Tips: Prepare For A Disaster

Your family may not be together when disaster strikes, so it is important to plan in advance: how you will contact one another; how you will get back together; and what you will do in different situations.

Family Emergency Plan

  • Identify an out-of town contact. It may be easier to make a long-distance phone call than to call across town, so an out-of-town contact may be in a better position to communicate among separated family members.
  • Be sure every member of your family knows the phone number and has a cell phone, coins, or a prepaid phone card to call the emergency contact. If you have a cell phone, program that person(s) as "ICE" (In Case of Emergency) in your phone. If you are in an accident, emergency personnel will often check your ICE listings in order to get a hold of someone you know. Make sure to tell your family and friends that you’ve listed them as emergency contacts.
  • Teach family members how to use text messaging (also knows as SMS or Short Message Service). Text messages can often get around network disruptions when a phone call might not be able to get through.
  • Subscribe to alert services. Many communities now have systems that will send instant text alerts or e-mails to let you know about bad weather, road closings, local emergencies, etc.
  • Sign up by visiting your local Office of Emergency Management website at http://www.ready.gov/america/local/index.html.

Planning to Stay or Go

Depending on your circumstances and the nature of the emergency, the first important decision is whether you stay where you are or evacuate. You should understand and plan for both possibilities. Use common sense and available information, including what you are learning here, to determine if there is an immediate danger. In any emergency, local authorities may or may not immediately be able to provide information on what is happening and what you should do. However, you should watch TV, listen to the radio or check the Internet often for information or official instruction as it becomes available.

Emergency Information

Find out what kinds of disasters, both natural and man-made, are most likely to occur in your area and how you will be notified. Methods of getting your attention vary from community to community. One common method is to broadcast via emergency radio and TV broadcasts. You might hear a special siren, or get a telephone call, or emergency workers may go door-to-door.

Emergency Plans

Use the New Online Family Emergency Planning Tool created by the Ready Campaign in conjunction with the Ad Council to prepare a printable Comprehensive Family Emergency Plan: http://ready.adcouncil.org/beprepared/fep/index.jsp.

Use the New Quick Share application to help your family in assembling a quick reference list of contact information for your family, and a meeting place for emergency situations: http://ready.adcouncil.org/beprepared/quickshare.html.

You may also want to inquire about emergency plans at places where your family spends time: work, daycare and school. If no plans exist, consider volunteering to help create one. Talk to your neighbors about how you can work together in the event of an emergency. You will be better prepared to safely reunite your family and loved ones during an emergency if you think ahead and communicate with others in advance.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.