Wednesday, March 30, 2016

Keys Swiped From Local Correctional Facility

A thief with access to a local jail's keys is probably one of the worst scenarios imaginable. The Humboldt County Correctional Facility (HCCF) experienced that nightmare on March 16.

Jail cell with keysDuring a routine probation search of a residence, Humboldt County Deputy Sheriffs found keys that appeared to belong to the HCCF. Three suspects were questioned at the residence, and the Sheriffs' department confirmed the keys were stolen from the HCCF.

Although there were no reports of the keys being used to gain illegal access to the HCCF, the fact that someone was able to swipe them from the correctional facility is one of the many reasons why securing inventory is so important.

An electronic key control system reduces the likelihood of key theft by controlling access to keys. These systems secure keys in tamper-proof cabinets or drawers that can only be accessed when approved users input a computer password and/or scan a fingerprint. If a key isn’t returned to a drawer within a certain amount of time, the system alerts management via text message, email or an audible alarm.

To learn more about electronic key control, check out this post.

Monday, March 28, 2016

Thief Steals BMW off Car Lot After Keys Left in Door

Gloved hand reaching for vehicle key in door
It didn’t take much for a car thief to drive away with a $10,000 car at Galaxy Auto Sales. Taking advantage of the keys left in the car’s door, the thief was able to drive the stolen 2003 BMW X5 off the dealer’s lot. By the time the police arrived at the dealership, the BMW was long gone.

An electronic key control system could have kept the keys accounted for and prevented them from ending up in the wrong hands. By automating the key tracking process, you can set up alerts that will notify you — via email or text message — if keys have been taken by an unauthorized user or haven’t been returned over a specific length of time. The keys are stored in a steel cabinet or drawer and can only be retrieved via password, biometric fingerprint scanner and/or key fob.

By knowing where your company’s keys are at all times, you can maintain accountability of your inventory and reduce liabilities.

For more information on how to keep your keys secure, read our post "Tighten Your Dealership’s Key Control to Help Secure Your Vehicles."

Monday, March 21, 2016

Five Benefits of Implementing Electronic Key Control

Businesses today are realizing the importance of automating the key control process over using a manual key tracking method. An electronic key control system provides benefits that pegboards and lockboxes do not, including increased security and efficiency. If you still have reservations about converting your key control process, here are five more benefits that may change your mind.

Reduced Liability

Electronic key control systemLiability is greatly reduced with real-time reporting of key activity. Every time a user accesses a key, it is logged and recorded in the system, providing you greater security and peace of mind. This feature is invaluable during investigations of theft, or even for simply tracking employees' key transactions.

Comprehensive Reports

Extensive reporting capabilities allow you to easily track all activities related to the key machine. You can request predefined reports (e.g. transaction report, checkout report, overdue key report, access level report) or generate custom reports.

User Customization

Access levels minimize your exposure to risk by never granting more access than is required for each user. Access levels are customizable to each user, so managers can determine which keys employees are authorized to use.


Unfortunately internal thefts exist due to lack of proper key control. With an electronic key control machine, accountability is enforced from the moment you check out a key. There are also alerts to let you know when a key has been checked out for too long, or if an unauthorized user attempts to access a key.

Remote Access

Remote access allows you and other authorized users to access the software from any PC, which allows you greater flexibility when monitoring the system. You are able to add information to key tags, run and view system reports and add users.

For more information on electronic key control, check out some of our resources.