Place of Worship Security: The Basics

By Mike Krohn, Project Manager at Kenton Brothers

Place of Worship Security: The BasicsWhere do you feel safe? Home? Work? In your car?

What about church? Do you feel safe in your place of worship? You should, right? After all, the church goes out of its way to create an inviting, warm, open-arms atmosphere to attract as many people as possible to worship and hear the Word. Whether you live in the big city, or a smaller community (as I do); attend a mega church with its own coffee shop or attend a burgeoning church in a rented building or school, we all want to relax and feel our place of worship is safe and secure.

Let’s face it, we live in an ever changing, constantly evolving world, which moves faster every single day. What were once hard-line standards and accepted practices are now being reimagined to accommodate current ideas and interpretations. Nothing is exempt from this, not even religion or the church. Sometimes, change and evolution are a good thing. But often, growth and change are painful and difficult to accept. This can lead to feelings of rejection, animosity, and unfortunately, even sometimes violence.

This year, my church will hold a global general conference and will be discussing some very controversial, if not popular topics. The way we worship may have to change. Many denominations are experiencing these same challenges. Many of us will adopt new opinions and attitudes and accept these changes. However, many people may view this as a slight to deeply engrained feelings about how they were raised in the church.

As a former law enforcement officer, security professional and facility director, I have worn many of the hats assigned to these issues. The energy behind our faith is strong and so are the feelings about how it should change. I’m fond of saying that where there is passion, there is energy; good or bad. In the case of a church where dozens or thousands of people will be gathered at any one time, this causes us to think more seriously about security at our houses of worship.

A Team Effort

The decision to increase security infrastructure and/or to have a security team or safety team is a complex effort, not to be entered into lightly or without the prerequisite foundational concepts being discussed. Again, this may change some well-established customs at your place of worship.

Physical infrastructure improvements rarely raise too many eyebrows, and the use of cameras, alarms, access control and projectile film have all become affordable, and often come with insurance benefits and discounts. As I said previously, while going from no security to physical site improvements and a safety team can be complex, we can and should make every effort to keep the team creation and operation as simple as possible.

Questions that need answers.

Place of Worship Security: The BasicsIs the congregation and board willing to make these changes?
Do they agree there is a need?
Are there people in the building willing to take on the responsibility?

 -OR-

Are we going to hire out law enforcement/security professionals to keep us safe?
Do we have the infrastructure and equipment needed to create and equip this team?
What will this look like to the community? To the congregation?

Let us dive in and assume the idea of a safety team has been raised at your place of worship.

Q1. What comes first?

A1. A security assessment! This can be done by local law enforcementpublic safety staff, by an insurance company, or by a private security integration company (I am partial to Kenton Brothers Systems for Security!)

The assessment will go over items such as are exits clearly marked, how many points of entry to the church are there? Are there areas where people can be secured in the event of an incident/weather calamity etc? Where is the church located in the community? What is the crime rate in the local area? Where will people park and walk towards the building? How many people will be in the building at one time? Are there stairs, elevators etc.?

Q2. What equipment, if any, do we need?

A2.  Communication tools! Two-way radios are almost a necessity. Flashlights, vests or identification badges are a solid idea to make these people readily identifiable when the need arises.

Q3. What operational changes are needed at our facility or building?

A3. Without being on your particular site, this is a more difficult question to answer, but common concerns range from creating traffic flow and parking lot designations with guided attendants, to limiting entry through certain doors at certain times. A general rule is one designated point of entry with attendants after services begin, or just prior. The remainder of all doors should be secured.

Q4. How do we prepare for an actual incident?

A4. Define the roles each member will have. DONT ASSUME ANYTHING! Practice! The teams should all know each other’s roles, and practice actual incident response from various approaches. Again, work to make these simple and realistic. Plans should be inclusive of every age group, from children to the elderly, and all levels of mobility from ambulatory to those who need assistance or wheelchairs.

