{"id":5406,"date":"2025-06-11T12:00:00","date_gmt":"2025-06-11T10:00:00","guid":{"rendered":"https:\/\/blog.simons-voss.com\/?p=5406"},"modified":"2025-09-22T11:03:03","modified_gmt":"2025-09-22T09:03:03","slug":"how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff","status":"publish","type":"post","link":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/","title":{"rendered":"How to Tackle Lost Keys, Unauthorised Access &#038; Time-Pressed Admin Staff"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||0px||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/School.png&#8221; alt=&#8221;Scalable Security: How Nurseries and Schools Can Start Small and Grow&#8221; title_text=&#8221;How to Tackle Lost Keys, Unauthorised Access &#038; Time-Pressed Admin Staff &#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Summary:\u00a0<\/strong><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Understand how traditional <a href=\"https:\/\/www.simons-voss.com\/en\/digital-master-key-system.html\">master key systems<\/a> increase workload, risk, and costs for schools<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Discover how digital locking systems simplify day-to-day admin and key control<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Explore audit trails and remote access management as essential tools for modern safeguarding<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Get insight into real-time solutions that ease the burden on facilities and site managers<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2>A Day in the Life of a School Facilities Manager\u00a0<\/h2>\n<p><span data-contrast=\"auto\">It\u2019s 7:45 AM. You\u2019ve barely opened the gates when you\u2019re alerted that the master keys have been misplaced. Again. While the person, or even multiple members of the team retrace their steps, your phone rings: a classroom door won\u2019t unlock, and a teacher can\u2019t get in to prepare for the day or a contractor can\u2019t access the boiler room for an important service.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">By 9:15, you\u2019ve already had three interruptions, two temporary access requests, and one headache.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is a typical morning for school facilities managers up and down the UK, in education facilities of all sizes &#8211; a constant juggle of access issues, lost keys, and time-consuming workarounds. In educational settings where time, budget, and safeguarding pressures are at an all-time high, something\u2019s got to give. And it\u2019s increasingly clear that traditional key-based systems are no longer fit for purpose.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Managing access control is a complex task that requires a level of sophistication and flexibility beyond what traditional key management systems can offer.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These institutions often deal with multiple staff members, hundreds (if not thousands) of doors, and countless users, making the manual distribution, retrieval, and tracking of keys a logistical nightmare.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For administrative teams and security managers tasked with managing access across such large and often dispersed environments, the everyday challenges can be overwhelming. In this blog, we\u2019ll explore how <a href=\"https:\/\/www.simons-voss.com\/en\/digital-locking-systems.html\">digital locking systems<\/a> and <a href=\"https:\/\/www.simons-voss.com\/en\/keyless-door-entry-systems.html\">keyless entry solutions<\/a> can help schools and universities tackle these issues head-on, offering tangible benefits for both operational efficiency and security.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2>The Overwhelming Costs and Risks of Lost Keys\u00a0<\/h2>\n<p><span data-contrast=\"auto\">In an institution where thousands of students and staff need access to various rooms, classrooms, offices, and other facilities, the cost of lost or misplaced keys is more than just a matter of inconvenience &#8211; it can be a security and financial headache. The sheer volume of keys in circulation means the risk of loss, duplication, or unauthorised access increases significantly.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In a larger educational setting, it\u2019s not just one or two lost keys that cause a problem; it could be dozens or even hundreds. A single lost key could provide unauthorised access to sensitive areas, compromising both safety and security. The cost of rekeying locks, replacing keys, and responding to security breaches can quickly mount, potentially impacting budgets that are already stretched thin.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Switching to a digital locking system allows educational institutions to eliminate the dependency on physical keys entirely. With keyless entry systems, every staff member can use a secure, personalised digital credential -whether it\u2019s an app on their smartphone or a smart card. If a credential is lost or compromised, access can be immediately revoked, and new credentials can be issued without the hassle of rekeying locks. The risks are mitigated, and the overhead costs are significantly reduced.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2>Viral trends are posing new access control risks\u00a0<\/h2>\n<p><span data-contrast=\"auto\">In today\u2019s digital age, the risks to school security are more complex than ever before. Social media platforms, often driven by viral trends, are encouraging secondary school-aged children to engage in dangerous and disruptive pranks, including breaking into school buildings at night and filming their actions for entertainment. These incidents, typically shared online, have raised significant concerns among school administrators and security teams. Not only do these pranks put the physical safety of students and staff at risk, but they also expose schools to the threat of vandalism, theft, and even reputational damage. As social media becomes a more prominent influence on young people\u2019s behaviour, schools and universities must adapt their security strategies to manage these evolving threats, ensuring they are equipped with modern access control systems that can prevent unauthorised access and offer real-time monitoring to protect against such pranks and other security breaches.