{"id":8558,"date":"2024-08-14T08:52:27","date_gmt":"2024-08-14T08:52:27","guid":{"rendered":"https:\/\/www.binfire.com\/blog\/?p=8558"},"modified":"2024-11-12T12:16:40","modified_gmt":"2024-11-12T12:16:40","slug":"security-key-keep-company-keys-secure","status":"publish","type":"post","link":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/","title":{"rendered":"Security Is Key: How To Keep Company Keys Secure"},"content":{"rendered":"<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Keys remain a reliable way of locking doors and operating vehicles. Making sure that these keys don\u2019t fall into the wrong hands is essential. But what if you\u2019re a company with lots of different keys to manage? What is the best way to keep all of these keys secure?<\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">There are a few different key management habits that could be worth adopting. This post delves into them.<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif;\">Security Is Key<\/span><\/h3>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><b>Start by checking locks are secure<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">There\u2019s no point in going to the trouble of safeguarding keys if your locks are easy to break open. Doors with standard latching locks and cheap padlocks are known to be easy to pick &#8211; an experienced thief won\u2019t need a key to enter them.\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><a href=\"https:\/\/vizilok.com\/blogs\/news\/the-most-secure-door-locks\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Modern deadbolt locks<\/span><\/a><span style=\"font-weight: 400;\"> and premium padlocks are much harder to break into without a key. These are the types of locks that you want to be using around your premises.\u00a0<\/span><\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><b>Only hand out keys to those you trust<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">When handing out keys to employees or cleaners, you need to make sure that you fully trust these people. There have been cases of employees or cleaners working with criminals to organize burglaries or vehicle theft.\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><span style=\"font-weight: 400;\">You can prevent this from happening to you by thoroughly screening new employees or cleaning companies. This is particularly important when hiring employees like janitors who will have access to lots of keys. <\/span><a href=\"https:\/\/www.goodhire.com\/resources\/articles\/how-to-do-a-background-check-for-employment\/\"><span style=\"font-weight: 400;\">Check for a criminal background<\/span><\/a><span style=\"font-weight: 400;\"> using a <a href=\"https:\/\/cocofinder.com\/\" target=\"_blank\" rel=\"noopener\">background check platform<\/a> and collect references from past employers..<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Alternatively, you can only give keys to your most loyal and dependable employees. This could mean that new employees do not have access to certain areas or must wait for a trusted key holder to open up the premises in the morning. Meanwhile, when outsourcing cleaners, some companies only allow cleaners to come in during working hours when there are already people in the building, instead of giving keys to cleaners to carry out cleaning out of hours.\u00a0<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><b>Use a key cabinet<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">A key cabinet can be used for storing lots of different keys &#8211; keeping them organized and secure. Such cabinets may be accessed via a digital lock, which then provides an added layer of security.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><span style=\"font-weight: 400;\">Key cabinets are a popular <\/span><a href=\"https:\/\/www.ecos-systems.com\/us\/industries-us\/key-and-fleet-management-in-automotive-industry\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">vehicle key management system<\/span><\/a><span style=\"font-weight: 400;\"> for car dealerships or companies with fleets. They are also commonly used by hotels or storage unit companies. Some cabinets are more secure than others or may be able to store more keys, so it\u2019s worth taking the time to compare solutions.<\/span><\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><b>Use a key safe<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">It\u2019s possible to place a key safe on a wall outside a property or a room. This is usually accessed by a code.<\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Instead of multiple people each being given separate keys, a key safe can enable multiple people to share one key. Not having to cut multiple keys can save you money and reduce the risk of keys getting lost and falling into the wrong hands. Instead, you simply share a code with authorized personnel. Some digital safes may allow you control to change this code whenever you want.<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><b>Explore alternatives to keys<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Your traditional key and lock is just one form of access control. Many modern businesses use other forms of access control &#8211; either as a second layer of security or as a replacement for keys.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Some of the alternatives to keys include:<\/span><\/p>\n<ul style=\"list-style-type: disc;\">\n<li aria-level=\"1\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><b>Key cards: <span style=\"font-weight: 400;\">Handing out key cards could be a more secure option.<\/span> <span style=\"font-weight: 400;\">Unlike keys, cards can be remotely deactivated if they get lost. You can also store digital information on when they are used to check for suspicious behavior.