Your browser does not support JavaScript!


Please click on the links below to view the FAQ answers.

Open All Close All

Why Use a Consultant
There are many reasons. Sometimes the expertise required is not readily available from within your organization and in most cases, staff are too busy to develop complex requirements and solutions that will have a significant impact on the business. In other cases, employees are too close to a problem that they can't see it and an external consultant can look at all the issues objectively. It also reduces risks and lowers costs as the consultant is qualified, insured and is only there on an "as needs" basis.

What does the threat level mean to my organisation?
Unless government authorities tell you otherwise, there is no need to change how you go about your daily business. But it is a reminder of the environment we are now in and the threat we face. It is important to keep your business or organization aware of the advice on the current level of threat and keep up to date with advice from local authorities. You should continue to exercise caution and report any suspicious incidents to the National Security Hotline on 1800 1234 00 or in an emergency, call 000. Some organizations may need to heighten security measures and procedures to satisfy compliance with changing threat levels and Cornerstone can assist with reviewing these potential changes. There is a link to the National Terrorism Threat Advisory System in the "Useful Links" page.

What can I do to protect staff, assets and facilities?
Make sure you are familiar with the emergency and evacuation plans for your workplace. If you are unsure, ask your supervisor. Attend an accredited first aid course. If you run a business, organization or manage a large building, review all your security measures. You should also review your emergency and evacuation plans. Rehearse them, update if necessary, and make sure every member of your staff knows what to do. Keep a careful check on garages and underground car parks so that you know whose vehicles are on your premises. If you have security cameras, and access control systems make sure they are maintained and working properly. Also check that the time and date are correct and retain the recordings in case they might be of use to police in the future.

How should we better manage visitors and contractors?
Allowing unchecked contractors and visitors onto your premises without strict controls is dangerous and it is wise to establish a visitor management system for persons and vehicles that is integrated into the site access control system. The visitor may be provided with a temporary card, PIN or printed barcode badge that will ensure their movements and activity are captured into the audit trail. Also try to establish a check-in Kiosk that will provide video inductions, accept the visitors license/signature, take a photo and then print the ID credential. At the same time the visitor's host is notified by SMS or email that their visitor has arrived.

Why integrate our video system with the access control system?
Integration of these two technologies (and others) provides a powerful tool to increase situational awareness and find video clips that are synchronized with events in the Access Control System. It saves time in searching as the operator simply looks for the event in the ACS and the corresponding video will already be displayed on the monitor. It also allows for faster, more effective, and more consistent response to emergencies and non-emergencies alike.

Why integrate the access control system with the human resources database?
This is a relatively new feature for access control systems called Active Directory Integration and is invaluable in two ways. Firstly, if an employee or contractor is terminated, the HR department is usually the first to know and when they change the status of the employee it immediately updates the new status to the access control system. Therefore, a once "valid" credential is now invalid. Secondly, it is more secure as it reduces the risk of employee's still having access to the facility after they were terminated. This often happens on a weekend when the HR department is closed.
Cornerstone can assist with determining compatibility between the two systems within your organization to see if this technology can be deployed.

Can we use one credential card or token for physical access control and IT network logon?
The answer is yes. Many organization now use smart cards for multiple systems. The smart card can be used for logon to IT systems as well a physical access control with biometric data stored on the card for verification in high security facilities. There are numerous other applications that third party vendors can also load onto the card such as vending and loyalty schemes, etc. Some organizations provide their staff and contractors with a standard credit card that also enables them to use access control systems across the organization.

Can we use NFC or Bluetooth enabled readers?
Yes. Many organizations are moving to NFC (near Field Communication) or Bluetooth enabled readers for access control. This means that anyone with a mobile phone can be provided with a virtual card that is embedded into an app on their phone and access is controlled as if it we a typical card.

Is my organisation required to register our CCTV system with state Police Forces?
The answer is no. However, NSW and some other Police Forces keep an extensive database of known CCTV installations to assist them in speeding up operational and investigative processes. You can voluntarily submit details of your CCTV system and your business location, etc., to their database online. If you would like to do that then follow this link. NSW Police CCTV Registration Database

What is the two person rule in access control
The two-person rule is used in access control systems for gaining access through high security doors or barriers. It means that two different people need to present their credential to an access reader to gain entry. It is used frequently in financial institutions and high-risk areas where it is essential that two people be in the area at the same time.

How does PAS 68:2013 relate to hostile vehicle mitigation in Australia?
PAS 68:2013 is a UK standard and means publicly available specification and the last issue was dated 2013. It is the de facto standard for rating equipment to withstand an impact from hostile vehicles. Obviously heavier and faster vehicles will have greater impact than a small car and calculations and data has to be examined prior to determining which rating the barriers will need for different scenarios. For information on PAS 68 please see this page on our site.