Tuesday, January 26, 2016

Apartment Keys Stolen By Resident

Thief entering apartment.The purpose of securing things behind lock and key is to ensure that only authorized users can access them. But what happens when those keys are stolen?

Over the course of a year, an apartment complex resident managed to obtain and duplicate 150 keys and then return the originals where he found them. Using the duplicates, the man entered tenants’ apartments when he knew they weren't there to steal and then sell their valuable items. Though the thief was eventually caught, the apartment complex is now liable to replace 150 locks, which can be extremely costly.

Keep your keys secure with an electronic key control system that protects your complex’s keys in a steel cabinet or drawer. By automating the key tracking process, you can enforce authorization methods such as scanning a fingerprint and/or entering a password. When a key is checked out, a transaction is logged and recorded in reports so you can track exactly who checks out keys and when.

By securing all keys in an electronic key control system, you can prevent them from getting into the wrong hands, and also increase your tenants’ safety and peace of mind.

For more information read “The Everyday Advantages of Apartment Key Control.”

Thursday, January 21, 2016

Why Reports Are Important to Key Security

KeyTrak reports
Managers can’t always stay in their offices to monitor key transactions. Electronic key control systems offer features that allow administrators to set up remote web access to view specialized system reports and perform administrative functions. To aid the report process, administrators can also be set up to receive email and text alerts while they are away from their systems.

With web access, system administrators can view detailed reporting. Some of these include work order status and key transaction history. The email and text alert option notifies administrators of system misuse, when an unauthorized key is taken, if a key is returned by a user other than the one who checked it out, or if keys are not returned within their assigned time frame.

With remote access to automated reports, you can regularly keep up with your key activity. It is important to take advantage of the reports that are generated from the key control systems because they provide a 100 percent automatic verifiable audit trail. Knowing what your employees are doing will give you the opportunity to prevent a security breach as well as provide peace of mind.

Once you have a key control system, it is crucial to take the steps to audit these reports to make sure your employees are accountable. If you would like to read more about what types of reports to look into, read “The Top Four Key Control Reports You Should Be Running.”