The end of summer for college students is near, and soon your campus will be filled with thousands of students, faculty, and staff to protect. School threats are on the rise across America. Universities, colleges, and K-12 schools practice fire drills and prepare for health-related incidents and natural disasters but are they prepared for active shooter events? Being proactive instead of reactive is critical when you’re confronted with an active shooter situation.

Plan and Train for Active Shooter Incidents

Most schools don’t think it can happen to them, but that’s not true. Look at Sandy Hook, for example. Who would think that an active shooter would target an elementary school? There are usually no warning signs before an active shooter incident.

Your priority is to train your staff to act swiftly during violent incidents. The more you train, the more prepared they’ll be when confronted with an active shooter or similar event.

Collaborate with local law enforcement and fire and rescue as they will be responding to these types of incidents. Working together with first responders allows everyone to work together without interfering in law enforcement duties and responsibilities. The whole process will work smoother without interference.

Integrating Technology with a Security Plan

There are a couple of ways to integrate technology with your security plan to increase your ability to manage or prevent active shooter incidents. Gunfire detection technology is an excellent security addition. Microphone sensor nodes in these systems detect gunshots and can lock doors and activate surveillance cameras in the area. They immediately send alerts and live video feed to law enforcement and security personnel.

Mass notification systems are also critical to efficiently notify people in the system of incidents in progress. These systems are much more efficient than other communication methods.

Access control is also a key security system to integrate with the rest of your security equipment. It can prevent a shooter from entering buildings, reducing casualties. It’s not hard to install and cost-effective. Access control also minimizes perimeter breaching.

The crucial take away from all of this is to prepare and plan for the inevitable. It can happen to your campus.

About Security Instrument

Security Instrument is a full-service, independently-owned security integrator that offers numerous electronic security options. We serve thousands with commercial and home security in Delaware, MD, NJ & PA.

In 2015, there were 371 mass shootings in the United States. Mass shooting incidents are difficult to plan for because they happen in seconds, and no business, university campus, or municipality is the same. Technology now has an excellent solution to locate active shooters so that law enforcement and first responders can stop the threat sooner and render aid to victims.

Gunshot Detection Basics

This technology certainly isn’t new. In fact, the government researched gunfire detection in World War I. However, the technology has vastly improved the system’s sensors.

The system alerts authorities in seconds to dramatically reduce response time to active shooter incidents. Gunshot detection analytics use microphone sensor nodes to detect gunfire. Once the analytics detect gunshots, they can also automatically activate surveillance cameras to live-stream video of the event. The system then immediately sends the information to law enforcement and security personnel.

Some of these systems send the information to a command center where experts verify the audio in seconds. In other systems, the analysis of the audio happens right inside the sensor node.  Some vendors that supply the technology claim that the system is so sensitive that it can identify the type of firearm. It can also detect the number of shots fired.

There are four primary types of gunshot detection systems:

  • Mobile
  • Fixed
  • Outdoor
  • Indoor

Benefits of Gunshot Detection Analytics

Safety directors say that the technology has drastically changed how they respond to incidents involving active shooters. Staff and employees receive alerts from the system much faster than alarm activations or phone calls. As a result, the response time for law enforcement and security personnel has significantly decreased.

Some cities find the system useful for more than just mass shooting incidents. Information received from these systems led to the investigation and arrest of a man who possessed a firearm illegally and had outstanding warrants for his arrest. The data these systems provide is invaluable.

About Security Instrument

Security Instrument is a full-service, independently-owned security integrator that offers numerous electronic security options. We serve thousands with commercial and home security in Delaware, MD, NJ & PA.

In today’s school security climate, many administrators assume that faculty and staff will intuitively respond appropriately to an emergency. However, this is not a wise assumption. When the pressure is on because of a viable threat, school employees need a clear set of guidelines to follow – and these guidelines should be implemented long before the emergency happens. This summer, school administrators can prepare for a potential emergency by taking the following three out-of-the-box approaches.

1. Train Them to Use Equipment

When new security equipment is installed, administrators are not the only ones who need to be trained in its use. Schools can hold an in-service day with faculty and staff that trains them on the way video surveillance systems, access control systems and alarms around the campus work. When equipment has been in place for years but is currently being upgraded, that is also a great time for staff to be trained. The knowledgeable technicians of your security integrator can assist with this training.

2. Hold Demo Days and Drill

Just as the students are trained to react via fire drills, faculty and staff can be trained to react to a security emergency via mock incidents that cover a variety of potential scenarios. During these drills, equipment that should be demoed includes the following: the mass notification system to rehearse how the lead will communicate to the campus during the emergency, the electronic locks to mimic a lockdown of the campus, and the alarm system to prepare for how the audible alarms will be used in a given emergency scenario. By understanding how the equipment will operate in an emergency, faculty can be more mentally prepared when seconds count.

