Expert Speak
How a Single Point of Entry Supports Safe School Environments
Written by Tertius Wolfaardt, Architecture and Engineering Manager at Axis Communications
Most students in the UAE started a new school year at the end of August, and the beginning of the academic year is the perfect time for school security personnel to ensure our schools are not only welcoming but also safe for all.
In Dubai, for example, the Executive Council Resolution states that private schools are responsible for the safety and protection of their students throughout the school day – whether they are on school premises, on buses, or at any student activity organised by the school outside of its premises. Schools, therefore, need to take all necessary measures, aided by the right technologies, to keep students and staff protected. And having a single point of entry is an essential place to start.
Maximise safety and efficiency with one point of entry
A single point of entry in schools allows visitors and parents to access screening, information, and potential entry to a school from one location. This location is usually a front door or main entrance that is easily seen and supervised to make it easier to control who can and cannot enter the building. This entry point should have signage outlining directions to a visitor management location where a staff member can sign visitors in.
There are many reasons why educational institutions should create a process for a single point of entry. Often, people who are not members of the school might need to enter the facility, such as parents, guests, or contractors. There may occasionally be unwanted intruders who might try to gain access to an institution. To make sure the right people are let in and kept out, schools should combine some form of gated entry with an audit trail to keep a record of who entered the school, for what purpose, and how long their stay was.
The visitor management process should start with a clearly marked main entrance where visitors are accepted and screened. All doors, including the main entrance, should always be locked until access is granted, with communication occurring through an intercom that can be accessed by the visitor from the main door.
It is important to train all staff on the visitor screening process so that they know who to allow access to. If a visitor is deemed to be someone who should have access, the intercom should be able to control the lock on the door, allowing that visitor entry and giving them directions to the main office.
Modern intercoms make it possible
An intercom that is clearly labelled and easy to use maintains accessibility and security. A single-button intercom for visitor sign-in enables quick and easy visitor screening. The intercom should also have a camera so the staff member can both hear and see the person they are speaking to.
There are many integrated network solutions that can support this process, and which can complement existing security systems. For instance, IP intercoms can be used or integrated as an access control system that combines video and audio communication. These intercoms can send recordings to an existing video management software system for record of the interaction in case this needs to be reviewed later.
Moving towards an IP-based solution allows for interoperability between other technologies used for secure access or screening. It also makes it possible to screen visitors from anywhere in the school. Staff can answer calls as well as screen visitors from many network devices including computers, IP phones, mobile devices, or dedicated answering units – rather than from only a single desk at the reception.
Enable proactive security
Schools require modern access control systems that can not only limit entry but also be used to proactively deal with potential security issues. For instance, modern IP-based access control systems can be configured to issue an alarm should a door be propped open.
When used in combination with embedded analytics on intercoms or video cameras installed near the entrances, school officials can be alerted to loitering or other suspicious activity. This empowers them to take a proactive approach to security, automating entry for those who should be there, and quickly responding to those who shouldn’t.
A safer learning environment
The support of the Dubai police’s Safety Ambassadors Council shows that school safety is of utmost importance to government and private and public education institutions alike. Every learner has the right to an environment that is safe and well-protected. With a single point of entry, a thorough visitor screening process, and a modern IP-based access control system, schools can ensure they create a learning environment that is safer, smarter, and more secure.
Artificial Intelligence
How AI is Reinventing Cybersecurity for the Automotive Industry
Written by Alain Penel, VP of Middle East, CIS & Turkey at Fortinet (more…)
Cyber Security
Positive Technologies Study Reveals Successful Cyberattacks Nett 5X Profits
Positive Technologies has released a study on the dark web market, analysing prices for illegal cybersecurity services and products, as well as the costs incurred by cybercriminals to carry out attacks. The most expensive type of malware is ransomware, with a median cost of $7,500. Zero-day exploits are particularly valuable, often being sold for millions of dollars. However, the net profit from a successful cyberattack can be five times the cost of organizing it.