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/Key-handover.png&#8221; alt=&#8221;Smarthandle AX Advanced Nahaufnahme&#8221; title_text=&#8221;Immediate, Remote Access Control&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b><span data-contrast=\"auto\">Why Traditional Keys Don\u2019t Cut It Anymore<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<ol>\n<li><strong> Lost Keys = Security Risk + Admin Overload<\/strong><span data-contrast=\"auto\"> Lost keys are more than just a nuisance. They\u2019re a direct threat to site security. Replacing them isn\u2019t just a cost issue \u2014 it\u2019s a process headache:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"><\/span><\/li>\n<\/ol>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Rekeying affected locks<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Informing relevant staff<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Reissuing keys<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Tracking who has what, and when<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<\/ul>\n<p>The hidden cost is time. According to SimonsVoss client insights, schools can spend <strong>hours per week<\/strong><span data-contrast=\"auto\"> managing key handovers and replacements. That\u2019s time pulled from health &amp; safety inspections, facilities planning, and essential compliance checks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ol start=\"2\">\n<li><strong> Unauthorised Access is Hard to Spot \u2014 Until It\u2019s Too Late<\/strong><span data-contrast=\"auto\"> With mechanical keys, once a door is unlocked, there\u2019s no trail. No timestamps, no user logs, and no way of knowing who entered or when. In a setting where children\u2019s safety is paramount, that\u2019s a worrying blind spot.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"><\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\"><a href=\"https:\/\/www.simons-voss.com\/en\/digital-locking-systems.html\">Digital locking systems<\/a> eliminate this risk. Audit trails show exactly who accessed which door, and when. If a safeguarding incident occurs, you don\u2019t just hope \u2014 you <\/span><i><span data-contrast=\"auto\">know<\/span><\/i><span data-contrast=\"auto\"> who was where, instantly.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2>Key Management: A Modern, Smarter Approach<\/h2>\n<p><strong>What if keys didn\u2019t need to be handed out at all?\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Digital credentials (like a fob or mobile-based access) can be issued remotely, with expiry times and user-specific permissions. This means:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Supply teachers only have access when they\u2019re on shift<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Contractors only access maintenance areas, not classrooms<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Admin staff never have to chase someone down for their key<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<\/ul>\n<blockquote>\n<p><strong>Real-World Use Case:<\/strong><span data-contrast=\"auto\"> A North Yorkshire secondary school recently switched to digital locking after three security breaches linked to copied keys. With remote access permissions, they reduced access-related incidents by 70% in the first six months.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/blockquote>\n<h2>Digital Locking Systems = Real Time, Real Control<\/h2>\n<p><span data-contrast=\"auto\">These systems don\u2019t just store data \u2014 they empower teams to act. If a door is left open after hours or someone tries to access a restricted area, alerts can be sent to key staff instantly.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Even better, doors can be:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Locked down remotely<\/strong><span data-contrast=\"auto\"> in the event of a security incident<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Unlocked temporarily<\/strong><span data-contrast=\"auto\"> to allow emergency access<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Scheduled<\/strong><span data-contrast=\"auto\"> to lock\/unlock during set periods (e.g., school hours only)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<\/ul>\n<p>This kind of control transforms the ability of site managers to stay on top of multiple access points without physically being everywhere at once.<span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2>Saving Time &amp; Budget Without Compromise<\/h2>\n<p><span data-contrast=\"auto\">Time savings aren\u2019t the only benefit.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When you factor in:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Replacing lost keys<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Rekeying locks<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Managing spreadsheets or paper logs of who has access<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Chasing staff for key returns\u2026<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<\/ul>\n<p>&#8230;the cost of outdated systems mounts fast.<span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Digital locking systems reduce this by consolidating control into a single platform. One school in the Midlands reports saving <\/span><strong>\u00a31,600+ annually<\/strong><span data-contrast=\"auto\"> just on key replacement and labour time.<\/span><\/p>\n<h2>Audit Trails for Safeguarding &amp; Compliance<\/h2>\n<p><span data-contrast=\"auto\">From Ofsted inspections to internal risk reviews, evidence matters. Schools must demonstrate who accessed secure areas, how access is controlled, and whether unauthorised entry is being effectively managed.