collect parcels thus greatly improving the delivery fulfillment process. More and more retailers are opting for the postal kiosks to smoothen purchasing journey of their customers giving them a more pleasant experience. The good thing about the smart lockers is that they can be placed in different locations near customers so the parcel collections are made easy. They can be situated near schools, business centers and even neighborhoods so the delivery and collection of parcels is made convenient for you the retailer and your customers. Aside from this, as a retailer, you can also:

· Enjoy brand strength and customer loyalty because of the flexibility that comes with self-collection and customers’ convenience.

· Offer fuss free deliveries and returns because the lockers are easy to use by the customers. Online purchases do not always go as expected and when this happens, customers can easily return the items to you using a stress free process using the smart lockers.

· Offer your customer security and discretion with their packages because they use the personal access code sent to them during the product purchase process. Smart lockers are digitized to improve security and privacy of the customers and this will be an added advantage to you as a business.

· Increase in-store traffic by getting your online shoppers to pick their packages at the store, but you can also make it more convenient for them by placing the lockers where it is most convenient for them.

· Reduce your time and labor because when you have the lockers in place you will need fewer resources to manage and distribute the parcels. It is much easier and affordable to have segmented collection points compared to making door to door deliveries.

· Use the parcel locker to popularize your brand because you can have it branded. Such locker branding exposes you to other potential customers in the localities you are extending your parcel services to and you stand to greatly benefit from the convenience you have to offer them.

When getting a parcel locker for your customers, you should select a smart locker that offers enhanced security, but at the same time is easy to use by the consumers. The good news is that most lockers are easy to use and manage hence both you and your customers will enjoy a pleasant experience with the delivery and picking of purchased items.

Employee Cyber Security Training Tips

You can tell your employees not to use their cell phones at work, but they are likely using them when you are not looking anyhow. You can instruct them that they should not download anything from an entrusted third party, and yet they are going to see a name they recognize and just go ahead and click anyhow. So what do you do?

Many companies will add a cybersecurity policy into their employee handbook and never speak of it again. That is a huge mistake! Not only should you hold a thorough training on this subject with your employees, but also you should have them attend this training at least twice a year!

Data security training needs to shock the employee enough to realize that human error is one of the leading causes of data breaches. Throw facts and statistics at them. Let them know they play a huge role in the safety of the company and how a large portion of data breaches are completely preventable and have stemmed from user error.

Verizon’s annual Data Breach Investigations Report of 2015 showed that 30% of staff-related e-mail breaches were due to sensitive information being sent to incorrect recipients.

While many prevention tips may seem like common sense to us by now, we tend to get lazy and take shortcuts. Find a way to get your employees to break their bad habits!

  • Educate employees on the types of cyber threats out there so they know the warning signs and how each threat attacks.
  • Never share passwords (even internally) and do not buy one of those internet password notebooks to write in and manage your login information!
  • Never plug in a USB without knowing its origin and expected contents.
  • Lock your computer when you step away from your desk for even a moment.
  • Be cautious what is in view on the monitor before screen sharing in webinars or when anyone else is around.
  • Never share emails that are not related to the work that you are doing as they may contain malicious attachments.
  • Training needs to include the warning signs of a breached system. Why? Once a system is breached, it is critical to remove the threat rapidly to prevent data loss or a follow-up virus or worm.

The crucial take away points are to implement cyber training with ALL employees (C-suite included) right away, and to repeat the training at least twice a year; refreshing the agenda with new cyber threats, statistics and details which have come to light since the previous training.

Why Your Business Needs Commercial Security Cameras

There are many components that can be involved in a proper security system. The perimeter around the premises should be under video surveillance, as should areas such as cellars, back and side entrances, cash register areas, vaults, and more. Some installation companies also offer motion detectors and intercom systems to facilitate inter-company communication for checking in and in case of emergency. The best companies will offer certified teams (where all employees have undergone stringent background checks) that can install everything and provide maintenance. Do some research to find the most secure and cost-effective set-up for your business, and consider the following ways a surveillance system will help protect your staff, clients, and property.

