Call Toll Free: 888-315-5230 or at: 303-954-8282

  • Request a Demo
  • Visitor Management
  • Store
  • Support
  • Sign In
The Original Visitor Management System Navigation
  • Product
    • Overview
    • All Features
    • Integrations
    • Attend a Product Tour
    • Enterprise Implementations
    • Reviews
    • Hardware Options
  • Pricing
    • What Does It Cost?
    • Request a Quote
  • Industries
    • Enterprise

    • Aerospace
    • Behavioral Health Practices
    • Coworking Spaces
    • Education
    • Engineering and Design
    • Food & Beverage
    • Private Practice
    • Logistics
    • Manufacturing
    • Technology & Software
  • Resources
    • Featured Customer Case Studies
    • Product Updates
    • The FABRIC Podcast
    • Refer a Friend to The Receptionist
    • What is a Visitor Management System?
    • Security and Compliance
    • Partner Program
    • COVID-19 Resource Center
  • Blog
  • Company
    • Our Story
    • Team
    • Careers
    • Contact
  • See How It Works
  • Product
    • Overview
    • All Features
    • Integrations
    • Attend a Product Tour
    • Enterprise Implementations
    • Reviews
    • Hardware Options
  • Pricing
    • What Does It Cost?
    • Request a Quote
  • Industries
    • Enterprise

    • Aerospace
    • Behavioral Health Practices
    • Coworking Spaces
    • Education
    • Engineering and Design
    • Food & Beverage
    • Private Practice
    • Logistics
    • Manufacturing
    • Technology & Software
  • Resources
    • Featured Customer Case Studies
    • Product Updates
    • The FABRIC Podcast
    • Refer a Friend to The Receptionist
    • What is a Visitor Management System?
    • Security and Compliance
    • Partner Program
    • COVID-19 Resource Center
  • Blog
  • Company
    • Our Story
    • Team
    • Careers
    • Contact
  • See How It Works
Home Blog Safety. Security and Compliance

Category Archive

Below you'll find a list of all posts that have been categorized as “Safety. Security and Compliance”

9 Ways to Secure Your Private Practice

9 Ways to Secure Your Private Practice

Looking for ways to secure your private practice? Here, we share tips on how to prevent theft and violence in your workplace.
Advice on How to Secure Your WorkplaceSecure Your Private Practice
Cyber Security Threats in the Workplace

Protect Your Workplace From Cyber Security Threats

What are the top cyber security threats in the workplace? In this post, we examine the most common vulnerabilities and how to reduce them.
Cyber SecurityThreatsworkplace
Blog on how to improve your campus security

Improve Your On-Campus Security With These Best Practices

What are some of the best ways to improve your on-campus security? In this post, we share how to use a visitor management software to stay secure.
Improve Your On-Campus Securityvisitor management system
Header for blog Improve Your Employee Safety Training

A Guide to Improving Your Employee Safety Training

Looking for ways to improve your employee safety training? In this post, we share tips to ensure that your employees stay safe at work.
Improve Your Employee Safety Traininginvesting in employee safetyproper safety protocols
Safer Visitor Experience

How to Create a Safer Visitor Experience

Would you like to create a safer visitor experience? Check out this simple guide.
Safer Visitor Experiencevisitor management system
Suspicious Activity in Your Lobby

How to Handle Suspicious Activity In Your Lobby

What do you do if there’s suspicious activity in your lobby? In this post, we share top tips for keeping your staff and your guests safe.
Handle Suspicious Activity In Your LobbySuspicious Activity in Your Lobbysuspicious behavior in your office
Video Surveillance in Your Front Office

How to Use Video Surveillance in Your Front Office

How do you use video surveillance in your front office? In this post, we share tips on how to legally and effectively use video in your office.
Use Video SurveillanceVideo Surveillance in Your Front Office
Flex Work Assessment

How’s Your Office’s New Flex-Work Schedule Going? 5 Questions to Ask Employees

If your office has adopted a flex work policy due to COVID-19 , it’s time to check in and assess its effectiveness.
Flex-Work AssessmentFlex-Work ScheduleOffice Improvements
COVID-19 Office Security Featured Image

