construction

Best Practices for Construction Site Security

{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Best Practices for Construction Site Security”,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://virtualbadge.com/wp-content/uploads/2022/02/construction-site-security.png|337|600|16289″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_5ZtkF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”mEuY8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”Jftbu”,”css_classes”:”text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Best Practices for Construction Site Security”,”tag”:”h2″},{“component”:”hc_title_tag”,”id”:”MhJmV”,”css_classes”:”text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”21st Century Construction Security Means Covering Every Angle”,”tag”:”h3″},{“component”:”hc_space”,”id”:”AX2kZ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_separator”,”id”:”1dEAk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”style”:””},{“component”:”hc_space”,”id”:”0OWam”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_ePe9S”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”vb9So”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Security Threats: An Introduction”,”tag”:”h3″},{“component”:”hc_space”,”id”:”94rt2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”7ZhtF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Construction sites, by their very nature, can invite access control breaches. Located in accessible public places, utilizing open floor plans, loaded with valuable materials and tools, and attracting attention with their size and noise, construction sites are a burglar’s dream. \n\nThe National Equipment Register estimates that $400 million worth of heavy equipment is stolen from construction sites every year. That’s not including theft of building materials (which are undergoing a major price hike) or tools. Work stoppages, associated with bust cycles and health related lockdowns, leave sites vacant and especially vulnerable for long periods of time. And theft need not only come from outsiders; a major portion of project site theft comes from disgruntled or opportunistic employees who have the inside scoop on the site.\n\nConstruction sites may invite opportunistic outsiders beyond thieves; vandals and arsonists can wreak their own kind of night time havoc. Daytime intruders (trespassers, competitors on reconnaissance, protestors, violent offenders) may practice identity fraud in order to pass through check-in stations, or may attempt assaults on workers. While potential hires should not be treated with undue suspicion, an investigation into their backgrounds may also reveal potential safety issues. \n\nKnowing that threats can come from a variety of different sources, how should the modern contractor react? By employing their own variety of security protocols, of course. A systematic, holistic approach to site protection means recognizing that the world presents a diverse range threats and problematic situations to resolve. By integrating several safeguards into a unified approach, managers can cut bad actors off at the pass, stay several steps ahead of criminal planning, and stymie access breaches once and for all. \n”},{“component”:”hc_space”,”id”:”yysyj”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_column”,”id”:”column_NYC7S”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”rGJlc”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_image”,”id”:”8o7Y2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https://virtualbadge.com/wp-content/uploads/2022/02/Construction-security-los-angeles.jpeg|1682|2494|16292″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”nUbKA”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_space”,”id”:”n0Jat”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_separator”,”id”:”whK3g”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”style”:””},{“component”:”hc_column”,”id”:”column_TBs6T”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”w3Nyi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_image”,”id”:”NZxPN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https://virtualbadge.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-07-at-11.52.08-AM.png|482|613|16296″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”sAbUE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_column”,”id”:”column_j5vwt”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”kuVjN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”The Site Security Toolbox”,”tag”:”h3″},{“component”:”hc_space”,”id”:”VzBxv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”T7QqE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Any security approach should integrate aspects of all of the following:\n\n•\tResearch and planning\n•\tPhysical barriers\n•\tPsychological deterrence\n•\tSecurity personnel\n•\tCameras and other recording equipment\n•\tInventory control\n•\tHuman resources and management\n•\tIdentity management systems\n\nLet’s examine each of these in order.\n”}]},{“component”:”hc_space”,”id”:”Zf8Us”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_separator”,”id”:”cP8qs”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”style”:””},{“component”:”hc_space”,”id”:”hKEAa”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_AqLO7″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”7HoI7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Conventional Methods”,”tag”:”h3″},{“component”:”hc_space”,”id”:”Jaq1K”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”W1jem”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The first step to securing any construction site begins with the planning phase. Before a project even begins, a security assessment of local risks should be performed. That assessment should then become a site-specific plan, written out as a policy document. A consultative relationship should be established with local law enforcement, and internal company experts should be called upon for their expertise. Responsibilities for supervising security