Involving your local emergency responders is always a great idea. Invite them to tour the facility, see your video systems, doors and safety plans. Invite them to do an assessment, (sometimes they simply cannot for liability reasons) or just seek their input on your first or next training day. As a former SWAT commander, I can tell you, we were ALWAYS looking for places to train! WIN-WIN!

Finally, please remember this is NOT a comprehensive list or manual. These are just some thoughts to get the conversations going. Please seek out the professionals in your area, do the research, and work through this with the idea that the process will have a natural evolution as the church and community changes with the world around it.

If you’re interested in reference materials, they are out there!

There are so many great articles and books. I recommend:

“Evil invades Sanctuary – The Case for Security in Faith-Based Organizations” by Carl Chinn
“Defending the Flock – A security guide for church safety directors” by Kris Maloney

CISA.gov has a suite of resources for faith based organizations also. “The Physical Security Performance Goals for Faith-Based Communities”. The first in a series of impending related documents geared toward industry partners—are a set of physical security practices that houses of worship and related facilities can use to reduce security risks to their congregations. You can find them here.

Please stay safe, be well and and if we can help, please call us at Kenton Brothers Systems for Security!

SALTO Systems: Unique Access Control Solutions for a 100+ Year Old Building

By Ryan Kaullen, Field Services Manager at Kenton Brothers

SALTO Systems: Unique Access Control SolutionsIn late 2023, Kenton Brothers was approached by a property management company about adding access control to a local, 100+ year old tenant-based building in Kansas City, MO. The building has more than 16 floors and multiple elevators needed access control. As you can imagine, when the building was being built access control was not in the minds of the architect nor builders. So, the task became how does Kenton Brothers provide access control for this unique situation while keeping costs in-line with the customer’s budget?

SALTO Systems

The answer was an access control platform that supports both online and offline locks while at same time being able to take care of access control for the elevators. The system is made by a company called SALTO Systems. Their array of lock solutions allowed Kenton Brothers technicians to install cable where it was accessible to connect to the server and have some of the locks being online, while also being able to install locks at doors where cable wasn’t an option. All while still granting access or denying access depending on the credential presented.

Here is the interesting feature of this system: Online readers re-program each card as they are presented, and then the new information is carried to the offline locks the next time they are used. This allows the system to be centrally managed without running wires to every lock. (Remember, this building is over 100 years old.) Pretty cool, right?

Our solution allows the property management company to grant access to individuals with the correct credentials into certain spaces like the gym, pool area, rooftop, etc. And they can deny individuals who should not have access to those spaces. Without the SALTO access control system, this is almost impossible to control.

SALTO Systems: Unique Access Control Solutions SALTO Systems: Unique Access Control Solutions

The next phase of the project was the elevators.

To accomplish getting readers to work with the elevators, and the readers needing to be offline readers, Kenton Brothers worked closely with the elevator company whose software and the access control software would work in tandem to take tenants to the correct floors while still allowing the property management company to program proper access to the readers. This was a close coordination between our team and the elevator company to accomplish our customer’s goals. And this was crucial to the success of the project because it again helps keep the flow of traffic of people going to the correct floors where they are allowed to be.

Projects like these are what Kenton Brothers loves to take on. These kinds of projects make us think outside the box, deliver one-of-a-kind systems, and come up with unique and customizable solutions to take care of the customer.  This is the type of work that has made Kenton Brothers stand out for over 127 years.

To see how Kenton Brothers can help with your unique needs, please give us a call.

SALTO Systems: Unique Access Control Solutions SALTO Systems: Unique Access Control Solutions

Integrating Facial Recognition into Access Control Physical Security, Increasing Security and Convenience!

By David Strickland, Vice President of Kenton Brothers

“Innovate or Die”

Facial RecognitionWhen walking through Kenton Brothers Systems for Security, you will see this phrase prominently displayed on the walls throughout our building. Innovation is one of our core values and it’s a big reason we continue to provide remarkable physical security solutions for our customers… going on 126 years.

