Security & Safety
School Security
Complacency can lead to the unthinkable
A security breach typically begins at the entry point of a school building. Mass shootings have become far too familiar to ignore. The objective is to stop the shooter from entering the building. That is much more problematic when the shooter is a student.
Security is 360 degree mission. Parking lots, bus garages, sports fields all need to be assessed. Proactive security assessments identify vulnerabilities and gaps in the current protocols.
It’s critical to compare the planning with the schools capability to execute the plan. Not all schools in the district have the same budgets or priorities.

93% of school shooters planned the attack in advance
In 2022, 34 students & adults died while 43,000 kids saw gunfire at school.
FORMAT: A series of stakeholder interviews – decision-makers and staff – a review of security documentation, training curriculum, and physical access to the workspace.
GOAL: Bridge the gap between the current or ideal state to build a holistically sound system.
We start with a macro view at the County or District level for public schools. The district is where policy and procedures are developed. A gap analysis is done. We meet with district staff, do a documentation review and look at the training curriculum.
The next phase is an evaluation of each school. A walk thru of the property and interviews with a cross-section of staff. We look at all entry and exit points including pickup and dropoff, and compare the school to the district plan. We identify any lack of alignment between expectations and actual practice.
Active Shooter Training: Dual modules for managers and staff. Reoccurring quarterly. Add to onboarding process.
Innovative Security Technology: We evaluate new technologies for securing each school. Our initial meeting captures your priorities, we align the best options, report on pros and cons, and include value/cost comparisons for your location.
Situational Awareness Workshops: A walk-thru designed for SROs to evaluate the building from the perspective of a criminal.
Plans & Procedures: Document management: reviews and updates. New document creation. Bundled pricing available.
Pricing
Security Assessment: Based on the size of the property, number of locations, and buildings.
Email or call 919-741-0961
Workplace Security
Security protocols have a tendency to “get done” after a scare, then get set aside. If security isn’t a constant – the safety of the workplace, its people and its property is at risk.
No one thinks it’s going to happen to them. If it does, the shock and panic make it even more traumatizing.
A security assessment is a gap analysis. We review practices and protocols that drive a client’s approach to security.
Prevention is the goal, but the response must be the priority. It is in the response that damages are either mitigated or increased.
An onsite security assessment protects your company, your employees, and your customers.
Pricing
Security Assessment: Based on the size of the property, number of locations, and buildings.
Email or call 919-741-0961
Secure intellectual Property
Protect Your People & Assets
FORMAT: A series of stakeholder interviews – decision-makers and staff -a review of security documentation, training curriculum, and physical access to the workspace.
GOAL: Help clients identify security vulnerabilities in their existing approach.
The assessment begins with a walk-through of the building, parking lots, and outbuildings. The client identifies a broad group of employees for interviews from across the organization.
Interviews are ongoing while a review of documentation begins. The training curriculum and schedule are examined. Outreach to community partners – law enforcement, firefighters, EMTs, and hospital staff – is done to validate the relationships.
The final deliverable is data-driven report with actionable insights.
Active Shooter Training: Dual modules for managers and staff
Situational Awareness Workshops: A walk thru of the location(s), looking for ways a bad actor could bypass security
Innovative Security Technology: We evaluate new technologies for securing your workplace, church or temple. Our initial meeting captures your priorities, we align the best options, report on pros and cons, and include value/cost comparisons for your location.
Cyber Vendor Security Evaluation: Any vendor with access to your system could be an entry point for a breach.
Plans & Procedures: Document management: reviews and updates. New documentation created. Bundled pricing available.
Targeted Security Assessments

Power Grid
Email or call 919-741-0961

Regional Airports
Email or call 919-741-0961

Family Farms
Email or call 919-741-0961

Places of Worship
Email or call 919-741-0961

Event Venues
Email or call 919-741-0961

Hospitals & Medical Groups
Email or call 919-741-0961
You Might Also Be Interested…

Secure Stadiums Bundle
Pre-populated security documentation for public venues. Plans, SOPs, training, checklists, and onboarding.

Rapid Response Teams
We’ll help you set up rapid-response team with in-house and community partners. Protocols, procedures and criteria for alerts.

Active Shooter Training
Two training modules, one for decision-makers and one for staff. Plan your response to minimize loss of life.

Threat probability
Evaluate threats from extremists, economic downturns, man-made disasters, climate change, and socio-economic inequality.
Cyber Safety
Cyber Simulations
Phishing is the number one offender when it comes to identity theft, malware, and system breaches. We test vulnerabilities by simulating a phishing campaign. Working with leadership, we design an email with a link to a spoofed website.
We capture and count staff who click the link so they can be re-trained.
Third-Party Security Evaluation
One of the worst data breaches in healthcare started with a payment processor. Think of all the suppliers or vendors who are attached to your system. What is their practice for communicating a breach? What about your customer data – can they share it or sell it?
We’ll review their documentation so you know what to expect or make necessary changes.
Cyber Education for Executives
Protecting the systems that house business intelligence, financials, products, and projects is a job for leadership. We’ve built a tightly tailored training for executives who want better understanding of cyber threats and their impact.
Minimal jargon, focused on security impact our program will bring you up to speed.

Training Catalog
- Active Shooter
- Situational Awareness
- Preventing Cyber Crime
- Emergency Preparedness
- Custom Safety Curriculum

Documentation
- Documentation Management
- Emergency Plans
- Paper Protocols
- GMP Procedures
- Policies & SOPs

Security Innovation Eval
We evaluate new security technologies – from AI gun identification to Kevlar curtains – to see what best fits your needs. We identify the best options, report on pros and cons, and include value/cost comparisons. Set up demos too.
About | Contact | NAIC Codes | Services | Blog | 919-741-0961
© 2022 Foxhole Consulting LLC All Rights Reserved 921 E Broad Street, #1027 Fuquay Varina, NC 27526