\u00a0<\/span><\/b><\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: disc;\">\n<li aria-level=\"1\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Key fobs: <span style=\"font-weight: 400;\">Key fobs work similarly to key cards and can also be remotely deactivated, as well as allowing you to track user information.\u00a0<\/span><\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: disc;\">\n<li aria-level=\"1\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Combination locks: <span style=\"font-weight: 400;\">These locks require a user to enter a three or four-number combination.<\/span><\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: disc;\">\n<li aria-level=\"1\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Passcode keypads: <span style=\"font-weight: 400;\">Passcode keypads may allow for even more complex codes &#8211; which may include numbers of letters.<\/span><\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: disc;\">\n<li aria-level=\"1\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Biometric passwords: <span style=\"font-weight: 400;\">This involves scanning parts of the body to enable entry such as scanning one\u2019s fingerprint on a pad or scanning one\u2019s face with a camera.\u00a0<\/span><\/span><\/li>\n<\/ul>\n<ul style=\"list-style-type: disc;\">\n<li aria-level=\"1\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Smart locks: <span style=\"font-weight: 400;\">Smart locks can only be accessed by entering a code or biometric password into an app.<\/span><\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Intercom systems: <span style=\"font-weight: 400;\">This involves using a voice or video intercom to contact an authorized individual who then pushes a button to allow entry.<\/span><\/span><\/li>\n<\/ul>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><b>Consider a master key<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">If you decide to stick with traditional locks, you could consider the option of getting a master key cut. This is a key that can access any lock in a building.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400; font-family: helvetica, arial, sans-serif; font-size: 14pt;\">This gives you access to anywhere without having to cut lots of keys. This can be useful if keys get lost and you don\u2019t have a spare. However, it\u2019s imperative that you keep this master key safe &#8211; if a criminal gets hold of this key, they have access to every single lock in the building.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keys remain a reliable way of locking doors and operating vehicles. Making sure that these keys don\u2019t fall into the wrong hands is essential. But what if you\u2019re a company&hellip;<\/p>\n","protected":false},"author":4,"featured_media":8560,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,34],"tags":[367],"class_list":["post-8558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-collaboration-2","category-collaborative-project-management","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Is Key: How To Keep Company Keys Secure - Collaboration Corner<\/title>\n<meta name=\"description\" content=\"Many modern businesses use other forms of access control - either as a second layer of security or as a replacement for keys.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Is Key: How To Keep Company Keys Secure - Collaboration Corner\" \/>\n<meta property=\"og:description\" content=\"Many modern businesses use other forms of access control - either as a second layer of security or as a replacement for keys.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboration Corner\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-14T08:52:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-12T12:16:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dan Smiljani\u0107\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Smiljani\u0107\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/\"},\"author\":{\"name\":\"Dan Smiljani\u0107\",\"@id\":\"https:\/\/www.binfire.com\/blog\/#\/schema\/person\/c85292bd82102a4d82c456ef778592e8\"},\"headline\":\"Security Is Key: How To Keep Company Keys Secure\",\"datePublished\":\"2024-08-14T08:52:27+00:00\",\"dateModified\":\"2024-11-12T12:16:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/\"},\"wordCount\":825,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png\",\"keywords\":[\"security\"],\"articleSection\":[\"Collaboration\",\"collaborative project management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/\",\"url\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/\",\"name\":\"Security Is Key: How To Keep Company Keys Secure - Collaboration Corner\",\"isPartOf\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png\",\"datePublished\":\"2024-08-14T08:52:27+00:00\",\"dateModified\":\"2024-11-12T12:16:40+00:00\",\"description\":\"Many modern businesses use other forms of access control - either as a second layer of security or as a replacement for keys.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage\",\"url\":\"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png\",\"contentUrl\":\"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png\",\"width\":1024,\"height\":512,\"caption\":\"key security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.binfire.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Is Key: How To Keep Company Keys Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.binfire.com\/blog\/#website\",\"url\":\"https:\/\/www.binfire.com\/blog\/\",\"name\":\"Collaboration Corner\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.binfire.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.binfire.com\/blog\/#organization\",\"name\":\"Collaboration Corner\",\"url\":\"https:\/\/www.binfire.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.binfire.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/12\/cropped-binfire_logo.png\",\"contentUrl\":\"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/12\/cropped-binfire_logo.png\",\"width\":696,\"height\":324,\"caption\":\"Collaboration Corner\"},\"image\":{\"@id\":\"https:\/\/www.binfire.