Download the magazine soft copy - Ksh 350

Magazines in Circulation

Secure Magazine your security guide Issue 7 (May – August 2017) Cover Page & Some Featured Topics

  • Cybercrime Set to Increase in Kenya According to Report
  • Economic Risks Associated with Election Period
  • Signs You are Dating a Con-artist
  • Would CCTV Surveillance Systems Be of Significance During 2017 General Elections?
  • Poison Prevention
  • Hikvision Launch all New EasyIP 3.0 Product Range
  • Calculating the Amount of Space You Need for your NVR
  • Are Drones a Game Changer in Security in Kenya as law is Passed?

Secure Magazine your security guide Issue 6 (January – April 2017) Cover Page & Some Featured Topics

  • Our Smartphones can now Secure us; Introducing the Usalama Mobile App
  • How Your Employees Put Your Organization at Risk
  • Man’s Bestfriend; As A Counter Terrorism Measure
  • Retail Security – Unveiling Issues that Almost Every Business Owner Ignores
  • Employee Theft, a Serious Activity yet Often Treated as an Ordinary Thing
  • Recommendations on Beefing Up Security in Law Courts to Prevent Attacks by Suspect
  • Security Concerns During Event
  • Why Perimeter Fencing is Quickly Gaining Ground as a Suitable Security Solution

Secure Magazine your security guide Issue 5 (September – December 2016) Cover Page & Some Featured Topics

  • Use of Security Products and Systems in ICT
  • Cyber Attacks on Video Surveillance Systems, the Irony, and Best Practices
  • Kids’ Security and Safety During Holidays
  • Use of Tracking Chips to tame Cattle Rustling in Kenya, and East Africa
  • Passion to Support Children from Vulnerable Households
  • Insecurity and Violence from Illegitimate Ownership of Land in Kenya
  • Take a Moment and Plan before Moving To a New House
  • Radio Frequency Tags, the Cunning Technology That Stops Shoplifters in their Tracks
  • Overcome the Car Theft Nightmare by Playing the Safety Card
  • Minimizing Your Business Risk through Limited Access

Secure Magazine your security guide Issue 4 (May – August 2016) Cover Page & Some Featured Topics

  • A Wake-up Call for Organizations to Review their Cyber Security Measures
  • You can Protect Your Business with Simple Social-Media Security Tips
  • Mitigating Ransomware Attacks
  • Computer Forensics: Recovering Electronic Evidence
  • Words of Wisdom to Women About Sexual Assault
  • Using Social Media in Emergency Situations
  • Stepping Up Security to Counter Terrorism in Kenya
  • Securing Our Youth and Generation against Cancer in Kenya
  • Surviving Night Car Breakdown and Emergency
  • Foolproof ways of Vetting Employment Candidates without Harming your Organization
  • Security Firms Must Train their Guards for Different Sectors

Secure Magazine your security guide Issue 3 (January – April 2016) Cover Page & Some Featured Topics

  • How useful is CCTV footage; Is it admissible as evidence in a court of law?
  • How Effective can CCTV Cameras be in Curbing Matatus Traffic Rules Breaking Menace?
  • Business-As-Usual is Long Dead, Prepare Your Employees for Terrorist Attacks
  • Changing Faces of Social Media and the Possible Intrusion to your Private Life
  • How Metal Detectors Work
  • Dealing with School Fires and Unrest in Schools
  • Are Your Kids Over Exposed to The Internet?
  • Demystifying Digital Forensics
  • Top Ten: The Most Important Cyber Security Tips For Your Users

Secure Magazine your security guide Issue 2 (September – December 2015) Cover Page & Some Featured Topics

  • CCTV Surveillance | Page 6-15
  • Security in Education | Page 16-19
  • General Business Security | Page 20-34
  • Security in Transport and Travel | Page 36-41
  • Scanning and Detection | Page 42
  • Burglar Systems | Page 43
  • Perimeter Protection | Page 44
  • Case Study | Page 45-63
  • Access Control | Page 64-65
  • Security in ICT | Page 66-75
  • Gate Motors | Page 80-82
  • Intercoms | Page 83Technical | Page
  • Technical 86-87

Secure Magazine your security guide Issue 1 (May – August 2015) Cover Page & Some Featured Topics

  • CCTV Surveillance | Page 8-19
  • Access Control | Page 20-25
  • Burglar Systems | Page 26-29
  • Access Control | Page 30-34
  • Security in Transport and Travel | Page 35-42
  • Security in ICT | Page 43-47
  • Security in Education | Page 48-49
  • Fire Protection and Fire Equipment | Page 50-53
  • Case Study | Page 54-60
  • Security in Entertainment Industry | Page 62-64
  • Company Profile | Page 65-83
  • General Business Security | Page 84-93