CENTURION Mini Product Catalogue

Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Tuesday, 30 May 2017

The Great Cyber Caper of 2017

On the 12th of May, an unknown party, or parties, launched a cyberattack on an unprecedented scale the aftermath of which is still being felt despite many businesses and private computer users stepping up their cyber security policies.

Copyright: aetb / 123RF Stock Photo
Dubbed the WannaCry cryptoworm, the malicious software is said to have infected some 230,000 computers in 150 countries worldwide, spreading through networks and bringing affected businesses to a grinding halt by encrypting data and demanding a “ransom” of around $300 in return for releasing it. Desperate to have access to their data, many opted to pay the ransom but were never issued with instructions for decryption, and it has been theorised that the attackers themselves are not entirely clear on how to undo the damage done by the appropriately-named ransomware.

Since the attackers demanded that the ransom amount be paid in Bitcoin, a ubiquitous cyber-currency which is largely untraceable, no suspects have been identified at the time of writing and data recovery specialists are still scrambling to salvage what they can while cyber security firms are rushing to the aid of the organisations that have been targeted.
The attack has raised important questions regarding the efficacy of firewalls and antiviruses.
What exactly is ransomware?
Ransomware is a type of malware (malicious software) that encrypts data on infected machines, making it inaccessible to the user. The attacker then demands a sum of money, or ransom, in return for releasing the data.

Who is at risk?

Theoretically, anyone with access to a personal computer or laptop is at risk of falling victim to a ransomware attack, although businesses are at greater risk since malware is often promulgated through company networks.

How is the ransomware activated?

The ransomware is activated in a number of different ways, but generally results from opening an email attachment that contains the malicious software. Clicking on suspicious links can also lead to a ransomware attack.

What can I do?

According to CENTURION IT manager and network security specialist Paul Mearns, the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.

He stresses the importance of not opening emails if one is unfamiliar or uncertain regarding the source.

Don’t open any attachments unless you are 100% sure that the email is safe and that you are familiar with the sender,” says Mearns, although he warns that even this is no guarantee of the mail’s integrity. 

“If you are unsure of something, contact your company’s IT department. We are here to help”.

For a full list of ransomware countermeasures, visit Microsoft’s website or click here.

Monday, 10 April 2017

5 Tips for a Worry-free Long Weekend Away

Come Friday, the country’s national highways will once again be packed as scores of South Africans make their way to various destinations in an attempt to squeeze the last few drops of sweet summer from the rapidly-fading season. A mass exodus from all the major cities on Thursday afternoon will mark the start of the four-day weekend, the sun glinting off the roofs of cars, caravans and Venter trailers like the scales of some gigantic metallic snake coiled along the length of the N3.

Make sure that you get the most out of your long weekend away with these five tips promoting maximum peace of mind.

Inspect your mode of transport
Copyright: ikonoklast / 123RF Stock Photo

Nothing puts a damper on holiday festivities faster than car trouble. Not only can it be extremely dangerous getting stranded out in the middle of nowhere (we’ve all seen The Hills Have Eyes and Wrong Turn, haven’t we?), but a breakdown is likely to end up costing you precious time and money that could have been better spent on typical holiday revelry.

Be sure to check the following aspects of your vehicle:
  • That your tyres (including the spare) are all in a good condition
  • Fluid levels (water, oil, brake fluid)
  • That you have enough fuel
  • Lights and indicators (including those of your trailer if you are taking one along)
Finally, if your insurance company offers roadside assistance, save the number on speed dial.

Confirm your reservation beforehand

Again, if countless horror movie tropes about cannibalistic families preying on desperate shelter-seekers are anything to go by, the last thing you want is to have to look for last-minute accommodation because your original booking didn’t pan out. Always confirm check-in times and dates a good couple of days before your trip, and be sure to take proof of payment and reservation with you.

Read some online reviews

Copyright: jirsak / 123RF Stock Photo
In the Information Age, there’s precious little information that can’t be found online, including accounts of previous visitors’ experiences at guesthouses, B & Bs, hotels and resorts. Do yourself a favour and search for ratings and reviews about your intended accommodation. Websites such as Booking.com, Tripadvisor and Lekker Slaap enable you to book directly via the website as well as read reviews. You can really save yourself a world of discomfort and disappointment by doing some online research first. Tried and true!

Check news sites for information about strikes that could affect you

There are a number of ways that your trip could be adversely affected by industrial action. Firstly, if there’s a fuel strike planned, it’s important that you stock up on enough of the stuff to get you to your destination and back. Fill up your tank, fill a couple of cans and keep them in a cool, safe place away from heat and open flames. Secondly, strikes often turn violent, so if you’re travelling through affected areas, you might want to consider a route change.

All-important security


We all knew we were building up to this point, didn’t we? But concerns about security amount to one of the leading causes of worry during vacations, probably because we are not comfortable with relinquishing control and leaving our homes and possessions unattended for extended periods of time.

