Is It a Crisis?

All organizations are vulnerable

The phrases critical communications and crisis communications are used interchangeably. However, they are synergistic building blocks. To understand both of these phrases, first take a look at the business objectives behind crisis communications. After doing this, there will be a scorecard for selecting a critical communication system. The scorecard will address Intelligibility, Interoperability, and several other “ilities” which should be considered.

CRISIS COMMUNICATION

All organizations are vulnerable to a crisis. Examples include Fukishima, BP Deepwater Horizon, Jack in the Box, WikiLeaks, and most recently the San Bernardino terrorist attack.

Trying to identify potential crisis situations is not easy and easily avoided by the tyranny of the urgent. For example, in Max H. Bazerman and Michael D. Watkins’ book “Predictable Surprises” they describe a situation or circumstance in which avoidable crises are marginalized in order to satisfy economic and social policies. They define a predictable surprise as a problem that at least some people are aware of, is getting worse over time, and is likely to explode into a crisis eventually. The best way to prepare for a crisis situation is by conducting an all hazard risk, threat and vulnerability assessment to identify potential risks which can have a significant impact on the enterprise. If you do not prepare, you will incur more damage. Without adequate internal and external communications operational response will fail, stakeholders will react negatively, management of the incident will be noticed as incompetent, and the length of time to resolve the incident and return to normal will be of greater duration and exponentially more expensive.

CRITICAL COMMUNICATIONS

Having been involved in numerous post incident reviews, there always seems to be one overarching issue that applies to critical communications breakdowns. These breakdowns always start with one or more people who needed to communicate something and, for one reason or another, were not heard. This could be inbound or outbound communications.

Detection and reporting of critical incidents require robust inbound communications. Inbound communications can come from local first responders, weather notification services, emergency management services, and most importantly from employees, visitors and other stakeholders. These folks should never be more than a few steps away from being able to report a problem. We cannot responsibly respond to a crisis situation if we are unaware that a crisis situation exists. As a caution do not disregard your employees and visitors as first responders. They have a vested interest in their safety and security and when properly trained and provisioned can be a force multiplier in rapid response and resolution to emerging events. What they need from you is the means to communicate.

Outbound communications are the communications we use to instantly notify, fire, police, crisis management teams, decision makers, employees, visitors, and stakeholders. Further, outbound communications facilitate cooperation for effective and efficient responses. Additionally, outbound crisis communication permits your crisis management team and first responders to organize an efficient response to contain the event and control panic.

DEFINING THE SCORECARD FOR SYSTEMS SELECTION

So, what are the tools we need to put in the hands of the stakeholders?

Interoperability. Are you able to integrate voice and messaging into your core security systems such as access control and video? Do you have the systems or have you considered the systems which allow for two-way integrated mass communications? These include computer desktop technologies, mobile devices, public area devices which permit rapid communications such as campus open areas, parking areas, and public venues? Does your system leverage social media tools and applications?

Intelligibility. Do not install systems that cannot meet the need to hear, be heard and be understood within any situation. Benchmark this across all vendors. You will see a broad spectrum of audio capability. Many security executives have rued the day they deployed based on a response to an RFP, without testing this core capability.

There is nothing worse in a crisis situation than not being able to understand someone who is trying to communicate critical information. Have you considered the various factors which impact critical communications such as background noise, reverberation, distance and stress (such as someone who may be screaming)? Do your systems allow for intelligibility, clarity and articulation?

Portability of Data. Data and data analytics are crucial to any crisis event and should be considered in three contexts; before the crisis occurs, during and after.

We all know what failure in crisis communication looks like. All you have to do is tune in to any news outlet to quickly understand failure. We also know what success looks like. During the recent terrorist attack in San Bernardino 14 people were killed, however more than 3,000 were saved. The success of the 3,000 was attributed to having a plan, communicating the plan, training the plan, and having the multifaceted layers of communication which facilitated an orderly and rapid evacuation while simultaneously notifying emergency first responders.

At the end of the day, if you considered the various crises which can impact your enterprise, planned and trained a response, and can clearly and intelligibly communicate between people across platforms to ensure the safety and security of your employees, visitors, and stakeholders while assuring the continued success of your organization, then when I watch the news will I see you as a success.

This article originally appeared in the September 2016 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3