A Good Defense Is the Best Offense

The fact that they can see commercial security cameras on the spot will immediately deter potential robbers from zoning in on your establishment as a target. Criminals scoping out businesses to rob will always prefer those that do not have obvious surveillance equipment because there is much less of a chance that they will be caught and subsequently prosecuted. Film footage often provides unquestionable testimony as to who has committed the crime.

Defense After the Fact

In the unfortunate circumstance that a business is burglarized or otherwise falls victim to criminal activity, commercial security cameras will help law enforcement apprehend those responsible. When that happens, the business can receive compensation for damages and losses. Anyone injured or killed (and/or their families) is more likely to receive the justice and peace of mind they deserve. Even if the faces in the video are not clear, footage provides invaluable information, such as when the incident happened, the weaponry involved, the physical profiles of the robbers, and more. This evidence also helps prevent innocent people from being wrongly prosecuted.

Professional Appearance

In today’s world, camera equipment is becoming more and more expected for legitimate companies. Clients associate this equipment with professionalism, not just safety, and they have increased confidence in all aspects of the business and its services and products when cameras are visible. They will know they’re in competent hands and that their well-being is prioritized.

Employee Safety

It’s hard enough to make a living; people shouldn’t have to worry about their personal safety while at work. Commercial security cameras keep minds at ease and help employers foster a comfortable working environment.

Employee Integrity

Although everyone hopes that the people they hire are committed to keeping the business’s best interests at heart, sometimes bad eggs slip through the cracks (especially in large companies). Knowing that there are commercial security cameras on the premises makes any employee considering an inside crime think twice. Depending on the particulars of the establishment in question, having such a system can also cut down on slacking off.

A Good Investment

Although the price of good equipment can seem daunting, many sellers are cost-effective, and a little research will yield reasonable results. Besides, it’s an investment that pays off; one burglary can devastate a business. What’s more, many insurance companies offer deals to places with security systems.

Hazardous Energy & Its Harmful Effects

‘Hazardous energy’ may be defined by the appropriate agencies of a country, but more or less, any electrical, mechanical, gravitational, thermal, chemical, hydraulic, pneumatic, nuclear or any other energy source in terms of machinery or equipment that can harm people is hazardous energy. One needs to be cautious, and due processes put in place, to ensure safety of workers during maintenance/ servicing of equipment. This is because of the unexpected release of stored energy. While death may be the result in the most serious cases, injuries include damage by electrocution, amputation, fractures, laceration, crushing of body parts and burns. Hopefully, you now have an idea how ‘hazardous’ this hazardous energy is.

As previously stated, those involved in the maintenance or servicing of machines may be seriously injured, or even killed in case this energy isn’t controlled using LOTO (Lockout Tagout) or any other methods.

Sources of hazardous energy need to be carefully identified. While some, like electricity/ power supplied to a piece of machinery, or the danger of an object falling, are obvious, others, such as air pressure in a system are hidden.

Let us discuss some of these types of energy mentioned earlier, in greater detail. One of the most common forms, electrical energy is not just live via power lines, it is also stored in batteries and capacitors.

Mechanical energy can best be described as the energy in a spring that’s compressed. The energy would release when the spring is released. Similarly, the release of mechanical energy can cause a worker to get struck by an object. Simply speaking, gravitational energy, or rather gravitational potential energy means the potential of an object suspended high above the ground to inflict harm by falling over you. The heavier an object is, and the greater the height it’s suspended it, the more gravitational potential energy there is. Chemical energy results in a fire, or explosion. It’s a result of a chemical reaction.

Note that all these mentioned types of energy may be primary, or residual. Primary energy sources are the direct sources of power, while residual sources refer to energy that is stored. Never take stored energy lightly, failure to dissipate it is one of the most common causes of accidents. In order to control hazardous energy, a machine or equipment, i.e. a system must be isolated from both primary as well as residual energy sources.

Hopefully, with my this article, everyone now understands what hazardous energy is, in what forms does it exist, and its dangers.

What Qualities Do You Need to Have to Be a Good Security Guard?

A Security Guard is hired to protect people or keep property secure and are there as a preventative measure. Having good security gives you total peace of mind but a lot of people do not think about it until it is too late. There are many security guards out there, but what qualities should you look out for when hiring one to ensure you feel safe?

