Header fastener image

Security Fasteners and General Fixings from Stock and to order

Click Now for a Quote

Call +44(0) 1902 457734

Twitter Icon Facebook Icon LinkedIn Icon Skype Icon

This blog post has been refreshed and updated on October 25th, 2019.

In the modern era, technology is continually advancing year on year. If there is a method considered to be slow, cumbersome or that requires hiring a specific skill set for a specific job, you can almost guarantee that there is something in the pipeline in regards to automating the process.

This has been seen more recently with the introduction of contactless technology. In the past, a security officer may have guarded an entrance throughout the day or night, granting access to the premises through the close inspection of credentials and identification. Often in 2019, there is now a device on the wall requiring only a personal RFID, or Radio-frequency Identification card.

Contactless technology has been slowly integrated into our lives since the 1990s and it would be hard to pinpoint someone that is unaware of its existence – whether it is a key fob or card to log into a security system, or paying for your shopping, there’s a connection to this technology in nearly every walk of life.

The issue is, however, that where this technology is used, there will always be people looking to exploit it for their own, illegal gain. The widespread use of such devices has meant that thieves have been able to easily devise methods to manipulate this technology to collect your information, data, or gain unauthorised access.

Tamper proofing for access systems

Typical methods of manipulating these systems are for the criminal to tamper with the reader itself and intercept signals. With these signals it would enable the criminal to clone cards that emit the same signal, to trick the system and gain access into potential high-security areas.

Thieves will continually seek to exploit vulnerabilities in contactless systems – but it is relatively easy to prevent these systems from finding themselves under attack.

Access systems are becoming increasingly sophisticated, but all are vulnerable if a fraudster can gain physical access to the device.

It’s one step to tamper-proof the reader but what about the card you carry in your pocket? Most of us have an RFID card in our pocket or wallet, such as a contactless pay bank card. Although the risk is considered low of someone being close enough to scan the card details, some research by Which? suggested wrapping your cards in tin foil or keeping them in a foil-lined wallet protect against data theft. Food for thought, perhaps!

Tamper proofing can be achieved via the fitting of a tamper-proof housing, including a recessed mount before being fixed with special tamper-proof screws. Access systems are usually supplied within a tamper-proof housing and this itself needs to be secured with tamper-proof screws.

Tamper Proof Screws

tricone-security-boltThese specialist screws are specifically designed to protect against tampering from vandals and thieves. 2-Hole Screws, Pin Hex Screws, Clutch Head Screws and Tricone® screws are all types of screws that feature unique drive heads which require a special driver to insert and remove.

Although tamper-proof screws could be suitable for such a job, the Tricone® Security Bolt provides a superior solution.

The Tricone® is Fastenright’s own patented premium security screw that is suitable for high torque applications and is one of the most secure fasteners on the market, as each Tricone® is uniquely coded and fully traceable to the customer.

The Tricone® hosts three equally spaced blind holes, formed into the head, wherein their middle is a cone projection, shaped and protruding upwards from the base of the hole – making forced removal of the fastener difficult.