School Vulnerabilities Explained at ASIS

Keeping students, faculty and visitors at schools are a top priority for every school district. Having a vulnerability assessment done at a school campus can make a huge difference in keeping everyone safe while there. In fact, having a professional come out to test the systems you have in place can make a huge impact. Many schools aren’t aware that something as simple as leaving a coffee mug in a classroom can put someone at risk.

During ASIS, John Woodmansee, from the Connecticut Department of Education, led a discussion on Virtual School Vulnerability Assessment.

The first exercise, if you will, was having attendees pick out what could be potential risks in a classroom from a picture he had on the screen.

The image showed what looked like a normal classroom. But there were a few things that could create a risk. For instance, the computer was unlocked and ready for anyone to use - meaning students could quickly gain access to private and sensitive information, including the teacher's email.

The teachers keys were out on the desk as well as the ID card. Leaving these out in the open is a big no-no. Students could easily take a key and open something or gain access to a room that might be restricted and hold certain items that shouldn’t be accessed by students - something such as a chemistry lab. The kids could also steal a key and make copies, perhaps before the teacher has even noticed the key was gone. The student could even return the key and the teacher would never know it had been compromised.These are just a few examples of something an instructor should be aware of before leaving the classroom unattended.

Other things instructors and faculty should know are the order of their priority list during an emergency as well as know exactly what the protocols are for each different emergency. Some school districts have started to use ‘All Hazard’ plans which have same protocols for multiple incidents, making it easier for faculty, staff and students to remember during the event or events.

Keeping everyone safe while on campus has always been the top priority for schools, and knowing how to make that task easier and safer is becoming much more attainable, thanks to conducting vulnerability assessments.

About the Author

Lindsay Page is the editor for Campus Security & Life Safety magazine, and the senior editor for Security Today.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.