But fear not, you don’t have to give up control completely. For example, you can install a GSM device and receive SMS notifications when someone opens your gate, or there’s a power outage back GSM intercom fitted and answer your intercom from anywhere, giving the impression that you’re home. Below we’ve provided some additional security tips:
home. Or have a
  • Have a friend or neighbour collect your mail
  • Check your alarm system before embarking on your trip (a GSM device can also be configured to notify you of alarm events, and it enables you to switch your alarm on and off via SMS text messages from your phone)
  • Put outside lights on a day-night switch and set it up so that the lights come on at night (or – you guessed it – just invest in a GSM device! You can also connect lights to your D5-Evo’s light relay and use the gate motor’s onboard timer to automatically switch them on and off. #IntelligenceInMotion)
  • Inform your armed reaction company that you’ll be away from home for a while
  • Ask someone to maintain your swimming pool while you’re away
  • Lock valuables in a safe
  • Check that doors, locks and windows are secure


Friday, 17 March 2017

5 Tips to Help You Sleep Better Tonight

Copyright: yuriisokolov / 123RF Stock Photo
Fact: sleep is good for you. It ranks right up there alongside drinking plenty of water and not forgetting your wife’s birthday under the category “things that will make you live longer”. Getting enough sleep improves focus, helps with stress and yes, it can even increase longevity according to some studies. The optimal number of hours of quality sleep required depends largely on one’s age and unique genetic composition, but most experts place the figure at between 7 and 9 hours for a healthy adult. 

It is also important that the sleep you do get is sufficiently deep and restful in order for it to be considered beneficial. So-called “light” (or non-REM, stage 1 and stage 2) sleeping, tossing and turning and frequent waking does not constitute quality sleep, and is likely to leave you feeling tired and agitated the next day.

But, with the mounting pressures and worries of everyday life – work, money, relationships – many of us may find quality sleep eluding us and consequently our health and overall performance of daily tasks are affected in a negative way.

Here are some tried and tested tips for getting a good night’s rest.

Take it easy on the caffeine

Copyright: capacitorphoto / 123RF Stock Photo
Caffeine (the active ingredient in coffee) is a powerful central nervous system stimulant, which means that it has a “perking up” effect, making a person feel more awake and alert. The problem is that, if you overdo it or enjoy coffee too close to bedtime, your CNS will become overstimulated, you’ll become “wired” and find it difficult to “switch off” and fall asleep. Also, don’t be fooled into thinking that caffeine is only found in coffee. Some tea varietals and even chocolate contain considerable amounts of the substance!

Do some light exercise

The health benefits of exercising have been well-documented. From improving cardio-vascular performance to burning fat, there aren’t too many cases to be made against hitting the gym! But did you know that getting the blood pumping an hour or two before bedtime can actually help you sleep better? Experts caution against exercising too close to bedtime, however, as your breathing and heartrate may require some time to return to normal levels.

Stick to a sleep schedule

Our bodies love routine, and severe deviations from our daily schedules have the tendency to jolt the system and disturb our bodies’ equilibrium. Try to go to bed and wake up at more or less the same time every day to keep your body – and mind - happy.

When you switch off, really switch off

This is becoming increasingly difficult to do in a technology-driven and obsessed society. Even when the lights are off, cellphones, tablets and television sets cast their spectral glow and remind us that we’re never truly disconnected from the world. This, as it turns out, is not a good thing. How many of us can truthfully say that we don’t use our mobile devices in bed, checking emails, chatting, playing games, etc.? As difficult as it may be, we need to condition ourselves to completely switch off the moment that we get into bed.

Stop worrying

Because it’s that easy, right? Not quite. Worry is one of the leading causes of not getting proper sleep, and contributes to a plethora of other health issues including strokes and heart attacks, stomach ulcers and, according to some studies, even cancer. Excessive worrying also leads to a compromised immune system, which essentially means that your body lets down its guard. There are plenty of ways to tackle excessive stress such as meditation, exercise and, in extreme cases, seeking professional help.

We care about your peace of mind! Don’t lose sleep worrying whether your gate motor will be there in the morning. Fit a theft-resistant cage from the leaders in access automation.

Thursday, 23 February 2017

Will 2017 be the Year of the Hacker?

Today’s criminal is a completely different breed.

Tech-savvy, sly, and immeasurably resourceful. He is able to adapt with ease to the forever-changing technological landscape, and use even the slightest weakness to his advantage. His tools are not crowbars and screwdrivers, but a mouse, keyboard and Internet connection. This newly-constructed reality has the distinct flavour of technological determinism: the branch of social science that has as its main tenet the belief that all human behavior and culture are influenced by innovations and developments in technology.

The impact that so-called ICTs (information and communications technologies) has made on our lives cannot be overstated, and developments such as Internet banking and apps have made long queues and frustrating face-to-face interactions things of the past.  Brick and mortar are being replaced by ones and zeros, and no one is complaining. The Dutch media and communications academic Van Poecke draws a clear distinction between modern and postmodern society, positing that in the former technology was in service of man, while in the latter man is subordinate to technology. He underlines this position by stating that, while in modern society there was a clear dividing line between technology and culture, in a postmodern society such as ours technology is the culture.

But, with this dramatic shift in the overall consumer experience, come myriad new threats to security, privacy and the integrity of information. Not even the biggest, most powerful financial institutions are immune, as evidenced by a recent phishing scam that saw customers of a major South African bank losing hundreds of thousands of rands. The scam, which was perpetrated around March of last year, saw huge sums of money (up to R200 000, in one case) being transferred out of clients’ bank accounts and has led to significant backlash from those who feel that the bank acted negligently.

It’s become an all too familiar narrative. This year alone, the accounts of two of my colleagues (that I know of) have been pilfered by online attackers, leaving them with the unenviable task of trying to recover their money from their respective banks. In both instances, the victims had done absolutely nothing to compromise the security of their online banking profiles; the hackers were simply able to circumvent all the security measures that the financial institutions had in place.

