Page 55 - Security Today, November/December 2023
P. 55
As a simple example, when you install a new security camera, change the default password to something more secure. How to configure the new password, where to store it, and who can access it can all be clearly documented to avoid confusion. Likewise, policies around privacy and data protection should be considered alongside security protocols. In a campus setting, you do not have to compromise privacy for the sake of security. Modern video management systems can be configured to blur faces by default to allow security teams to monitor the campus while still maintaining privacy. In the event of an incident, investigators can lift the mask to identify people on an as-needed basis. Within a unified software platform, digitized SOPs can automate privacy processes and per- missions and make it easier for everyone to follow the set protocols. ONGOING TRAINING IS ESSENTIAL Continuous education promotes a culture of security and empha- sizes the role each of us has to play in keeping everyone safe. Once you have your SOPs, policies, and plans in place, set up a regular ca- dence of training and education. In times of crisis, staff will respond. An example could include a tabletop scenario to test your “” response and identify potential oversights or weaknesses. In this role-playing exercise, stakeholders run through what they would do and what problems or challenges they might face. This exercise is not only a great way to rehearse what you would do but can also reveal blind spots or other stakeholders who could be involved. It is beneficial to involve students in practice drills as well. You probably already have a regular program of fire drills. Consider what other kinds of emergencies your campus may face and what students need to know to be able to respond effectively in a crisis. Everyone on campus needs to know what their role is in the event of a natural disaster or emergency. Student preparation and practice will relieve any anxiety students may have about potential tragedies. Likewise, every person who regularly accesses the campus network should be educated on basic cybersecurity best practices. These include changing default passwords, avoiding password- sharing, and keeping software up to date. Criminals look for soft targets. Do not make it easy for them to find a weak point of entry into your system. CREATING PUBLIC-PRIVATE PARTNERSHIPS Schools cannot operate in a silo. Proactively building strong rela- tionships with local law enforcement and other stakeholders makes you more resilient in times of crisis. One of the ways some schools have approached this is to formalize public-private partnerships. They can share resources, expertise and best practices to improve crime prevention and emergency response. The school resource officer program is a great example. The role of this officer is to provide support to the school community, including students, parents, school staff, and administrators. It is a longstanding and effective program that supports community police work by focusing on prevention and early intervention. Federating technology with local law enforcement is another example of an effective public-private partnership agreement. Police can easily access information in video management sys- tems or other technologies to reduce friction and speed response in an emergency. A camera registry program also allows police to leverage surveillance video from private cameras to assist in investigations. Police cannot access private security information at any time—they still need to ask permission. A camera registry program makes it easier and faster for police to submit the request. Collaboration between physical security, cybersecurity, and law enforcement specialists is key to enhancing campus safety. A unified security platform improves communication between these teams and departments to proactively plan for joint responses and formalize procedures. This multi-layered, holistic approach to security helps defend against modern security threats, which can come as easily from a weak password as a broken window. “THE BEST WAY TO SUPPORT THIS IS WITH A UNIFIED SOFTWARE PLATFORM THAT BRINGS TOGETHER INTELLIGENCE FROM DISPARATE SYSTEMS AND SUPPORTS COLLABORATION BY ALL STAKEHOLDERS.” SOFTWARE SECURITY 11