Security Consultations for Schools
It is all about our kids!
Are our dear children really protected when they are in school?
PSI – Security Consulting for Schools
When you drop your children off at school, you feel certain that nothing bad can happen to them. The dedicated teachers, the good friends and the educational atmosphere create for us – the parents, the school staff and the pupils – a feeling of security. Experience has taught us that this feeling of security is an illusion that can blow up at any given stage. the schools in the USA are not equipped to handle security and terror incidents. The security systems are amateurish or non-existent; the school campuses are not equipped to handle harmful infiltrations or weapons, and they are built in such a way that it makes it difficult for emergency forces to intervene and for pupils to escape – should such an incident occur.
Our Objective: To Deter Potential Culprits and to Minimize Injuries in the Event of an Attack
Most of the attacks at schools are premeditated, carried out by a culprit familiar with the school and its daily routine. Therefore, the security experts at PSI carry out a comprehensive tour of the school and its nearby surroundings looking for weak spots and security vulnerabilities. In addition to learning the school’s daily routine, the team examines the technology systems installed in place and interviews key people – the principal, teachers and other staff members. Based on all the data collected, a consultation is held together with experts in structure-security, security cameras, cyber security, self-defense, etc. During this consultation, for every security vulnerability located, strategic and tactical solutions will be formulated, together with recommendations for adjustments to the physical environment, security cycles and passive psychological deterrent methods. In addition, PSI experts provide detailed standard security procedures, as well as de-escalation tactics for emergency situations – pending the arrival of local security forces. We also prepare an accessible technological-intelligence infrastructure to be used by the breaching units in real time