The New Office Security Needs of a Post-COVID Workplace

Some of the ways that offices have had to adapt to COVID-19 may have increased certain security risks. However, you can keep your office safe by learning the best practices for office security after COVID-19.
Office security after COVID-19Office Surveillance SystemPost-COVID Workplace
Office door lock options
What You Need to Know About Door Lock Options for Your Office

What You Need to Know About Door Lock Options for Your Office

Evaluating office door lock options? We explain what to consider when it comes to convenience and security in choosing a commercial door lock.
Digital SecurityDoor Lock Options for Your OfficeOffice door lock options
Workplace Contact Tracing

What Employers Need to Know About Contact Tracing

Employers also have an important role to play in informing employees of their coronavirus exposure risk. Here’s what employers need to know about workplace contact tracing.
Respect Employee PrivacySupport Exposed EmployeesWorkplace contact tracing
supply chain compliance

4 Steps to Supply Chain Compliance

When it comes to keeping their supply chains safe and in line with local regulations, industries’ needs vary. For example, food manufacturers may need to keep a closer eye on timelines and temperatures to ensure food safety, and manufacturers of…
Supply Chain Compliancesupply managementTraceability as a Marketing Tool
Temperature Screening
Credit: Shutterstock

Temperature screening — what we’ve found, how we’re responding, and what comes next?

As COVID-19 stay-at-home orders expire and businesses ease into opening their doors, a top concern has emerged: how to keep visitors and employees safe from a virus that hasn’t been eradicated? When the coronavirus was initially growing into a global…
CoronavirusSafetyvisitor management
tips on preventing infectious disease spread at your office

Protect Your Office From the Risk of Infectious Disease — Starting in the Lobby

The recent threat of COVID-19 has everyone focused on preventing the spread of disease, both at work and at home. However, practices like thorough and frequent handwashing and refraining from face-touching have benefits that aren’t limited to the new coronavirus.…
facilities management tools

5 Essential Tools for Facilities Managers

With these facilities management tools, managers can keep better track of equipment, inventory, maintenance schedules, and repair requests.
Essential Tools for Facilities ManagersFacilities Management ToolsIntegrated Workplace Management Systems
Office Emergency Evacuation Tools

5 Tools for Smoother Emergency Evacuations in the Workplace

These emergency evacuation tools for your office can help keep your employees and building occupants safer in the case of a fire or another emergency.
Emergency Evacuations in the WorkplacePrevent False Fire AlarmsSmoother Emergency Evacuations
Security Cameras for the Office

Does Your Business Really Need Security Cameras?

Office security cameras can play a key role in the physical security of your business. Here’s what to know as you consider surveillance options for your company.
Office Video SurveillanceOffice Video Surveillance SystemsSecurity CamerasSurveillance Technology
office mail policy

How to: Developing the Best Mail and Delivery Policy for Your Office

An office mail policy that addresses how deliveries and packages should be handled can be a crucial part of boosting office security.
DeliveriesMail policySafety
Lobby Security

How to Recognize Suspicious Behavior in Your Office Lobby

Good lobby security starts with an observant staff. Make sure they know exactly what to look for when it comes to suspicious behavior that could indicate an impending crime, and how they should alert the rest of the staff.
Office SecurityRecognize Suspicious Behaviorvisitor management
security for multi-tenant buildings

4 Tips for Managing Security for a Multi-Tenant Building

Managing security for multi-tenant buildings can be tricky. However, with these best practices, you can ensure a secure experience for tenants and their visitors.
Managing SecurityPotential Property Management CompanySecurity Culture
Workplace data privacy

5 Myths About Data Privacy Debunked

Workplace data privacy efforts are crucial. Data breaches destroy customers’ trust and can result in huge expenses and legal fees. Make sure you understand the following security myths and take steps to fix them.
Cyber SecurityData Privacy DebunkedEffective Data Security
Radical support

Why We Trademarked the Term “Radical Support®”

Radical Support has been central to our business identity for a while now. Here’s why we decided to formalize that with an official trademark.
Empathy and Respectful CommunicationRadical SupportTrademarked the Term
ROI on business security

How Business Security Pays for Itself

Determining the ROI on business security efforts isn’t exactly simple, but estimating their monetary value can help put their benefits into perspective.
Breach PreventionBusiness SecuritySecurity Systems
business security threats

