Logo_R2-01.png

Guardian Forest Security Limited

Your Personal Security Consultant

  • Home

  • About

  • Service

  • Principle

  • Contact

  • Blog

  • Logical Security

  • More

    Use tab to navigate through the menu items.

    Security Blog

    Our Recent Posts

    Smishing Tactics - Delivery, Unpaid fee, Resolve it

    Smishing Tactics - Delivery, Unpaid fee, Resolve it

    Gathering Quantitative Data in Mainland China

    Gathering Quantitative Data in Mainland China

    Phishing Tactics - Attorney, Deceased, Unclaimed Assets

    Phishing Tactics - Attorney, Deceased, Unclaimed Assets

    Archive

    • May 2022
    • April 2022
    • December 2021
    • July 2021
    • April 2021
    • November 2020
    • July 2020
    • October 2019
    • July 2019
    • May 2019
    • January 2019
    • December 2018
    • October 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017

    Tags

    • access card
    • access control
    • assa abloy
    • battery
    • biometric
    • burglary
    • camera
    • car
    • CCTV
    • china
    • CLIQGo
    • cloud
    • cost
    • cyber security
    • dedicated data line
    • Email
    • false alarm
    • fingerprint
    • hack
    • housekeeping
    • human
    • Information
    • infra-red
    • Intellectual Property
    • Investigation
    • iPhone
    • keypad
    • legal
    • lock
    • logical security
    • network layer
    • operation
    • parking
    • phishing
    • phone line
    • police
    • policy
    • politics
    • QR Code
    • remote access
    • risk analysis
    • risk assessment
    • safe
    • sensor
    • video
    • wired
    • wireless
    Does Facial Recognition help my security?

    Does Facial Recognition help my security?

    Security management involves applying technology to support overall risk mitigation efforts. Consideration: Before answering the title question, let's consider the following: 1) What assets are at risks? (people, property, information, and goodwill) 2) What are the existing vulnerabilities? (access control, identity verifications, surveillance, etc) 3) How capable are the threat sources? (honest, opportunistic, professional, etc) The above considerations help businesses to m

      © Guardian Forest Security Limited
      Your Personal Security Consultant
      Est. 2017 Hong Kong