The world is very different than it was 125 years ago, and so are the solutions we provide to mitigate today’s security risks. The need for robust access control measures to safeguard sensitive areas is more critical than ever. As the security industry innovates, traditional methods like mechanical locks, keycards and PINs are gradually being replaced by cutting-edge biometric technologies. Among these, facial recognition stands out as a revolutionary tool, offering enhanced security and convenience in commercial access control physical security.

This blog explores the role of facial recognition as a biometric credential in access control. Here are five ways we think it will have a big impact.

1. Enhanced Security through Uniqueness:

Facial recognition technology capitalizes on the uniqueness of each individual’s facial features. Unlike passwords or keycards, which can be lost, stolen, or shared, faces are inherently unique, making them an ideal biometric credential. By registering authorized personnel in the system, access control devices can accurately match live facial images with the stored templates, ensuring that only authorized individuals gain entry.

2. Seamless and Contactless Authentication:

One of the standout advantages of facial recognition in access control is its contactless nature. Users no longer need to physically interact with devices or carry identification cards. Authentication is as simple as glancing at a camera, making it more convenient and hygienic—particularly in a post-pandemic world where reducing physical contact is thought to be essential.

3. Rapid and Real-Time Identification:

Facial RecognitionFacial recognition technology operates at impressive speeds, providing real-time identification results. This capability is especially valuable in high-traffic areas like airports, offices, and educational institutions, where quick and efficient access control is necessary. The system can process multiple faces simultaneously, reducing bottlenecks and ensuring smooth entry flows.

4. Integration with Existing Systems:

Facial recognition can seamlessly integrate with existing access control infrastructure. Many modern access control systems are designed with open architecture, allowing easy integration with biometric devices. By retrofitting facial recognition solutions into their current systems, organizations can upgrade security measures without a complete overhaul.

5. Multifactor Authentication with one “credential”:

The fusion of facial recognition with other biometric security measures, such as fingerprint or iris recognition, could create biometric systems that offer even higher security levels and resistance to spoofing attempts.  Multifactor authentication all within one “credential” – the human body!

So what about the other side of the coin… Can facial recognition be spoofed?

Yes, facial recognition can be defeated if the installation and calibration processes aren’t followed correctly. One innovation in the commercial security world is helping along that front. For instance, some systems such as  IDEMIA use liveness detection, which ensures that the face presented for authentication is a live, three-dimensional image rather than a photograph. This feature guards against spoofing attempts, where adversaries try to trick the system with static images.

The future of facial recognition in access control physical security looks very promising. Advancements in artificial intelligence and machine learning algorithms will likely improve the accuracy and efficiency of these systems. Additionally, including 3D facial recognition technology could further improve security by adding an extra layer of depth and precision to the identification process.

We believe Facial Recognition as a biometric credential in access control physical security represents a remarkable leap forward in safety and convenience. With enhanced security features, contactless authentication, and rapid identification capabilities, facial recognition technology is reshaping access control best practices.

Want to learn more? Let’s get together and discuss how utilizing this technology can increase your commercial physical security while increasing convenience: two things that are traditionally in conflict!

 

Video: Planning and Implementing Elevator Security

By Erik Andress, Sales Management Professional at Kenton Brothers

In today’s video we’re discussing elevators. In particular, how to secure them with cameras and access control. Elevators can be tricky… They require a lot of planning and coordination with the elevator company. We’ll get into some of those details today and what you need to know!

Step one is by far the most important stage and that’s planning.

Securing an elevator requires collaboration between the elevator company the security integrator as well as the client. The client lets the security innovator know how they want the elevator to function and behave. The security integrator works with the elevator company to make that possible.

Let’s use a an example: Where do you want the card reader mounted? Is it on the outside of the elevator denying access altogether or is it on the inside of the cab denying access just to certain floors? Or both? You may want to deny access to the elevator because it’s not for the public. You may also want to deny access to certain floors because it is a secure facility.