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.binfire.com\/blog\/#\/schema\/person\/c85292bd82102a4d82c456ef778592e8\",\"name\":\"Dan Smiljani\u0107\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.binfire.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/99ae270ed6ab49c1c64dc704b4633142bfdcfb95efc534578a392fbb2456934a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/99ae270ed6ab49c1c64dc704b4633142bfdcfb95efc534578a392fbb2456934a?s=96&d=mm&r=g\",\"caption\":\"Dan Smiljani\u0107\"},\"description\":\"Dan is a practitioner of project management and our resident geek. With a background in computer science, Dan is the lead product tester at Binfire. When Dan not writing code, you will probably find him cycling and hiking with friends.\",\"sameAs\":[\"https:\/\/www.binfire.com\"],\"url\":\"https:\/\/www.binfire.com\/blog\/author\/daniel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Is Key: How To Keep Company Keys Secure - Collaboration Corner","description":"Many modern businesses use other forms of access control - either as a second layer of security or as a replacement for keys.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/","og_locale":"en_US","og_type":"article","og_title":"Security Is Key: How To Keep Company Keys Secure - Collaboration Corner","og_description":"Many modern businesses use other forms of access control - either as a second layer of security or as a replacement for keys.\u00a0","og_url":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/","og_site_name":"Collaboration Corner","article_published_time":"2024-08-14T08:52:27+00:00","article_modified_time":"2024-11-12T12:16:40+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png","type":"image\/png"}],"author":"Dan Smiljani\u0107","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Smiljani\u0107","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#article","isPartOf":{"@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/"},"author":{"name":"Dan Smiljani\u0107","@id":"https:\/\/www.binfire.com\/blog\/#\/schema\/person\/c85292bd82102a4d82c456ef778592e8"},"headline":"Security Is Key: How To Keep Company Keys Secure","datePublished":"2024-08-14T08:52:27+00:00","dateModified":"2024-11-12T12:16:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/"},"wordCount":825,"commentCount":0,"publisher":{"@id":"https:\/\/www.binfire.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png","keywords":["security"],"articleSection":["Collaboration","collaborative project management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/","url":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/","name":"Security Is Key: How To Keep Company Keys Secure - Collaboration Corner","isPartOf":{"@id":"https:\/\/www.binfire.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png","datePublished":"2024-08-14T08:52:27+00:00","dateModified":"2024-11-12T12:16:40+00:00","description":"Many modern businesses use other forms of access control - either as a second layer of security or as a replacement for keys.\u00a0","breadcrumb":{"@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#primaryimage","url":"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png","contentUrl":"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/08\/Key-Security.png","width":1024,"height":512,"caption":"key security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.binfire.com\/blog\/security-key-keep-company-keys-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.binfire.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Is Key: How To Keep Company Keys Secure"}]},{"@type":"WebSite","@id":"https:\/\/www.binfire.com\/blog\/#website","url":"https:\/\/www.binfire.com\/blog\/","name":"Collaboration Corner","description":"","publisher":{"@id":"https:\/\/www.binfire.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.binfire.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.binfire.com\/blog\/#organization","name":"Collaboration Corner","url":"https:\/\/www.binfire.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.binfire.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/12\/cropped-binfire_logo.png","contentUrl":"https:\/\/www.binfire.com\/blog\/wp-content\/uploads\/2024\/12\/cropped-binfire_logo.png","width":696,"height":324,"caption":"Collaboration Corner"},"image":{"@id":"https:\/\/www.binfire.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.binfire.com\/blog\/#\/schema\/person\/c85292bd82102a4d82c456ef778592e8","name":"Dan Smiljani\u0107","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.binfire.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/99ae270ed6ab49c1c64dc704b4633142bfdcfb95efc534578a392fbb2456934a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99ae270ed6ab49c1c64dc704b4633142bfdcfb95efc534578a392fbb2456934a?s=96&d=mm&r=g","caption":"Dan Smiljani\u0107"},"description":"Dan is a practitioner of project management and our resident geek. With a background in computer science, Dan is the lead product tester at Binfire. When Dan not writing code, you will probably find him cycling and hiking with friends.","sameAs":["https:\/\/www.binfire.com"],"url":"https:\/\/www.binfire.com\/blog\/author\/daniel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/posts\/8558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/comments?post=8558"}],"version-history":[{"count":2,"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/posts\/8558\/revisions"}],"predecessor-version":[{"id":10034,"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/posts\/8558\/revisions\/10034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/media\/8560"}],"wp:attachment":[{"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/media?parent=8558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/categories?post=8558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.binfire.com\/blog\/wp-json\/wp\/v2\/tags?post=8558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}