Header fastener image

Security Fasteners and General Fixings from Stock and to order

Click Now for a Quote

Call +44(0) 1902 457734

Twitter Icon Facebook Icon LinkedIn Icon Skype Icon

Technology is continually advancing in every sector. If there’s a method that is slow, cumbersome or requires hiring a person to do a job, you can guarantee there is something being created to automate the process. An example of this would be contactless technology. Whereas once, a security officer might have guarded an entrance all day granting access to premises through inspection of ID badges and credentials, there is now a device on the wall requiring only a personal RFID (Radio-frequency Identification) card.

Contactless technology has been integrated into our lives since the 1990’s and I’m sure we are all aware of its existence. Whether it’s a key fob/card to log into a security system or paying for your shopping, we all have a connection to this technology.

Where there is technology, there will always be people trying to exploit it for illegal gain. The wide spread use of such devices has meant that thieves can easily devise methods to manipulate them to collect your important information or gain unauthorised access.

Tamper proofing for access systems

Typical methods of manipulating these systems are for the criminal to tamper with the reader itself and intercept the signal. With this signal it would enable them to clone cards which emit the same signal to trick the system and gain access.

Thieves will constantly seek to exploit vulnerabilities in contactless systems but it is relatively easy to prevent these systems from attack. Access systems are becoming increasingly sophisticated but all are vulnerable if a fraudster can gain physical access to the device.

Tamper proofing can be achieved by fitting a tamper proof housing, including a recessed mount and fixed with special tamper proof screws. Access systems are usually supplied with in a tamper proof housing and this itself needs to be secured with tamper proof screws.

Tamper proof screws

These specialist screws are specifically designed to protect against tampering from vandals and thieves. 2-hole, Pin Hex, Clutch head and Tricone® screws for example have unique drive heads which require a special driver to insert and remove.

tricone-security-bolt

Although all tamper proof screws could be suitable for such a job, the Tricone® security bolt provides a superior solution. The Tricone® is Fastenright’s own patented premium security screw that is suitable for high torque applications and is one of the most secure fasteners on the market, as each Tricone driver tool is uniquely coded and fully traceable to the customer.

The Tricone® has three equally spaced blind holes formed into the head and in their middle, a cone projection is shaped and protrudes upwards from the holes base making forced removal of the fastener extremely difficult.

It’s one step to tamper proof the reader but what about the card you carry in your pocket? Most of us have an RFID card in our pocket or wallet, such as a contactless pay bank card. Although the risk is considered low of someone being close enough to scan the card details, some research by Which? suggested wrapping your cards in tin foil or keeping them in a foil lined wallet protect against data theft. Food for thought, perhaps!