Feb 11 2025
Security

A Toolkit for Holistic Physical Security in School Buildings

Integrate physical security technology as part of an overall cybersecurity effort to ensure the safety of students and staff.

Protecting students, teachers and staff requires a 360-degree approach as part of a holistic physical security strategy.

Not only do schools need physical security measures, such as door locks and emergency communications, but they also require protection from threats, such as ransomware and malware.

“Physical security and cybersecurity are intricately linked,” explains Jake Stauch, a former director of product at Verkada. “One really can’t exist without the other.”

Physical security technology includes surveillance cameras, motion sensors, access controls and role-based permissions. These technologies can protect school systems from both internal and external threats to computers and records, server rooms and other equipment, Stauch says.

Click the banner below to enhance your school’s physical security program.

 

Here are some technologies to consider when bolstering a school building’s physical security posture:

Video Security Cameras

Surveillance cameras provide visibility into areas such as parking lots, school hallways and common spaces, including cafeterias. Combine video security cameras with analytics and alerts to increase security, Stauch advises.

“Closed-circuit TV and surveillance cameras serve as the eyes of the security system, keeping watch over everything,” explains Erik Avakian, a cybersecurity executive counselor at Info-Tech Research Group.

Alarms

Panic buttons enable security teams to respond to incidents, and video feeds connected to a button’s location can alert onsite security and the police, Stauch says.

Alert systems can notify staff of motion after hours or that a door was left ajar, he says.

Many schools are equipping staff with silent alarms in compliance with Alyssa’s Law, which “requires all public elementary and secondary school buildings to be equipped with a silent panic alarm connected to local law enforcement,” according to a website on the law. The law has so far passed in seven states and is pending in 13 others.

Jake Stauch
Physical security and cybersecurity are intricately linked. One really can’t exist without the other.”

Jake Stauch Former Director of Product, Verkada

Access Control

Matt Kjin, segment development manager at Axis Communications, suggests creating a hierarchy of access based on the needs of employees. Credentials might consist of a PIN or use a smart device such as a phone, an access method that is gaining popularity, he says.

“With one touch of a button, admins can trigger a lockdown procedure,” Stauch says. “Access to restricted areas can also easily be added and removed to scale efficiently.”

Meanwhile, software allows school systems to control access to data from surveillance cameras, which enables school districts to manage clearances and minimize risks from unauthorized access, he says.

Access to security cameras is crucial for school safety. Earlier this month, suspicious activity that potentially compromised the district’s security camera systems led to a phone and internet outage at Aurora Public Schools in Colorado. Ensuring that the right school leaders and response teams, and no potential threat actors, have access to surveillance of a school helps keep everyone on campus safe.

RFID Tags

Radio-frequency ID tags help schools keep track of equipment and protect a district’s bottom line.

“Investments should be protected from theft or misuse,” Avakian says. “By tagging items, IT staff can quickly know where everything is, which helps reduce losses and can also improve response time during emergencies.”

READ MORE: Why do physical security and cybersecurity work so well together?

Best Practices for Implementing Physical Security Tech in Education

When purchasing physical security equipment, ensure that software and hardware are compatible and integrated as part of a central security management system, Avakian suggests.

IT departments should work with maintenance and facilities teams to organize physical security systems in “concentric circles,” Kjin advises. That allows items such as surveillance cameras, motion sensors, electronic door locks and glass-break sensors to communicate with each other using physical relays, logic strings or artificial intelligence, he explains.

If cloud computing links IT systems together as part of a holistic security strategy, controlled access to server rooms will also be critical, Avakian says.

“By tightly managing who can access the physical parts of the network, organizations can reduce the risk of cyberattacks or data breaches that often start with physical access,” he says.

LEARN MORE: Missouri equips mobile incident command centers for school safety.

Boosting physical security includes maintaining a working relationship with local law enforcement and emergency services. That will make emergency procedures smoother should an incident occur. Exercises and drills conducted with law enforcement and emergency services can test incident response and emergency preparedness, Avakian suggests.

“Any lessons learned will help improve the incident response process, bolster the relationships with incident responders, and ensure that incidents are responded to effectively and everyone’s working together,” he says.

Traitov/Getty Images
Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.