3. Designate Points, Prepare to Train Students

Around the campus, there are places that can be official safe zones – for example, classrooms that can be designated as places for students to barricade themselves in the event of an emergency. These places should be communicated to faculty during summer security training, and this information can then be passed down to students once classes begin. Students should engage in drills as early as possible in the school year, so they can be aware of security protocols from the beginning of the school year on.

By getting serious about school security during the summer, campus faculty can be better prepared when it matters most. To speak with an experienced security integrator that can help, contact Security Instrument.

About Security Instrument

Security Instrument is a full-service, independently-owned integrator that offers numerous options to mitigate school emergencies in Delaware. We serve thousands of electronic security customers located throughout Delaware, MD, NJ & PA.

School’s out for summer, but the work goes on for administrators who are on duty year-round. One of the most important things school administrators can do during the summer months is fine tune their school security policies. When partnering with the security integrators who are contracted to do the work, school administrators can update security policy for the benefit of the students and staff alike. Here are some ways to get started.

1. Schedule a Campus Risk Assessment 

During the summer break, administrators can hold a risk assessment for the school campus that involves looking at the expected enrollment for the next year – and, takes into account any changes that may have occurred over the past school year in terms of class sizes, staff turnover, or security-specific events.

2. Focus on Best Practices

Today’s best practices call for layers of security on campus, in order to inhibit potential criminals from entering classroom buildings. For example: Limiting visitors to a single point of entry into the main building, and ensuring that all fences, gates and even signage around campus funnels the incoming traffic to that single entry point. Another example is to implement electronic measures such as electronic locks and mass notification systems.

3. Consider Additional Measures

Access control systems are not just for private corporations; they are also for school campuses – public, private and charter alike. With an access control system, students and staff are required to swipe a simple credential (perhaps their school-issued ID card) in order to be granted entry by the electronic portal.

Campus risk assessment can include determining which outdoor points need added cameras to ensure all-points surveillance on campus. It can also involve determining which indoor areas need surveillance, such as stairwells and locker rooms.

 

4. Take the Measures to Another Level

With an access control system, schools can keep watch lists for administrators to record the names of potential unwanted visitors. This list can include disgruntled ex-employees, non-custodial parents of students, and personal friends of students who have no reason to be on campus.

5. Implementing or Enhancing Video Surveillance

The time for all schools to implement video surveillance systems is now. For campuses that already have camera systems, enhancing them is a measure that can also take place over the summer. For example, the campus risk assessment can include determining which outdoor points need added cameras to ensure all-points surveillance on campus. It can also involve determining which indoor areas need surveillance, such as stairwells and locker rooms.

Summer is undoubtedly the perfect time of year to fine tune school security. For questions on these security policy updates or inquiries about additional measures, contact Security Instrument for a complimentary campus assessment.

About Security Instrument

Security Instrument is a full-service, independently-owned integrator that offers numerous electronic security options. We understand school security in Delaware, and we serve thousands of customers throughout Delaware, MD, NJ & PA.

When school is out for the summer, that’s when large campuses can turn their focus to developing a security plan for the coming school year. It’s a challenge, but a necessary endeavor.

Because campuses range in size, population, number of buildings and amount of open space, there is no one-size-fits-all model for securing them. But by taking a multi-layered approach, a school’s security department can determine which types of security can best work for the campus’s needs.

Layer #1: Address Immediate Needs

Many times, campuses address their security plans after a recent threat. If that is the case, then the first order of business is to examine whether there are any measures that could have prevented the incident, electronic or otherwise. Often, these measures include better security at the entry point that was used to gain access to the campus.

Layer #2: Identify Other Campus Security Challenges

If there is no recent security incident, then the next step is to reflect on other campus security challenges. What types of incidents present themselves on the campus? The security department should pull all available reports to find out which campus security violations occur the most often.

Because campuses range in size, population, number of buildings and amount of open space, there is no one-size-fits-all model for securing them.

Layer #3: Identify Problem Locations

Where do those violations occur? Do most of the burglaries occur in dorm rooms or classrooms? Do most of the assaults take place behind buildings or in parking lots? Knowing the answers to these questions will help the department determine where cameras should be monitoring the premises.

Layer #4: Consider Outside Traffic

How often do students leave campus, and what are the outside establishments they frequent? Are there policies in place to limit visitors – especially in the evening? Updating the security plan is the perfect occasion for adding or adjusting visitor policies.

Layer #5: Ask Your Integrator for Advice

When a campus is working with an experienced security integrator, that external perspective can prove to be highly valuable. An outside consultant brings a fresh eye to a project that day-to-day security staff may overlook, with insights on where additional trouble spots may be.

Sometimes, updating the campus security plan is a reality check on the school’s risks and vulnerabilities. Regardless, it’s work that must be done in order to provide students and staff with the safest environment possible. To speak with an experienced security integrator about this, contact Security Instrument. We will be glad to meet you for a complimentary campus security assessment.

