SlideShare a Scribd company logo
1 of 16
Download to read offline
5when choosing a security system 
MISTAKES TO AVOID 
by Andrea Baratta
INTRODUCTION
Security systems have become a very important 
and integral part of both residential and 
commercial living. 
According to the 2012/2013 crime statistics report* 
more than 50% of recorded offences are classified 
as burglary and theft. 
It’s not a surprise that buyers are willing to invest 
more in a safe and secure property and companies 
look for solutions to ensure their businesses are 
not being damaged or broken into. 
Electronic security systems such as CCTV, access 
control and intercoms represent an easy and 
affordable way of achieving this but you need to 
make sure you don’t make some common mistakes 
that reduce the efficacy of the system installed. 
We have identified 5 recurring mistakes when it 
comes to choosing or managing a security system. 
3 
*Victoria Police – Crime statistics 2012/2013
COMMON MISTAKE #1
5 
Ignoring your building security rating 
Not all buildings and security systems are the same. Knowing 
the security level of your building is the starting point to 
understand how your property compares with others, identify 
key risks and design a customised solution that will maximise 
the results. 
When it comes to security, the environment where the system 
operates is a fundamental variable that should be taken into 
consideration. Limiting the process to obtaining a quote and 
installing a new system is often not enough to address your 
security concerns. 
Epsilon Security adopts a innovative rating system that can help 
you assess the current level of security in your building and 
compare it to the average value of the properties in your area. 
The report will then enable you to identify key risks and 
implement a solution that not only will significantly improve 
your safety but will also increase the rating of the building and, 
as a consequence, the value of your property.
COMMON MISTAKE #2
7 
Lacking clear security objectives and a strategy 
to achieve them 
When multiple parties are involved in the decision making 
process it could be very difficult to find common ground 
and security works are continuously delayed, leaving 
the building exposed to threats. 
Key risks and requirements should become part of a more 
comprehensive security plan that defines what objectives 
the security upgrade will help you achieve, what solutions 
can be adopted and an implementation roadmap. 
The security plan can be used as a discussion paper with 
other stakeholders involved in the process and become 
the reference for any security related decisions whether 
they are immediate or in the future. 
Epsilon Security can provide you with a roadmap that helps 
you explore different options and keep your security effective.
COMMON MISTAKE #3
9 
Being confused by new technologies 
and technical jargon 
Like many clients we work with, you might not have a 
technical background and have limited knowledge about 
available technologies and products in the market. 
Security products evolve at such a fast pace that you 
would need to invest lot of time to keep current with latest 
technological developments. 
We believe you don’t need to spend hours trying to become 
an expert before buying a solution, however, we always 
recommend making informed decisions. This means 
understanding the general principles of how the systems 
work, the technologies used and what to expect from 
the operational point of view. You don’t want to end up 
with products that become superseded shortly after the 
installation and for which spare parts may become an issue. 
From e-books to workshops, Epsilon Security has a range 
of tools that help you evaluate products and systems before 
making a decision.
COMMON MISTAKE #4
11 
Using wrong products and unreliable suppliers 
The security market is growing faster than ever before and 
there are countless security providers out there. 
Being cautious in your decision and looking at the long term 
value provided can save you lot of money in the future as well 
as providing you with a more reliable system for the present. 
The main reasons why security systems need to be replaced 
are the lack of service and the availability of spare parts. Our 
recommendation is to make sure that your supplier or installer 
has an established presence in the market and is known for 
providing good service other than being able to support the 
systems after the installation. You can easily find information 
about them on the internet, security magazines or simply by 
word of mouth. 
Epsilon Security has been servicing the Australian market for 
more than 30 years and all our products come from reliable 
suppliers who always have spare parts or back-compatible 
products for their systems. All our installers carry a valid 
security license and comply with current security regulations.
COMMON MISTAKE #5
13 
Underestimating the importance 
of a maintenance plan 
New digital and IP (Internet Protocol) based systems offer 
features and performances far more advanced than old 
analogue systems. At the same time, like any electronic device, 
they require periodical inspections, cleaning and sometimes 
resetting. Not having a maintenance contract or plan in place 
might result in your system being less reliable than expected. 
At Epsilon Security, we can provide you with a customised 
maintenance plan (MAP©) that includes three key documents 
that will help you keep your building safe and secure: 
a) a Maintenance program for each system so that downtime 
can be reduced or eliminated 
b) an Asset register to identify all the products installed 
and their position so that items can be easily located 
and replaced and 
c) Standard Procedures to follow in case of security issues.
ABOUT US 
We hope the ideas and suggestions proposed in this booklet 
are valuable to you. If you are upgrading or evaluating a 
security install at your property you might want to use our 
free templates to streamline and manage the installation 
process more effectively. 
You can download your FREE copy of the templates at: 
www.epsilonsecurity.com.au 
If you have any concern about the security in your building we 
can also provide a Building Security Rating for your property. 
The Building Security Rating is a unique and innovative 
methodology that certifies how secure your building is. 
It has been developed in collaboration with the University 
of Melbourne. 
If you need more information please send us an email, call 
our office or visit us. We have branches in Melbourne, Sydney 
and Brisbane. We’d love to hear from you! 
Andrea Baratta 
t: +61 3 9553 6888 
e: andrea@epsilonsecurity.com.au
VIC 
47 Levanswell Road 
Moorabbin VIC 3189 
t: +61 3 9553 6888 
f: +61 3 9553 6887 
e: infovic@epsilonsecurity.com.au 
NSW 
36 Ricketty Street 
Mascot NSW 2020 
t: +61 2 8585 0700 
f: +61 2 8585 0701 
e: infonsw@epsilonsecurity.com.au 
QLD 
Unit 32, 17 Cairns Street 
Loganholme QLD 4129 
t: +61 7 3801 3555 
f: +61 7 3806 0926 
e: infoqld@epsilonsecurity.com.au 
www.espilonsecurity.com.au

