On the Run

Businesses take a proactive approach to employee safety, security

The modern workplace is increasingly mobile. The prevalence of secure mobile internet and emphasis on face-to-face collaboration has seen corporations increasingly emphasize remote work for their employees. Running perpendicular to this trend, however, is a sharp increase in the number and frequency of natural and manmade emergencies. Corporations are implementing tools and processes necessary to keep employees safe while they are away from their families.

In a recent research paper released by Everbridge titled “Safety and Security for Business Travelers, Lone and Remote Workers,” the study found that mobile workers are most concerned about communication during an extreme weather, fire, explosion or active shooter situation. Additional statistics from the research underscore how often mobile workers find themselves in harm’s way.

  • Twenty-five percent of employers stated that they have had their mobile workers in the proximity of a workplace violence situation in the past 12 months, while 20 percent have had travelers in the proximity of a terrorist attack within 72 hours of its occurrence.
  • Eighty-four percent of respondents said they had remote workers affected by a location-specific weather event in the last twelve months.

Organizations need to quickly communicate with their employees in case of a location-based critical event. This is why many businesses are moving towards creating “fusion centers” or “command centers” that manage all workplace systems and disruptions from a central location. These centers have dedicated staff that can analyze a number of information streams, such as social media, media and access systems that can be used to identify major events as they happen. But not all emergencies are created equal. Businesses cannot afford to have their mobile workers have alert fatigue so it’s up to the command center’s staff to assess the threat and take definitive action.

It is also important to discuss data privacy as it relates to employee communications. Facebook and other tech companies have been in the news for their aggressive acquisition of personal data. If positioned incorrectly, it is easy to see how a well-intentioned mobile worker plan could be positioned as a corporate “Big Brother” intent on tracking employees’ whereabouts. The good news is that the overwhelming majority of workers in our study said they were ok with sacrificing privacy for safety during business trips. It’s not always easy to walk that fine line between privacy and protection but it’s something that workers will understand if it’s communicated correctly.

Modern mobile worker safety programs hinge on three key capabilities: understanding who potentially could be affected by an event, utilizing a “check-in” system that allows employees to let security teams know if they are ok and, finally, providing information that helps them get out of that situation.

Effective Mobile Worker Programs Rely on Elimination

When a critical event occurs, the first step a security team will do is determine who is not in danger. The beauty of today’s digital world is that everything is connected and many of the devices and technologies we use on a daily basis transmit data instantaneously that can be automatically acquired by commend center staff.

Everything from modest access control and badging systems to more sophisticated biometric systems that require fingerprint and facial recognition track specific employee movements between corporate buildings. Wi-Fi access points act similarly, providing location information linked to laptops, apps and other devices your employees connect to throughout your facilities.

Many enterprises find this to be their first major hurdle when implementing a mobile worker strategy as they use manual processes (call lists and spreadsheets) to manage their workforce. By tapping into these systems, companies can maintain a database of where their employees are and use that data for triggering automated incident communication.

The Importance of Panic Buttons

In the previously mentioned report, 78 percent of respondents said their leadership team would like them to confirm that all their people are safe and accounted for within an hour of a critical event and only 36 percent could do this today.

The mobile phone serves as the centerpiece to mobile worker security strategies so it’s important that employees download have the ability to send an SOS signal. If an employee finds him or herself in an active shooter situation, for example, panic button app capabilities are extremely valuable. Panic buttons have the capability of sending a message to an organization’s security team—automatically transmitting the employee’s location, as well as any shared audio and video with just the push of a button.

Multi-Modal Communications Approaches

If the check-in messages go unanswered, the first step security teams need to do is pinpoint their employees’ exact location(s). Many solutions allow businesses to use interactive, map-based message targeting to specifically define who will receive their communications.

Enterprises can’t rely solely on mobile phones as the sole communication channel for their strategy. It stands to reason that sudden, unexpected events could either see people without their phones or have them be unreachable due to damage to critical infrastructure. Businesses can utilize a number of alternatives including desktop alerts, public websites, Intranets, internal systems and social media.

What’s particularly important for mobile worker programs is the ability to integrate within a specific geographic location seamlessly. Organizations with globally distributed employees, contractors, customers or partners must be able to support local dialects, languages and preferred regional communication methods into their emergency alert systems. Organizations can reduce the difficulty of communicating tasks under pressure and increase recipient comprehension by delivering messages in a local language that is familiar to the recipient.

International travelers will require special strategies from businesses because notification systems must comply with local data privacy and security laws. This isn’t just a regulatory mandate; it’s a safety one as non-compliant systems won’t be able to deliver messages to at-risk workers in different parts of the world. These laws can differ by region and often restrict the transfer of data over country borders. Organizations should understand the regulatory landscape of any country its employees or partners travel within to ensure deliverability isn’t an issue during an emergency.

The speed of business isn’t going to slow down. Corporations should make investments in their workers’ safety— whether they are located within their office or in remote corners of the world. A sound mobile safety strategy could very well be the difference between life or death.

This article originally appeared in the July/August 2018 issue of Security Today.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3