Making Security a Priority in Building Design – Wimgo

Making Security a Priority in Building Design

Security has become a huge concern for anyone involved in building design and construction these days. Schools, hospitals, offices, homes – you name the building type and safety is at the top of the priority list. The world we live in contains both external dangers like terrorism and active shooters, as well as internal threats like theft, fraud, workplace violence. It’s a bit of a scary time, and developers aim to create spaces where occupants can feel as secure as possible.  

Beyond just wanting to keep people safe, there are practical reasons for making security a core part of the design process. If something bad happens on a property, the owners can be sued for negligence if reasonable protections weren’t in place. No one wants that liability. Also, both tenants and insurers demand stringent security features in new buildings. It pays off to go above and beyond minimum requirements. 

So what does a secure building actually look like? The goal is to layer multiple elements – physical barriers, electronic systems, cybersecurity, emergency planning – that work together to deter threats, detect intrusions, and enable rapid response. It takes careful thought and coordination, but the result is a customized program tailored to your unique needs.

In this article, we’ll break down key considerations for integrating security into different aspects of your building. Follow recommendations in each area below and you’ll be on your way to creating a safe space for occupants to work, learn, receive care, or go about their daily activities. Peace of mind awaits!

Physical Security Considerations

Physical security focuses on controlling physical access both around the perimeter and within your buildings. The mantra is block access to restricted areas and harden spots that are vulnerable to damage. Here are some ways to beef up your exterior protection and interior space:

Perimeter Security 

The perimeter is your first line of defense, literally surrounding the property. Make it a solid barrier:

 Install tall fencing or walls with limited access points to keep intruders from wandering onto the grounds. Gates should be well-lit and controlled by keypads, remotes, or guards. 

 Post warning signs clearly stating the premises are monitored and secured. 

 Make sure lighting extends to all sides – illumination deters crime.

 Security cameras provide 24/7 monitoring and further discourage trespassing.

 Place thorny bushes below windows as natural climbing deterrents. Keep trees and landscaping well-trimmed to eliminate hiding spots.

 Concrete bollards or planters protect exterior doors by preventing vehicles from driving up.

Entry Points

Pay extra attention to entry points which are natural targets like lobbies, loading zones, and parking garages:

 Use access control systems like keypads, card readers, or biometric scanners to restrict entry to authorized staff.  

 Station security personnel to check IDs and manage visitor sign-in procedures. Provide waiting areas out of sight of sensitive zones.

 Install surveillance cameras to capture all activity. Monitor a secure central command post. 

 Use mantraps with double entry to prevent piggybacking behind someone with access.

 Equip vestibules with two-way intercoms for screening visitors before unlocking interior doors.

Internal Layout

Decisions on interior layout can enhance security:

 Isolate high-risk areas like research labs or computer rooms with additional access restrictions. 

 Direct visitor traffic through reception desks for sign-in before entering general areas. Issue temporary badges.

 Use simple wayfinding tools – color coding, icons, directional signs – to clearly guide people.

 Favor open floor plans with long sight lines. Windowed interior offices improve natural surveillance.  

 Limit access by role via keys, proximity cards, etc. Disable after-hours entry to restricted zones.

 Avoid numbering offices/rooms in ways that identify protected spaces from the exterior.

Building Materials

Upgrade walls, doors, windows and other materials to resist damage from forced entry or criminal attacks:

 Install ballistic glass, polycarbonate, or layered window laminate to prevent shattering.

 Use steel window and door frames – much stronger than wood or hollow metal. 

 Reinforce exterior walls and sensitive areas with concrete, steel or ballistic drywall. 

 Choose solid metal doors matched to metal frames – they won’t kick or pry open easily.

 Keep valuables like sensitive documents, jewelry, cash, or pharmaceuticals locked in fireproof safes with high-security locks. 

Windows and Doors

All openings to the outside should be well-hardened:

 Install high-grade, pick-resistant locks on all windows and exterior doors. Avoid standard pin/tumbler locks.

 Cover windows with metal security screens or bars – extremely tough to break through.

 Connect doors and windows to intrusion detection systems to alert staff of any unauthorized openings.

 Ensure exterior doors are steel or reinforced. No glass near door handles where it could easily shatter.

 Use metal frames matched to metal doors and robust hardware like security hinges. 

Lighting 

Proper lighting is crucial for security and safety:

 Brightly illuminate building exteriors, parking areas, pathways, and entrances year-round using vandal-resistant light fixtures.

 Install emergency backup lighting systems for exits, generators, and critical areas to use if the power fails.

 Incorporate motion sensor lighting that automatically turns on with detected activity – especially in isolated areas.

 Provide well-lit guard stations at access points to easily identify approaching individuals while avoiding shadowy ambush points. 

 Ensure cameras have adequate lighting for clear night recordings. Consider infrared illuminators.

Signage

Signage plays an important role for security personnel and first responders:

 Post visible street address signs that are legible from the road to assist police/fire response.

 Use signs at entrances to state security warnings like 24-hour camera surveillance in effect. Deterrence!

 Provide clear wayfinding so visitors understand exactly where they are permitted to go. 

 Color code zones, label access levels, provide directional guidance to flows. Well-placed signs reduce confusion. 

 Mark emergency exits and evacuation routes to safely guide occupants out in a crisis.

Electronic Security Systems

Electronic systems provide integrated access control, video surveillance, intrusion detection, and emergency communications:

Access Control

Managing access is vital – you want to know who enters your buildings and when. Electronic access control validates credentials before allowing entry. Common tools include:

 Keypads for punch code entry. Can be weatherproof for outdoor placement.  

