Is It a Crisis?

All organizations are vulnerable

The phrases critical communications and crisis communications are used interchangeably. However, they are synergistic building blocks. To understand both of these phrases, first take a look at the business objectives behind crisis communications. After doing this, there will be a scorecard for selecting a critical communication system. The scorecard will address Intelligibility, Interoperability, and several other “ilities” which should be considered.

CRISIS COMMUNICATION

All organizations are vulnerable to a crisis. Examples include Fukishima, BP Deepwater Horizon, Jack in the Box, WikiLeaks, and most recently the San Bernardino terrorist attack.

Trying to identify potential crisis situations is not easy and easily avoided by the tyranny of the urgent. For example, in Max H. Bazerman and Michael D. Watkins’ book “Predictable Surprises” they describe a situation or circumstance in which avoidable crises are marginalized in order to satisfy economic and social policies. They define a predictable surprise as a problem that at least some people are aware of, is getting worse over time, and is likely to explode into a crisis eventually. The best way to prepare for a crisis situation is by conducting an all hazard risk, threat and vulnerability assessment to identify potential risks which can have a significant impact on the enterprise. If you do not prepare, you will incur more damage. Without adequate internal and external communications operational response will fail, stakeholders will react negatively, management of the incident will be noticed as incompetent, and the length of time to resolve the incident and return to normal will be of greater duration and exponentially more expensive.

CRITICAL COMMUNICATIONS

Having been involved in numerous post incident reviews, there always seems to be one overarching issue that applies to critical communications breakdowns. These breakdowns always start with one or more people who needed to communicate something and, for one reason or another, were not heard. This could be inbound or outbound communications.

Detection and reporting of critical incidents require robust inbound communications. Inbound communications can come from local first responders, weather notification services, emergency management services, and most importantly from employees, visitors and other stakeholders. These folks should never be more than a few steps away from being able to report a problem. We cannot responsibly respond to a crisis situation if we are unaware that a crisis situation exists. As a caution do not disregard your employees and visitors as first responders. They have a vested interest in their safety and security and when properly trained and provisioned can be a force multiplier in rapid response and resolution to emerging events. What they need from you is the means to communicate.

Outbound communications are the communications we use to instantly notify, fire, police, crisis management teams, decision makers, employees, visitors, and stakeholders. Further, outbound communications facilitate cooperation for effective and efficient responses. Additionally, outbound crisis communication permits your crisis management team and first responders to organize an efficient response to contain the event and control panic.

DEFINING THE SCORECARD FOR SYSTEMS SELECTION

So, what are the tools we need to put in the hands of the stakeholders?

Interoperability. Are you able to integrate voice and messaging into your core security systems such as access control and video? Do you have the systems or have you considered the systems which allow for two-way integrated mass communications? These include computer desktop technologies, mobile devices, public area devices which permit rapid communications such as campus open areas, parking areas, and public venues? Does your system leverage social media tools and applications?

Intelligibility. Do not install systems that cannot meet the need to hear, be heard and be understood within any situation. Benchmark this across all vendors. You will see a broad spectrum of audio capability. Many security executives have rued the day they deployed based on a response to an RFP, without testing this core capability.

There is nothing worse in a crisis situation than not being able to understand someone who is trying to communicate critical information. Have you considered the various factors which impact critical communications such as background noise, reverberation, distance and stress (such as someone who may be screaming)? Do your systems allow for intelligibility, clarity and articulation?

Portability of Data. Data and data analytics are crucial to any crisis event and should be considered in three contexts; before the crisis occurs, during and after.

We all know what failure in crisis communication looks like. All you have to do is tune in to any news outlet to quickly understand failure. We also know what success looks like. During the recent terrorist attack in San Bernardino 14 people were killed, however more than 3,000 were saved. The success of the 3,000 was attributed to having a plan, communicating the plan, training the plan, and having the multifaceted layers of communication which facilitated an orderly and rapid evacuation while simultaneously notifying emergency first responders.

At the end of the day, if you considered the various crises which can impact your enterprise, planned and trained a response, and can clearly and intelligibly communicate between people across platforms to ensure the safety and security of your employees, visitors, and stakeholders while assuring the continued success of your organization, then when I watch the news will I see you as a success.

This article originally appeared in the September 2016 issue of Security Today.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.