Once the burglar is inside the building, it is very unlikely that they will search only one room.

It is wise to secure all the weak points of a building which may allow entry to potential burglars (entry points), and the places where valuables are kept (a target place). For this purpose, burglary detectors are installed, available with different functions and in different shapes and sizes.

Read more

Modern alarm control panels allow various regimes of operation (daily, nightly, holidays, higher degree of security…), which allows a high degree of adaptability to the rhythm of living of an individual or a family.

The anti-theft system is operated either through internet or SMS interface, keyboard (code entry), remote control, non-contact pendant or on the basis of fingerprint identification. That is how the system recognizes you as authorized to enter the building. In addition to the mandatory protection of all access points of the building, additional protection of vulnerable rooms can also be installed, along with an anti-sabotage detector which detects attempts to disable the security system.


is not typical only for protection systems, but is present in practically all digital fields (smart metering, banking, mobile communications, video surveillance…) When it comes to alarm systems we distinguish between four levels: detection (detectors detect unusual events), processing (alarm central control panel receives the information, analyses them and “decides” whether the alarm should continue on or if it is a false alarm), communication (WAN – Wide Area Network) and security-control (receives information about an unusual event and reacts accordingly). Detectors represent the lowest level, and the security-control centre the highest. An increasing number of elements can be located in a cloud or several clouds.

Simple tips for preventing false alarms:

  1. An alarm system should be regularly serviced and maintained.
  2. An alarm system should only be operated by authorised and trained persons. Unauthorised persons should not be allowed to operate or maintain an alarm device.
  3. Entry-exit rules should be set and documented. All persons operating the device should be properly trained and familiar with the procedures. Entry into the secured area should only be allowed through a specified and agreed entrance.
  4. Before leaving the secured area, make sure the facility is left in proper condition (windows, doors, heaters, ventilation…). The easiest way to ensure that is by making a round of the technically secured areas.
  5. Before the reconstruction of premises or installation of sources of heat, movement or sound in a secure area, the company maintaining the alarm system should be consulted. The company maintaining the alarm system should be consulted regarding any change that could affect the functioning of the alarm system.
  6. Spatial detectors (infra-red, microwave, ultrasound) should not be covered (packaging, inventory, curtains, documentation…). There should be no obstacles that would interfere with the functioning of spatial detectors.
  7. An alarm system should be handled carefully and responsibly. The state of system elements (keyboards, detectors, interfaces, control panel…) should be visually checked on a daily basis. Any damage or unusual state should be communicated to the surveillance centre.
  8. In case of a false alarm the circumstances that could have caused the alarm to trigger should be analysed. All observations should be documented and discussed with the system maintenance worker.
  9. Before entering the premises, make sure you know the switch-off code. When in a hurry, one can easily forget it. If the alarm is nonetheless triggered, immediately call the surveillance centre and cancel the intervention which could otherwise be an unnecessary expense for the company.


Technology of detectors, cameras and process units (alarm central control panels) has developed significantly and become accessible to a large number of users. What’s becoming important is that interventions (notifications about an event) are quick and effective, while communications are also at the forefront of new development and possibilities. One of the interesting and relatively simple means of informing of the altered state is through GSM pagers in the form of text messages.

Detectors are the basic component parts of each security alarm system;

they are the sensors which are the first to detect that something unusual is happening, and forward this information to the brain (alarm central control panel), which decides – processes what to do. There are several types of detectors distinguished on the basis of the technology used, the location of installation and the function which they perform.

Internal IR motion detectors are the most common type. They use radiated IR energy.

Read more

Dual-technology internal motion detectors: they combine two elements (IR and microwave) inside a single unit.

Read more

External IR motion detector is used outside, where operating conditions are fundamentally different than those found inside.

Read more

A glass break detector is triggered at the characteristic sound of glass breaking or cutting (specific sound frequencies). It does not have to be installed on the glass surface; it is installed in the room and covers an area of up to 10 x 10 m. It must be oriented towards the origin of the sound (i.e. towards the glass surface).