can be assigned to various managers, who should also impart an ethic of security to their workforce. The plan can be periodically reviewed and updated, as risks on the ground evolve. \n\nPhysical barriers are an obvious and essential component of defending a site. This means erecting a fence around the site that can be fully locked at night time, with manned access control points that allow flowthrough during the day. Said boundary can include material that deters fence climbing, and should be fully illuminated to expose potential climbers. Physical barriers don’t just include the walls, either. Keeping everything that can be locked, locked down, adds another layer of defense. Ensuring that vehicles and heavy equipment are secured with heavy steel locks, disabled, or protected with antitheft devices can prevent them from being driven off site at night. Vehicles can be outfitted with keyless ignition systems that require a unique PIN for operation. Establishing separate storage areas for more portable items such as personal affects, materials, and tools provides further barriers to theft. Such storage areas can be shipping containers, storage trailers or other units, and should also be guarded by heavy locks. Ensuring that fuel and oil cans are stowed away, and gas tank caps are locked, will also suck the oxygen out of arson attempts.\n\nVisual and audio deterrence adds a more psychological advantage to security plans. Warning signs placed around the site can be a reminder to thieves that detection systems will enable their prosecution. The use of lights to illuminate the site after hours will eliminate visual cover for criminal activity, while obviously placed cameras will show that every action is recorded. Motion- activated lights, sirens and alarms can be utilized to create more panic for intruders. Incorporating visible on-site guards with monitoring stations and patrols are the most powerful deterrent, discouraging not only break ins, but minor probing attempts as well. Finally, simply staying on top of your security- from maintaining all systems, to responding to minor incursions- will show offenders that they do not have the opportunity to escalate. \n\nFor those that do choose to use camera or CCTV systems, there is a vast range of tactical and technological options available. Cameras should be effectively placed so as to ensure full site coverage; alternately, installing PTZ cameras with full 360° rotation can be effective. All cameras should remain out of the reach of intruders. Motion recording and thermal detection can enhance video capture and even trigger automated alerts. 24/7 recording, long range surveillance, advanced analytics, and facial recognition software can provide prosecutorial evidence after an intrusion. Finally, live monitoring by guards or off premise experts, combined with effective coordination with law enforcement, is the most powerful tool that managers can use to apprehend intruders.\n\nMaintaining an inventory control system for all tools, materials, and equipment is essential for determining and rectifying theft. This not only includes recording identifiers like serial numbers, license plate numbers, etc. but registering them with state and local authorities. All items should be photographed in their original condition, as well as marked by the company in an obvious way. Verifying all deliveries, as well as creating a check-out process for tools or equipment keys, can eliminate much of the guesswork around theft and vandalism. At higher levels of inventory control, heavy equipment can be outfitted with GPS beacons (tracking), and smaller equipment and tools can all be RFID chipped or labeled with QR codes. \n\nThe construction workforce itself must be managed for security risks. Disgruntled employees are more likely to steal material from the site, and those who get away with theft are emboldened to escalate their sabotage. For these reasons, employers should strive to support the needs of their workforce, and address their grievances, while swiftly punishing any acts of theft or vandalism among the workers. Failure to adequately screen or drug test workers prior to employment constitutes a final potential security breach with your personnel.\n”}]},{“component”:”hc_column”,”id”:”column_sg1Se”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”xq8sW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_space”,”id”:”5l8ij”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_space”,”id”:”YxUrb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_space”,”id”:”c7zrF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_image”,”id”:”7iEFy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https://virtualbadge.com/wp-content/uploads/2022/02/Screen-Shot-2022-02-07-at-11.53.19-AM.png|461|559|16299″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”N61ri”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_space”,”id”:”y8WAm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_separator”,”id”:”Axu40″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”style”:””},{“component”:”hc_space”,”id”:”APj5p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_jOjZ2″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”ErPrJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_image”,”id”:”x3pCO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https://virtualbadge.com/wp-content/uploads/2022/01/Job-Assessment-Checked-In-Square.png|750|750|15956″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”5tjg3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_column”,”id”:”column_ZUBqC”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”uxAdW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Innovative methods: Identity Management”,”tag”:”h3″},{“component”:”hc_space”,”id”:”Z3PiY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”AZA1L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”While the above-mentioned methods are excellent ways of stopping overt intruders, more sophisticated methods are needed to demarcate covert intruders from company employees. Virtual badges for employees are an example of an identity/workforce management system that can track an entire construction workforce: who they are (and aren’t), where they’ve been, and when they arrived and left.