Friday, December 9, 2011

ATM User Safety Tips

ATM users should be advised about what steps they can take to reduce their risk of getting robbed. While it is unlikely that providing safety tips will prevent any particular robbery, the larger purpose is to change ATM users' habits. Safety tips can be provided through mailings to cardholders, signs posted at ATMs, messages printed on ATM receipts, messages displayed on ATM screens, safety presentations, and public awareness campaigns. Listed below are some standard safety tips for ATM users:

o    Be aware of your surroundings, especially between dusk and dawn. If you notice anything suspicious—a security light out, someone loitering nearby—consider coming back later or using a supermarket or convenience store ATM.

o    If using the ATM at night, take someone with you.

o    Park in a well-lit area as close as possible to the ATM.

o    At a drive-through ATM, be sure the doors are locked and the passenger windows are rolled up.

o    If you withdraw cash, put it away promptly; count it later, in private.

o    Put your ATM card and receipt away promptly; never leave your receipt at the ATM.

o    Keep your PIN secret—don't write it down, and don't share it with anyone you don't trust absolutely. Your PIN provides access to your account.

o    Shield the keypad when entering your PIN to keep it from being observed.

o    Avoid being too regular in your ATM use—don't repeatedly visit the same machine at the same time, the same day of the week, for instance.

ATM users should further be advised to close any vestibule doors securely and not to open doors for others. In addition, signs at ATMs should state that the site is being surveilled by cameras.

Some victims resist during robberies either to protect their valuables or because they believe the offender is about to get violent. Some succeed in preventing the robbery through resistance, while others get injured or killed. Offenders want to get the crime over with quickly so they can escape. Any delay increases their nervousness and, therefore, the likelihood they will become violent. Robbers are usually highly agitated and easily perceive the victim's actions as threatening. Drug and alcohol use will obviously influence their emotional state. Some use violence immediately to preempt any resistance. In cases with multiple offenders, the risk of violence increases because each offender is also concerned about appearing tough and in control to the other(s).

As with other violent crimes, victims should assess the particular situation, taking account of nearby assistance, weapons they are threatened with, offenders' behavior and emotional state, their own defensive abilities, and their own psychological need to resist. Given an imperfect understanding of why robbers become violent, compliance is usually the safer course of action for victims, and the best advice for police to offer. Widespread victim compliance, however, undoubtedly leads some offenders to perceive lower risk and, therefore, increases their ATM robbery rates. Stay safe!

For more information on security and access control please visit our website at

Wednesday, November 16, 2011

Is your website optimized for search engines?

1. Choosing Keywords
The basic premise of keyword optimization is simple: Discover the search words that potential customers are using to find products or services like yours, and then build your Web content around those words. What complicates matters is that countless other websites are trying to do the same thing.