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Audit trails offer:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Automated logs of every door interaction<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">A timestamped list of entry\/exit events<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Data exports for compliance reporting<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<\/ul>\n<blockquote>\n<p><strong>Did You Know?<\/strong><span data-contrast=\"auto\"> Under Ofsted\u2019s updated 2023 framework, <\/span><strong>leaders are expected to proactively manage site security<\/strong><span data-contrast=\"auto\"> and demonstrate awareness of access risks. Digital audit trails help schools not only pass inspections but prove active safeguarding.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/blockquote>\n<h2>Addressing Admin Pressures with Scalable Solutions<\/h2>\n<p><span data-contrast=\"auto\">Facilities and admin staff are stretched. Any technology that simplifies their day while improving security is worth serious consideration.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Digital locking systems are:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Easy to use<\/strong><span data-contrast=\"auto\"> \u2013 intuitive interfaces that require minimal training<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Quick to install<\/strong><span data-contrast=\"auto\"> \u2013 no drilling, no disruption to learning environments<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><strong>Fully scalable<\/strong><span data-contrast=\"auto\"> \u2013 start with priority doors and expand site-wide when budgets allow<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<\/ul>\n<p>And because credentials can be reused, there\u2019s no pile-up of old keys or stockpiling replacement sets. It\u2019s modern key management for modern educational settings.<span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2>Final Thoughts: A Smarter Way Forward<\/h2>\n<p><span data-contrast=\"auto\">School security doesn\u2019t have to be reactive. By replacing <a href=\"https:\/\/www.simons-voss.com\/en\/digital-master-key-system.html\">master key systems<\/a> with digital alternatives, educational settings gain back time, control, and peace of mind.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This isn\u2019t about complex tech \u2014 it\u2019s about enabling schools to manage access in a way that\u2019s:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Traceable<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Accountable<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Flexible<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Cost-effective<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\"> <\/span><\/li>\n<\/ul>\n<p>Because when the admin team can spend less time chasing keys, they can focus more on the things that matter: safety, operations, and creating the best environment for learning.<span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><strong>Interested in exploring how <a href=\"https:\/\/www.simons-voss.com\/en\">electronic locks<\/a> can transform your school\u2019s day-to-day?<\/strong><span data-contrast=\"auto\"> Let\u2019s talk about phased upgrades, tailored to your site and your goals.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary:\u00a0 Understand how traditional master key systems increase workload, risk, and costs for schools\u00a0 Discover how digital locking systems simplify day-to-day admin and key control\u00a0 Explore audit trails and remote access management as essential tools for modern safeguarding\u00a0 Get insight into real-time solutions that ease the burden on facilities and site managers\u00a0 A Day in [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":5410,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:paragraph -->\n<p><strong>In this blog we will explore -<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>How many education settings struggle to secure multiple doors with limited budgets.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Modern parents have higher expectations when it comes to efficient and smart technology and how meeting and exceeding these expectations can result in business growth.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>A scalable, retrofit approach allows nurseries and schools to test systems and expand over time.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Keyless entry solutions reduce disruption and maintenance.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>This piece outlines how starting with digital door locks on one or two key access points can lead to full integration over time.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>In the world of education, tight budgets, legacy infrastructure, and minimal disruption are everyday challenges, on top of managing lots of little people with plenty of independence and an inquisitive nature. Whether you're a school business manager, a facilities lead in a nursery, or an estate manager across multiple campuses, the demand for safer, smarter, and scalable access control solutions has never been more urgent. This is where the concept of starting small and growing, strategically and cost-effectively, can redefine your entire approach to door security.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Meeting the Expectations of Modern Parents<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Today\u2019s parents are digital natives - they bank via apps, unlock cars with their phones, and monitor home security from their watches. So, when they walk into a nursery or school setting, they bring those same expectations of ease, safety, and transparency with them.