Magnetic contacts are used for motion detection (protection of windows and doors); they were the only detection method before the arrival of IR sensors.

Read more

An electronic barrier (IR barrier) is a special type of detector which presents an additional problem for a potential burglar. It’s used in more demanding applications (external or internal) and it is composed of a transmitter and a receiver.

Read more

A selective microphone (acoustic noise detector) is sensitive to impact and sound which is made at drilling. It is used for protection of safes; activation level is set at installation, reducing the number of false alarms.

Tear-off detectors are used for early detection of attempted burglaries when burglars try to tear off the anchor attachments of safes.

Read more

Some alarm control panels can be connected with fire alarms and access control readers as well, allowing for integration of multiple systems (burglary, fire, access control) in one alarm control panel.

When we are absent from home for a longer period of time: we are the ones that can do the most to ensure our safety

When to use wired or wireless anti-theft system?

Alarm systems can be wired or wireless. Wireless systems are becoming increasingly popular, as the technology of sensor elements has progressed to the point where battery-operated power supply represents no problem (frequent replacements of batteries). Wireless systems have the advantage of quick and easy assembly without installations which would spoil the appearance of the room. But if you are building or renovating a house, it is definitely a good idea to consider installations for the security system. These must conform to the requirements for low-voltage installations in buildings.

You are the one who can do the most to protect your property

You are the one who can make sure that your apartment or house does not become a target for the crooks. When you are way for a longer period of time, make it look like you are home. Tidy up the garden, mow the lawn, make sure that the mailboxes are being emptied, the windows regularly opened, the blinds closed, clothes dried, lights turned on (motion detector lighting), radio playing… Modern controllers can do many of these things, but neighbours or relatives must often help as well. All the valuables and larger amounts of money should be stored at a safe place (bank, safe). Do not leave notes about your absence (and the date of your return), keys under doormats, on windowsills, in flower pots… If despite all precautions a burglary still occurs, notify the police, do not move or tidy up anything, and do not enter the apartment on your own, as the perpetrator(s) could still be inside. If you confront the burglar, do not expose yourself, your safety is the most important.

Statistics can teach us a lot

More than 2/3 of experienced burglars can access a flat secured with average security means in less than five minutes. The residents usually make their work very easy.

We have poorly secured windows, which sometimes even remain open. Windows and doors which can open at the top are not an obstacle for the professionals. The two other easiest points of entry during a burglary are the basement and the garage.

The front door and the roof are less popular entry points for burglars. This of course depends on whether we are dealing with a ground floor flat in a block of flats or an individual house, but in most cases the front doors are nowadays well secured with various anti-burglary mechanisms.

The most popular points of entry of burglars are:

  1. Windows
  2. Basement
  3. Garage

Burglars are deterred most by alarm systems, security doors, security glass, and many are also deterred by the sticker: The facility is protected with a video-surveillance system.

The majority of intruders do not mind if the neighbours are home and proceed with their actions regardless. They are also not deterred by blinds or Venetian blinds.

The favourite part of the day for breaking into an individual house is night time, while burglaries of flats are more frequent during the day. Approximately one half of the burglaries occur at night, when the residents are asleep in the building.

Burglars choose their targets based on the recommendation of someone they know. When observing the building, they pay attention to longer periods of absence (the state of the surroundings), a full mailbox, ventilation (open windows) and, of course, to lighting.

They also take advantage of social networking, where many people daily publish even the most insignificant details: when they use the bathroom or their weekend plans, also they happily post their photos from skiing holidays in winter and photos from the seaside in summer. The burglars wish them a nice holiday and then make it away with the “must have” valuables, with which the owners previously also bragged on social networks.

Burglars decide on breaking into a building:

  • On the basis of recommendations, information on absence, obtained interesting information which they pick up
  • After observing a full mailbox
  • On the basis of observations of the building and the daily habits of its residents

Modern security systems make the jobs of the burglars significantly harder or even make burglary impossible (prompt detection and subsequent deterring). Unfortunately there are still a lot of buildings which are not secured or are only poorly secured.

Many opt for technical security once the unpleasant event has already occurred.