Understand the competitive ratio. Generally speaking, the more popular (or potentially lucrative) the search term, the more websites compete to rank high for that search term. Yes, you want to rank high on popular terms -- but if you don't have limitless resources, it is wise to target search terms for which you have a realistic shot at a high ranking. The best keywords, says Jill Whalen, a longtime SEO practitioner and head of the consultancy High Rankings, are "words and phrases that are being searched but that may have been overlooked by other websites."
An effective way to find such terms is to calculate the ratio of the number of pages a search returns to the popularity of the search term. "You have to look at the competitiveness of every keyword phrase that's relevant to what you offer," Whalen says.
Do the math. First, draw up a list of the keywords -- or, better yet, keyword phrases -- a potential customer might plausibly search if he or she were looking for your product. (A bike retailer, for example, might start with variations on bike, bicycle, and cycling; a specialty shop might also try bike frames and bike components.)
Then, see how often users search for these terms by plugging each into keyword-tracking tools such as Wordtracker (, Keyword Discovery (, or Google AdWords's Keyword Tool ( The Google AdWords tool is free, and the website offers a free, though less robust, version of Wordtracker. Besides showing how many times these phrases are searched on average in a day or month, these tools will suggest other relevant terms. You may learn, for instance, that bicycle parts is a much more popular search term than bicycle components.
Next, run each phrase through Google. The more websites returned, the more competition you will have with that phrase. (In general, Woessner recommends devising terms that generate fewer than one million page hits.)
Finally, divide the number of indexed pages by the number of daily searches. The lower the result, the more promising the term. Ideally, says Woessner, the ratio should be 500 to 1 or less.
Narrow your keywords. If your ratio is higher than 500 to 1, you will probably want to choose narrower or more specific keywords. For example, if you do most of your business locally, you would be smart to add a geographic term to each keyword used on top-level pages. (Bicycle shop becomes bicycle shop Poughkeepsie.) Such a search is less popular, but the competition to win it is much less fierce, so it is likely to generate a better ratio.
There's no need to generate an exhaustive list of phrases. However, because each page of a website has a different focus or objective, each should have its own keywords. The homepage should have the most general terms, and keywords should become more tailored and specific as you burrow deeper into the site.
2. Placing Keywords Strategically
Once you have determined the best keywords to use, you need to employ them strategically, in two places.
In the code. It is the search engine that ultimately associates a keyword with a webpage, and the first place it looks to decipher a page is at the top of the page's coding -- within the so-called head tag that defines the page's overall characteristics. (A webpage's code, of course, isn't normally visible in a browser window; to see it, use the browser's "source" or "page source" command.) Incorporate the keywords you have chosen in the title, description, and keywords tags. These are often called meta tags, and the code often begins with that word.
The title will appear at the top of the user's browser window, and the description is often quoted by search engines, so these should be coherent and concise -- the title should be six to 12 words, according to Bruce Clay, a leading SEO consultant, and the description 12 to 24 words. Your title and description should reinforce each other and the page's visible content. If you have a lot of keywords, choose judiciously, because search engines prize natural-sounding language. You can load all your keywords, even misspelled variants, into the keywords tag field.
In the visible content. Your keywords should appear frequently in the text, as well as in the other elements of a page, including the descriptive "alt" tags that underlie images and in the headlines and subheads atop a section of text. Though there is no agreement among optimizers about how much text a page should include or how frequently keywords should be mentioned, they do agree on this: If people find your copy thoughtful and worth reading, a search engine will, too. Never stuff a page so full of keywords that it doesn't read naturally.
3. Building a Better Website
How your site is organized, designed, and built will affect its search-engine ranking, according to
Andy Robson, managing director of the optimizing firm dzine it. Organize content into themed categories, what Clay calls silos. "By lining up your content by the way people search, you define to the search engine what you're about," Clay says. You can either group similar pages together into separate directories of folders and subfolders, or you can create "virtual silos" by using links that guide a user from one page to the next.
Other strategies are more technical, so you may need to rely on a Web developer for assistance. The site must be hosted on a fast server. The page code should be free of bugs and fully comply with the standards for website structure set by the World Wide Web Consortium. (You can test this at Include in the site's code a special protocol known as Sitemap, which makes it easier for visiting search engines to scan the site. Sitemaps can be submitted directly to the search engines.
Seeding Links
Once you have optimized your website, you want to attract links from other sites. SEO consultants offer a fairly prosaic strategy: Build a good site with useful content to which other sites will want to send their readers. Here are a few strategies to grease that wheel.
Lend your expertise. Forge partnerships under which other sites can publish your repurposed or original content on the condition that they link back to your site. "Sharing your expertise about the product or the service can differentiate your brand," says Stephen Woessner. "The brand story is what gets somebody to purchase one product over another."
Find out who's linking to your competition. Many of them probably should be linking to you as well. The "links" tool at reports the inbound links to a website detected by the major search engines. Many of those links will come from directories that are important to your industry or community. There's no sin in requesting a link -- or in trading content for one.
Be choosy about linkers. "You want the best sites, not the most, to link to you," says Bruce Clay. "If an expert links to you, by association you're an expert" (provided the expert is in your subject area). By the same token, avoid link farms, or websites that exist solely to provide outbound links, and services that sell links outright. Search engines, says Clay, will penalize you for the chicanery.
SEO Subterfuge
The techniques we have talked about here are often described as ethical, organic, or natural SEO. By contrast, black hat SEO embraces manipulative or deceptive techniques to game the search-engine system. Search engines work hard to keep these techniques from working, so they are seldom effective for long and could even get you blacklisted. Here are several strategies that you are best off avoiding.
Cloaking: Presenting two different versions of the same page, one to search engines and one to users.
Keyword stuffing, or spamming: Loading up the meta tags with popular search terms that have no substantive connection with the page.
Hidden links and keywords: Concealing them in the background color, outside the visible margins, or in other code.

A great example of an optimized website is the Millennium Group website

Tuesday, November 1, 2011

Internal Theft and Fraud Costs Businesses $40 Billion a Year

Why rob a bank, when it’s so easy to steal from your employer?

