Security & Safety

School Security

Complacency can lead to the unthinkable

A security breach typically begins at the entry point of a school building. Mass shootings have become far too familiar to ignore. The objective is to stop the shooter from entering the building. That is much more problematic when the shooter is a student.

Security is 360 degree mission. Parking lots, bus garages, sports fields all need to be assessed. Proactive security assessments identify vulnerabilities and gaps in the current protocols.

It’s critical to compare the planning with the schools capability to execute the plan. Not all schools in the district have the same budgets or priorities.

 93% of school shooters planned the attack in advance

In 2022, 34 students & adults died while 43,000 kids saw gunfire at school.

FORMAT: A series of stakeholder interviews – decision-makers and staff – a review of security documentation, training curriculum, and physical access to the workspace.

GOAL: Bridge the gap between the current or ideal state to build a holistically sound system.

We start with a macro view at the County or District level for public schools. The district is where policy and procedures are developed. A gap analysis is done. We meet with district staff, do a documentation review and look at the training curriculum.

The next phase is an evaluation of each school. A walk thru of the property and interviews with a cross-section of staff. We look at all entry and exit points including pickup and dropoff,  and compare the school to the district plan. We identify any lack of alignment between expectations and actual practice.

Active Shooter Training: Dual modules for managers and staff. Reoccurring quarterly. Add to onboarding process.

Innovative Security Technology: We evaluate new technologies for securing each school. Our initial meeting captures your priorities, we align the best options, report on pros and cons, and include value/cost comparisons for your location.

Situational Awareness Workshops: A walk-thru designed for SROs to evaluate the building from the perspective of a criminal.

Plans & Procedures:  Document management: reviews and updates. New document creation. Bundled pricing available.

Pricing

Security Assessment:  Based on the size of the property, number of locations, and buildings.

Email or call 919-741-0961

Workplace Security

Security protocols have a tendency to “get done” after a scare, then get set aside.  If security isn’t a constant – the safety of the workplace, its people and its property is at risk.

No one thinks it’s going to happen to them. If it does, the shock and panic make it even more traumatizing. 

A security assessment is a gap analysis. We review practices and protocols that drive a client’s approach to security.

Prevention is the goal, but the response must be the priority. It is in the response that damages are either mitigated or increased.

An onsite security assessment protects your company, your employees, and your customers. 

Pricing

Security Assessment:  Based on the size of the property, number of locations, and buildings.

Email or call 919-741-0961

Secure intellectual Property

Protect Your People & Assets

FORMAT: A series of stakeholder interviews – decision-makers and staff -a review of security documentation, training curriculum, and physical access to the workspace.

GOAL: Help clients identify security vulnerabilities in their existing approach.

The assessment begins with a walk-through of the building, parking lots, and outbuildings. The client identifies a broad group of employees for interviews from across the organization.

Interviews are ongoing while a review of documentation begins. The training curriculum and schedule are examined. Outreach to community partners – law enforcement, firefighters, EMTs, and hospital staff – is done to validate the relationships.

The final deliverable is data-driven report with actionable insights.

Active Shooter Training: Dual modules for managers and staff

Situational Awareness Workshops: A walk thru of the location(s), looking for ways a bad actor could bypass security

Innovative Security Technology: We evaluate new technologies for securing your workplace, church or temple. Our initial meeting captures your priorities, we align the best options, report on pros and cons, and include value/cost comparisons for your location.

Cyber Vendor Security Evaluation: Any vendor with access to your system could be an entry point for a breach.

Plans & Procedures:  Document management: reviews and updates. New documentation created. Bundled pricing available.

Targeted Security Assessments

Power Grid

Attacks on utility substations are growing, knocking out power to communities. Moore County was out of power for days.

Email or call 919-741-0961

Grain Harvester

Regional Airports

No federal regulation at smaller airports makes them vulnerable to criminals and attackers. Easy entry, less tracking.

Email or call 919-741-0961

Family Farms

Family farms are typically unprotected. An increasing number of hackable IoT devices are used in remote areas.

Email or call 919-741-0961

Places of Worship

Mass shootings at churches, synagogues, and temples are a growing class of hate crimes. Most don’t prepare for the unthinkable.

Email or call 919-741-0961

Event Venues

Transient staff and vendors have minimal training. Danger ranges from stage stampedes to an active shooter.

Email or call 919-741-0961

Hospitals & Medical Groups

Hospitals in particular are extremely vulnerable because there is no challenge to emergency entry and little monitoring on patient floors.

Email or call 919-741-0961

You Might Also Be Interested…

Stadium documentation

Secure Stadiums Bundle

Pre-populated security documentation for public venues. Plans, SOPs, training, checklists, and onboarding.

ransomware

Rapid Response Teams

We’ll help you set up rapid-response team with in-house and community partners. Protocols, procedures and criteria for alerts.

Active Shooter Training

Two training modules, one for decision-makers and one for staff. Plan your response to minimize loss of life.

Threat probability

Evaluate threats from extremists, economic downturns, man-made disasters, climate change, and socio-economic inequality.

Cyber Security

Cyber Safety

Cyber Simulations

Phishing is the number one offender when it comes to identity theft, malware, and system breaches. We test vulnerabilities by simulating a phishing campaign. Working with leadership, we design an email with a link to a spoofed website. 

We capture and count staff who click the link so they can be re-trained. 

Third-Party Security Evaluation

One of the worst data breaches in healthcare started with a payment processor. Think of all the suppliers or vendors who are attached to your system. What is their practice for communicating a breach? What about your customer data – can they share it or sell it?

We’ll review their documentation so you know what to expect or make necessary changes.

Cyber Education for Executives

Protecting the systems that house business intelligence, financials, products, and projects is a job for leadership. We’ve built a tightly tailored training for executives who want  better understanding of cyber threats and their impact.

Minimal jargon, focused on security impact our program will bring you up to speed. 

training

Training Catalog

  • Active Shooter
  • Situational Awareness
  • Preventing Cyber Crime
  • Emergency Preparedness
  • Custom Safety Curriculum
Plans Policies and Procedures

Documentation

  • Documentation Management
  • Emergency Plans
  • Paper Protocols
  • GMP Procedures
  • Policies & SOPs

 

Artificial Intelligence

Security Innovation Eval

We evaluate new security technologies – from AI gun identification to Kevlar curtains – to see what best fits your needs. We identify the best options, report on pros and cons, and include value/cost comparisons. Set up demos too.

memberships

About | Contact | NAIC Codes | Services | Blog919-741-0961

© 2022 Foxhole Consulting LLC All Rights Reserved 921 E Broad Street, #1027 Fuquay Varina, NC 27526