Experts estimate that performing a popular phishing attack involving ransomware costs novice cybercriminals at least $20,000. First, hackers rent dedicated servers, subscribe to VPN services, and acquire other tools to build a secure and anonymous IT infrastructure to manage the attack. Attackers also need to acquire the source code of malicious software or subscribe to ready-to-use malware, as well as tools for infiltrating the victim’s system and evading detection by security measures. Moreover, cybercriminals can consult with seasoned experts, purchase access to targeted infrastructures and company data, and escalate privileges within a compromised system. Products and tools are readily available for purchase on the dark web, catering to beginners. The darknet also offers leaked malware along with detailed instructions, making it easier for novice cybercriminals to carry out attacks.
Malware is one of the primary tools in a hacker’s arsenal, with 53% of malware-related ads focused on sales. In 19% of all posts, infostealers designed to steal data are offered. Crypters and code obfuscation tools, used to help attackers hide malware from security tools, are featured in 17% of cases. Additionally, loaders are mentioned in 16% of ads. The median cost of these types of malware stands at $400, $70, and $500, respectively. The most expensive malware is ransomware: its median cost is $7,500, with some offers reaching up to $320,000. Ransomware is primarily distributed through affiliate programs, known as Ransomware-as-a-Service (RaaS), where participants in an attack typically receive 70–90% of the ransom. To become a partner, a criminal must make a contribution of 0.05 Bitcoin (approximately $5,000) and have a solid reputation on the dark web.
Another popular attack tool is exploits: 69% of exploit-related ads focus on sales, with zero-day vulnerability posts accounting for 32% of them. In 31% of cases, the cost of exploits exceeds $20,000 and can reach several million dollars. Access to corporate networks is relatively inexpensive, with 72% of such ads focused on sales, and 62% of them priced at under a thousand dollars. Among cybercriminal services, hacks are the most popular option, accounting for 49% of reports. For example, the price for compromising a personal email account starts at $100, while the cost for a corporate account begins at $200.
Dmitry Streltsov, Threat Analyst at Positive Technologies, says, “On dark web marketplaces, prices are typically determined in one of two ways: either sellers set a fixed price, or auctions are held. Auctions are often used for exclusive items, such as zero-day exploits. The platforms facilitating these deals also generate revenue, often through their own escrow services, which hold the buyer’s funds temporarily until the product or service is confirmed as delivered. On many platforms, these escrow services are managed by either administrators or trusted users with strong reputations. In return, they earn at least 4% of the transaction amount, with the forums setting the rates.”
Considering the cost of tools and services on the dark web, along with the median ransom amount, cybercriminals can achieve a net profit of $100,000–$130,000 from a successful attack—five times the cost of their preparation. For a company, such an incident can result not only in ransom costs but also in massive financial losses due to disrupted business processes. For example, in 2024, due to a ransomware attack, servers of CDK Global were down for two weeks. The company paid cybercriminals $25 million, while the financial losses of dealers due to system downtime exceeded $600 million.
Expert Speak
What the Bybit Hack Reveals About the Future of Crypto Security
Written by Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point (more…)
-
GISEC1 week agoPositive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies
-
Cyber Security1 week agoAxis Communications Sheds Light on Video Surveillance Industry Perspectives on AI
-
GISEC1 week agoVideo: SANS Institute Weighs in on Deepfakes, Model Poisoning and Risk Frameworks at GISEC Global 2025
-
GISEC1 week agoManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025
-
GISEC1 week agoVideo: SentinelOne Speaks Hyperautomation, Purple AI, and the Future of Threat Detection at GISEC Global 2025
-
Africa Focus6 days agoCyberKnight Sets Up South Africa Entity
-
GISEC1 week agoGroup-IB @ GISEC Global 2025: Tackling Evolving Cyber Threats with Localised Intelligence and AI
-
GISEC1 week agoVideo: CyberKnight on Zero Trust, AI, and Saudi Arabia’s Digital Transformation at GISEC Global 2025