Hackers and other online criminals have also become more creative with regard to their methods, and it is becoming increasingly difficult to distinguish genuine communications sent from real banks from fraudulent emails, SMSs and even phone calls aimed at stealing one’s personal information. These cyber-crooks and social engineers are continuously changing and innovating their modus operandi to be virtually undetectable.

Here are some tips for protecting your assets and personal details against cyber-attacks:

Never, ever give your ATM PIN to anyone, even if they do claim to be from a (your) bank
Never click on any links in emails from banks if you are not 100% certain that the communication is authentic. Rather phone your bank and request confirmation regarding the authenticity of the email
Don’t give your Internet and cellphone banking passwords to anyone
Regularly run anti-virus software to check for malicious software such as spyware on your computer
If you suspect that your online security has been compromised, notify the bank and, if necessary, the police immediately
If you regularly do online shopping, ensure that you only use reputable vendors that make use of secure payment gateways for monetary transactions
Don’t respond to emails and/or SMSs claiming that you have won a prize unless you are certain that you have entered such a contest
IMPORTANT: take time to read notices on your bank’s home page regarding the latest phishing scams. Don’t just click the x to close the dialogue and get on with your banking. Taking 5 minutes to read the warning could save you a lot of heartache and trouble

Friday, 27 January 2017

New G-WEB PLUS Innovation Introduces the Contact List

Users of CENTURION’s G-WEB PLUS online interface will now be able to populate a useful central contact list from which they can conveniently import contacts to their devices.

The web portal, which was launched as a companion product to the G-SWITCH-22 GSM module in 2011, has undergone a dramatic transformation in recent months with both cosmetic and functional changes at the order of the day. Since its genesis, G-WEB has evolved to meet client usability and security needs, but the true epoch of its ongoing metamorphosis was when “PLUS” was affixed to the product’s name, for it signaled a new era marked by the addition of a plethora of new features.

While G-WEB was originally launched as a management and administration portal for what was at the time CENTURION’s sole GSM product, the aforementioned G-SWITCH-22, it has since become a turnkey solution complete with a device health monitor and the ability to download transaction logs indicating not only device interactions, but also changes made to the system settings.  

With the improvements to G-WEB, CENTURION is another step closer to embracing media mogul and communications pioneer Marshall McLuhan’s concept of the global village, and creating an environment in which the digital and the corporeal worlds converge.

In conclusion, G-WEB PLUS is an altogether more mature and well-rounded offering than its predecessor and, judging by the paeans of praise pouring in from the public, one that is a hit with its users. 

To set up a contact list, log into G-WEB PLUS and, on the home screen, click on the My Contacts menu item:



To add a contact, simply click on Add Contact to the bottom left of the screen:



You’ll now be presented with a pop-op screen. Once you’ve completed the requisite fields, simply click on Add to complete the addition, or click on Done Next to add more numbers.



Should you wish to add a number to a device using your contact list, navigate to that device’s access numbers, and click on Add Number from Contact List:




Have you checked out our series of G-WEB PLUS video tutorials on YouTube? Watch them here.

Wednesday, 18 January 2017

Social Media and Security: What are the Risks?

Social networking sites such as Facebook and its great granddaddy MySpace have created a veritable microcosm of peer-to-peer interactions, marketing and entertainment. What started out as a simple means for people to reconnect with school friends and faraway family members has to some extent spawned an entirely new reality that is, in many respects, a far cry from the pre-social media days.

This dramatic shift in our experience of social reality can be seen as an important part of the ongoing process of globalisation, the wave of digital “oneness” sweeping the globe and leaving blurred – or even completely erased – cultural, socio-political and geographical lines in its wake.


But where has this Brave New World left us from a personal security perspective? What new challenges has the Information Age wrought, and what can we do to better safeguard ourselves and our loved ones against this new generation of tech-savvy criminals?

Let’s find out.

Don’t share your password

As we mentioned earlier, social media has created a completely new world and, to all intents and purposes, your password is your key into that world. You wouldn’t go around lending out the key to your home all willy-nilly, and your social media accounts’ passwords should be treated with equal care and respect.

Letting your password land up in the wrong hands can be absolutely ruinous; from having your online reputation tarnished to falling victim to fraud, ensure that the fidelity of your social media passwords remains intact.  Cyber-security experts also recommend using a phrase rather than a single word or thought as your social media password.

Understand Facebook’s security settings

Those settings exist for a reason, and it’s important that you and your family members are completely au fait with them.

To access and configure Facebook’s security settings, click on the little down arrow next to the lock icon, which can be found in the top right-hand corner of your screen:



This will produce a drop-down menu. Click on Settings:



You’ll now be taken to Facebook’s General Settings menu, with more options on the right-hand side. Click on Security:



From this screen, you’ll be able to edit your security preferences and create a more secure social media environment.

If you have kids, know what they’re getting up to online

For all its benefits, social media has sadly also become a rich hunting ground for predators who exploit the relative anonymity of cyberspace for their own nefarious purposes. We are not advocating spying on your kids, but we certainly encourage sitting down with them and having an open discussion about the dangers of social media. The more you educate them, the more you’ll be able to allay your own feelings regarding these platforms. Empower your children to be better, more security-conscious social media users.