\n\nPrior to arriving on site (or at their first arrival), workers submit their identification documentation for badge approval. Once approved by administrators, digital ID badges indicate the presence of official employees, subcontractors, vendors or visitors. With site perimeter fencing established, your access control points should only grant access to virtual badge users. A seamless check-in process, enabled by a simple badge scan, allows for rapid access. And because digital ID badges are secured using unique QR identifiers- and can’t be faked, like traditional hard badges- imposters won’t make it through the gate. \n\nThe badge approval process can be linked to passing a background check and drug test, filtering out potentially dangerous personnel. Automated rolling background checks can be connected to virtual badges, meaning that employees and subs are periodically screened over time. Should a follow-up background check fail, the associated badge will automatically terminate, preventing the holder from future site access. Any contract terminating event, for that matter, can result in a badge being deleted. Such flexibility affords site managers the ability to truly deny access to delinquent or disgruntled workers (who may be more likely to damage company property).\n\nDigital ID badges support biometric integrations, like fingerprint analysis and facial recognition. Such biometric markers can be read, via smart device, during the badge creation process, or even the worksite check-in. While virtual badging systems are quite secure on their own, discriminating managers can support biometric integrations for added peace of mind. \n\nSites without hard perimeters can implement geofencing- an automatic check-in process whenever and wherever badge holders cross into the site. Even with a porous site, unapproved personnel will be unable to produce a badge upon request. Approved badge holders can be tracked down to their assigned geographic zones- an especially useful tool for security incident detective work. Being able to narrow down who was where, and thus who shouldn’t have been there, makes finding offenders that much easier. \n\nIn the unfortunate and unlikely event that a security issue does take place during regular hours, every badge holder can receive alerts (via their badge) that warn them to steer clear of the incident. \n”}]},{“component”:”hc_space”,”id”:”RTx7f”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_separator”,”id”:”FRGxe”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”style”:””},{“component”:”hc_space”,”id”:”lAry3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_lFxrO”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”column_FlsXG”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hsLyf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Conclusion”,”tag”:”h2″},{“component”:”hc_space”,”id”:”kFMlL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”mP7PO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The world presents a range of security risks that can threaten any construction project. Fortunately, an even greater range of defensive precautions are available to managers and contractors. By first understanding the specific threats a site could face, and then crafting an integrated security plan, managers can feel more secure in their charges. If possible, each aspect of the security toolbox should be implemented. Without reservation, conventional area denial methods should be combined with recording equipment, inventory tracking, workforce screening, and innovative identity management systems. \n\nIf you’ve already implemented more tried and true methods, it might be time to give virtual badges a closer look. Unified security plans should incorporate technology that can manage worker statuses, prevent identity fraud and daytime trespass, and disseminate mass alerts. If you’d like to infuse old school practices with connectivity-enabled safeguards, our knowledgeable experts can help guide you along the way. \n”}]},{“component”:”hc_column”,”id”:”column_66Kpa”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”GOzjG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_image”,”id”:”yIVDU”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https://virtualbadge.com/wp-content/uploads/2022/01/1444712356322.jpeg|531|885|16092″,”alt”:””,”thumb_size”:”large”}]}]},{“component”:”hc_space”,”id”:”tdYNw”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_button”,”id”:”rZHIO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:””,”position”:”center”,”animation”:false,”text”:”Learn About Virtual Badge For The Construction Industry Today!”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https://virtualbadge.com/construction”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”uvABP”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_space”,”id”:”uwlI6″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]}],”section_settings”:””},”column_Uf7Oz”:{“id”:”column_Uf7Oz”,”main_content”:{“component”:”hc_space”,”id”:”5l8ij”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”column_4WSSQ”:{“id”:”column_4WSSQ”,”main_content”:{“component”:”hc_space”,”id”:”YxUrb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”column_5ZtkF”:{“id”:”column_5ZtkF”,”main_content”:{“component”:”hc_space”,”id”:”uvABP”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https://virtualbadge.com/wp-content/uploads/2022/02/construction-site-security.jpeg|337|600|16290″,”excerpt”:”Construction sites, by their very nature, can invite access control breaches. Located in accessible public places, utilizing open floor plans, loaded with valuable materials and tools, and attracting attention with their size and noise, construction sites are a burglar’s dream. “,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}

