{"id":17581,"date":"2015-08-15T17:56:13","date_gmt":"2015-08-15T21:56:13","guid":{"rendered":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you.html"},"modified":"2015-08-15T17:56:13","modified_gmt":"2015-08-15T21:56:13","slug":"business-report-hello-security-i-am-it-how-are-you","status":"publish","type":"post","link":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/","title":{"rendered":"Business Report: Hello Security. I Am IT. How Are You?"},"content":{"rendered":"
\n
\n\"mark_shaw.jpg\"\n<\/div>\n
Mark Shaw, president, Stored Technology Solutions (StoredTech)\n<\/div>\n<\/div>\n

BY MARK SHAW<\/p>\n

It began years ago when technology started
\ntaking over many facets of our workplace. In
\nthe beginning, computers took the place of
\nhandwritten sheets of data and typewriters,
\nthen technology came to our phones, they were
\ncordless, then they were mobile, and now with
\ntoday’s smart phones, the joke of “Oh it makes
\nphone calls too?” has become the norm.<\/p>\n

In the business world, phones went from
\ndigital and analog, to full IT centric, a VoIP
\n(Voice over IP) technology which enables a
\nplethora of new features on the same cable
\nthat runs the network and internet. Phones
\nbecame integrated in to the desktop PC experience,
\nincluding on screen dialing, chatting and
\nconference calling, following your call from
\nPC to Phone to Cell, and voicemails to email.
\nSo what does any of this have to do with
\nsecurity in the workplace?
\nIt’s all related, the same jump from the old
\nworld security of using a key, to upgrading to
\nan alarm system after you use your trusty key
\nto the evolution of IP based, think technology,
\naccess control for your company.<\/p>\n

What is this new technology anyways? This
\nnew form of access control and security has
\ndramatically improved the experience and
\nsafety of the workplace. In the modern era of
\nsecurity you have door locks that are fully based
\non networking and software and can allow a
\nlock or unlock of a door with a swipe card, facial
\nrecognition or any number of biometric means.
\nThe system locks or unlocks the doors based on
\na series of access control requirements.<\/p>\n

For example, you can have a set of employees
\nwho can only access the building Monday
\nthrough Friday, 8 a.m. till 7 p.m. If one of those
\nsecurity groups tries to access the door outside
\nof those hours on a Saturday for example, they
\nwill be unable to enter the office. This provides
\nsome level of overview for what each employee
\ncan and cannot do on the off hours where there
\nmay be no management in the facility.<\/p>\n

With computers running the show you can
\nalso provide detailed reports of who entered
\nthe facility and when did they leave. You can
\ncorrelate this data to any number of employee
\nrequired data. As a business owner you know
\nwhen people came and went in your organization and for how long they were there.
\nThis is valuable information that can help
\nprevent loss of data, inventory or intellectual
\nproperty.<\/p>\n

Other values in this new technology are
\nin the inherent security this provides, no
\none is walking in and out of your company,
\nand employees know they are working in a
\nsafe work place. Safety for the staff as well
\nas accountability are huge factors in today’s
\nmodern world.<\/p>\n

Take a page from a company with key locks
\nand no security in their office. When they let
\na disgruntled employee go, they often ask for
\nthe keys without any real knowledge if these
\nkeys were duplicated. The company, unless it
\nchanges locks and goes through an expensive
\nre-keying for the staff, cannot ensure that there
\nare not individuals with access to the property.<\/p>\n

Today we can with a click of a mouse, deactivate
\nan employee’s key card and even set
\nalerts if said employee tries to use the card
\nin any door at any office, anywhere. All of this
\ncontrol can be done remotely without ever
\nhaving to put a foot in the office. We are seeing
\na world of network and internet controlled
\naccess control.<\/p>\n

These are just a few examples of the technology
\nenabled security that organizations are
\nactively using today. Technology that even a few
\nyears ago was so costly and so cumbersome,
\nthe value for small businesses was not there.<\/p>\n

If you consider the power of such technology
\namplified with all the of surveillance camera
\nsystems available today you can take a moment
\nin time, pinpoint all the data that was recorded
\nfrom the cameras, tied to who was in the facility
\nand who came and went, you have a secure
\nworkplace that employees and owners alike
\ncan feel comfortable with.<\/p>\n

