vpnewlong

 

Since 1988, FJC Security Services has been honored to work for a broad range of industries. FJC Viewpoints was created to showcase that expertise and experience.

Cyber Security: Preventing the bad guys from ruining your good name

“We’ve been hacked.” For 27 percent of Americans and all of the major companies in the US, a compromised computer system is a stark reality. “It’s hard to say whether there has really been an increase in the number of data breaches, or we’ve just gotten better at detecting and reporting incidents,” said Eva Velasquez, Identity Theft Resource Center President..

Read More

5 Key Security Issues You Must Address to Combat an Active-Shooting Incident

No one wants to deal with the prospect of an active shooter in their facility or even their vicinity. But preparation and planning are key to preventing loss of life, and security personnel are well-positioned to coordinate these efforts for their employer. To get the ball rolling on developing a comprehensive plan to combat the threat of an active shooter, security..

Read More

6 Steps to Enhancing Security within Facilities that Serve Vulnerable Populations

Providing adequate security is important for any facility, but it’s particularly important for facilities that serve sensitive and/or vulnerable populations, such as children, people with disabilities, people with mental health challenges, and people with sobriety issues. These demographics tend to be least able to protect themselves, and more likely to find themselves in situations where they become a risk to..

Read More

Why every business can benefit from an on-site security assessment

Every business understands that it needs to physically secure its premises to protect all assets, customers and employees. To achieve this protection, businesses routinely spend thousands of dollars on closed-circuit cameras, sophisticated alarm systems, gates and fencing, fire detection devices, IT security software, and access control systems such as electronic keys. They also hire in-house security personnel or contract with..

Read More

Five things to understand about how security guard training works

Becoming a security guard is a rewarding profession with opportunities for growth and advancement, but it’s not an easy profession to break into. Aspiring security officers must first navigate a complex set of licensing requirements that vary by state. Some of these requirements must be completed before an individual can even begin working as a security guard. Furthermore, the marketplace..

Read More

Changing Your Security Force From Proprietary to Contract

How does an organization balance the pluses and minuses of both proprietary and contract guarding services? Contracting affords security expertise, administrative, overtime, uniform and training savings, call-out coverage solutions, personnel qualification standardization and program management. Alternatively, proprietary security programs offer program loyalty, higher wages and management workforce control. Also, an organization which is sensitive to its brand image may feel..

Read More

Honoring the Protectors

by Matthew W. Horace

Being immersed in the security industry each day, it sometimes takes another colleague to remind us that it is easy to forget to honor those who protect us all: the “Protectors of the Protectors”. We don’t always consider the individuals, the men and women who actually provide the day-­‐in-­‐day-­‐out security services that make a difference in how we feel about..

Read More

The Essential Requirement for Providing Aviation Security

The Essential Requirement for Providing Aviation Security The Russian Metrojet Flight 9268 crash on October 31 represents the latest in a string of unfortunate tragedies of the global aviation security network. The 224 people aboard the plane, which crashed shortly after taking off from an Egyptian airport, were likely the victims of a terrorist attack – precisely the type of..

Read More

How to incorporate technology effectively into your business’s security systems

Robberies, burglaries, vandalism, and theft by employees are unfortunately inherent risks of running a business. Businesses traditionally have relied on primarily low-tech solutions, such as gates, fences, and warning signs, to protect their assets, customers, and employees. These solutions are relatively low-cost and can serve as effective deterrents to crime. But advances in technology have given businesses a number of..

Read More

5 emerging network vulnerabilities that cyberattackers are exploiting

For decades, businesses have been dealing with the threat of computer viruses, hackers who remotely penetrate their systems, and thieves who make off with entire drives and laptops filled with proprietary data. Businesses for the most part have recognized these threats and taken precautions to remedy the most serious vulnerabilities. But cyberattackers are smart and highly adaptable – they’re always..

Read More