David Glickman

Recent Posts

5 Ways Virtual Badge Improves Construction Site Safety

{"main-title":{"component":"hc_title","id":"main-title","title":"","subtitle":"","title_content":{"component":"hc_title_image","id":"title-image","image":"","full_screen":false,"full_screen_height":"","parallax":false,"bleed":"","ken_burn":"","overlay":"","breadcrumbs":false,"white":true}},"section_5ZtkF":{"component":"hc_section","id":"section_5ZtkF","section_width":"","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","vertical_row":"","box_middle":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","section_content":[{"component":"hc_column","id":"column_vtfQF","column_width":"col-md-12","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","main_content":[{"component":"hc_wp_editor","id":"Xhugf","css_classes":"","custom_css_classes":"","custom_css_styles":"","editor_content":"\n\nConstruction places can be risky due to heavy machines, dangerous tools, and various hazards. It's…

12 months ago

Best Practices To Keep Your Construction Workers Compliant

{"main-title":{"component":"hc_title","id":"main-title","title":"","subtitle":"","title_content":{"component":"hc_title_image","id":"title-image","image":"https://virtualbadge.com/wp-content/uploads/2022/08/SafetyFirst.png|576|864|17633","full_screen":false,"full_screen_height":"","parallax":false,"bleed":"","ken_burn":"","overlay":"","breadcrumbs":false,"white":true}},"section_5ZtkF":{"component":"hc_section","id":"section_5ZtkF","section_width":"","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","vertical_row":"","box_middle":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","section_content":[{"component":"hc_column","id":"column_vtfQF","column_width":"col-md-12","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","main_content":[{"component":"hc_wp_editor","id":"Xhugf","css_classes":"","custom_css_classes":"","custom_css_styles":"","editor_content":"Introduction\nConstruction is one of the most dangerous industries in the world. Even though it accounts…

2 years ago

How to Tell if Your Organization Has Identity Management Issues

{"main-title":{"component":"hc_title","id":"main-title","title":"","subtitle":"How to Tell if Your Organization Has Identity Management Issues","title_content":{"component":"hc_title_image","id":"title-image","image":"https://virtualbadge.com/wp-content/uploads/2022/02/Hand-Smartphone-Badge2-50-darkened-compressed.png|800|1488|16224","full_screen":false,"full_screen_height":"","parallax":false,"bleed":"","ken_burn":"","overlay":"","breadcrumbs":false,"white":true}},"section_5ZtkF":{"component":"hc_section","id":"section_5ZtkF","section_width":"","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","vertical_row":"","box_middle":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","section_content":[{"component":"hc_column","id":"column_5ZtkF","column_width":"col-md-12","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","main_content":[{"component":"hc_space","id":"mEuY8","css_classes":"","custom_css_classes":"","custom_css_styles":"","size":"","height":""},{"component":"hc_title_tag","id":"Jftbu","css_classes":"text-center ","custom_css_classes":"","custom_css_styles":"","text":"How to Tell if Your…

