{"id":226,"date":"2021-06-17T16:14:30","date_gmt":"2021-06-17T16:14:30","guid":{"rendered":"https:\/\/www.jadealarm.com\/blog\/?p=226"},"modified":"2021-08-25T17:50:40","modified_gmt":"2021-08-25T17:50:40","slug":"jade-newsletter-june-2021","status":"publish","type":"post","link":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/","title":{"rendered":"Jade Wire June 2021"},"content":{"rendered":"\n<h3>Tech information to help keep you safe!<\/h3>\n\n\n\n<h2>Hacking Risks: Is Your Home Security System Safe?<\/h2>\n\n\n\n<p>In the past, alarm systems were just a tripwire tied to a bell and other primitive setups. However, thanks to<br>modern and innovative technology, you now have access to much more effective security devices to help keep<br>you safe. However, with this technology, a new risk has emerged \u2013 hackers.<\/p>\n\n\n\n<p>Hackers are smart. They find new and effective ways to bypass your security system and get into your personal<br>information.<\/p>\n\n\n\n<h2 id=\"h-hacking-defined\">Hacking Defined<\/h2>\n\n\n\n<p>Hacking means that someone has gained unauthorized access to a computerized or electronic system. It really is<br>that simple.<\/p>\n\n\n\n<p>With security systems, hacking virtually always means gaining access to the app that manages the cameras or<br>alarm or going around the security system, so it does not go off. From Wi-Fi cameras and doorbell cameras to<br>your entire alarm panel, there are more than a few ways for hackers to gain access to your system. The news<br>media frequently reports of a hacker\u2019s success!<\/p>\n\n\n\n<h2>Is Your System at Risk?<\/h2>\n\n\n\n<p>One of the top signs that your security system is at risk of being hacked is if you do not use the services of a<br>quality and reputable company for your alarm services. By using Jade Alarm, a certified alarm company, you<br>are using a quality service provider who is concerned about safety and your security! We have taken extra<br>efforts to ensure we are protecting your personal information and your security system and to ensure it is not<br>breached by nefarious individuals.<\/p>\n\n\n\n<p>If you are concerned about your system being hacked, speak with us! We can help you understand what<br>safeguards are in place to minimize the possibility of being hacked.<\/p>\n\n\n\n<h2>Does your system need a re-evaluation or possible upgrade?<\/h2>\n\n\n\n<p>Many time a business or homeowner may not think much about the surveillance and security systems except<br>when it is needed! This could mean your existing solutions are outdated, need to be upgraded, suffer from gaps,<br>or are not fully functional.<\/p>\n\n\n\n<p>Please don\u2019t let this occur! Unfortunately, if you don\u2019t take a proactive stance to your security needs, you may<br>discover these shortcomings too late. Knowing the most common signs that you should upgrade your security<br>can help you avoid potential issues.<\/p>\n\n\n\n<h2>You Are Unable to View or Record Activities<\/h2>\n\n\n\n<p>For most businesses and homes, being able to view and monitor key areas of the facility and property is<br>essential for safety and compliance. This is especially true for customer-facing businesses like retail stores and<br>restaurants. Our Jade Alarm \u2018health check\u2019 of the video system indicates our Central Station Command Center<br>Dispatchers are 3-times a day checking in on your video system ensuring a reliable picture is observed. More<br>than once have our Dispatchers recognized an issue with a camera such as moving it away from the protected<br>area.<\/p>\n\n\n\n<h2>Significant Expansion Since the Security System Was Installed<\/h2>\n\n\n\n<p>Has your business or home had renovation, been expanded or changed significantly since your surveillance or alarm system was installed? Have you moved walls and could have changed protection capability of motion sensors? Have all your premise keys been returned to you after being loaned out? Are you sure that all areas are being properly protected?<\/p>\n\n\n\n<p><strong>It is important to re-evaluate the infrastructure to ensure it matches the growth going on.<br><\/strong><\/p>\n\n\n\n<h2>The Inability to Respond in Real-Time to Risky or Disruptive Situations<\/h2>\n\n\n\n<p>Vandals and thieves can strike at any time. Also, because of the restrictions imposed by COVID-19, the public may demonstrate disruptive behavior, which is something that has been seen in some areas. Having a high-resolution camera system that feeds into a constantly recording along with an alarm monitoring system will help ensure the safest and fastest response times. We have the records to prove it!<\/p>\n\n\n\n<h2>No Power Redundancy or Communications<\/h2>\n\n\n\n<p>Today, thieves are savvier more than ever before. They can take over a premises landline or jam the cell phone to prevent the alarm from reaching the first responders. Talk with us about our SecureNet true digital radio network to ensure your alarm signal will still get through! Make sure you have some type of backup communications in place. Also, thinking ahead if the power goes out, be sure your back up batteries that power your system are \u2018fresh\u2019 and recently replaced to keep the alarms live until power is restored. This is especially important after the recent \u2018rolling\u2019 power outages. We now have extended battery backup power cabinets for long term power outages.<\/p>\n\n\n\n<p>If you notice any of the issues mentioned here, it is clear you need to upgrade your home or business\u2019s security system. Doing so will help ensure you, your family and if a business, your employees, your business, and your customers remain safe.<\/p>\n\n\n\n<h2>Residential<\/h2>\n\n\n\n<h2>Important Detectors You Need in Your Home<\/h2>\n\n\n\n<h2>(Besides a Security System)<\/h2>\n\n\n\n<p>Protecting your home and family is a top priority for most people. This is one of the top reasons people invest in a home security system. However, intruders are not the only threat to your family\u2019s safety in a home. <a href=\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2021\/08\/Environmental-Flyer.pdf\">There are other potential dangers, too, such as carbon monoxide poisoning, water leaks, and smoke.<\/a> Jade Alarm\u2019s Dispatchers can be alerted with the right detectors.<br><strong>Contact us for a no-charge evaluation\u2014we continue to save lives with our life-safety systems!