Be wary of advertising your absence from home

Though I have not yet been able to establish the validity of this report, there have been rumours doing the rounds regarding insurance firms overseas not paying out claims when it was discovered that the claimant had posted about his or her holiday on social media. While these claims have, in all likelihood, been greatly exaggerated, it is certainly wise not to be too specific about the dates during which one intends to be out of town. Social media wouldn’t be social media without holidaymakers showing off their idyllic lifestyles, but we recommend that users avoid posting specifics that could leave things back home vulnerable.

Don’t publish your home address

This one may seem patently obvious, but you don’t want strangers knowing where you live.

Use a secure protocol when accessing social media sites

You may know the “https” prefix from accessing your online banking profile, but chances are you haven’t given much thought to what it means. The “s”, as you’ve probably guessed by now, stands for “secure” and the presence of this protocol essentially means that the website you are visiting has been given an extra security layer to help safeguard against malicious online behaviour such as phishing.

The security protocol ensures that communication over the website is encrypted and that private information is kept, well, private. The majority of social media sites natively encrypt communication but, if you don’t see “https” in front of the URL, you can (and should) manually enter it.



Not all “friends” are friendly

We all receive friend requests every now and again from people we don’t know and, in the majority of cases, it’s a completely harmless gesture. Someone spots your profile under “People you may know” and decides to add you. No harm, no foul.

But, just like in the corporeal world, there are those individuals who have intentions far more diabolic than merely “liking” pictures of your cat.

According to the National Cyber Security Alliance’s Stay Safe Online website, just because it’s fun to create a large pool of friends “doesn’t mean that all friends are created equal”.

The website recommends “[using] tools to manage the information you share with friends in different groups or even [having] multiple page. If you’re trying to create a public persona as a blogger or expert, create an open profile or ‘fan’ page that encourages broad participation and limits personal information”.

Thursday, 5 January 2017

Property Managers: This is Why You Need GSM Access Control

Copyright: gstockstudio / 123RF Stock Photo
Orange is the new black, coffee is the new wine, comedy is the new rock ‘n roll and, if current security trends are any indication, cellphones are the new remote controls.
Say what?

While remote controls will undoubtedly always have a place in the access control environment (and in our sentimental old hearts), there are those who consider them to be anachronistic and passé, remnants of a simpler time. Technology, by its very definition, has to keep evolving and nowhere is this truer than in the case of security technology, where a single misstep in the race to stay ahead of the criminal curve could have disastrous and far-reaching consequences.

Property managers and bodies corporate are switching over to GSM access control en masse. Is this a passing fad, or is cellphone access control here to stay? What’s all the hype about?

Let’s find out.

Lower stock-holding

Copyright: twinsterphoto / 123RF Stock Photo
Is having a box full of remotes in your office cramping your style? Could that spot in the corner better be utilised by your golf clubs? A surprising benefit of using GSM access control at the property, or properties, that you manage is that it can actually free up some space as you don’t have to keep any physical devices in stock.  The tenants use their own cellphones for access.

More security


Remotes have gotten a bad rap of late as vulnerable to security threats such as copying or cloning and, in the case of code-hopping systems such as CENTURION's NOVA, there is actually very little risk of this happening. That being said, GSM offers an even more secure solution since only learned-in, authorised phone numbers can access the system, which is usually also password-protected. In addition, website administration makes it possible to draw detailed transaction logs documenting which numbers were used for access, at what times, etc.

Monitoring

Whereas remotes can generally only be used for control (it’s right there in the name), the majority of GSM devices offer outputs as well as inputs, which can be connected to alarm systems, electric fences and even mains power and set up to send the users SMS notifications of events such as power failures and alarm breaches.

Offsite administration

This is another major, time-saving benefit of opting for GSM access control: the fact that users can be added and deleted, device settings edited and bulk communications sent – all from the comfort of one’s home or office. A number of leading GSM products offer offsite administration via a website or online portal. This also makes life easier for tenants since they don’t have to wait for someone to come and program their remote onsite. It can be done remotely in a matter of minutes.


Friday, 2 December 2016

7 Essential Security Tips when Traveling Abroad

Copyright: efired / 123RF Stock Photo
Having recently returned from honeymoon in the oft-overlooked but not-to-be-missed South-east Asian gem of Vietnam, I am more conscious than ever of the importance of keeping one’s wits about you when travelling abroad. It’s all too easy to get caught up in the newness and novelty of one’s surroundings to the extent that one becomes an easy target for criminals and, before you know it, you’re not only a stranger in a strange land, but a victim in a country the language, geography and customs of which might be totally alien to you. Not a good position to be in.

Despite still bearing the scars of its embattled past in the form of widespread poverty and squalor, Vietnam feels remarkably safe and is home to some of the friendliest people I’ve ever had the privilege of meeting. Even walking around at night, and with the possible exception of some opportunistic hucksters and shoe shiners willing to charge exorbitant prices for their labours, one never really feels in any sort of immediate danger. That being said, we were able to avoid the majority of the pitfalls associated with international travel since we had done a fair bit of reading up prior to boarding a plane bound for the Orient.

But the world can be a dangerous place, which is why your friends here at CENTURION have compiled a list of security tips for you to keep in mind when travelling abroad. Safe travels!

1. Don’t let your passport out of your site

Copyright: kagenmi / 123RF Stock Photo
Before we left for Vietnam, my mother-in-law joked that we should even go for a swim with our passports if it came to that; that’s how important that little green (or black, or blue, or maroon) document is, and considering that, without it, and to paraphrase the title of a famous holiday movie, you won’t be home for Christmas. If you are unable to carry your travel documents with you at all times, then hear from your hotel whether it has a safe available where you can store them for safekeeping. It’s also a good idea to make electronic copies of all your travel documents.