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Security is no longer just about locks and bolts. It\u2019s about how a facility demonstrates it takes safety seriously in ways that feel up to date and proactive. Parents want to see that their child\u2019s school or nursery is embracing technology to safeguard access points, manage visitors, and prevent lapses in protocol - not relying on outdated master keys or sign-in sheets. It's crucial to work with a solution provider that understands the needs of <a href=\"https:\/\/www.simons-voss.com\/en\/sector-specific-solutions\/schools-and-education.html\">schools and further education environments<\/a>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Understanding the Constraints<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Budgets in the education sector are notoriously tight. Safeguarding and security are critical, but resources are often stretched between competing priorities: staffing, curriculum, student support, and infrastructure. Traditional master key systems come with hidden long-term costs. Keys are lost, locks need to be rekeyed, and no real-time audit trail is possible.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Facility upgrades are often seen as a necessary evil - disruptive, time-consuming projects that require careful planning. For many schools and nurseries, the perceived hassle of replacing legacy locks or integrating a new system is enough to delay action.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>But what if there was a different way?<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong> Start with One Door<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Digital locking systems - especially wireless, keyless entry solutions -allow educational settings to begin with just one door. Think of it like a test case: choose a high-traffic or high-risk access point (e.g. main entrance, server room, staff room) and install a digital lock that can be managed remotely.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>With no drilling, wiring or major disruption required, this allows school administrators to test the system with minimal commitment. And because today\u2019s best digital locking systems are designed to retrofit existing doors, there\u2019s no need to overhaul current hardware.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This matters not only from a safeguarding perspective, but also from a commercial standpoint. In a competitive early years environment, where prospective parents are choosing between settings, investing in modern access control is a tangible way to build trust and stand out. Digital locking systems send a clear message: <strong><em>we\u2019re forward-thinking, we\u2019re secure, and we\u2019ve got it covered.<\/em><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>For nurseries and schools looking to boost enrolment or attract more discerning families, demonstrating a commitment to innovation, especially in areas like safety, can be a key differentiator (pardon the pun).<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In short, it\u2019s not just a security investment. It\u2019s a reputational one too.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"id\":2290,\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} -->\n<figure class=\"wp-block-image size-large\"><img src=\"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2024\/05\/mann-tuer-oeffung-1024x683.jpg\" alt=\"\" class=\"wp-image-2290\"\/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:paragraph -->\n<p><strong>Scaling Over Time<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Once confidence in the system is built - whether due to smoother operations, improved safeguarding, or cost\/time savings - the rollout can be expanded. Many educational facilities grow their access control solutions organically, door-by-door, in line with available budget and evolving need.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Digital access solutions allow you to:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Add new doors to the system without revisiting or replacing previous installations.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Maintain a single dashboard for all access permissions across your site.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Reuse components or credentials where needed, for maximum ROI.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>This scalability is key for multi-site academies or nurseries within education trusts. It gives flexibility and prevents large upfront expenditure.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Retrofitting Without Disruption<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Many nurseries and primary schools operate from older buildings. Drilling into doors, pulling cables or making structural changes can be both disruptive and expensive.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Modern digital locking systems are designed to be retrofit-ready:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>No wiring required<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>No drilling into heritage or fire doors<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>No downtime or out-of-hours installation costs<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>This means installations can take place during school hours with minimal classroom interruption.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"id\":3028,\"sizeSlug\":\"large\",\"linkDestination\":\"none\"} -->\n<figure class=\"wp-block-image size-large\"><img src=\"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2024\/06\/Foto-43.1-682x1024.jpg\" alt=\"\" class=\"wp-image-3028\"\/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:paragraph -->\n<p><strong> Ease of Use for Staff and Parents<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Beyond the technical setup, the day-to-day operation of these systems is also built for ease. Staff no longer need to carry bulky keychains or remember codes. Permissions can be granted from a mobile device or desktop platform. Temporary access can be given to contractors or supply teachers - and just as easily revoked.