Monday, April 27, 2009

Layer your security like an onion


When you think about security, think of an onion not an egg. Often homeowners place all their security hopes on one simple thing a door lock. With only one line of defense standing between a criminal and his quest to procure your items as their own, the odds of success are clearly in the bad guys favor. The greater the layers of security a criminal must traverse to accomplish his desires, the greater his or her chance of failure. Think of your security like an onion with multiple layers of obstacles, not an egg with a thin easily penetrable shell.
The first layer of defense can be fence with a locking gate or a front porch with a gate. If, however, the lock on the gate is broken it is a clear sign to a criminal that any other layers of security will almost certainly be weak.
The next layer of security is a locking storm door, with the main door protected by a main lock and a dead bolt lock. Any windows should not be obstructed by high bushes where a criminal could hide behind. Prickly bushes like a holly bush or rose bushes provide a natural barrier against criminals if they are planted in front of a window. When protecting windows adding additional window locks as a backup and window pins that will prevent the window from being raised past a certain height are essential in preventing the window from being pried open. Another barrier is motion detecting lights as well as any good exterior lighting that illuminates any potential hiding places.
A security yard sign is also a minor deterrent to criminals, but criminals are incredibly adept in knowing whether a sign is just a ploy. Often many homes have security signs of defunct security companies in their yard. Also many big box companies design the majority of their promotional security systems the same way, which gives the criminal a road map of what to do in order to circumvent the alarm. If you have a basic alarm system it is only a beginning. Every three to four years security systems need to be updated to stay ahead of criminal advancements.
Even the security system needs to be layered, especially the communication apparatus, must be layered. Dependence on a conventional phone line is not enough. The addition of a cell phone back-up unit is essential to an overall security alarm defense to assure that communication can be made if the primary phone line is cut. Another way of protecting the primary phone line is to armor plate the line leading into the telephone box then installing a metal strong box over the telephone box. The strong box must be secured with headless screws or rivets.
Prior to accessing the security system a critical layer of defense are security surveillance cameras. These cameras can record suspicious activity and even send a video feed to an offsite location for back-up storage. This makes circumventing the defenses a daunting task. When the criminals are forced out of their comfort zone and made to conform to the security devices they are at a huge disadvantage. Although most people can not afford to everything, it is best to do all you can afford to do.
The key to any successful security plan is commitment to make it a success. You must first adopt a mentality that you will not be lax on security issues. A consciousness that says safety first is far better than the mindset that it won’t happen to me so I don’t worry about it. There are few things worst than coming home to a ransacked home. Finding what remains of your personal possessions tossed like trash is a gut wrenching feeling. The knowledge that your items that were stolen most likely won’t be seen again is the second wave of violation. According to national statistics someone is burglarized on average every 15.6 seconds somewhere in the United States. Layering your security measures and nurturing a security consciousness can prevent a criminal’s next victim from being you.
Your comments about this post are welcomed. For more detailed information on security products and home security systems go to http://whensafetymatters.com

No comments: