Is It a Crisis?

All organizations are vulnerable

The phrases critical communications and crisis communications are used interchangeably. However, they are synergistic building blocks. To understand both of these phrases, first take a look at the business objectives behind crisis communications. After doing this, there will be a scorecard for selecting a critical communication system. The scorecard will address Intelligibility, Interoperability, and several other “ilities” which should be considered.

CRISIS COMMUNICATION

All organizations are vulnerable to a crisis. Examples include Fukishima, BP Deepwater Horizon, Jack in the Box, WikiLeaks, and most recently the San Bernardino terrorist attack.

Trying to identify potential crisis situations is not easy and easily avoided by the tyranny of the urgent. For example, in Max H. Bazerman and Michael D. Watkins’ book “Predictable Surprises” they describe a situation or circumstance in which avoidable crises are marginalized in order to satisfy economic and social policies. They define a predictable surprise as a problem that at least some people are aware of, is getting worse over time, and is likely to explode into a crisis eventually. The best way to prepare for a crisis situation is by conducting an all hazard risk, threat and vulnerability assessment to identify potential risks which can have a significant impact on the enterprise. If you do not prepare, you will incur more damage. Without adequate internal and external communications operational response will fail, stakeholders will react negatively, management of the incident will be noticed as incompetent, and the length of time to resolve the incident and return to normal will be of greater duration and exponentially more expensive.

CRITICAL COMMUNICATIONS

Having been involved in numerous post incident reviews, there always seems to be one overarching issue that applies to critical communications breakdowns. These breakdowns always start with one or more people who needed to communicate something and, for one reason or another, were not heard. This could be inbound or outbound communications.

Detection and reporting of critical incidents require robust inbound communications. Inbound communications can come from local first responders, weather notification services, emergency management services, and most importantly from employees, visitors and other stakeholders. These folks should never be more than a few steps away from being able to report a problem. We cannot responsibly respond to a crisis situation if we are unaware that a crisis situation exists. As a caution do not disregard your employees and visitors as first responders. They have a vested interest in their safety and security and when properly trained and provisioned can be a force multiplier in rapid response and resolution to emerging events. What they need from you is the means to communicate.

Outbound communications are the communications we use to instantly notify, fire, police, crisis management teams, decision makers, employees, visitors, and stakeholders. Further, outbound communications facilitate cooperation for effective and efficient responses. Additionally, outbound crisis communication permits your crisis management team and first responders to organize an efficient response to contain the event and control panic.

DEFINING THE SCORECARD FOR SYSTEMS SELECTION

So, what are the tools we need to put in the hands of the stakeholders?

Interoperability. Are you able to integrate voice and messaging into your core security systems such as access control and video? Do you have the systems or have you considered the systems which allow for two-way integrated mass communications? These include computer desktop technologies, mobile devices, public area devices which permit rapid communications such as campus open areas, parking areas, and public venues? Does your system leverage social media tools and applications?

Intelligibility. Do not install systems that cannot meet the need to hear, be heard and be understood within any situation. Benchmark this across all vendors. You will see a broad spectrum of audio capability. Many security executives have rued the day they deployed based on a response to an RFP, without testing this core capability.

There is nothing worse in a crisis situation than not being able to understand someone who is trying to communicate critical information. Have you considered the various factors which impact critical communications such as background noise, reverberation, distance and stress (such as someone who may be screaming)? Do your systems allow for intelligibility, clarity and articulation?

Portability of Data. Data and data analytics are crucial to any crisis event and should be considered in three contexts; before the crisis occurs, during and after.

We all know what failure in crisis communication looks like. All you have to do is tune in to any news outlet to quickly understand failure. We also know what success looks like. During the recent terrorist attack in San Bernardino 14 people were killed, however more than 3,000 were saved. The success of the 3,000 was attributed to having a plan, communicating the plan, training the plan, and having the multifaceted layers of communication which facilitated an orderly and rapid evacuation while simultaneously notifying emergency first responders.

At the end of the day, if you considered the various crises which can impact your enterprise, planned and trained a response, and can clearly and intelligibly communicate between people across platforms to ensure the safety and security of your employees, visitors, and stakeholders while assuring the continued success of your organization, then when I watch the news will I see you as a success.

This article originally appeared in the September 2016 issue of Security Today.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.