Official TEKConn Blog

Combining network and physical security

Cameras and other security tools can be integrated with IT systems for remote monitoring and improved efficiency.

Cameras and other security tools can be integrated with IT systems for remote monitoring and improved efficiency.

In this blog, we have talked at length about various IT assets and how they impact the operations of small and midsize businesses (SMBs), banking institutions, healthcare facilities and more.

Smartphones and tablet computers have brought mobile device management and security to the forefront as bring-your-own-device programs proliferate the business world. Several high-profile hacking incidents have driven home the need for strong password management measures for everyone from part-time employees to CEOs.

There's another type of IT asset that deserves its fair share of attention though, and today we're going to give it its due. When we think of security in the IT sense, words like firewalls, malware and viruses spring to mind. But, security cameras can often prove to be a critical element of an organization's defenses.

"A camera serves two purposes. The first is dissuasion, where any potential thief knows that they are being recorded, which may prevent the criminal act in the first place," a recent TechRepublic article said. "But also, if someone does attempt anything, then you have a recording of it. And unlike a witness, a camera records exactly what went on and can be used effectively in court should you suffer an actual loss…"

An SMB could have hundreds of thousands of dollars in equipment in their offices, while a medical practice might have stores of prescriptions meds. In either scenario, theft poses several serious problems.

It's important not to overlook IT integration when setting up an office security system and cameras. The best IT support firms can work with organizations to coordinate technologies so that footage can be recorded to office servers or hard drives and properly catalogued. In many cases, camera systems can even be viewed and controlled via smartphone with custom mobile applications. So a business owner can be alerted to unauthorized activity at any time, no matter where he or she might be.