2. Avoid seedy-looking areas

While the most spectacular areas do tend to also be the most remote and secluded, if you know that you are travelling to a country with a high incidence of crime, it’s generally best to avoid spots where you are likely to be a target by virtue of there being no one around to help you. Also, if movies like Hostel have taught us anything, it’s that dark alleyways full of guys playing poker (or some local variant thereof) and smoking cigars are best avoided.

3. Invest in a lock

Designed by Freepik
This one saved us a lot of anxiety on our trip. If, like us, you intend on taking a backpack along with you as you explore (we kept water, a map and our mobiles in ours), then investing in a padlock with a settable passcode will help keep your valuables secure. Many cities in the developing world are plagued by pickpockets – many of whom are quite skilled at their trade – and you don’t want your trip ruined by having your stuff stolen.

4. Don’t make it easy for them


Copyright: antonioguillem / 123RF Stock Photo
Again, if you plan on taking valuables such as cameras and cellphones out with you, make sure that they can’t easily be snatched by thieves on foot or, more commonly, on bikes or scooters that can be used for an easy getaway. Keep your valuables in a backpack that can be strapped to your shoulders (don’t keep the straps around your head or neck – this can be injurious to your health should someone try to snatch it away) and avoid taking out your cellphone in large crowds where it is bound to draw attention and awaken temptation.

5. Beware of scammers


There are many individuals out there who would be more than happy to relieve you of all that troublesome cash you’re carrying around. Whether charging you insane prices for an unsolicited shoeshine or trying to extort money from you for some obviously fictitious wrongdoing, scammers are everywhere and they are surprisingly successful. If someone tries to sell you something you really don’t want or need, stand your ground without being confrontational. They are extremely persistent at first, even slightly threatening, but they let off once you have made it clear that you are not interested.

6. Cash is not always king

Swipe your card whenever and wherever possible. Most hotels accept the major credit and debit cards, and carrying large amounts of cash with you is just asking for trouble that could have stayed. However, markets and roadside stalls generally are equipped for cash-only transactions. Ensure that, if you do carry cash with you, it’s kept securely in your (locked) backpack. It’s a good idea to keep your cash and credit cards separate so that, should either go missing, you have a backup.

7. Have your luggage wrapped


This service costs around R70 at the airport, and will not only help protect your luggage against damage, but will reduce the likelihood of it being tampered with (for example to transport illicit substances) or stolen from.

Bonus “stay healthy” travel tips:

Always drink bottled water, and use bottled water to brush your teeth
Ask for drinks with no ice (ice is typically made using tap water)
Find out in advance what vaccinations you’ll need, and make sure that you get them!
Only eat fruits and vegetables that you’ve peeled yourself
When buying from roadside stalls, patronise the stalls that are busy as they tend to have a higher turnaround of ingredients
Make sure that you take malaria prophylaxis when travelling to affected areas, and use mosquito-repellent. It’s also wise to wear clothing that covers your arms and legs
Do not pet stray animals as there’s a possibility that they’re carrying rabies
Be sure to stay well-hydrated (I speak from experience having endured Vietnam’s legendary humidity)
If you plan on eating meat, make sure that it’s properly cooked and preferably hot
If you are taking prescription medication, carry some in your cabin luggage. In the words of the kindly nurse who administered my travel vaccines, “it’ll do no good to man or beast if you end up in one country and your meds in another!”. Also, customs officers may ask you to produce the prescription, so be sure to take a copy with you

Friday, 25 November 2016

Security Tips for the Holidays

The holidays are magical. There’s more time to spend with loved ones, traffic is a tad less soul-destroying and there’s a general sense of good cheer that pervades everything. Even if you’ve heard Boney M’s rendition of The Little Drummer Boy a thousand times, it’s not cloying because it means that the holidays are in full swing.

Unfortunately, it’s also the time when criminals are most active, taking full advantage of the fact that many homes are left unattended for extended periods of time. It’s open season, but instead of hunting wabbits like loveable old Elmer Fudd, these crooks are hunting vulnerable houses.

Fortunately, your friends at Centurion Systems are here to provide you with some great holiday security tips to help keep you and the contents of your home safe from those wanting to do some last minute “shopping”:
·         Dispose of the packaging your gifts came in where it is out of sight. You don’t want to advertise the fact that you now have a brand new 50” flat screen TV
Be wary of posting your vacation plans on social media
Test your alarm system thoroughly and notify your armed response company before leaving for holiday
Have a neighbour collect your mail. A full mailbox is a tell-tale sign that the residents haven’t been home for a while
Have a friend or neighbour maintain your pool while you’re away, or use a GSM module
Ensure that doors and windows are properly secured before you hit the road
Ask someone to come switch on or two lights on at night. A GSM module can also be used for this
Suspend newspaper and magazine deliveries
If possible, leave one car in the driveway and ask one of your neighbours to come and move it a small distance every once in a while to give the appearance that it is being driven
Criminals know all about Christmas bonuses. Do not carry around large sums of cash, but make use of Internet banking where possible
If you have a garden, arrange for the grass to be cut and the plants to be watered while you are away
If you are travelling to a country with a known crime problem, avoid carrying handbags and cellphones that can be easily snatched and do not walk around on your own, especially after dark
Do research on the Internet for travel warnings before booking your trip. You want to avoid travelling to areas with ongoing armed conflicts and political unrest. Wiki Travel is a fantastic website to do research on

Monday, 27 June 2016

Security in the Workplace

Unless you hit it big by penning a series of novels about boy wizards or sparkly vampires, chances are you spend the greatest part of your day in an office of some sort. And, since the focus of our newsletter has predominantly been on domestic security, we reckoned it’s high time we explored some of the ways that you can keep safe in your place of employment.