There are details we have to understand. Is there already traveling cable in the elevator? Is there space for us to install our equipment? Where is the control panel for the elevator, and where should our control panel go for access control? It can get complicated quickly.

Step two is integration.

We work with a professional elevator technician to make sure the proper cables are in place and integrate the card reader into the elevator’s controls.

Step three is configuration.

Now that the systems are integrated, we need to make sure that we go back to the client’s expectations of how they wanted the elevator to function. We need to make sure that our configuration is lining up with exactly what they asked for.

Step four is to test and calibrate.

When you put security inside of an elevator, you’re introducing a lot of moving pieces. With access control or commercial video surveillance, we need to make sure that we spend time testing the system. We need to make sure the camera’s field of views are dialed in correctly.

The final step is training.

We need to make sure that the admins and users of the system understands exactly how the system works and how changes can be made.

If you need help securing the elevators in your company buildings, we can help. Just give us a call!

Introducing the Kenton Brothers CyPhy Security Plan

By Neal Bellamy, IT Director at Kenton Brothers

CyPhy Security PlanLately we’ve been talking a lot about Cyber Security. As with all types of commercial security, Cyber Security is best implemented as layered defense. In other words, a single key or credential won’t gain access to the entire kingdom. Also, like Physical Security, even a small oversight can become the launch point for a larger attack.

For years, Kenton Brothers has been doing our part to help maintain security on your physical security devices. We use unique, randomly generated passwords for all of your devices. We make sure the firmware is updated at the time of install and implement other industry standard security best practices. While it’s a good start, there were still some gaps. So we are taking it to the next level.

The Kenton Brothers CyPhy Security Plan

Kenton Brothers is introducing our CyPhy Security Plan. Security is not a “set it and forget it” proposition. The security landscape, both Cyber and Physical, is always changing. It must be evaluated and re-evaluated to make sure the greatest number of holes are closed. With the CyPhy Security Plan we will still make sure your physical security systems are set up with the latest software, unique passwords, etc.

With this new program, we will follow the security hardening guides from all manufacturers, lock down all switch ports and ensure firewalls are set up and configured properly. After the initial installation is complete, we will be involved ongoing. We will monitor new releases from the manufacturer and alert you to any critical security related issues for your system. Furthermore, if you have the manufacturer’s software upgrade plan in place, we will remotely upgrade your systems and firmware every 6 months.

Where applicable, the CyPhy Security Plan includes:

• Using unique and randomly generated passwords for each purpose and user
• Upgrading firmware to the latest supported version
• Setting the server firewall to only allow authorized communications
• Locking switch ports to allow only authorized devices
• Monitoring manufacturer’s software for critical security alerts
• Enforcing encrypted communication wherever possible
• Disabling services, applications and ports not being used on devices
• Using unprivileged account for normal system usage
• Enforcing encrypted edge storage
• Filtering communication to local IP addresses only
• Disabling SD card slots not being used
• Following hardening guides from all installed manufacturers

We want the CyPhy Security Plan to dovetail into your existing cyber security plan.

If you have other cyber security initiatives already installed, like MFA, managed firewall, managed global service accounts, VPNs etc., we will help you integrate those into the physical security devices, networks and servers. We will also make suggestions to improve the security and operations of your systems. For example, deploying internet facing servers in the DMZ or connecting the security systems to Active Directory for ease of user management.

If you don’t have a cyber security plan in place, you can rest assured that the physical security devices will be protected and can even use our commercial security best practices to increase the security for your other systems.

Of course, there is no un-pickable/un-hackable lock, and there will never be a perfect defense for cyber attacks. Setting up a layered defense will significantly decrease the chances of a successful cyber attack on your network. The CyPhy Security Plan is our commitment to protect you whether the attack comes to your front door, or from the internet.

To learn more about our CyPhy Security Plan, please give us a call and we will discuss your current setup as well as the benefits of ramping up your security efforts.