Bringing IT all Together

Bringing IT all Together

Any IoT device connected to the physical security system is a potential gateway

Systems integration has been an industry catchphrase for more than 20 years. Yet, many campuses still lack a holistic, integrated approach to security, both physical and logical. Operating disparate devices within separate silos removes many of the benefits resulting from integration – including better protection of buildings, assets and people. Integration typically enables superior performance, customization, convenience and lower overall costs.

Physical and Logical Security
The essential campus integration is the convergence of physical and logical security. These vital operations can no longer operate in separate silos. Most campus systems now include many Internet of Things (IoT) devices such as wireless cameras, access readers and sensors. Any IoT device connected to the physical security system is a potential gateway for hackers targeting critical campus data.

Once in the system, a talented hacker may be capable of shutting down services such as the entire security operation or obtain the contents of the campus data center, leading to potentially catastrophic security and privacy risks. Ransomware attacks threatening to shut down whole campuses are an almost weekly event. It is not enough to react to attacks. The goal of campus security and IT teams is to prevent successful hacks.

Virtually any campus is vulnerable. A hacked system puts a campus’ reputation at risk while also leading to legal and financial liability issues. Security directors and integrators must familiarize themselves with basic cybersecurity tactics and terms to work effectively with the campus IT professionals.

Prime Targets
Cutting-edge research that is conducted on many campuses make them prime targets for both physical and logical security attacks. Sophisticated attacks from organized crime rings or foreign governments have replaced lone wolf hackers with nuisance viruses.

A study released last year by a pro-consumer website found since 2005, school districts and colleges have suffered more than 1,300 data breaches, with nearly 25 million records affected. Most of the intrusions were the result of hackers or the campuses accidentally releasing information. Yet, 15% of the cases resulted from lost and stolen laptops and other portable devices.

Security integrators play essential roles in hardening campus cybersecurity. Here are a few examples:

• Changing manufacturer’s original device passwords that often are no more challenging than 123456789

• Pushing to upgrade outdated or insecure devices that lack today’s strong cybersecurity capabilities

• Run vulnerability scans on devices before connecting them to the campus network and continue to monitor their health once deployed

• Install two-factor identity authentication, often using biometric devices along with card readers, on critical sites such as campus data centers

Physical security benefits from cybersecurity. For example, the fear of a successful cyberattack may lead campuses to delay installing IoT devices that improve video surveillance and access control. A robust and well-deployed cybersecurity plan creates greater confidence in the overall security strategy.

The Clery Act
The 1990 federal Clery Act drives much of higher education’s embrace of security systems integration. The act requires all colleges and universities receiving federal funding to report annually about campus crime incidents. Campuses that fail to follow the regulations run the risk of heavy fines and the loss of government funding. Students and their parents use the data to select a safe campus

The Clery Act significantly increased the need for integrated security technology. Security integrators must be familiar with the act to ensure their work meets strict regulations. Before beginning work on campus, integration firms must conduct thorough background checks on all employees.

Today, most campuses working with reputable systems integrators have surveillance cameras that respond to alarms from the access control or intrusion systems. Monitoring and controlling a dozen or more different systems takes place from a single security operations center. So, why is traditional systems integration still a topic? With technological advances, it’s reasonable to expect higher-level performance from integrated security devices on campuses of all sizes.

Cloud-based, hosted video and access control services easily integrate with other devices while eliminating the space required for on-campus servers. The system host, either an integrator or manufacturer, handles software updates and regular health checks. Apps provide authorized smartphone and tablet users with remote system controls, such as monitoring a single camera to ordering an immediate campus-wide lockdown.

Automatic Event Responses
Artificial intelligence presents tremendous opportunities, including automatic event responses. Facial recognition technologies use AI-based software linked to access control systems to enable approved students or faculty entrance into restricted laboratories. Other AI software monitors real-time video creating central station alarms for late-night movements of humans or vehicles outside a dormitory or other sensitive areas.

Wind-blown foliage or stray dogs are ignored as they move across a camera’s field of view. Largely freed of false alarms, station operators spend more time on true events.

The COVID-19 pandemic still has many campus administrators concerned about mask wearing or social distancing within classrooms. AI software, integrated within the surveillance camera system, spots people not wearing protective face coverings or alerts staff when room occupancies are exceeded.

Many security directors integrate visitor management systems into their overall plan. The systems enable campuses to print temporary badges or use smartphone apps limiting visitor access to specific areas, such as dorms, labs and administrative offices, during certain days and times. Turnstiles restrict access to critical areas until a person produces a valid credential.

No two campuses have the exact security needs, meaning customization of an overall system is vital. Solutions from one manufacturer may not meet all requirements or not do so as efficiently and cost-effectively. Work with an integrator to choose the solutions that best fit your campus’ needs and then integrate them into an existing security system.

Campus Integration Plan
Also, include procedures for handling emergencies in any campus integration plan. Emergencies rarely happen with advance notice. Even day-to-day events can go off the track, such as a chemical spill, to pose a security problem.

Expect the unexpected by creating written policies and procedures for a wide assortment of natural and manmade events. Designate campus security officers and representatives from each department or building to assist nearby students, faculty and staff during shelter-in-place or evacuation orders.

Campuses benefit from integrated security systems. When operated within siloes, physical security and cybersecurity show a lack of holistic security that is more likely to result in successful attacks, leading to loss of sensitive information, economic damage and potential injuries or loss of life.

This article originally appeared in the November / December 2021 issue of Campus Security Today.

Featured

  • Child using key card scanner at school

    The Second Line of Defense

    Beyond exterior locks, discover how corridor doors and electronic access control create vital interior "zones" to protect students and staff. Read Now

  • Surveillance cameras on building

    Community-driven Video Technology

    How Lancaster, PA transformed from a crime-ridden "tipping point" to a thriving downtown using a unique, nonprofit-led 4K video surveillance network. Read Now

  • Person unlocking door with smartphone

    Streamlining Secure Access

    Berkeley’s International House upgrades 510 doors with wireless locks, ditching mechanical keys for a unified, smartphone-ready access system. Read Now

  • Person pointing at screen

    TCA Improves Its Mass Communications

    Trinity Christian Academy replaces disjointed analog systems with a unified IP-based platform to streamline daily bells and campus-wide emergency alerts. Read Now