Dog owners the world over often remark on the power of their dog’s bark—one swift whoof and any would-be burglar takes a hike. But when it comes to fully protecting your family and belongings, should you really be leaving your trust in the paws of the family pet? We take a look at the downsides of how even the toughest of dogs can easily fall victim to a smart burglar.
Simon Says
Have you ever commanded a dog you’ve never met before to sit? What happens more often than not is they’ll respect your command. Should a burglar present himself as the alpha of the home, your dog may turn from an aggressor to a smiling pup. It’s not uncommon for police K9’s to be taught commands in a foreign language to avoid this very problem.
What’s in the box? What in the box?!
The classic cartoon setup of a robber warding off a guard dog with steak isn’t too far off; sometimes even the best of guard dogs succumb to their own taste buds. And if you shake a bag of treats before you give one to your dog, this may be the perfect setup for a robber. The operant conditioning of the sound being followed by a treat can click a dog’s brain over from bite mode to obey mode.
Close to Home
It may sound far-fetched, but it happens: a robber could be your acquaintance, friend, co-worker or even family member. If your dog already knows them, how much of a barker will your dog be? Will they alert you? Or will they be happy to see their friend and forgo their post for a rub on the belly? It’s a serious matter to consider.
Your dog likely isn’t the best security for your home, especially when compared to a state-of-the-art security system from SEi. With a live video feed to your smartphone, a direct line to the local authorities and a 24-hour monitoring center, a security system from SEi is heads (and tails) above the security a dog can offer. That’s not to say they aren’t welcome additions to your SEi system.
Does your store, restaurant, or gym hand out keys to employees? Do you know how many employees have keys? Have those keys ever been copied or duplicated without your knowledge? Have they all been returned once an employee leaves? These are all great questions to think...
What is Temperature Monitoring? Temperature monitoring is the process of measuring and reporting the temperature of a specific environment or process. A temperature sensor or probe can be placed anywhere in your building for example in a cooler or freezer, to analyze...
Do you have video at your place of business or at home? Does the video system you use today have a local Digital Video Recorder (DVR) or a Network Video Recorder (NVR)? What if we could replace them with nothing and give you superior video? Can you easily access your...
In today’s dynamic work environment, ensuring the security of your workplace is paramount. Access control solutions can be essential for safeguarding sensitive information, protecting valuable assets, and maintaining a safe and efficient workspace. By implementing an...
Carbon monoxide (CO) poisoning is a serious threat to you and your home. This odorless and colorless gas can cause severe harm and even death without warning. According to the CDC, more than 400 Americans die annually from CO poisoning unrelated to fires in the United...
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.