Proper Training and Education – It is essential before hiring a Security Guard to know they have knowledge of industry standards and an understanding of Security Operations. They need to be prepared on how to handle any situation that may arise whilst they are on duty, how to prevent disasters from occurring and the correct safety procedures that need to be taken in an emergency. They should hold the required Certification and Licence and this must be kept up to date.

Physical Fitness – There are many potential scenarios that Security Guards could be faced with whilst on duty, and to be a great at your job then you must be prepared for any one of them. To be able to protect a person from harm then you need to be able to defend yourself and your client. If an intruder attempts to break in to the premises you are watching, then you might need to give chase and apprehend the culprit. You might be required to walk around the premises on alert for possible threat, and at times just the sight of a Security Guard can act as a deterrent. A Security Guard must keep themselves fit so they can are ready for anything.

Honesty and Integrity – Many times a Security Guard will be required to work alone, therefore the Client must feel they can trust them to do the job they were hired to do and not breach security or take advantage of confidential information. Background checks are standard procedure before a Security Guard is employed to ensure there is no previous criminal history. The nature of the job also has an increased risk of confrontation, so you need to be able to trust that the person in charge knows how to assess a situation and act appropriately without excess force.

Alertness – A good Security Guard needs to be alert and aware of events going on around them. They need to be able to stay focussed and avoid distractions at all time to ensure they are prepared to deal with any situation that may arise or prevent one from getting worse. If something important gets overlooked, then lives could be put at risk or criminal activity could be missed. At times they may need to report information to law enforcement so they need to be able to give as much detail as possible.

Common Sense – Security Guards have to be able assess a situation with deductive reasoning and logic before deciding an appropriate course of action. They will need to think quick to determine if there is a legitimate threat and figure out if there a way to avoid it by being able to think a few steps ahead to try and predict how a situation will play out. This is especially important in cases of an emergency where it could mean the difference between life and death.

Temperament – It is important for Security Guards not to overreact so they are able to prevent tense situations from becoming worse. Many times confrontations can be prevented from escalating with the correct course of action. At times Security Guards are working in places where people are consuming alcohol which has an added risk of potentially explosive incidents occurring. In these instances, if they aren’t handled calmly and rationally and preventative measures aren’t taken in a timely manner then things could easily get out of control fast.

Communication Skills – Without good communication skills, Security Guards run the risk of misunderstanding important instructions that are given to them by their Client or employee. This may lead to confusion where wrong decisions get made. At times Security Guards work in a team so they need to be able to effectively communicate to their co-workers to ensure correct information is being passed on. In instances where they are dealing with law enforcement, they may need to accurately convey and document incidents that have occurred.

5 Reasons Your Business Should Have an Information Protection Policy

Information is the lifeblood of all businesses, but many business owners and high level managers often overlook the security of their business information to focus on what they consider more important; “the generation of revenue.” Many even know the risk well in advance but take on the mentality, “It will never happen to us.” Then the inevitable happens.

Experience has proven that the disregard for the protection of business information is disastrous. The smallest vulnerability in a business’s Information Security System (ISS) can and does cause businesses thousands, even millions of dollars in financial loss everyday. Experts have found that in the majority of the cases involving “loss” from the theft of information that the business owner(s) or managers were aware that potential breaches existed and did nothing to correct the issue. Experts also point out that in 99% of the cases that the cost to fix the breach would have been thousands to millions of dollars cheaper then the loss the business sustained from the breach itself.

According to “Trends in Proprietary Loss” (ASIS International, 2007) these are the top 5 reasons businesses of all sizes should have an active and progressive Information Security System (ISS) and Information Security Management System (ISMS) in place.

  • Loss of reputation/image/goodwill – Taking a hit in the pocket could be bad but not as half as bad as taking a hit to your reputation. Many business can rebound from loss of revenue but repairing your business reputation can cost astronomical time, effort and money. The implications are overwhelming in most cases.
  • Loss of competitive advantage in one product/service – When you have been working feverishly to stay ahead of the game but your competitor beats you to the finish line every time, “There’s a hole in your boat.” The leaking of trade secrets, product delivery timelines and other business processes can completely derail a business and destroy its competitive advantage.” In 2006 there was a well known case of information theft concerning an employee from a major beverage. That employee stole trade information and conspired to sell it to another beverage company for 1.5 million dollars.The employee was arrested after the competitor turned her in.
  • Reduced of projected/anticipated returns or profitability – This can occur when your competitor knows your pricing strategy. If they’re selling the same type of product or service as your business they can, and will easily outprice you.
  • Loss of core business technology or process – A quick Google search will give you some insight on how businesses lose billions in the process when technology is leaked or stolen. The case of the drawn out and costly battle of the “Cell Phone Giants” comes to mind. Do a Google search about it. There are some really insightful facts that you may not have known about the case.
  • Loss of competitive advantage in multiple products/services

