Like many people, at the end of a year, I look back at what I have achieved.
This helps when looking forward to setting goals for the forthcoming year.
During 2016, I launched this blog with nothing but a concept and a few blog post ideas.
During this time, I have received many positive comments from people on how the content here is helping people in their work.
To give some statistics, there have been over 600 new users viewing the site since it launched in May 2016.
Those 600 visitors have read some 1,700 pages – way more than I ever imagined at the start of this journey.
These statistics are also one way of determining whether I am meeting my goal in sharing knowledge in the security industry to make people’s lives easier.
Here are my top 5 blog posts, along with a summary of what seems to be working and why.
1. Introduction to RFID for Access Control – We take it for granted when using smart cards on a daily basis to enter our facility that they will work.
Understanding a little bit about the type of RFID technology and how it works can be useful in selecting the correct card technology for the next project.
2. Introduction to Long Range Vehicle Identification – Controlling access to vehicles is just as important as controlling access to people.
With a vehicle, we require different technology with a much longer reading distance to be effective.
We explore the advantages and disadvantages of the different types of long range vehicle identification, and which technology to use for which situation.
3. Introduction to Automatic Number Plate Recognition – Using an RFID based tag is one way to identify and control access to vehicles, using the license plate fixed to each vehicle is another.
This article discusses how ANPR works, how it can be used and when to use it.
4. The important role architects can play in security – To be honest, I wasn’t expecting this post to be so popular!
Early engagement is essential for effective security design, whilst a security consultant might be engaged for a high risk project, there are many other projects where security is not considered from the outset.
In this article, I identify some of the common design elements that can be used during the stage when an architect is involved, in the hope that these will be incorporated into all projects where relevant to improve the security for the end customer.
5. How Secure is your password? – Passwords can be a weak link in security.
Making things too complicated for users to remember, or forcing them to manage multiple passwords can result in bad practice.
In this article, I share how I manage passwords to ensure that each site or application is secure.
2 Key Takeaways
Based on this list, here are my 2 key takeaways about what is working and why.
Understanding technology is important
3 out of the top 5 posts of 2016 were about how specific technologies work.
This information goes way beyond manufacturers brochures or spec sheets.
It’s based on real-world experience on when to deploy which technology to provide the best solution for the customer.
This is vital for consultants to understand when specifying and designing security solutions.
Security is so much more than physical measures
Gates, barriers and access control systems play their part as part of an integrated security strategy.
However, there are other very effective ways of protecting a facility, such as lighting, signage and planting
These elements are often overlooked and should be used more on every project, not just the high threat ones.
Armed with this information on what people find useful, I have created a content plan for the whole of 2017.
Its designed to bring you more content that will be useful, starting with a series in January on how to avoid Value Engineering.
See you in 2017!
Sign up below to receive future blog posts in your inbox and to receive a free copy of my eBook, 5 ways to improve the effectiveness of an access control system.