2 years ago

How to Attract and Retain Qualified Construction Staff

{"main-title":{"component":"hc_title","id":"main-title","title":"","subtitle":"How to Attract and Retain Qualified Construction Staff","title_content":{"component":"hc_title_image","id":"title-image","image":"https://virtualbadge.com/wp-content/uploads/2022/03/Construction-Worker-Onboarding.png|720|1079|17285","full_screen":false,"full_screen_height":"","parallax":false,"bleed":"","ken_burn":"","overlay":"","breadcrumbs":false,"white":true}},"section_5ZtkF":{"component":"hc_section","id":"section_5ZtkF","section_width":"","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","vertical_row":"","box_middle":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","section_content":[{"component":"hc_column","id":"column_5ZtkF","column_width":"col-md-12","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","main_content":[{"component":"hc_space","id":"mEuY8","css_classes":"","custom_css_classes":"","custom_css_styles":"","size":"","height":""},{"component":"hc_title_tag","id":"Jftbu","css_classes":"text-center ","custom_css_classes":"","custom_css_styles":"","text":"How to Attract and Retain Qualified Construction…

2 years ago

How Virtual Badge Improves Trust, Safety & Compliance Thru Background Checks

{"main-title":{"component":"hc_title","id":"main-title","title":"","subtitle":"How Virtual Badge Improves Trust, Safety & Compliance Thru Background Checks","title_content":{"component":"hc_title_image","id":"title-image","image":"https://virtualbadge.com/wp-content/uploads/2022/03/bgc-icon-darkened.png|1155|1732|17249","full_screen":false,"full_screen_height":"","parallax":false,"bleed":"","ken_burn":"","overlay":"transparent-dark","breadcrumbs":false,"white":true}},"section_5ZtkF":{"component":"hc_section","id":"section_5ZtkF","section_width":"","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","vertical_row":"","box_middle":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","section_content":[{"component":"hc_column","id":"column_5ZtkF","column_width":"col-md-12","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","main_content":[{"component":"hc_space","id":"mEuY8","css_classes":"","custom_css_classes":"","custom_css_styles":"","size":"","height":""},{"component":"hc_title_tag","id":"Jftbu","css_classes":"text-center ","custom_css_classes":"","custom_css_styles":"","text":"How Virtual Badge Improves…

2 years ago

How The Virtual Badge API Simplifies Badging

{"main-title":{"component":"hc_title","id":"main-title","title":"","subtitle":"How The Virtual Badge API Simplifies Badging","title_content":{"component":"hc_title_image","id":"title-image","image":"https://virtualbadge.com/wp-content/uploads/2022/03/VB-Logo-Orange.png|270|1012|17179","full_screen":false,"full_screen_height":"","parallax":false,"bleed":"","ken_burn":"","overlay":"transparent-dark","breadcrumbs":false,"white":true}},"section_5ZtkF":{"component":"hc_section","id":"section_5ZtkF","section_width":"","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","vertical_row":"","box_middle":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","section_content":[{"component":"hc_column","id":"column_5ZtkF","column_width":"col-md-12","animation":"","animation_time":"","timeline_animation":"","timeline_delay":"","timeline_order":"","css_classes":"","custom_css_classes":"","custom_css_styles":"","main_content":[{"component":"hc_space","id":"AX2kZ","css_classes":"","custom_css_classes":"","custom_css_styles":"","size":"m","height":""},{"component":"hc_title_tag","id":"Jftbu","css_classes":"text-center ","custom_css_classes":"","custom_css_styles":"","text":"How The Virtual Badge API Simplifies Badging","tag":"h2"},{"component":"hc_title_tag","id":"MhJmV","css_classes":"text-center ","custom_css_classes":"","custom_css_styles":"","text":"Learn…

2 years ago