 Wireless remotes for keyless entry with the press of a button.  

 Proximity cards that unlock when tapped on a reader.

 Biometrics like fingerprint, facial recognition, retinal scans for hands-free access.

 Smartphone apps that essentially turn phones into virtual keys.

 Video intercoms so you can visually ID visitors prior to buzzing them in remotely. 

Video Surveillance 

Security cameras provide 24/7 monitoring and recording of all your critical areas:

 Place cameras at entry/exit points, hallways, stairwells, common areas, parking lots – basically everywhere!

 Pan-tilt-zoom (PTZ) cameras can track and zoom in on suspicious activity. 

 Central monitoring station allows simultaneous live viewing of multiple cameras on wall of monitors/screens.

 Networked IP cameras easily integrate with digital systems for remote viewing, alerts, recorded video analysis.

 High-resolution models provide clear identifications needed for prosecution. 

 Consistent surveillance leaves criminals feeling exposed.

Intrusion Alarms

Alarm systems detect breaches and alert personnel:

 Place sensors on doors/windows to trigger alarms when opened. Glass break sensors also available.

 Motion detectors in key areas send alerts when someone enters after hours or roams a restricted space.

 Provide staff panic buttons for silent duress notification if needed. 

 Configure video analytics on surveillance cameras to automatically flag unusual activity. 

 Response protocols send real-time notifications and reports to security staff any time a sensor is tripped. 

Emergency Communications

Reliable communications are critical during an emergency:  

 Video intercoms allow two-way communication at doors for screening.

 Two-way radios enable rapid contact between guards and staff.  

 Overhead PA systems allow announcements to occupants in the building.

 Phones, call boxes, and emergency towers provide direct 911 contact.

 Alert systems flash strobes and broadcast announcements in a crisis – e.g. active shooter. 

Cybersecurity  

IT security can’t be overlooked in modern buildings packed with interconnected systems and devices vulnerable to hacking. A breach could have catastrophic results. Cyber protections you need:

Network Security

Safeguard your networks from intrusion by:

 Installing firewalls to filter traffic and block unauthorized access attempts from outside.

 Segmenting networks so that security systems reside on isolated zones with restricted connectivity to general users and devices. 

 Requiring any remote system/data access to occur only through encrypted VPN tunnels to prevent interception. Multi-factor authentication helps validate identities.

 Restricting admin access to networks, tracking all activity for audits. Disable unused ports promptly.

 Applying software patches and security updates to networks, servers, and devices continuously as they become available to eliminate vulnerabilities.

 Using intrusion detection systems to monitor network traffic and system logs – blocks detected threats. 

Data Protection

Your building contains sensitive data like occupant records, research, financial documents that require safeguarding:

 Encrypt stored/transmitted data to render it unreadable if somehow compromised.

 Restrict access to only personnel whose role specifically requires it – principle of least privilege. Use robust authentication.

 Require multi-factor login (e.g. password + texted code) for greater identity verification when accessing sensitive data or systems. 

 Maintain regular offline backups of critical data – needed for restores after incidents. Store backups securely offsite.

 Where extremely high confidentiality is needed, isolate those systems completely on a protected network with no external connectivity.

Device Security 

The expanding array of facility systems – HVAC, lighting, elevators, badging readers, etc. – can also be exploited if not properly secured:

 Isolate device networks from general building networks and users. Limit communications to only essential systems.

 Disable unsecured remote access protocols like telnet. Require SSH, HTTPS, SFTP to leverage encryption.

 Change default passwords to long randomly generated strings. Use a password manager. Regular resets recommended.

 Continuously patch devices and install firmware updates to close vulnerabilities as they are discovered.

 Only enable essential services/ports devices actually need for intended operation. Disable the rest.

Planning and Training  

True security requires advance planning and personnel training:

Security Master Planning

Develop an in-depth security master plan early in the design phase:

 Perform threat assessments to identify plausible risks – crime, workplace violence, terrorism, natural disasters, cyberattacks. What issues are unique to your facility?

 Security consultants can inspect plans and conduct vulnerability assessments to identify weaknesses in layout or systems for remediation prior to construction.

 Create a budget that covers equipment, software, personnel, training, and maintenance over the lifecycle of the facility.

 Define specific security systems and integration strategies you’ll implement down to component models and locations in a detailed site plan. 

 Review relevant regulations in your jurisdiction and confirm compliance – e.g. fire codes, health care mandates.

Drills and Exercises 

Once built, test systems and practice emergency response:

 Train all regular occupants on security protocols as part of onboarding. Review emergency procedures like fire response, lockdown, active shooter, etc. 

 Conduct periodic drills to practice scenarios and reinforce training. They help commit responses to memory to avoid hesitation in actual events.

 Tabletop exercises involve discussing hypothetical scenarios and decision making with your teams. Useful preparatory exercises. 

 Run full-scale emergency simulations with multiple integrated response teams reacting as they would in a real-world emergency.

Conclusion

Integrating security early in the design process results in a layered, resilient building program tailored to your unique risks. Assess threats, define systems, train personnel exhaustively. Expert guidance is invaluable. While security has costs, it gives great peace of mind and reduces liability – a wise long-term investment in any facility. The recommendations above explore how to effectively incorporate protections. At the end of the day,buildings are about people – give yours a space to feel safe.