- Keeping the Bad Guys Out
- What To Protect: Necessity Versus Convenience
- Access Controls: Keys, Numeric Pads, Proximity Sensors, and Beyond
- Logs and Reports: Who Has Been Where, and When?
- Summary Checklist
Logs and Reports: Who Has Been Where, and When?
One of the very best features that you get with an electronic security system is logs. Log files tell you when each door was accessed and by whom. You see both successful and unsuccessful attempts, so you know if someone is trying to reach an unauthorized area. Even if the user is authorized, he or she may be inappropriately accessing an area after hours. If you don't have a night shift, someone's name showing up on a report for having accessed a door at 2:00 a.m. should raise a red flag. Investigate any potential foul play.
It's important that the correct fob/card be assigned to the correct person to match what's programmed in the security database. Otherwise, your log files won't be accurate, and someone could be using someone else's identity. I did this accidentally, so I know what can happen. I programmed and handed out the fobs for my staff. I noticed later in the logs that one person's name was showing up as accessing the computer room door on a day when I knew he was on vacation. I grew suspicious about what he might be doing in the office on his day off, until I realized that I had switched two of the cards and was tracking the wrong person. Oops! Learn from my mistake.