• Retail theft rose by 5.9% in 2009, the biggest increase since 2001.
• But it's not the shoplifters retailers have to worry about.
• Dishonest employees steal about 6.6 times more than shoplifters.
• In fact, one out of every 28 retail employees was caught thieving in 2009.
Need a laptop? Just grab one from the office

• In 2005, theft of office equipment cost employers $550 million.
• By 2007, it cost employers $656 million.
• By 2009, it cost $747 million.
• Want that equipment back?
• Good luck.
• 96% of stolen office equipment is never recovered.
Often, the most dangerous culprit is someone on the inside

• According to Forrester Research, employee theft of sensitive information is 10 times costlier per incident than any accidental sharing of sensitive data.
• Forrester recommends, “Enterprises should focus more of their resources on stopping the most damaging incidents: deliberate theft by insiders and abuse by outsiders.”
What other crimes should businesses watch out for?

• Theft and fraud costs businesses $40 billion a year.
• It happens without guns, without violence and often, without detection.
• And 40% of these crimes are committed by trusted employees – not strangers.
Any organization could be a target

• It's not just consumer goods and laptops up for grabs.
• Companies need to protect their proprietary secrets, knowledge and processes that:
• Generate revenue
• Increase profits
• Provide competitive advantage
• This information can be stored almost anywhere, from Word documents and presentations to CAD drawings and flowcharts.
How much is that data worth?

• Knowledge-intensive industries accrue 70 to 80% of their portfolio value from proprietary data and secrets.
• What industries are we talking about?
• Manufacturing
• Information services
• Professional, scientific and technical services
• Transportation
• When their important data is stolen, leaked or misused, the impact can be catastrophic.
Visit for information on how to prevent internal theft and fraud.

Monday, October 17, 2011

Millennium Group educational based website redesign

Millennium Group is pleased to announce the release of their newly designed website! By updating the website,, they have been able to improve navigation, connect visitors with useful information about their expertise, and provide an easy way to contact them for assistance. The primary objective of the new Millennium Group, Inc. website is to educate end users and provide an effective business development tool for their dealers. They are placing an emphasis on making available the appropriate information and resources for their audience to learn about Millennium Group products and industry expertise. Listed below are some highlights from the site:

Millennium Group's website was designed to be user- friendly and simple to navigate. The new website is designed to allow users to quickly find the content they are looking for from the main page. In addition, its low hierarchical structure allows users to find information easily. ..and smoothly.

A brand new feature know as the “Did you know?” section will surely give you a new perspective on the security industry as a whole. Learn the surprising truth about a businesses’ most valuable assets, the new ways businesses are vulnerable to crime and the hidden dangers in some security systems. Did you know internal theft and fraud costs businesses $40 billion a year?  You can’t afford NOT to check this section out!

Now follow Millennium Group, Inc. on twitter, get answers to your questions quickly at the Millennium Group LinkedIn page, follow the latest industry information through their blog or like them on Facebook!

As Synergistics, Inc. continues to evolve, they are always striving to find ways to better serve their customers. Synergistics has merged with and is now part of a larger group, Millennium Group Inc. Synergistics products can now be found under the products section in the Millennium Group website.

And while you’re there, take some time to complete the contact form and tell them what you think. Millennium Group, Inc. is constantly striving for new and improved ways to connect  with their customers. Visitors to the website have the opportunity to win a $100 American Express gift card if you subscribe to the Millennium Group Email List. Please feel free to check out the new website at

Monday, October 3, 2011

Is your system backwards compatible?

Providing upgrade paths and supporting backwards compatibility does require more planning by the project architects and you do have to be creative about ensuring that you are not paying a huge performance penalty as a result of the backwards compatibility. These goals can be achieved as evidenced by the thousands of companies and products that deal with this challenge every day.

Maintaining backwards compatibility and providing an upgrade path for users of previous versions is not something that is easy to pull off. In fact, some would argue that it is one of the biggest technical challenges that any software company will face.

Ultimately, every software company must face this decision – make it easy for your users or make it easy for your developers. Give your developers a green field to develop new features or make it easy for your existing customers to upgrade and take advantage of your new features. Millennium Group has always tried to take the path that made it easiest for our users. We believe that ultimately this allows our developers more time to focus on our current platform rather than trying to implement bug fixes in 2 or 3 different branches of our product.

Backwards compatibility is not something provided by every access control company.

At the end of the day, the backwards compatibility issue comes down to how best to serve the customer. The answer is easy – allow them to protect their investments and reduce the cost of implementation over a long period of time. Unlike in the cell phone industry where new customers are treated like kings and old customers are treated like a nuisance, we want all of our customers – past, present and future – to be able to benefit from our latest and greatest platform.

We do our best to make the upgrade process as seamless and painless as possible. Visit for more info.