{"id":2204,"date":"2022-11-14T23:45:03","date_gmt":"2022-11-14T23:45:03","guid":{"rendered":"https:\/\/torus-technology.com\/us\/?p=2204"},"modified":"2025-08-19T06:06:15","modified_gmt":"2025-08-19T06:06:15","slug":"rethinking-security-in-the-education-sector","status":"publish","type":"post","link":"https:\/\/torus-technology.com\/beta\/rethinking-security-in-the-education-sector\/","title":{"rendered":"Rethinking security in the education sector"},"content":{"rendered":"<p>The sudden and dramatic impact of the pandemic on the education sector could not have been anticipated. Yet teachers, lecturers and education administrators and support staff appear &#8211; from the outside at least &#8211; to have transitioned to new ways of delivering education almost overnight. Whilst this is positive, it has come with challenges, and has led the <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/torus-technology.com\/us\/education\/\">education sector<\/a><\/span> to think about security very differently.<\/p><p>One of the characteristics of the sector is that organisations often have tens of thousands of employees and students, spread across multiple sites, and in some cases with a hybrid (non-classroom) delivery model being rolled out very swiftly.<\/p><h2><strong>Enabling innovation, not stifling it<\/strong><\/h2><p>The University of California, Berkeley, is a public land-grant research university based in Berkeley, California. Established in 1868 as the University of California, it is the state&#8217;s first land-grant university and the first campus of the University of California system.<\/p><p>The university has over 44,000 students on campus. This makes them amongst the largest public institutions in the country.<\/p><p>Jenn Springer heads up IT at Berkeley. She says that security is \u201ctop of mind\u201d every day.<\/p><p>\u201cI have research labs, I have IT organisations across the campus that don&#8217;t sort of report into the authority of the CIO. I have researchers who have amazing graduate students with lots of technology ability that are spinning up servers and putting machines under the desks and actually sometimes even running their own networks. And that makes it incredibly challenging.\u201d\u00a0\u00a0<\/p><p>She says that this amazing innovation makes it hard to \u201cwrap their arms\u201d around the security risks. She talks about the joint responsibility of the university and those students attending it.<\/p><p>\u201cIt&#8217;s really so much more about changing hearts and minds, and really getting the researchers and the students to understand how important security is, and that it&#8217;s their responsibility as well as my responsibility\u00a0 to keep the campus secure and safe. We offer the tools to enable them to do that. But it is very different than a vendor organisation or an organisation where we can talk down, make a bunch of dictates that people must do certain things.\u201d<\/p><p>She says that the balance of enabling innovation, empowering researchers and students and having security measures in place is a delicate balance which universities need to strike.<\/p><h2><strong>Schools face the same security challenges as any other organisation<\/strong><\/h2><p>On the other side of the continent, Michael Martinrano is Superintendent of Schools for Howard County, Maryland. Howard County Public School System is located midway between Washington DC and Baltimore, Maryland, with a diverse student population of around 58,000 students. Not surprisingly, he also has responsibility for around 10,000 employees.<\/p><p>Martinrano talks about the impact of the pandemic.<\/p><p>\u201cIt was a whole different layer of engagement, that we had to again, protect our students.\u00a0 First, by aggressively being involved in making our teachers aware of those risks, and how to respond when certain events were occurring.\u201d\u00a0<\/p><p>Martinrano says that the organisation has to actively think about \u201cbad actors\u201d who can do harm at schools, and put measures in place. Enhancements have been made to both property and data systems.<\/p><p>\u201cI&#8217;ve had to enhance the total security of our school systems data and opportunities for people to tap into our network for fishing expeditions, or whatever it may be. To give you an example, I&#8217;ve added additional positions to our budget just addressed on cybersecurity.\u201d<\/p><p>He describes it as \u201cdisheartening\u201d that educational environments are not exempt from these security challenges, but he says that being proactive is the only option. It\u2019s a new era of security measures for schools.<\/p><h2><strong>Engineering the platforms to deliver trust in digital infrastructure<\/strong><\/h2><p>In education as well as other sectors, Trent Loebel, CEO of Torus, says his team is seeing a very strong desire to get commonality and consistency across their devices. He makes the point that this is not just about efficiency, but also that they recognise that they don\u2019t get the \u201cabsolute security benefits\u201d if they have disparity of systems.\u00a0<\/p><p>They are seeing this trend across all aspects of security. But it even applies to the \u201csimple keys\u201d which organisations hold &#8211; which is the area Torus focusses on.<\/p><p>\u201cVirtually every building, every medium and large building in the world has keys &#8211; if not to all of the doors, to many of the doors within those buildings. And those physical keys need to be managed, they need to be only in the hands of the people that are authorised to use them. That\u2019s impossible to achieve that when it&#8217;s done manually, with pieces of paper or a spreadsheet and keeping them in a drawer.\u201d\u00a0<\/p><p>He says that the consequences of not having a structured, secure system is not just risk, but also huge amounts of wasted staff time every single day. This includes not just administering the keys, but tracking them down when they don\u2019t return as planned.<\/p><p>\u201cThe ultimate risk and cost with poor key management is where they fall into the wrong hands. In this case, the people that you don&#8217;t want to have them get access to your, buildings or facilities and your valuable assets. So that&#8217;s that&#8217;s the obviously the ultimate benefit from having a sophisticated <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/torus-technology.com\/us\/key-cabinets\/\">key management solution like Torus<\/a><\/span>.\u201d<\/p><p>With fewer people on campus at some times and more of a hybrid model of delivering education, schools and universities are having to consider all of their security risks closely. Loebel says that <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/torus-technology.com\/us\/integration\/\">automated solutions for access control<\/a><\/span> can often be \u201cvastly better\u201d than a manual solution can ever be. He says that clients of Torus are achieving payback \u201cwithin six months or less\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>The sudden and dramatic impact of the pandemic on the education sector could not have been anticipated. Yet teachers, lecturers and education administrators and support&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2205,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rethinking Security in the Education Sector | Torus<\/title>\n<meta name=\"description\" content=\"Discover how modern security challenges in education demand smarter, integrated solutions. Explore strategies to enhance campus safety with Torus Technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rethinking Security in the Education Sector | Torus\" \/>\n<meta property=\"og:description\" content=\"Discover how modern security challenges in education demand smarter, integrated solutions. Explore strategies to enhance campus safety with Torus Technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"Torus\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-14T23:45:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T06:06:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/torus-technology.com\/wp-content\/uploads\/2022\/11\/priscilla-du-preez-XkKCui44iM0-unsplash-1024x507.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trent.loebel@cictechnology.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trent.loebel@cictechnology.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rethinking Security in the Education Sector | Torus","description":"Discover how modern security challenges in education demand smarter, integrated solutions. Explore strategies to enhance campus safety with Torus Technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/","og_locale":"en_US","og_type":"article","og_title":"Rethinking Security in the Education Sector | Torus","og_description":"Discover how modern security challenges in education demand smarter, integrated solutions. Explore strategies to enhance campus safety with Torus Technology.","og_url":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/","og_site_name":"Torus","article_published_time":"2022-11-14T23:45:03+00:00","article_modified_time":"2025-08-19T06:06:15+00:00","og_image":[{"width":1024,"height":507,"url":"https:\/\/torus-technology.com\/wp-content\/uploads\/2022\/11\/priscilla-du-preez-XkKCui44iM0-unsplash-1024x507.jpg","type":"image\/jpeg"}],"author":"trent.loebel@cictechnology.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trent.loebel@cictechnology.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/","url":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/","name":"Rethinking Security in the Education Sector | Torus","isPartOf":{"@id":"https:\/\/torus-technology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/#primaryimage"},"image":{"@id":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/11\/priscilla-du-preez-XkKCui44iM0-unsplash.jpg","datePublished":"2022-11-14T23:45:03+00:00","dateModified":"2025-08-19T06:06:15+00:00","author":{"@id":"https:\/\/torus-technology.com\/#\/schema\/person\/d1e94865231f21fe2289e6c6c3c7e4d2"},"description":"Discover how modern security challenges in education demand smarter, integrated solutions. Explore strategies to enhance campus safety with Torus Technology.","breadcrumb":{"@id":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/#primaryimage","url":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/11\/priscilla-du-preez-XkKCui44iM0-unsplash.jpg","contentUrl":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/11\/priscilla-du-preez-XkKCui44iM0-unsplash.jpg","width":1366,"height":676},{"@type":"BreadcrumbList","@id":"https:\/\/torus-technology.com\/rethinking-security-in-the-education-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/torus-technology.com\/"},{"@type":"ListItem","position":2,"name":"Rethinking security in the education sector"}]},{"@type":"WebSite","@id":"https:\/\/torus-technology.com\/#website","url":"https:\/\/torus-technology.com\/","name":"Torus","description":"Securely manage keys, cards and tags","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/torus-technology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/torus-technology.com\/#\/schema\/person\/d1e94865231f21fe2289e6c6c3c7e4d2","name":"trent.loebel@cictechnology.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/torus-technology.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/752e96cb12e29efb75bff70600acf2afbe77e1b3ed15132454f1576112ad7c4d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/752e96cb12e29efb75bff70600acf2afbe77e1b3ed15132454f1576112ad7c4d?s=96&d=mm&r=g","caption":"trent.loebel@cictechnology.com"},"url":"https:\/\/torus-technology.com\/beta\/author\/trent-loebelcictechnology-com\/"}]}},"_links":{"self":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/2204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/comments?post=2204"}],"version-history":[{"count":11,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/2204\/revisions"}],"predecessor-version":[{"id":5457,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/2204\/revisions\/5457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/media\/2205"}],"wp:attachment":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/media?parent=2204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/categories?post=2204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/tags?post=2204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}