More Related Content

What's hot

What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?Siemplify
 
Seekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingSeekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingPaul Enright
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsGareth Niblett
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemEoin Woods
 
Reducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills DevelopmentReducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills DevelopmentCompTIA
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSiemplify
 
Infinit security card-mark capwell
Infinit security card-mark capwellInfinit security card-mark capwell
Infinit security card-mark capwellMark Capwell
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallSplunk
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster CompanyPriyanka Aash
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT Innovators
 
Splunk ITOA Roundtable - Zurich: 30th November 2017
Splunk ITOA Roundtable - Zurich: 30th November 2017Splunk ITOA Roundtable - Zurich: 30th November 2017
Splunk ITOA Roundtable - Zurich: 30th November 2017Splunk
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityElasticsearch
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything IISPEastMids
 

What's hot (20)

What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
Seekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingSeekintoo-SIEM Consulting
Seekintoo-SIEM Consulting
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
API Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About ThemAPI Vulnerabilties and What to Do About Them
API Vulnerabilties and What to Do About Them
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Reducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills DevelopmentReducing IT Security Breaches Through Skills Development
Reducing IT Security Breaches Through Skills Development
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
Infinit security card-mark capwell
Infinit security card-mark capwellInfinit security card-mark capwell
Infinit security card-mark capwell
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster Company
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Splunk ITOA Roundtable - Zurich: 30th November 2017
Splunk ITOA Roundtable - Zurich: 30th November 2017Splunk ITOA Roundtable - Zurich: 30th November 2017
Splunk ITOA Roundtable - Zurich: 30th November 2017
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
CyberObserver
CyberObserverCyberObserver
CyberObserver
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 

Viewers also liked

Jornada de “sensibilización y concientización por la seguridad ciudadana”
Jornada de “sensibilización y concientización por la seguridad ciudadana”Jornada de “sensibilización y concientización por la seguridad ciudadana”
Jornada de “sensibilización y concientización por la seguridad ciudadana”Portafolio periodístico - Pp
 
An education, or process, approach elt j 1993-flowerdew-305-16[1]
An education, or process, approach elt j 1993-flowerdew-305-16[1]An education, or process, approach elt j 1993-flowerdew-305-16[1]
An education, or process, approach elt j 1993-flowerdew-305-16[1]eidda AR
 