The reality is that we spend a great deal of time (and money) turning our homes into the kind of high-tech fortresses that would make a Bond villain green with envy – and rightly so – but how prepared are we to deal with threats to our personal security in the building where we spend 80% of our day?

Sure, there’s the obligatory fire evacuation drill every couple of months, and you might even have a working clock-in machine, but there’s a lot more that you can do to help ensure that you and your coworkers don’t fall victim to crime at work (and we’re not talking about all those hours of unpaid overtime you put in, either).

Here’s a few useful (and potentially life-saving) tips to keep in mind when you leave for the office tomorrow:
  •  Ensure that there is a proper evacuation plan, and that it is communicated to all employees and contractors. This includes establishing emergency assembly points and designated exits
  • If you’re in the habit of arriving at work early or leaving late, have a trusted co-worker escort you to and from your car or, if you are in a position to do so, move your car closer to the building entrance
  • When entering the office park or building, check that you are not being followed
  •  Know your co-workers and report anyone who seems out of place or is acting suspiciously. Your vigilance might just save a life!
  •  If you’re the last one leaving the office, ensure that entry points are locked and secured and that the alarm has been armed
  • Regularly check that camera and surveillance equipment are in working order
  • Have a maintenance schedule drawn up for security equipment such as traffic barriers, gate motors, keypads and card readers
  • If a co-worker is acting in a suspicious or threatening manner, report this to your HR representative
  • Assign asset numbers to all movable assets and keep an up-to-date inventory


Thursday, 23 June 2016

Part 1 of Installer Series: Making the Sale

While the rising crime rate means that proper access control is now a necessity rather than the luxury it was in decades past, security equipment is still not exactly something that leaps off the shelves like, say, the latest iPhone. For most, it’s still very much a grudge purchase; something that has to work extra hard to get consumers to reach for their cheque books (do people even still use those?).

As an installer of security and access control equipment, selling probably constitutes a significant part of your job and is at least as important as the actual installation of the equipment. So, the question remains, how does one awaken desire in that homeowner that’s on the fence about whether or not he really needs that alarm system? How does one make him really want that gate operator and go gaga for a new garage door motor?

In this, the first article in our Installer Series, we’ve compiled a list of sure-fire tips to help you sell, curated from our resident sales guru Scott Wilson.

The “closing the deal” misnomer

According to Scott, too many salespeople focus on the “closing” part of the transaction, but often neglect to do all the prep work needed to get there, sort of like wanting to cross the finish line without doing the race. This lack of preparation and groundwork can lead to the transaction falling through, as no initial trust and rapport is established with the potential client.

You sell yourself, not the product

“The minute you sell, you come across as a salesperson, and most people turn their back on a salesperson” Scott explains. He emphasises the importance (in fact, he refers to these points as “non-negotiables”) of arriving on time, notifying the client in advance if you’re going to be late, appearing presentable and providing accurate and up-to-date documentation to accompany your installation. It’s all about first impressions.

Satisfy their needs

“Take a step back, and ask yourself why you would not buy from somebody” Scott advises, citing not having their needs met – and not price - as the main reason that consumers won’t use a particular product or service.

Price is a negotiable factor and consumers tend to opt for the solution or service provider that adds the most value, even if the price is slightly higher.

Ask questions (the “why” factor)

Why does the client want a gate motor? Why does he want that particular gate motor? The more information you have, the better you’ll be able to provide a solution to give the customer what he or she needs (tying in with the point above).

Handle objections

“When people try and close deals, the biggest problem is that they haven’t handled objections” warns Scott.

If there are any objections, they need to be handled first, because if the customer doesn’t place the order there and then, it means that there is something that they are still not completely convinced about. This can be remedied by asking questions about the customer’s situation (see the point above), and ensuring that the customer is happy with and understands your responses to his or her objections.

Sell them the whole package

Scott goes on to say that while the gate motor or access control product might provide the user with the initial answer, the whole package comes back to the installer. “The package deal that the installer offers the homeowner or the company, is actually what these people are looking for. They’re not looking for someone just to install a gate motor and walk away. They’re looking for someone who can offer more than the next person, and that “more” tends to be the small things that don’t have a monetary value”.

Sell them on the benefits

Terms like “rising and falling edge” and “dry contact” mean precious little to the man (or woman) on the street. Even ubiquitous jargon like “battery backup” has the tendency to elicit looks of blank confusion or plain indifference. If the response to your pitch is “so what?” you may need to tweak your approach a little.

Remember, the average homeowner doesn’t give a hoot about the gate motor’s capacious remote control memory or its high duty cycle; he only cares about how owning one is going to benefit him. Focus on the fact that he’ll no longer have to get out of his car in the pouring rain to open the gate and, even better, he’ll significantly reduce the likelihood of getting hijacked in his driveway.

Sell them support

When it comes to technology, competent after-sales support (or the lack thereof) plays a significant role in the consumer’s decision to adopt (or avoid) a certain solution or brand. Make sure that your customer knows that you’ll be there for them long after the installation has been completed.

