Thursday, May 29, 2014

Asset Management: When You Have to Secure More Than Keys

actors portraying FBI agents
“The asset has been secured.” You may have heard an FBI agent drop this line in your favorite crime drama after they lock down a person or item important to national security.  

When a character in a hit series mentions an "asset," they could be referring to anything from a top-secret file to a lethal weapon. Depending on what industry you work in, this could be the case for your business as well. As a manager, you may need to secure not only keys but assets in a variety of forms. 

Let's look at a couple industries that use electronic key management systems to secure assets other than keys.

Law Enforcement Agencies 

Along with managing key access, police departments and correctional facilities are tasked with securing assets such as firearms, tasers and other highly sensitive weapons. If any of these items were to fall into the wrong hands, it could open the department up to major liability.

An electronic asset management system with individual tamper-proof lockers and features, such as a biometric fingerprint reader, to prevent unauthorized users from accessing assets, provides more security and accountability than a traditional storage area and allows law enforcement agencies to store larger items.

Military Facilities

soldier with radio
Similar to law enforcement agencies, in addition to securing keys and the areas they unlock, military facilities have highly sensitive weapons and information to keep secure. 

An electronic key and asset management system with lockers featuring all steel construction enables these types of facilities to safeguard larger items such as handheld radio equipment, transmitters and locators behind a passcode, fingerprint and/or proximity card.

High-security electronic key control systems with the flexibility to store items beyond just keys increase accountability, security and efficiency for a variety of businesses.

Find out more about the features of electronic key control systems here

Thursday, May 22, 2014

Majority of Phoenix Fire Department's Keys Go Missing: 9,000 Businesses at Risk

Fire truck Keys don’t always go missing because they were stolen by an employee or common thief. Sometimes, you and your staff just misplace them (which still creates a security breach).

Take the Phoenix Fire Department for example. It originally made 1,350 copies of master keys that open more than 9,000 business’s lock boxes throughout the city. The fire department uses these keys to enter buildings in the event of an after-hours emergency.

The bad news is, after 15 years, 63 percent of those keys have gone missing. No one stole them. They were simply misplaced. Personnel failed to return keys when they retired or quit, the department sold ladder trucks and engines with the keys still inside, etc. Long story short — the city is paying $50,000 to re-key all 9,000 of the lock boxes.

Remember, the security of your business is only as good as the controls you put in place to safeguard your keys. If you don’t properly secure keys, it’s not only dangerous for your staff and customers, but it’s costly to go back and fix these issues after the fact.

To prevent keys from slipping through the cracks, consider installing an electronic key control system. With an automatic key system:
  • Users must provide a form of authorization such as a password or fingerprint before they can remove a key, giving you a real-time, verifiable trail of key activity.
  • If a key isn't returned within a specific time frame, the system will send an alert directly to the administrator by text or email. You can see who last checked out a key and what time it was accessed.
  • The system houses the keys in a single location, so there is no more guessing where specific keys are located.
Overall, the system tracks who checks out a key and when, providing accountability where previously there was none. Read another true story of key management issues in a public safety department here.

Friday, May 9, 2014

What Are The Benefits of Electronic Key Control?

With the progression of technology, businesses have begun automating processes for various reasons, including improving efficiency to increase profits. Automated key control provides certain benefits that you just don't get using pegboards or lock boxes. However, there are still some companies that haven't jumped on the automation wave. If you happen to be one of the holdouts, here are four benefits to electronic key control that just may change your mind.

Increased Accountability

KeyTrak Fingerprint Scanner
Electronic key management eliminates the guesswork of who checked out a key, when they checked it out and if they returned it. With an electronic system, employees must enter a valid password, swipe a proximity card and/or scan their fingerprint to gain access to keys. The likelihood of human error is significantly reduced, as an audit trail is created when a key is removed, noting who removed the key, the date and time the key was taken and when or if the key was returned.



 More Time

Stop watchIt's a common misconception that electronic key control systems are complicated and take too long to operate. This assumption could not be more wrong. On average, an electronic system is about twice as fast (or faster) than a manual process. It would take anywhere from 30 seconds to five minutes to locate and remove a key from a pegboard or lockbox and manually update a log sheet. Conversely, it would only take 15 to 60 seconds to perform the same transaction with an electronic system.

Tighter Security

white lock on red background
Added security is by far the biggest benefit of electronic key management.When using a manual key control method, there's no way to automatically verify if an employee has the authorization to check out certain keys. An electronic system, on the other hand, can assign different access levels. With this added level of security, users can only obtain keys for which they have authorization. In addition to preventing employees from accessing keys outside of their access level, electronic key management systems can also notify you of missing or overdue keys by sending a text message or email.


 Reduced Liability

banging gavelIn addition to providing accountability, increasing security and saving time, an electronic key management system can also reduce liability. Employing a secure system decreases the likelihood of theft or more horrific crimes for which your business could held liable. Consider this:
  • An apartment complex was found liable in the death of a former tenant after the handyman used a master key to enter the tenant's apartment and murder her, resulting in a $10.8 million verdict.
  • The Phoenix Fire Department lost 850 master keys that access about 9,000 business throughout the city, resulting in $50,000 in rekeying costs.
In both cases, an electronic key control system would have not only tracked who checked out keys but also made sure that users were authorized for certain keys.

To see the benefits of electronic key management in action, check out our case studies.

Wednesday, May 7, 2014

Multifamily Key Control: The Way You Collect Data Is Key

Key control is important for all businesses — especially those in the multifamily industry.