All of the above are sound reasons while your business should have an active information security policy. I am of the opinion that any business that regularly loses money and fails to implement processes to stop it,will soon be out of business. Therefore, I encourage all business managers, executives and owners to take the protection of their information seriously. Make time to review your current information security processes and policy with your security manager. Listen to his/her concerns and recommendations. After all that is what you hired him/her for. Concentrate on making your security a “Necessary good” instead of a “Necessary evil” and dedicate a reasonable but flexible budget to immediately address new or unexpected security threats. It could truly save you a life of headaches, court battles and money in the end.

Below are a few recommendations that I believe will help any business to begin improving their information security process. It will also help to improve overall security in general.

Recommendations

  • Ensure that sensitive information is only accessible to a small group of people based on a need to know basis. This information is to be kept in a secure area with progressive and redundant security measures.
  • The first level of security can be posted signage that designates the level of authorization required to be in specific areas. These signs should also advise the consequences for ignoring them.
  • The second level of security may include CCTV cameras which are manned or unmanned (but have the ability to be reviewed later). Cameras serve as a good method to detect, deter and in some cases respond to nefarious behavior.
  • The third level of security mandates designated key cards or key fobs to enter restricted areas. This authorization can also be indicated by color coded ID badges. A security checkpoint guarded by trained security officers is also an option.
  • The fourth level of security concerns areas where the most sensitive information is held. This area should include CCTV cameras, locked file cabinets and safes. This should be supported by a well written Information Protection Policy created in partnership with an experienced security professional and it should be strictly adhered to.
  • Lastly, a schedule for audit and compliance should be instituted and a designated person appointed the responsibility for its oversight. This recommendation has more to do with Information Security Management, which I will discuss in a later topic.

General Information Security Practices

The preceding concerned security strategies for highly sensitive information however, we must not overlook the need for the security of general business information. Information comes in many forms and businesses must protect them all. Here are a few more tips that I recommend to improve your current Information Security Policy:

  • Ensure that all documents that contain personal, personnel and company information are always kept secure. This information should never be left lying around on someone’s desk or in their inbox. Always keep this type of information under lock and key and designate a person to ensure strict accountability.
  • Ensure that you have a information security policy in place and share it with your entire staff. This policy should include how to file or discard company information.
  • Ensure that your company has a shredder and include shredding regulations (what should be shredded, when and by whom) into your policy.
  • Always ensure that someone in your organization stays abreast of current cyber threats. This person is normally the head of the IT department or your security manager. He/she should also ensure that your anti-virus and firewall systems are regularly updated and tested. If your company does not have a dedicated IT department of manager it wouldn’t hurt to consult with an IT Security firm to get a check-up.
  • Ensure that your Information Protection policy includes regulations pertaining to thumb drives and portable hard drives. The policy should clearly state what information can be saved or uploaded from and to the devices. Also consult with your IT department to disable the USB ports on your computers and networks if necessary.
  • Finally, every business should have a Non-Disclosure Agreement. NDAs set the expectations for your employees as it pertains to the privacy of your business affairs, processes and materials. It also provides the recourse for violating the policy. Sample NDAs can be found on the web, but I recommend consulting with your attorney to ensure that your NDA provides you and your business optimum protection.

That about sums it up. I believe that by implementing these strategies that every business can improve the protection of their information and reduce the chances of suffering financial loss. In many cases you may even increase your profitability, which is why we are all in business anyway. I hope that you found this information valuable. Never underestimate what a solid Information Security Program can do for you.

Thanks for reading and I hope that these quick security tips help to kick start or rekindle your Information Security Program.

Author: Melvin E. Key, CPP