School Vulnerabilities Explained at ASIS

Keeping students, faculty and visitors at schools are a top priority for every school district. Having a vulnerability assessment done at a school campus can make a huge difference in keeping everyone safe while there. In fact, having a professional come out to test the systems you have in place can make a huge impact. Many schools aren’t aware that something as simple as leaving a coffee mug in a classroom can put someone at risk.

During ASIS, John Woodmansee, from the Connecticut Department of Education, led a discussion on Virtual School Vulnerability Assessment.

The first exercise, if you will, was having attendees pick out what could be potential risks in a classroom from a picture he had on the screen.

The image showed what looked like a normal classroom. But there were a few things that could create a risk. For instance, the computer was unlocked and ready for anyone to use - meaning students could quickly gain access to private and sensitive information, including the teacher's email.

The teachers keys were out on the desk as well as the ID card. Leaving these out in the open is a big no-no. Students could easily take a key and open something or gain access to a room that might be restricted and hold certain items that shouldn’t be accessed by students - something such as a chemistry lab. The kids could also steal a key and make copies, perhaps before the teacher has even noticed the key was gone. The student could even return the key and the teacher would never know it had been compromised.These are just a few examples of something an instructor should be aware of before leaving the classroom unattended.

Other things instructors and faculty should know are the order of their priority list during an emergency as well as know exactly what the protocols are for each different emergency. Some school districts have started to use ‘All Hazard’ plans which have same protocols for multiple incidents, making it easier for faculty, staff and students to remember during the event or events.

Keeping everyone safe while on campus has always been the top priority for schools, and knowing how to make that task easier and safer is becoming much more attainable, thanks to conducting vulnerability assessments.

About the Author

Lindsay Page is the editor for Campus Security & Life Safety magazine, and the senior editor for Security Today.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.