About Security Instrument

Security Instrument is a full-service, independently-owned integrator that offers numerous home security options. We are a Delaware Valley security company that serves thousands of customers located throughout Delaware, MD, NJ & PA.

For a business that caters to Valentine’s Day shoppers, diners or spectators, the most romantic weekend of the year may actually be the riskiest. If you own a restaurant, retail establishment or destination property, check out these tips on Valentine’s weekend security for your business.

LIGHTS LOW, CAMERAS ON

Your dining room may have the lights down low, but your wireless IP video cameras should still be rolling. On a high-traffic night like Valentine’s Day, the security risks are higher and your vigilance should be as well. While you’re busy watching the floor, supervising the staff or managing the reservation list, keep your virtual keypad app handy to remotely access your interior and exterior cameras. Record clips that look suspicious, view images that pique your interest and have clips emailed to you for future reference if necessary.

MIND THE STORE

If you own a retail establishment that’s in high demand on February 14, then it’s a day to amp up security measures during peak hours. Own a jewelry store? The same guideline about your cameras applies, and it may not be a bad idea to have the entire staff on hand that day. Florists, thieves may not be in the market for roses – but they are prone to act on days they know will be profitable for you. After all, they want to get their hands on as much register cash as possible. So whether you sell 24 karat gold, flowers or heart-shaped boxes of chocolate, be on high alert this Valentine’s Day.

CLOSE CAREFULLY

How about businesses that don’t provide the services Valentine’s Day is famous for? Those establishments are at risk too. Maybe you plan to close up early because Valentine’s Day is a notoriously slow day or evening. If so, be sure to check all entrances to make sure locks are securely in place and cameras are operating. Then, don’t forget to arm your system before you leave. Don’t like giving your employees the alarm code? Pull out your phone and use your virtual keypad to do it yourself, from wherever you happen to be.

No matter what business you’re in, your security system can be indispensable this Valentine’s Day. To learn more, contact Security Instrument and request a free security consultation.

ABOUT SECURITY INSTRUMENT

Security Instrument is Delaware’s largest full-service independently-owned security company, serving thousands of customers throughout Delaware, MD, NJ & PA.

Exchanging outdated door locking hardware with a wireless access control system is one of the smartest ways to upgrade the security at an enterprise of any size. At this point, it’s inarguable that the ability to replace keys with electronic credentials has transformed commercial security for the better.

But is there an access control option for organizations that want even more advanced systems? There sure is. It’s biometric access control, and it takes standard access control into cutting edge territory.

What is Biometric Access Control?

A biometric access control system is powered by infrared technology, which it uses to verify the identities of individuals who attempt to enter the controlled building or area. Often, biometric access control is associated with fingerprint scanning. True, fingerprint authentication is one of the most popular biometric ID technologies; however, biometric access control encompasses everything from facial recognition to retina eye scanning.

Using this technology, biometric access control confirms the identity of employees and other approved individuals entering an area; this may be contractors, vendors, or frequent visitors who exist in the database. These systems are designed to verify identities quickly and precisely, even when lighting is low. It is also designed to scan simultaneous subjects, so that groups of people entering at or around the same time can be authenticated one by one in seconds. This makes biometric access control perfect for large employers, public buildings and other applications where groups of people are entering in waves throughout the day.

Biometric Access Control Applications

At this point, you may be thinking that biometric access control is exclusively for high-profile locations. True, sensitive locations do benefit from it – but biometric access control can fit a variety of applications. Everything from aviation, to finance, to manufacturing, to healthcare regularly benefits from biometric access control technology. Even childcare is becoming an emerging opportunity for access control. With all these trades incorporating sites of different sizes and levels of security vulnerability, this underscores the wide range of needs access control can fill.

When it’s time to consider enhancing building security with biometric access control, Delaware Valley organizations can contact Security Instrument for a complimentary consultation. We will be glad to speak with you.

About Security Instrument

Security Instrument is a full-service, independently-owned security integrator that offers numerous electronic security options. We serve thousands with commercial and home security in Delaware, MD, NJ & PA.

 

Now that the key to business security is actually keyless (at least in terms of building access), more businesses are looking into their options for cloud-based access control. It should be an easy decision to convert outdated, traditional door locks to access control; the absence of keys is enough reason on its own. But for those business owners who still need convincing, here are a few advantages of making this shift.

Lower Installation Costs

For business owners who were early adopters of access control and left dissatisfied, it’s important to be aware that modern, cloud-based access control is much easier to retrofit than the first generation of systems.

For one, high installation costs are a thing of the past; those complex wiring requirements have been replaced by simple engineering that replaces the door locking hardware with the access control reader. With the communication powered by wi-fi, it’s easier, more affordable and totally wireless.

