Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Advice to School Administrators: Don’t Let Security Drown in a Flood of Financial Woes

By Jeff Floreno
August 10, 2010

Sometimes it seems like this recession will last forever. Month after month, consumers and businesses continue to hold their breath, “making do” with old resources and returning time and time again to find the coffers still empty. Schools feel the recession’s crunch perhaps more than other institutions. With budget decisions made far beyond their reach, school administrators have little control and much responsibility to stretch budgets, cut programs and allocate limited resources. 

Non-critical programming is the first to go. Dollars are focused on the classroom, as they should be. But much like trying to teach school without a building, a secure environment is an absolute prerequisite to successful teaching and learning in the classroom.

Without a secure environment, schools risk injury to students and staff, distractions to learning, and damage to property. To make things worse, the state of the economy is directly proportional to security risks: as the economy worsens, safety and security risks of people, property, and information escalate. All this to say: this is no time to let security lapse.

But in a rough spot, administrators do not have the dollars to dedicate to state-of-the-art security systems. In many cases, they are dismissing school resource officers (SRO) to cut payroll. So what’s an administrator to do?

Administrators must view the problem through a new lens. It’s not “all” versus “nothing,” or “state of the art” versus “status quo.” It is possible to advance security on a tight budget by leveraging existing equipment, taking strategic steps, and making sure every dollar spent is maximized.

 

Conduct an assessment to prioritize needs

Assessments help answer the question, “Where should I begin?” An assessment involves evaluating the school’s risks starting from the outside and moving in. Some third party assessments overseen by a security consultant can be expensive, but don’t be deterred. Armed with the right information, schools can conduct their own assessment. And while it may not be as thorough as one conducted by a security professional, it will uncover opportunities to improve security. Then, those scarce budget dollars can be spent mitigating high-risk areas and other critical security problems.

Starting with the surrounding community, is there infrastructure or activity that could present a risk to the school? Is there a transportation hub within walking distance that may bring unwanted foot traffic on campus? Or does a nearby manufacturing or chemical plant pose a risk? On campus, what traffic problems are most prevalent? Are there areas where signs or foliage blocks visibility, creating safety hazards for pedestrians or drivers? Are fences dilapidated, rusted or in poor repair?

Thinking through and documenting the issues help prioritize security and safety issues that need to be addressed. This effort of understanding the risks and prioritizing them makes it much easier to leverage limited dollars to accomplish the most.
 

Leverage existing systems

For schools with legacy video systems, upgrading these analog solutions to IP is a great way to enhance performance of the system and simultaneously primes it for a more cost-effective upgrade path to the latest technologies. An investment in encoders is about half the cost of replacing cameras with the newest IP cameras and lends the existing system all of the flexibility and performance of IP video. The result is much more frequent, efficient and effective use of video. Sorting, tagging and sharing video becomes much easier and means that it can be used much more proactively to keep an eye on things across campus rather than being used only after an unfortunate event has occurred. Suddenly, a tool that was rarely used is now used by individuals across the school, and can provide context for events. Who opened the door in the AM? When was it propped? Did anyone come through it while it was propped? Was there any disruptive behavior between classes? This type of upgrade path allows administrators to make a modest investment and, in turn, exponentially increase usage and value of existing video systems.  

Leverage in-house resources

When it comes to security systems, schools can quickly rack up expenses on maintenance and repairs with third party resources. While some of this is unavoidable, in-house resources can be trained to manage systems - particularly IP systems. With IP technology, IT professionals are accustomed to working with peripherals on the network. Training and certification programs are available and can impart crucial information about video and access control systems, allowing in-house staff to install, troubleshoot and service them at a fraction of the cost of bringing in outside consultants. Other benefits include reduced downtime of critical security systems and reduced installation time.

To backfill for the loss of an SRO, in-house resources can be trained and assigned some of the tasks fulfilled by an SRO. For example, teachers may be assigned to monitor the hallways during class changes, office staff may be trained to periodically review recorded video, and new security-reporting processes may be put in place. With everyone set up to contribute to helping make the school a safer place, the cost of both identifying and preventing problems is greatly reduced.

Although school administrators face tough budget decisions, they receive no leeway to provide a less safe environment for students and staff. No matter how financially strapped, administrators must still make safety and security a priority. By making the right investments, maximizing existing resources, and eliminating unnecessary expenses, administrators can minimize security costs without sacrificing a safe learning environment.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff Floreno is director of security operations and strategy for Wren, providers of physical security solutions that create safe learning environments. He can be reached at jeff.floreno@wrensolutions.com. To learn more, visit www.wrensolutions.com.  

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Classroom with five rows of desks

    29% of school systems report a rise in student-to-student security incidents

    See More
  • school safety and security report

    State of School Safety report reveals 30% gap between parents and administrators on perception of school safety

    See More
  • Woman working on phone and laptop

    Starting a job in tech? Read this advice to maximize your experience

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing