Top Mistakes Companies Make When Managing a Security Workforce

Top Mistakes Companies Make When Managing a Security Workforce

There’s an age-old saying that goes something like this: If you’re going to do it, do it right. With global demand for security services forecast to increase 6.9 percent annually—and no signs of it slowing any time soon—security companies of all sizes are facing the need to adapt to rapidly changing customer requirements, demographics and technology landscapes. Never has the need to “do it right” been greater.

Gone are the days of paper-based note-taking and incident reporting, or hiring four guards to cover the role of one. Today’s security companies need to be more efficient and responsive, including being better at scheduling resources. Not only are they required to dispatch the right guard to the right site at the right time to do the right things, but clients are asking to see data to justify annual security spends and help with future planning.

Expectations are changing and security companies need to step up. Based on my many years of experience as a security service provider and corporate security manager as well as the experience of my company, TrackTik Software, in helping organizations maximize the efficiency and effectiveness of their security personnel around the world, here are what we have found to be the top mistakes security organizations make when it comes to growing and managing their workforce—and how to avoid them:

Neglecting to account for human behavior. There’s a perception in the industry that a security guard is a transitory job, prone to high turnover. To reduce the risk of being short-staffed, companies tend to hire more resources than necessary. A better tactic to avoid over-staffing, improve job satisfaction and productivity, and decrease turnover, however, is to get to know the personal preferences and behaviors of each of your guards, and use that information to optimize scheduling.

For example, if employee A is more comfortable working at a concierge desk and prefers the day shift, you shouldn’t be calling that person to patrol an empty industrial lot overnight. There are tools that can help with this kind of strategic scheduling, and using this approach, you will find that your employees are happier, better focused and more motivated to do good work—contributing to an overall more efficient operation.

Failing to remove mundane tasks. If you’re managing a security workforce and you’re not already taking advantage of technology to automate repetitive tasks, it’s only a matter of time before your business stagnates. Your guards will lose interest and your operational costs will be too high to stay competitive. The goal is to identify where and when technology can augment your security processes and then rely on human intervention only for those tasks that require it.

It is impossible for people to pay full attention, 100 percent of the time, but if you let machines do the mundane work while your guards focus on decision-making and response, you’ll get their focus when you need it most. This approach will also help drive workforce engagement, which is key in an industry prone to staffing shortages.

Implementing technology for technology’s sake. From cameras to access control readers to interactive voice response systems, there are so many neat and fun technologies available, it’s easy to fall into the trap of purchasing the latest gadget to solve a one-off problem without considering the big picture first. A standalone call-in system may help to boost incident reporting, for example, but to really impact your bottom line, it needs to be integrated into your overall workforce management platform so that you can collect, store and report actionable data about those incidents.

Before making a technology purchase, it’s important to understand the problem you’re trying to solve. It doesn’t make sense to purchase the latest in automated detection technology if you don’t have the integrated systems in place to ensure a timely, coordinated human response will follow.

Overlooking the value of data. Traditionally, guard services were sold at an hourly rate. Clients wanted to know that a guard would be on site at a specific time, without necessarily questioning the benefit. In today’s data-driven world, this scenario is changing. Corporate executives want to know specifics about the service they’re receiving for their annual security budget—from the type and number of incidents reported to the time of day when most incidents are likely to occur.

The more that a security service provider can present information to show where resources are best used, and where money can be saved, the more likely they are to retain the clients’ business. Ask yourself: am I providing information or intelligence? Don’t let your data hide in plain sight. Make sure you are using the right business intelligence tools to first collect that data and then turn it into a meaningful report that can be used for decision making.

Not aligning security with corporate goals. Corporate security is no longer viewed as made up of “corporate cops,” but rather, as an internal service, integral to a company’s overall performance. As a security service provider, you need to routinely review your clients’ corporate goals and objectives, and show how a security service can help to reach them. As an example, if Human Resources is focused on creating a safe work environment, offer to provide employee escorts to the parking lot at night and contribute to the overall corporate goal of a higher employee net promoter score (eNPS).

Ignoring security as an important business function. There’s growing evidence that Enterprise Security Risk Management—the practice of managing a security program through the use of risk principles— needs to be fully integrated into corporate processes at every level of business. If you don’t establish organizational policies, procedures and best practices to identify and manage corporate security risks, you won’t be properly equipped to mitigate them. It’s important to remember the 90/10 rule: 90 percent of effective security measures are policy and procedure related, only 10 percent has to do with technology.

From small local shops to large multinational security service providers, the biggest change in security workforce management is the transition to generate and collect data, right down to the guard activity level. Guards are often the biggest spend of a security program and forward-thinking executives are demanding insight into how that money is used. The better equipped you are to deliver business intelligence about the security service you provide, the more you’ll be able to demonstrate the true value of security as a business function.

This article originally appeared in the April 2019 issue of Security Today.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3