Welcome!

News Feed Item

Master Lock Offers Tips for Summer Home Safety

MILWAUKEE, WI -- (Marketwired) -- 06/16/14 -- Home is where the heart is, and also, where the people and possessions most important to consumers reside. Yet, nearly half of North Americans (44 percent) don't take any security precautions other than locking their windows and doors to keep these items safe.* With the start of summer and families more likely to be enjoying the outdoors -- either at home or away -- Master Lock is reminding consumers of simple security precautions to ensure their home remains a safe haven.

"Safety starts and ends at home," said Rebecca Smith of Master Lock, a leading manufacturer of innovative safety and security solutions. "There's no better time to incorporate safe practices into your family's routine to ensure a safe and memorable summer."

Master Lock offers its top six tips for home security:

1. Make Your Backyard a Safe Place - Remember to put garden tools and lawn mowers away in a locked place after use. Un-stored tools could cause a fall or tempt young children to use them as toys. Secure your shed or garage door with a high-security, weather-resistant lock, such as the Master Lock Magnum Laminated Padlock. Not only does this deter kids from using tools as toys, it also guards lawn equipment from theft.

2. Sleep Safely with Windows Open - Sleeping with open windows provides a cool breeze for pleasant rest and helps many people sleep better. Even better, it lessens the chance of succumbing to carbon monoxide poisoning, a dangerous nighttime killer. Unfortunately, it also provides easy access to your home for intruders. Before enjoying this summertime routine, take proactive measurers to ensure you do so safely. If you use a home security system (only 14 percent of North Americans do*), ensure it provides window security coverage. Otherwise, use a window blocking device that prevents windows from opening more than six inches, and ensure windows cannot be accessed from outside. While you're sleeping, ensure all doors are locked, and safeguard patio doors from intruders with Master Lock's Door Security Bar.

3. Designate a Family Meeting Spot - More than half of North Americans (54 percent) have not designated a meeting spot in case of a house fire.* Set one with your family now so you're prepared should a fire ever strike. It's also good practice to designate a meeting spot whenever you're away from home. Whether you are at a carnival, park or away on vacation, always come up with a plan of where to meet. This will give you peace of mind in case someone in your family is separated from the group.

4. Check Your Smoke Detectors - Properly installed and maintained smoke detectors save lives and protect against injury and loss due to fire.** Yet, only seven percent of North Americans test smoke detectors monthly* -- the recommended frequency to ensure they're always working correctly. Replace batteries yearly or as soon as you hear a low-battery warning sound that usually sounds like a chirping noise. Smoke alarms should be replaced completely every 10 years.

5. Create Backups- With busy summer schedules, it's easy to forget your keys before leaving the house. To avoid being locked out of your house, make extra copies of your keys, and keep them in a secure spot. The Master Lock Storage Security Lock Box allows you to store your extra key and have it be accessible only by those who know the combination.

6. Prepare for the Unexpected - Technology today makes it easier than ever to ensure you're never waiting in line at an urgent care clinic without your child's insurance information or forgetting passwords to your online accounts. Store digital copies of your family's important medical and identification information in the free and secure Master Lock Vault for easy access from your smart phone on the go.

For more information on safety tips and products, please visit the Master Lock website at www.masterlock.com or the Master Lock Facebook page at www.facebook.com/masterlock.

About Master Lock
The Master Lock Company LLC is recognized around the world as the authentic, enduring name in padlocks and security products. Master Lock Company offers a broad range of innovative security and safety solutions for consumer, commercial, and industrial end users. Master Lock Company LLC is an operating unit of Fortune Brands Home & Security, Inc., a leading consumer brands company. Headquartered in Deerfield, Ill., Fortune Brands Home & Security, Inc. (NYSE: FBHS) is included in the S&P MidCap 400 Index. For more information about Master Lock, visit www.masterlock.com.

*According to a May 2014 Safety and Security Survey of more than 1,000 North Americans conducted by Master Lock via SurveyMonkey.

**According to the American Red Cross.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2616619

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"Splunk basically takes machine data and we make it usable, valuable and accessible for everyone. The way that plays in DevOps is - we need to make data-driven decisions to delivering applications," explained Andi Mann, Chief Technology Advocate at Splunk and @DevOpsSummit Conference Chair, in this SYS-CON.tv interview at @DevOpsSummit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
"We provide DevOps solutions. We also partner with some key players in the DevOps space and we use the technology that we partner with to engineer custom solutions for different organizations," stated Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...