Broader Scalability

Now, security integrators can offer access control systems that range from traditional, computer-based systems to the latest in IP, browser-based technology. This can be done on a single door at a small business, a high-rise structure, or a multi-building campus. That’s what broad scalability is about.

More Customization Options

The days of “one size fits all” access control are long gone. From popular options like card readers and keypads to more advanced options like magnetic locks and electric strikes, cloud-based access control is available in tons of choices. As for the cloud? That’s what keeps the encrypted data for your system stored safely for your security.

If your organization is ready to take the next step in building security, we would be glad to speak with you about cloud-based access control. Delaware businesses of all sizes, please contact Security Instrument for more information.

About Security Instrument

Security Instrument is a full-service, independently-owned security integrator that offers numerous electronic security options. We serve thousands with commercial and home security in Delaware, MD, NJ & PA.

The hospitality industry has its hands full when it comes to security. Here are just a few of the challenges the average hotel property must address:

  • Achieving perfect symmetry between creating an inviting atmosphere for guests while simultaneously implementing access control procedures
  • Analyzing camera footage for potential security threats 24/7
  • Securing valuable assets on a property that caters to hundreds, if not thousands of transient guests every day of the year

How can a hospitality establishment maintain its welcoming environment and culture of customer service, while also ensuring everyone on the premises remains secure? It’s a delicate balancing act, but it can be achieved. Here are some tips for making it happen.

Upgrade Access Control

Any establishment that continues to use actual room keys is behind the game on security. When access control cards are issued to every guest, it’s easier for management to keep track of guest room entry – but it’s also a valuable way to control access to guest-only areas, including the fitness center, pool and other locked areas that only guests may use. For higher end establishments, access control can be categorized so that only a certain class of guests may enter members-only and VIP areas. If your establishment is still relying on keys, it’s time to upgrade.

Upgrade the Upgrade

Of course, even access control cards can come with some pitfalls, such as cards being misplaced by guests or deactivated by employees unnecessarily. If a hotel has graduated from the initial convenience of key cards and is looking for a next-generation access control solution, one avenue to consider is a system that syncs access with the guests’ smartphones. This is an up-and-coming solution being adopted by some of the nation’s most prestigious hospitality establishments, and managers are finding that it offers a fluid, more rewarding guest experience.

Reevaluate Video Surveillance

Every hotel needs video surveillance, but implementing it is just the first step. After a period of time, managers may find that the security video is missing the mark. While the front desk, entry points, and lobby are all great places to start, they are not the end game of hotel video surveillance. Consider reevaluating the establishment’s security camera layout; if there are not sufficient cameras watching over guest hallways, retail areas, service corridors and dining rooms, then it may be time to add those to the network. To minimize the need for 24/7 monitoring onsite, consider embracing intelligent video analytics solutions that can identify suspicious events and significant patterns as they occur. Ask your security integrator to recommend a solution that can be scaled to the footprint of your establishment.

The more secure hotel guests feel, the more likely they will be to reward an establishment with repeat business and recommendations. To improve hotel security while still maintaining a hospitable atmosphere, contact Security Instrument. We will be glad to provide an onsite security evaluation of the property.

About Security Instrument

Security Instrument is a full-service, independently-owned security integrator that offers numerous electronic security options. We serve thousands with residential, commercial and hotel security in Delaware, MD, NJ & PA.

There’s no deployment without design when it comes to commercial security. Wilmington business owners, here are some security system design considerations to make before contacting an integrator.

Partner Communication

Your security integrator should listen first, design second. If the vendor has a “one-size-fits-all” template for system design and refuses to listen to your needs as an organization, that’s a red flag. Partner communication is key when designing a commercial security system.

Equipment Readiness

Still, they should also have equipment at the ready so that installation can happen on schedule. If parts need to be ordered and too many workarounds are required, that’s an indicator of potential problems surfacing down the road. Make sure your integrator has equipment on hand to meet your needs before committing to an order.

Certification and Compliance

For organizations that are regulated and shouldered with compliance requirements, it’s critical that the security integrator is able and willing to help. Make sure the vendor is ready to uphold to your organization’s policies and procedures, and that they have been certified by equipment manufacturers so that deployment is as seamless as possible.

After design, other considerations to make when choosing a commercial security integrator include:

  • Project management experience
  • Web-based project management software
  • Simplicity of wiring
  • Project commissioning
  • Final termination policies

To speak with a commercial security integrator that designs expertly and deploys seamlessly, contact Security Instrument to request a consultation for commercial security. Wilmington, MD, NJ and PA organizations can reach us at (888) 326-8936.

About Security Instrument

Security Instrument is a full-service, independently-owned security integrator that offers numerous electronic security options. We serve thousands with residential and commercial security in Delaware, MD, NJ & PA.

[activecampaign form=1]