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Parents and guardians benefit too. Some schools have extended their access systems to include drop-off and collection points. This can significantly enhance safeguarding and reduce queues and miscommunication.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>ESG and Modernisation Benefits<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Keyless digital systems are not only efficient - they're also sustainable. With minimal hardware, long-lasting batteries, and no plastic keycards required, they support schools' Environmental, Social &amp; Governance (ESG) goals. Modernising your infrastructure through scalable, low-impact upgrades is a step towards a safer, smarter school.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"id\":1887,\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\n<figure class=\"wp-block-image size-full\"><img src=\"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2024\/05\/school-security-760x428-1.jpg\" alt=\"\" class=\"wp-image-1887\"\/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:paragraph -->\n<p><strong>A Realistic Upgrade Path<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>We understand the pressures educational settings are under. That\u2019s why our systems are built to support long-term growth. Start with:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>One high-traffic door to validate the benefits<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Expand to multiple points of entry and staff-only areas<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Integrate centrally for total control and compliance<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>No waste. No duplication. Just a secure, scalable system that grows with your needs.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong> Security That Grows With You<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Security doesn\u2019t have to be all-or-nothing. For nurseries and schools looking to upgrade, a scalable, retrofit-ready system offers the best of both worlds: immediate safeguarding benefits with a sensible growth path.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>With minimal disruption and maximum control, digital locking solutions empower education settings to take a modern, strategic approach - one door at a time.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Ready to upgrade your first door? Speak to our team to plan a simple, scalable security strategy for your school or nursery.<\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","footnotes":""},"categories":[184],"tags":[],"class_list":["post-5406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Tackle Lost Keys, Unauthorised Access &amp; Time-Pressed Admin Staff<\/title>\n<meta name=\"description\" content=\"Discover how digital locking systems simplify day-to-day admin and key control. Get insight into real-time solutions that ease the burden on facilities and site managers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Tackle Lost Keys, Unauthorised Access &amp; Time-Pressed Admin Staff\" \/>\n<meta property=\"og:description\" content=\"Discover how digital locking systems simplify day-to-day admin and key control. Get insight into real-time solutions that ease the burden on facilities and site managers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/\" \/>\n<meta property=\"og:site_name\" content=\"SimonsVoss Magazin\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-11T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T09:03:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/School.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bruce Donald\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Donald\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/\"},\"author\":{\"name\":\"Bruce Donald\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#\\\/schema\\\/person\\\/cc07e3fde7637adbe87c4857ee31e681\"},\"headline\":\"How to Tackle Lost Keys, Unauthorised Access &#038; Time-Pressed Admin Staff\",\"datePublished\":\"2025-06-11T10:00:00+00:00\",\"dateModified\":\"2025-09-22T09:03:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/\"},\"wordCount\":1603,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.simons-voss.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/School.png\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/\",\"url\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/\",\"name\":\"How to Tackle Lost Keys, Unauthorised Access & Time-Pressed Admin Staff\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.simons-voss.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/School.png\",\"datePublished\":\"2025-06-11T10:00:00+00:00\",\"dateModified\":\"2025-09-22T09:03:03+00:00\",\"description\":\"Discover how digital locking systems simplify day-to-day admin and key control. Get insight into real-time solutions that ease the burden on facilities and site managers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.simons-voss.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/School.png\",\"contentUrl\":\"https:\\\/\\\/blog.simons-voss.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/School.png\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/technology\\\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Tackle Lost Keys, Unauthorised Access &#038; Time-Pressed Admin Staff\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/\",\"name\":\"SimonsVoss Magazin\",\"description\":\"Alles, was Sie \u00fcber digitale Schlie\u00dfsysteme wissen m\u00fcssen!\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#organization\",\"name\":\"SimonsVoss Technologies GmbH\",\"url\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.simons-voss.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/SV-logo.png\",\"contentUrl\":\"https:\\\/\\\/blog.simons-voss.