Threshold
Logo for: Threshold Visitor Management Systems

About this blog

We write articles mainly about visitor management, which helps you to know who is (or has been) in your facility. It is just part of an organization’s physical security processes that protect people and property within and around a building or campus.

Categories

Search

Meet the bloggers

Paul Kazlauskas About me › My posts ›

Andrew Jones About me › My posts ›

Blog

Where should you wear your name badge?

Friday, September 25, 2015 by Andrew Jones

Placeholder Are there a right way and a wrong way to wear a name badge?  Most people wear their badges on their left (near their heart). That’s because most people (about 90 percent of us) are right-handed, so it’s easier to put our visitor badges on our left side. But is that the correct way to do it? When, after all, do we wear name badges? Most likely it is when we are among people who don’t know us. So, when we meet them, we want to make it easy for them to learn our ...

Read more 

Questions to ask when developing a visitor management policy

Tuesday, September 22, 2015 by Paul Kazlauskas

PlaceholderIt is now common practice for schools, corporations, and healthcare facilities to have a need for policies on how to handle visitors to their facilities. Visitors to a facility increase the risk of violence, theft, and injury. Even if a visitor is at your facility for a completely valid reason, it is important to document their presence and reason for the visit. While it’s certainly not a good idea to ban all visitors to a facility over possible fears of what could happen, it is ...

Read more 

4 cyber security tips for students

Wednesday, September 2, 2015 by Paul Kazlauskas

PlaceholderAs a new school year begins, cyber security risks should be brought up and discussed with students. Phishing scams are more prevalent than ever before. Personal mobile device use in school, without proper device security, can potentially cause a hack or identity theft. It is helpful to know your Google security and privacy tools that can help keep your information private and secure. Students should be very careful when sharing data online. Unfortunately, many students don’t think ...

Read more 

The downside of using biometrics to replace passwords

Monday, August 24, 2015 by Paul Kazlauskas

PlaceholderAs I mentioned in a previous blog post, one of the hot, emerging trends in the security world involves the use of biometrics. Biometric authentication involves ways of identifying people using a person’s unique physical characteristics such as fingerprints, facial structure, eyes, or voice. A natural application for biometrics involves replacing passwords for accessing a smartphone. This practice may be convenient and feel secure, but some researchers are worried about this ...

Read more 

How to remain calm in a challenging situation

Wednesday, July 22, 2015 by Josette Lumbruno

Placeholder “Practice living in the present moment.” This is a simple solution, yet so difficult to execute on a daily basis. Is it any wonder we experience so much stress, worry, and anxiety in a world filled with distressing news and events? Living in the present moment can be scary. Our self-preservation mode kicks in, and we retreat to the future or into the past to hide or just find a way get away from the “stuff” that frightens us or prohibits us from moving ...

Read more 

«  previous  |  3 4 5 6 7 9 10 11 12  |  next  »Displaying posts 36 – 40 of 87