The Uber Moment for Banking
The Uber Moment for BankingThe Uber Moment for Banking
The Uber Moment for BankingEdwin Zacipa
 
Discussion 1 assure
Discussion 1 assureDiscussion 1 assure
Discussion 1 assureeidda AR
 
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LREpsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LRAndrea Baratta
 
Graber’S Amish Bakery
Graber’S Amish BakeryGraber’S Amish Bakery
Graber’S Amish Bakeryguest30e39b9
 
Los 3 elementos del marketing
Los 3 elementos del marketingLos 3 elementos del marketing
Los 3 elementos del marketingdefault default
 
" Chromakey. Una llave para la Educación"
" Chromakey. Una llave para la Educación"" Chromakey. Una llave para la Educación"
" Chromakey. Una llave para la Educación"omarslide
 

Viewers also liked (12)

Jornada de “sensibilización y concientización por la seguridad ciudadana”
Jornada de “sensibilización y concientización por la seguridad ciudadana”Jornada de “sensibilización y concientización por la seguridad ciudadana”
Jornada de “sensibilización y concientización por la seguridad ciudadana”
 
mestizaze01
mestizaze01mestizaze01
mestizaze01
 
An education, or process, approach elt j 1993-flowerdew-305-16[1]
An education, or process, approach elt j 1993-flowerdew-305-16[1]An education, or process, approach elt j 1993-flowerdew-305-16[1]
An education, or process, approach elt j 1993-flowerdew-305-16[1]
 
The Uber Moment for Banking
The Uber Moment for BankingThe Uber Moment for Banking
The Uber Moment for Banking
 
Discussion 1 assure
Discussion 1 assureDiscussion 1 assure
Discussion 1 assure
 
Unidad ii primer parte
Unidad ii primer parteUnidad ii primer parte
Unidad ii primer parte
 
My Story
My StoryMy Story
My Story
 
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LREpsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
 
Graber’S Amish Bakery
Graber’S Amish BakeryGraber’S Amish Bakery
Graber’S Amish Bakery
 
Los 3 elementos del marketing
Los 3 elementos del marketingLos 3 elementos del marketing
Los 3 elementos del marketing
 
Cursos
CursosCursos
Cursos
 
" Chromakey. Una llave para la Educación"
" Chromakey. Una llave para la Educación"" Chromakey. Una llave para la Educación"
" Chromakey. Una llave para la Educación"
 

Similar to Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR

10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
Network security
Network securityNetwork security
Network securityROBERT S
 
Commercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideCommercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideBusiness.com
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityMichael Xevgenis
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyerTimmy Chou
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxElaineLadyman1
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Asim Jahan
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfNathanDjami
 

Similar to Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR (20)

10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Network security
Network securityNetwork security
Network security
 
Commercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideCommercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com Guide
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information Security
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyer
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsx
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 

Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR

  • 1. 5when choosing a security system MISTAKES TO AVOID by Andrea Baratta
  • 3. Security systems have become a very important and integral part of both residential and commercial living. According to the 2012/2013 crime statistics report* more than 50% of recorded offences are classified as burglary and theft. It’s not a surprise that buyers are willing to invest more in a safe and secure property and companies look for solutions to ensure their businesses are not being damaged or broken into. Electronic security systems such as CCTV, access control and intercoms represent an easy and affordable way of achieving this but you need to make sure you don’t make some common mistakes that reduce the efficacy of the system installed. We have identified 5 recurring mistakes when it comes to choosing or managing a security system. 3 *Victoria Police – Crime statistics 2012/2013
  • 5. 5 Ignoring your building security rating Not all buildings and security systems are the same. Knowing the security level of your building is the starting point to understand how your property compares with others, identify key risks and design a customised solution that will maximise the results. When it comes to security, the environment where the system operates is a fundamental variable that should be taken into consideration. Limiting the process to obtaining a quote and installing a new system is often not enough to address your security concerns. Epsilon Security adopts a innovative rating system that can help you assess the current level of security in your building and compare it to the average value of the properties in your area. The report will then enable you to identify key risks and implement a solution that not only will significantly improve your safety but will also increase the rating of the building and, as a consequence, the value of your property.
  • 7. 7 Lacking clear security objectives and a strategy to achieve them When multiple parties are involved in the decision making process it could be very difficult to find common ground and security works are continuously delayed, leaving the building exposed to threats. Key risks and requirements should become part of a more comprehensive security plan that defines what objectives the security upgrade will help you achieve, what solutions can be adopted and an implementation roadmap. The security plan can be used as a discussion paper with other stakeholders involved in the process and become the reference for any security related decisions whether they are immediate or in the future. Epsilon Security can provide you with a roadmap that helps you explore different options and keep your security effective.
  • 9. 9 Being confused by new technologies and technical jargon Like many clients we work with, you might not have a technical background and have limited knowledge about available technologies and products in the market. Security products evolve at such a fast pace that you would need to invest lot of time to keep current with latest technological developments. We believe you don’t need to spend hours trying to become an expert before buying a solution, however, we always recommend making informed decisions. This means understanding the general principles of how the systems work, the technologies used and what to expect from the operational point of view. You don’t want to end up with products that become superseded shortly after the installation and for which spare parts may become an issue. From e-books to workshops, Epsilon Security has a range of tools that help you evaluate products and systems before making a decision.
  • 11. 11 Using wrong products and unreliable suppliers The security market is growing faster than ever before and there are countless security providers out there. Being cautious in your decision and looking at the long term value provided can save you lot of money in the future as well as providing you with a more reliable system for the present. The main reasons why security systems need to be replaced are the lack of service and the availability of spare parts. Our recommendation is to make sure that your supplier or installer has an established presence in the market and is known for providing good service other than being able to support the systems after the installation. You can easily find information about them on the internet, security magazines or simply by word of mouth. Epsilon Security has been servicing the Australian market for more than 30 years and all our products come from reliable suppliers who always have spare parts or back-compatible products for their systems. All our installers carry a valid security license and comply with current security regulations.
  • 13. 13 Underestimating the importance of a maintenance plan New digital and IP (Internet Protocol) based systems offer features and performances far more advanced than old analogue systems. At the same time, like any electronic device, they require periodical inspections, cleaning and sometimes resetting. Not having a maintenance contract or plan in place might result in your system being less reliable than expected. At Epsilon Security, we can provide you with a customised maintenance plan (MAP©) that includes three key documents that will help you keep your building safe and secure: a) a Maintenance program for each system so that downtime can be reduced or eliminated b) an Asset register to identify all the products installed and their position so that items can be easily located and replaced and c) Standard Procedures to follow in case of security issues.
  • 14. ABOUT US We hope the ideas and suggestions proposed in this booklet are valuable to you. If you are upgrading or evaluating a security install at your property you might want to use our free templates to streamline and manage the installation process more effectively. You can download your FREE copy of the templates at: www.epsilonsecurity.com.au If you have any concern about the security in your building we can also provide a Building Security Rating for your property. The Building Security Rating is a unique and innovative methodology that certifies how secure your building is. It has been developed in collaboration with the University of Melbourne. If you need more information please send us an email, call our office or visit us. We have branches in Melbourne, Sydney and Brisbane. We’d love to hear from you! Andrea Baratta t: +61 3 9553 6888 e: andrea@epsilonsecurity.com.au
  • 15.
  • 16. VIC 47 Levanswell Road Moorabbin VIC 3189 t: +61 3 9553 6888 f: +61 3 9553 6887 e: infovic@epsilonsecurity.com.au NSW 36 Ricketty Street Mascot NSW 2020 t: +61 2 8585 0700 f: +61 2 8585 0701 e: infonsw@epsilonsecurity.com.au QLD Unit 32, 17 Cairns Street Loganholme QLD 4129 t: +61 7 3801 3555 f: +61 7 3806 0926 e: infoqld@epsilonsecurity.com.au www.espilonsecurity.com.au