The threat of an employee stealing and using tenant keys to commit burglary is real. An apartment complex in Boston realized this when it experienced a series of burglaries where there was no sign of forced entry, indicating someone had used keys to access the units. It's essential for you, as a property owner, to tightly secure keys and uphold staff accountability by recording key transactions.

The first decision you have to make is whether to collect this data actively or passively.

What's the Difference?

Active Data Collection

keys being handed to person in front of apartmentsActive data collection relies on users to manually record information such as key tag numbers, dates, times and reasons for checking out keys or to swipe a key tag through a reader after removing it from a lockbox.

This method of data collection is most often used with manual key control methods such as pegboards or with electronic key boxes that don't automatically record user transactions from the instant the key is taken to the moment it's returned.

Passive Data Collection

Passive data collection doesn't require users to remember to manually enter any transaction information. Instead, transaction information is collected automatically the instant a key is removed from the system so users don't have to manually write it down, enter it into a spreadsheet or scan a key tag.

Automated key control systems use passive data collection to record user information, date, time and reasons for checking out a key (e.g., during an apartment showing or maintenance call). Another perk of this type of data collection is that it provides a 100 percent verifiable audit trail of the information, so it enforces employee accountability.

Why Passive Data Collection Is More Secure

When it comes to security, the word "passive" has a negative connotation. In terms of recording key control data, however, passively collecting data is crucial for protecting yourself from liability risks.

Active Data Collection

In a perfect world, your staff would always take the time to accurately record when they check out or return keys. Unfortunately, human error is inevitable (even well-meaning, trustworthy employees make mistakes). In the event that one of your employees decides to use a key for a prohibited activity, active data collection leaves your key control protocol vulnerable to manipulation.

A key can be taken from a lockbox or pegboard, duplicated and returned within a matter of minutes. If a person removes a key without signing it out and subsequently returns it before anyone notices it's missing, the key security for the unit to which the key belongs has been compromised. Even if you use computerized lockboxes that require users to enter a PIN or swipe a card, keep in mind that transaction details won't be recorded unless the user scans the key tag or enters the key tag number into the system.

Without any recorded key transaction details, the security breach will likely go unreported until a resident or their property is harmed. Because the landlord is responsible for following key control best practices to protect residents, active data collection can create liability risks for the property owner.

Passive Data Collection 

Passive data collection virtually eliminates the risk of inaccurate records because users aren't required to manually input information or scan a key tag. By relying on passive data collection, you'll be able to easily keep a real-time verifiable audit trail of which users checked out or returned keys and the date, time and reason they did so. Data can't be forged or altered by users, so you'll automatically have tighter and more accurate key security than if you were using a manual process.

Passive data collection reduces the risk that keys will fall into the wrong hands. Electronic key systems that rely on passive data collection authenticates users by having them scan a fingerprint, enter a unique password, scan a key card or provide a combination of these authentication methods. Some systems also allow you to create access levels for authorized users. In the event that a user attempts to remove a key they're not authorized to use, the system can  instantly notify you by text or email.

We think the choice is pretty clear for property owners, because, most importantly, passive data collection enforces a necessity that active data collection doesn't: accountability. For more tips on how to secure your property, check out our whitepaper "Six Common Key Control Mistakes Property Owners Make."

Thursday, May 1, 2014

Key Control Shouldn't Be Like a Zoo

Over the years, several zoo key control mishaps have made headlines. During the late '90s, Nala the lioness escaped from a Florida zoo while handlers were cleaning her cage. Back in the '30s, almost 200 Rhesus monkeys took over Long Island after their enclosure was left open one night. In China, a zookeeper was arrested after he failed to lock the gate to the tiger area, resulting in the death of a visitor.

In situations like these, key control systems can provide vital intelligence about what goes on behind the scenes at your zoo. Below are three benefits to tracking zoo keys electronically.

Detailed Reports Provide an Inside Look at Your Key Activity

gorilla plotting his escape from a zooAutomated key management systems generate reports sorted by employee, time, date and key, which helps your zoo keep exhibit keys organized while also providing granular information about employees' activities.

Each key has a unique ID within the system, so you'll be able to see if employees are accessing enclosures when they shouldn't be, as in the case of a Cumbria zookeeper who was mauled after she entered a tiger enclosure without permission.

Access Levels Provide Employee Accountability

Though zookeepers are expected to know how to care for all animals, most zookeepers prefer to stick with one animal throughout their careers. For this reason, not all zookeepers need access to every key, but if all exhibit keys are kept in a single cabinet without varying levels of security, any employee can take any key. 

A key system that has a total lockdown feature can prevent keys from falling into the wrong zookeeper's hands. When provided with the appropriate password, fingerprint or security card, the system will unlock only the applicable keys. Access levels are especially helpful for senior-level zookeepers who manage a team of keepers that access different exhibits. If you require a fingerprint to access multiple keys, the system will only unlock keys for the designated employees.

You Have a Starting Point for Tracking Down Escaped Animals

In the event that a breakout occurs, an automated key control system can show you the exact moment a key is taken and who took it, so you can speak with the person who checked out the keys to get more details about what happened during that time.

For example, if Jim accesses the gorilla cage key at 2:55 p.m. and Susan notices at 3:15 p.m. that the gorilla has escaped through the unlocked cage door, she'll know to ask Jim if he noticed anything unusual when he was at the gorilla enclosure.

Once you start tracking keys electronically, you'll be able to identify weaknesses in key management processes to help you make sure your zoo doesn't end up in the headlines.