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/SV-logo.png\",\"width\":600,\"height\":154,\"caption\":\"SimonsVoss Technologies GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/simonsvoss\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCv-1cCpIedcgsgZzGbOohdQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/#\\\/schema\\\/person\\\/cc07e3fde7637adbe87c4857ee31e681\",\"name\":\"Bruce Donald\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3edfaf47e835acdcaa05759f3aed4a7bb8f43ba857060feba2cae41170344f5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3edfaf47e835acdcaa05759f3aed4a7bb8f43ba857060feba2cae41170344f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3edfaf47e835acdcaa05759f3aed4a7bb8f43ba857060feba2cae41170344f5?s=96&d=mm&r=g\",\"caption\":\"Bruce Donald\"},\"url\":\"https:\\\/\\\/blog.simons-voss.com\\\/en\\\/author\\\/bruce\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Tackle Lost Keys, Unauthorised Access & Time-Pressed Admin Staff","description":"Discover how digital locking systems simplify day-to-day admin and key control. Get insight into real-time solutions that ease the burden on facilities and site managers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/","og_locale":"en_US","og_type":"article","og_title":"How to Tackle Lost Keys, Unauthorised Access & Time-Pressed Admin Staff","og_description":"Discover how digital locking systems simplify day-to-day admin and key control. Get insight into real-time solutions that ease the burden on facilities and site managers.","og_url":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/","og_site_name":"SimonsVoss Magazin","article_published_time":"2025-06-11T10:00:00+00:00","article_modified_time":"2025-09-22T09:03:03+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/School.png","type":"image\/png"}],"author":"Bruce Donald","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruce Donald","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/#article","isPartOf":{"@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/"},"author":{"name":"Bruce Donald","@id":"https:\/\/blog.simons-voss.com\/en\/#\/schema\/person\/cc07e3fde7637adbe87c4857ee31e681"},"headline":"How to Tackle Lost Keys, Unauthorised Access &#038; Time-Pressed Admin Staff","datePublished":"2025-06-11T10:00:00+00:00","dateModified":"2025-09-22T09:03:03+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/"},"wordCount":1603,"publisher":{"@id":"https:\/\/blog.simons-voss.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/School.png","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/","url":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/","name":"How to Tackle Lost Keys, Unauthorised Access & Time-Pressed Admin Staff","isPartOf":{"@id":"https:\/\/blog.simons-voss.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/#primaryimage"},"image":{"@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/School.png","datePublished":"2025-06-11T10:00:00+00:00","dateModified":"2025-09-22T09:03:03+00:00","description":"Discover how digital locking systems simplify day-to-day admin and key control. Get insight into real-time solutions that ease the burden on facilities and site managers.","breadcrumb":{"@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/#primaryimage","url":"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/School.png","contentUrl":"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2025\/05\/School.png","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/blog.simons-voss.com\/en\/technology\/how-to-tackle-lost-keys-unauthorised-access-time-pressed-admin-staff\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/blog.simons-voss.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to Tackle Lost Keys, Unauthorised Access &#038; Time-Pressed Admin Staff"}]},{"@type":"WebSite","@id":"https:\/\/blog.simons-voss.com\/en\/#website","url":"https:\/\/blog.simons-voss.com\/en\/","name":"SimonsVoss Magazin","description":"Alles, was Sie \u00fcber digitale Schlie\u00dfsysteme wissen m\u00fcssen!","publisher":{"@id":"https:\/\/blog.simons-voss.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.simons-voss.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.simons-voss.com\/en\/#organization","name":"SimonsVoss Technologies GmbH","url":"https:\/\/blog.simons-voss.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.simons-voss.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2023\/07\/SV-logo.png","contentUrl":"https:\/\/blog.simons-voss.com\/wp-content\/uploads\/2023\/07\/SV-logo.png","width":600,"height":154,"caption":"SimonsVoss Technologies GmbH"},"image":{"@id":"https:\/\/blog.simons-voss.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/simonsvoss\/","https:\/\/www.youtube.com\/channel\/UCv-1cCpIedcgsgZzGbOohdQ"]},{"@type":"Person","@id":"https:\/\/blog.simons-voss.com\/en\/#\/schema\/person\/cc07e3fde7637adbe87c4857ee31e681","name":"Bruce Donald","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d3edfaf47e835acdcaa05759f3aed4a7bb8f43ba857060feba2cae41170344f5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3edfaf47e835acdcaa05759f3aed4a7bb8f43ba857060feba2cae41170344f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3edfaf47e835acdcaa05759f3aed4a7bb8f43ba857060feba2cae41170344f5?s=96&d=mm&r=g","caption":"Bruce Donald"},"url":"https:\/\/blog.simons-voss.com\/en\/author\/bruce\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/posts\/5406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/comments?post=5406"}],"version-history":[{"count":9,"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/posts\/5406\/revisions"}],"predecessor-version":[{"id":7294,"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/posts\/5406\/revisions\/7294"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/media\/5410"}],"wp:attachment":[{"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/media?parent=5406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/categories?post=5406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.simons-voss.com\/en\/wp-json\/wp\/v2\/tags?post=5406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}