<\/strong><\/p>\n\n\n\n<h2>Smoke Detectors<\/h2>\n\n\n\n<p>Fire can quickly spread. This is why each home should be equipped with a working fire alarm. In fact, according to the U.S. Fire Administration, residential structures are the leading property type for fire related deaths, fire injuries, and fire dollar loss. The possibility of an injury and possible fatalities is high with residential fires, which makes it essential that you take the right precautions. Investing in monitored smoke detectors with heat sensor fire alarms that are triggered with the presence of smoke and increased temperatures. This is a smart way to protect yourself and your family. <strong>AND DO YOU HAVE AN ESCAPE PLAN IN PLACE?!!! THIS IS CRITICAL!!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tech information to help keep you safe! Hacking Risks: Is Your Home Security System Safe? In the past, alarm systems were just a tripwire tied to a bell and other primitive setups. However, thanks tomodern and innovative technology, you now have access to much more effective security devices to help keepyou safe. However, with this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":236,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[32],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v18.1 (Yoast SEO v18.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking Risks: Is Your Home Security System Safe? - Jade Alarm<\/title>\n<meta name=\"description\" content=\"With home security systems, hacking virtually always means gaining access to the app that manages the camera or alarm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jade Wire June 2021\" \/>\n<meta property=\"og:description\" content=\"With home security systems, hacking virtually always means gaining access to the app that manages the camera or alarm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"Jade Alarm\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-17T16:14:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-25T17:50:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2021\/08\/Depositphotos_72370039_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"762\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmp@jadealarm.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#website\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/\",\"name\":\"Jade Alarm\",\"description\":\"Informative Advice from Security Professionals\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.jadealarm.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2021\/08\/Depositphotos_72370039_s-2019.jpg\",\"contentUrl\":\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2021\/08\/Depositphotos_72370039_s-2019.jpg\",\"width\":1000,\"height\":762,\"caption\":\"Online Security Technology and Hacking Risk Alert Concept\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#webpage\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/\",\"name\":\"Hacking Risks: Is Your Home Security System Safe? - Jade Alarm\",\"isPartOf\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#primaryimage\"},\"datePublished\":\"2021-06-17T16:14:30+00:00\",\"dateModified\":\"2021-08-25T17:50:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0\"},\"description\":\"With home security systems, hacking virtually always means gaining access to the app that manages the camera or alarm.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.jadealarm.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jade Wire June 2021\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0\",\"name\":\"jmp@jadealarm.com\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g\",\"caption\":\"jmp@jadealarm.com\"},\"sameAs\":[\"https:\/\/www.jadealarm.com\/blog\"],\"url\":\"https:\/\/www.jadealarm.com\/blog\/author\/jmpjadealarm-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hacking Risks: Is Your Home Security System Safe? - Jade Alarm","description":"With home security systems, hacking virtually always means gaining access to the app that manages the camera or alarm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/","og_locale":"en_US","og_type":"article","og_title":"Jade Wire June 2021","og_description":"With home security systems, hacking virtually always means gaining access to the app that manages the camera or alarm.","og_url":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/","og_site_name":"Jade Alarm","article_published_time":"2021-06-17T16:14:30+00:00","article_modified_time":"2021-08-25T17:50:40+00:00","og_image":[{"width":1000,"height":762,"url":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2021\/08\/Depositphotos_72370039_s-2019.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"jmp@jadealarm.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.jadealarm.com\/blog\/#website","url":"https:\/\/www.jadealarm.com\/blog\/","name":"Jade Alarm","description":"Informative Advice from Security Professionals","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jadealarm.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2021\/08\/Depositphotos_72370039_s-2019.jpg","contentUrl":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2021\/08\/Depositphotos_72370039_s-2019.jpg","width":1000,"height":762,"caption":"Online Security Technology and Hacking Risk Alert Concept"},{"@type":"WebPage","@id":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#webpage","url":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/","name":"Hacking Risks: Is Your Home Security System Safe? - Jade Alarm","isPartOf":{"@id":"https:\/\/www.jadealarm.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#primaryimage"},"datePublished":"2021-06-17T16:14:30+00:00","dateModified":"2021-08-25T17:50:40+00:00","author":{"@id":"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0"},"description":"With home security systems, hacking virtually always means gaining access to the app that manages the camera or alarm.","breadcrumb":{"@id":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.jadealarm.com\/blog\/2021\/06\/17\/jade-newsletter-june-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jadealarm.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Jade Wire June 2021"}]},{"@type":"Person","@id":"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0","name":"jmp@jadealarm.com","image":{"@type":"ImageObject","@id":"https:\/\/www.jadealarm.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g","caption":"jmp@jadealarm.com"},"sameAs":["https:\/\/www.jadealarm.com\/blog"],"url":"https:\/\/www.jadealarm.com\/blog\/author\/jmpjadealarm-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/226"}],"collection":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":4,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/226\/revisions\/242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/media\/236"}],"wp:attachment":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}