References (or referrals) are critical

Put yourself in your customer’s shoes. Would you be comfortable giving your hard-earned money to someone who you know nothing about? Unlikely.


Presenting the homeowner with your references before beginning the quoting process, helps you build trust and rapport with your potential customer and will help put his mind at ease about the transaction.

Stay tuned for more useful sales tips and tricks - only on the official Centurion Systems blog!

Thursday, 14 April 2016

Are You a Sitting Duck?

The SAPS has issued a warning regarding a new modus operandi employed by a car hijacking syndicate operating in the Muldersdrift area, close to the Beyers Naude offramp.

It starts off innocently enough. Operating under the guise of being a Good Samaritan and feigning concern, a passing car points to your own vehicle, ostensibly alerting you to the fact that something is amiss, perhaps a flat tyre or a water leak. Shortly after, a second car points out the same area of affliction threatening to fell your automobile. What choice does one have but to trust these kindly strangers, who displayed such chivalry in notifying you of the impending mechanical calamity? You stop your car next to the road to inspect, and that is when a third car pulls up next to you. The driver and several cohorts get out of the vehicle, the weapons in their gloved hands making their intentions excruciatingly clear…

Car hijackings are on the rise, adding to the already palpable miasma of fear that South Africans are faced with on a daily basis. And while it is true that many hijackings occur on our roads, it has been found that most hijackings take place in residential driveways as motorists are about to enter the property. The exact percentage of driveway hijackings varies, but it has been estimated that between 50% and 80% of hijackings are perpetrated in this manner.

Only last year, beloved radio personality David O'Sullivan's wife and young son were left traumatised when armed robbers followed them into their property and liberated Mrs. O'Sullivan of jewelry and other valuables.


Motorists often have to wait outside their property for the entrance gate to open. This creates a “boxed in” effect and criminals use this period of immobility to their advantage.

It is important that the time that your vehicle remains stationary is kept to an absolute minimum. If you know that your gate generally takes a long time to fully open, rather ask someone to be ready to open for you when you arrive home.

Alternatively, have a very fast gate motor installed; preferably a model that can be interfaced with infrared beams and set to close behind you the moment that you are safely inside your property.


Don’t become a sitting duck for opportunistic criminals.

Tuesday, 15 January 2013

Your 2013 Security Calendar

As an avid security enthusiast, chances are you’ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages!

I personally feel that a good security expo brings out the child in all of us; at the risk of succumbing to a tired metaphor, one does almost feel like a kid in a candy store when attending one of the many security-oriented events held throughout the year. The myriad gadgets, technological innovations and space-age intelligence generally on display at security events always leaves one feeling undeniably inspired by the sheer power of human endeavour, no longer cowed by an uncertain future but rather excited at the prospect of a secure one.
CENTURION is fortunate enough to have participated in a number of these prestigious events in the past – and will certainly continue to do so in the future - and we hereby submit for your reading pleasure a small sample of what you can look forward to in the year ahead.

1.       SecurExpo 2013
This relatively new entrant to the world of security conventions was held for the first time in Harare, Zimbabwe in March of 2012. SecurExpo, which saw a very successful launch at the Royal Harare Golf Club last year, draws participants from all sectors of the economy and focuses on all facets of security including cybercrime, cable theft prevention, computer forensics, etc. If SecurExpo 2012 was anything to go by, this event is sure to become Zimbabwe’s premier showcase for integrated security solutions.     

The theme for this year is “Integrated Security, providing Global Protection”
Venue: Harare, Zimbabwe.  For more information contact Conrad Chibanda, cchibanda@secureexpo.org

Dates: 13 to 16 March 2013

2.       Secutech 2013
The official Secutech website bills the event as “The business platform for global security manufacturers to demonstrate corporate values”. Sounds good to me!

The 16th annual Secutech international exhibition and conference for electronic and information security, fire and safety will be held in Taiwan and will showcase innovations in areas such as surveillance, access control, personal safety and police equipment.
Venue: Taipei Nangang Exhibition Center in Taiwan

Dates: 24 to 26 April 2013
Website: www.secutech.com

3.       Mine Site Security Conference
With Africa holding the world’s largest producer of platinum and one the largest producers of gold, it is only natural that integrated security solutions would be such an important factor when it comes to the safeguarding of our valuable subterranean resources. Of course, access control is also important from a safety perspective as it is imperative that the identities of all employees engaged underground at any given time are known and easily accessible. And so, the Mine Site Security Conference was born.

Venue: Park Inn, Sandton
Dates: 28 to 29 January 2013


4.       IFSEC 2013
As far as security expos go, this is the biggie. This writer, for one, cannot help but succumb to almost juvenile excitement when thinking about the row upon row of hi-tech gear. Last year saw the event play host to almost 6000 visitors and some 200 exhibitors – will these numbers be exceeded at IFSEC 2013?

According to IFSEC SA’s website “IFSEC South Africa is the leading Commercial Security, Homeland Security and Fire exhibition on the African continent”.