We are seeing a world of network and internet
\ncontrolled access control, where we can add
\nsecurity and safety requirements to the top of
\nthe list. IT firms are finding this is an ideal niche
\nfor them because the core foundation for all this
\ntechnology is the same network that serves up
\nyour files, emails, computers, and phones.<\/p>\n

By utilizing this core technology that most
\nsmall businesses already have, you can leverage
\na technology that sits on top of this, is monitored
\naround the clock and is able to provide data on
\na level unseen before.<\/p>\n

If you have not considered a technology based
\naccess control system for your organization,
\nperhaps now is the time. What efficiencies and
\nadded security can you provide everyone in
\nyour employ? The world is more technology
\nbased then ever, access control is just the latest
\nvictim of that.<\/p>\n

Can you find a typewriter in your organization?
\nBest bets are in the next few years, it will
\nbe sitting next to your keys.<\/p>\n

Shaw, president of Stored Technology Solutions<\/em>
\n(StoredTech).<\/p>\n

Photo Courtesy StoredTech<\/p>\n","protected":false},"excerpt":{"rendered":"

Mark Shaw, president, Stored Technology Solutions (StoredTech)BY MARK SHAW It began years ago when technology started taking over many facets of our workplace. In the beginning, computers took the place of handwritten sheets of data and typewriters, then technology…<\/p>\n","protected":false},"author":88,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[67],"yoast_head":"\r\nBusiness Report: Hello Security. I Am IT. How Are You? - Glens Falls Business Journal<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Business Report: Hello Security. I Am IT. How Are You? - Glens Falls Business Journal\" \/>\r\n<meta property=\"og:description\" content=\"Mark Shaw, president, Stored Technology Solutions (StoredTech)BY MARK SHAW It began years ago when technology started taking over many facets of our workplace. In the beginning, computers took the place of handwritten sheets of data and typewriters, then technology...\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Glens Falls Business Journal\" \/>\r\n<meta property=\"article:published_time\" content=\"2015-08-15T21:56:13+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/10\/mark_shaw.jpg\" \/>\r\n<meta name=\"author\" content=\"Amanda Delyser\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amanda Delyser\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/\",\"name\":\"Business Report: Hello Security. I Am IT. How Are You? - Glens Falls Business Journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\"},\"datePublished\":\"2015-08-15T21:56:13+00:00\",\"dateModified\":\"2015-08-15T21:56:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Report: Hello Security. I Am IT. How Are You?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website\",\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/\",\"name\":\"Glens Falls Business Journal\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5\",\"name\":\"Amanda Delyser\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g\",\"caption\":\"Amanda Delyser\"},\"url\":\"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/amandadelyser\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Report: Hello Security. I Am IT. How Are You? - Glens Falls Business Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/","og_locale":"en_US","og_type":"article","og_title":"Business Report: Hello Security. I Am IT. How Are You? - Glens Falls Business Journal","og_description":"Mark Shaw, president, Stored Technology Solutions (StoredTech)BY MARK SHAW It began years ago when technology started taking over many facets of our workplace. In the beginning, computers took the place of handwritten sheets of data and typewriters, then technology...","og_url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/","og_site_name":"Glens Falls Business Journal","article_published_time":"2015-08-15T21:56:13+00:00","og_image":[{"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-content\/uploads\/sites\/109\/2014\/10\/mark_shaw.jpg"}],"author":"Amanda Delyser","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amanda Delyser","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/","name":"Business Report: Hello Security. I Am IT. How Are You? - Glens Falls Business Journal","isPartOf":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website"},"datePublished":"2015-08-15T21:56:13+00:00","dateModified":"2015-08-15T21:56:13+00:00","author":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5"},"breadcrumb":{"@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/2015\/08\/business-report-hello-security-i-am-it-how-are-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/"},{"@type":"ListItem","position":2,"name":"Business Report: Hello Security. I Am IT. How Are You?"}]},{"@type":"WebSite","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#website","url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/","name":"Glens Falls Business Journal","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/9d7e187e0edba5e188b14052e66c4fc5","name":"Amanda Delyser","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4192a4b199506cdd7a2d2166c1a16dd3?s=96&d=mm&r=g","caption":"Amanda Delyser"},"url":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/author\/amandadelyser\/"}]}},"_links":{"self":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/17581"}],"collection":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/users\/88"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/comments?post=17581"}],"version-history":[{"count":0,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/posts\/17581\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/media?parent=17581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/categories?post=17581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glensfalls.com\/glensfallsbusinessjournal\/wp-json\/wp\/v2\/tags?post=17581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}