3 Ways Cyber Threats and Business Security Will Change in 2019

Business security threats have always been on business leaders’ radar, but rapidly advancing technology makes it even more important to keep up on the latest dangers.
Monitoring Internal ThreatsThreats and Business SecurityTypes of Security Software
workplace safety drills

4 Tips for Conducting Workplace Emergency Drills

Workplace safety drills are an essential part of an effective safety plan. However, some drills may work better than others. Here’s why.
Conducting Workplace Emergency DrillsMaking Emergency Preparedness More FunWorkplace Safety Drills
visitor access policy

How to Create an Effective Visitor Agreement (And Which Mistakes to Avoid)

A visitor access policy can be a great way to clarify visitors’ responsibilities before they enter your facility. But if they’re not done right, dangerous gaps could leave your company at risk.
Create an Effective Visitor AgreementLegal agreementsVisitor Agreement as a Branding Tool
Industrial emergency planning

How the Best Industrial Companies Plan for Emergencies

The best industrial emergency planning requires a great planning team, careful consideration of the hazards facing your company, and thorough plans that are kept updated.
Companies Plan for EmergenciesEmergency planningInternal Emergency Planning Team
Software company security

Physical Security Basics For Technology and Software Companies

Physical security is as important as ever for software and technology companies. Protect your digital assets from on-site threats with these precautions.
Physical Security BasicsSecurity-Focused CompanyTechnology and Software Companies
Factory safety videos

The Benefits of Safety Videos for Factory Visitors

It’s your job to keep factory visitors safe, and adding mandatory safety videos to the check-in process is one way to help.
Benefits of Safety VideosHiring a Video Production CompanySafety Videos for Factory Visitors
GDPR office visitors

Here’s How the GDPR Will Affect Your Visitor Check-In Process

Any company that values its customers’ right to privacy should be paying attention to the GDPR and how it affects visitor check-in policies.
Collect Visitor DataGDPR office visitorsVisitor Check-In Process

Why We Respond to All of Our Reviews (Positive and Negative)

Responding to every online review is time consuming, but it’s an integral part of responsive customer support. Here’s why.
Online ReviewsPositive and Negative ReviewsReview Responses

Should Your Logistics Company be C-TPAT Certified?

Government certification can be complex and take months, but the benefits of C-TPAT partnership for logistics companies are hard to ignore.
C-TPAT CertifiedCBP ComplianceLogistics Company

Security Lessons from FedRAMP-Compliant Companies

Could it benefit your company to use some of the official security protocols required for hosting government cloud solutions?
FedRAMP RequirementsFedRAMP-Compliant Companiesvisitor management software
Credit: musicoomph.com

8 Types of Front Office Roles and Responsibilities

If you hire a receptionist, they’ll likely be responsible for much more than checking visitors in. Here are some roles to consider.
Company GrowthFront OfficeStructure Your Business

Recent Posts

  • Agile Work Environments and How to Implement One in Your Workplace
  • How to Prevent Quiet Quitting
  • How to Encourage Two-Way Feedback within Your Organization
  • A Guide to Hiring the Best Front Desk Staff for Your Practice
  • 9 Ways to Secure Your Private Practice

Categories

  • Brand Image
  • Company Culture
  • Company News
  • Compliance
  • Coworking Spaces
  • Creating a Visitor Experience That Wows
  • Culture
  • Culture Building
  • Education
  • Engineering and Design
  • Feature Updates
  • Featured Business
  • Food and Beverage
  • Impressing Job Candidates
  • In Your Office
  • Industry-Specific
  • Legal
  • Long-Term Care
  • Long-Term Care Facilities
  • Manufacturing
  • Office Culture
  • Office Design
  • Office Management
  • Office Productivity
  • Office Reception
  • Office Security
  • Office Tech
  • Product
  • Productivity
  • Radical Service
  • Radical Support
  • Safety. Security and Compliance
  • Security and Compliance/Visitor Management
  • Technology in the workplace
  • The Modern Workplace
  • The Receptionist How Tos
  • The Receptionist News and Updates
  • The role of the receptionist in the modern workplace
  • Uncategorized
  • Visitor Management
  • Terms of Service
  • Privacy Policy
  • GDPR Compliance
  • Support
  • Careers
  • Contact
  • Sitemap
  • Opt-out preferences

Proudly Headquartered in Denver, CO

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}