Mistake 4: Under-engineering doors and hardware
A mis-hung fire door or fatigued closer will defeat even premium electronics. Select the right locking method (maglock, electric strike, motorised lock) for the door set and usage, specify monitored keeps and robust door contacts, and plan ergonomic reader placement that suits natural approach as well as users with mobility or dexterity needs. Small hardware choices decide whether a door behaves beautifully for years—or becomes your most frequent call-out.
Mistake 5: Forgetting inclusive access and visitor journeys
Access control must work for everyone who has a legitimate reason to be there. Reader heights, handle forces and approach clearances should reflect Equality Act considerations; where appropriate, specify automatic operators or touch-free exits for dignity as well as throughput. Visitor and delivery flows fail when they’re bolted on at the end; build video entry into the design so receptions can verify callers and log releases rather than bypass the audit trail. For typical options and integration patterns, see Entry Phone Installation.
Mistake 6: Neglecting cabling, power and electrical safety
Intermittent faults often trace back to power margins and cabling. Plan structured cabling routes, label everything, supervise power supplies and provide battery standby so doors behave deterministically during outages. Electrical work should conform to BS 7671 (IET Wiring Regulations); the IET co-publishes the standard with BSI and is the UK authority on electrical installation—building to this baseline reduces risk and speeds internal sign-off.
Mistake 7: Putting security devices on flat networks
Modern platforms are IP-based; treat them like any other critical system. Place controllers and gateways on segmented VLANs, enforce strong admin authentication, change default credentials and restrict management interfaces. Controllers should continue making decisions at the edge on cached permissions if WAN or server links fail, then reconcile events later. This design pattern keeps day-to-day operation resilient while you secure the management plane.
Mistake 8: Overlooking integration until the last week
CCTV, intruder alarms, lifts, visitor management, barriers and long-range vehicle readers deliver their value when they’re integrated deliberately—not with a last-minute relay. Decide early what events should do (e.g., a forced door pulls up the associated camera, first-in/last-out arms or disarms intruder zones), document the I/O or API design, and write witness tests you’ll run at commissioning. We outline practical patterns in CCTV–Access Control–Alarm Integration.
Mistake 9: Choosing credentials without governance in mind
Cards and fobs are quick to administer at scale; PINs suit back-of-house doors or second-factor use; biometrics add assurance but raise your data-protection bar. Where biometrics identify people, templates and related events are generally special category personal data under UK GDPR, which means a DPIA, clear signage, proportionate retention and strong security. Failing to plan that governance work leads to delays—or worse, non-compliance. (Reserve biometrics for areas that genuinely need them and document your justification.)