Note that IFSEC also boasts international legs, including one in the UK and one in Nigeria.
Venue: Gallagher Convention Centre, Midrand

Dates: 18 to 20 June 2013
Website: www.ifsecsa.com  

Wednesday, 17 October 2012

CENTURION Uses Key Technologies to Help Keep You Safe

“And slowly, and surely, they drew their plans against us”
 
This iconic line forms part of the introduction to one of the most famous radio plays ever to be recorded, the Orson Welles adaptation of H.G. Wells’ unnerving sci-fi tour de force, The War of the Worlds. Of course, the conspirators Wells was referring to here were malicious otherworldly intelligences intent on destroying our planet and/or enslaving the human race. It was gripping stuff; so gripping, in fact, that it sowed widespread panic when it was broadcast sometime during the beginning of the previous century.
So how does the father of modern science fiction’s ominous opening words – so utterly ripe with foreboding – relate to the current security situation in South Africa?
It’s quite simple, really. The reality is that yes, South Africa sleeps, but it is an uneasy sleep plagued by nightmares of home invasions and crooks lurking about in the night. In this sense, we are akin to War’s protagonist (and indeed, all of mankind), our eyes darting nervously about as we await the imminent invasion and the terrible fate that awaits us.
But it need not be that way. If there is one prevailing theme throughout the history of mankind, it is the triumph of good over evil. We, the average citizens of this country, the home and business owners, are Good, while the criminals represent the forces of Evil.
Centurion Systems has developed a number of key technologies to aid the forces of Good in this eternal struggle, and to help South Africans sleep more soundly, secure in the knowledge that their homes and families are safe. It is worth noting that CENTURION is a South African company with South African sensibilities, always in tune with the unique security needs of the country.
CENTURION’s ongoing influence in the fight against crime is clearly evident in the following technologies:
 
Intruder-detection Alarms
As children, the majority of us were told cautionary tales and feared the “bogeyman”: an exaggerated evil entity that would come for us if we misbehaved. But, in our childlike innocence, we knew that switching on the light would render the bogeyman powerless and banish him to the realms of shadow whence he came.
In the slightly imagination-stripped world of adulthood, the bogeyman takes the shape of criminals wanting to get their hands on our possessions – or otherwise cause us harm – and the entrance gate is the typical point where they would try breach perimeter security. From following hapless homeowners into their properties to obstructing the gate safety beams so that the gate stays open, criminals have devised all sorts of clever ways of gaining entrance.
The Intruder-detection Alarm feature-set is CENTURION’s interpretation of “switching on the light” and catching the bogeyman in the act.  These alarms – consisting of the Break-in Alarm and Ambush Alarm – work by sounding the onboard buzzer of your D-Series operator (D10/D10 Turbo, D5-Evo, SECTOR, VECTOR2) whenever the infrared gate safety beams are interrupted, or remain interrupted for a predefined period of time.
Consider, if you will, the practical application of these alarms: A potential intruder has been staking out your house for a couple of nights and knows your habits, your comings and goings. Then, one night, the criminal sees you enter your property and decides to stick some insulation tape over the lenses of the beams, thereby keeping the gate open and affording himself ample opportunity to enter the yard.
But the joke’s on him, because you have enabled the Ambush Alarm which promptly picks up that the beams have been obstructed for the preset period of time, and it triggers the alarm which you have relayed to your security company. The armed response chaps arrive and arrest the would-be burglar. Threat neutralised.
 
ChronoGuard
As you can most probably deduce from its name, ChronoGuard was named after the Greek word for time, “chronos”, which is also used as a prefix in English words related to time (think: “chronological”).
Yes, the ChronoGuard is a timer, but it is a timer that opens up a world of access control possibilities.
 
Take, for example, the Auto-activations feature offered by ChronoGuard. Using the onboard Real Time Clock and Calendar found in CENTURION D-Series controllers, this feature allows you to set up to 100 unique time periods that can be used to perform a myriad automatic activations. Among them:
·         Opening your gate during busy times, such as in the mornings, so that your gate motor’s battery is not run flat from continually opening and closing
·         Interfacing with an irrigation system to water your garden at certain times of the day
·         Automatically switching on a security light only at night so as not to waste electricity
The possibilities are virtually endless.
Then there’s the Time-barring functionality. This security feature is useful to anyone from home-owners to managers who want to restrict access to their property after work or during weekends. Time-barring can be used to inhibit signals from remote controls or even physical triggers, so criminals won’t be able to simply short-circuit wires in order to get the gate to open.
From a practical application perspective, this is very handy since employers who have issued their staff with remotes can configure their D-Series gate motor or traffic barrier to work during normal office hours, but ignore inputs from remotes after hours. Hey presto – you now have a highly effective access control system without having to buy any expensive additional equipment. All that is needed is your CENTURION D-Series operator.
Code-hopping Technology
 
“And slowly, and surely, they drew their plans against us”
That menacing line makes a final appearance. Criminals have always attempted to use our own tools and technology against us and, at times, it even seemed as though they had succeeded.
“Code grabbing” is one way in which tech-savvy crooks have been doing this; taking the wonderful convenience of remote controls and using it for their own dark purposes. What basically happens is this: a homeowner stops at his entrance gate and presses his remote, oblivious to the fact that in the bushes nearby a crook is hiding wielding a makeshift signal-grabbing device. The crook than uses this device to “grab” the code transmitted by the homeowner’s remote, and so gets carte blanche for helping himself to the homeowner’s possessions.
In an effort to combat this malfeasance, CENTURION has implemented code-hopping technology. What this means, is that every code transmitted by the CENTURION transmitter is completely and randomly different to the previous one, making code-grabbing more or less impossible. It is worth noting that this is the same sort of secure technology currently employed by leading vehicle manufacturers.
From the development and implementation of these innovative technologies it is clear that in actuality it is us drawing our plans against the criminals, and not vise versa.