Colored lanyards. All faculty, staff and visitors should wear badges attached to colored lanyards (preferably with breakaway clasps), and the colors should correspond to their role (e.g., red for faculty, blue for visitor). Its a simple way to identify people from a distance and also spot suspicious people roaming without a lanyard. “Hi. How can I help you?” Staff and even students should be trained to ask strangers this question. Note the wording of the question. “Can I help you?” will not work because it gives the person the opportunity to say “No.” “Hi” is polite and disarms the person. The word “how” forces the person to state a purpose. An inability to answer this question easily is a tip-off that the person could be up to no good.Operating profile map. A simple way to understand what needs to be done from a security and access control perspective is to map out your facilitys operating profile. Draw a time line that starts at 12 a.m. and ends at 12 a.m. 24 hours. Then draw three lines underneath, one that stretches across the “operating day” when the highest concentration of assets (students) are present. The second line is for facilities, and stretches for as long as some access to the building is needed, regardless of whether school is in session. The third line is for dark hours, when zero access to the school is required. These maps can be made for general operating times and also for weekends or special events and can help stakeholders understand what policies are in place when.Crisis card. A single laminated card with major risks and proper responses can be made to stick under the phones of staff. Risks are listed in three categories and are color coded: green for environmental risks (e.g., weather), blue for medical risks (e.g., seizure) and red for security risks (e.g., bomb threat). Under each of these categories, the specific risks are listed in order of most likely to occur to least likely. Source: Paul Timm, Reta Security Inc. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe