Is It a Crisis?

All organizations are vulnerable

The phrases critical communications and crisis communications are used interchangeably. However, they are synergistic building blocks. To understand both of these phrases, first take a look at the business objectives behind crisis communications. After doing this, there will be a scorecard for selecting a critical communication system. The scorecard will address Intelligibility, Interoperability, and several other “ilities” which should be considered.

CRISIS COMMUNICATION

All organizations are vulnerable to a crisis. Examples include Fukishima, BP Deepwater Horizon, Jack in the Box, WikiLeaks, and most recently the San Bernardino terrorist attack.

Trying to identify potential crisis situations is not easy and easily avoided by the tyranny of the urgent. For example, in Max H. Bazerman and Michael D. Watkins’ book “Predictable Surprises” they describe a situation or circumstance in which avoidable crises are marginalized in order to satisfy economic and social policies. They define a predictable surprise as a problem that at least some people are aware of, is getting worse over time, and is likely to explode into a crisis eventually. The best way to prepare for a crisis situation is by conducting an all hazard risk, threat and vulnerability assessment to identify potential risks which can have a significant impact on the enterprise. If you do not prepare, you will incur more damage. Without adequate internal and external communications operational response will fail, stakeholders will react negatively, management of the incident will be noticed as incompetent, and the length of time to resolve the incident and return to normal will be of greater duration and exponentially more expensive.

CRITICAL COMMUNICATIONS

Having been involved in numerous post incident reviews, there always seems to be one overarching issue that applies to critical communications breakdowns. These breakdowns always start with one or more people who needed to communicate something and, for one reason or another, were not heard. This could be inbound or outbound communications.

Detection and reporting of critical incidents require robust inbound communications. Inbound communications can come from local first responders, weather notification services, emergency management services, and most importantly from employees, visitors and other stakeholders. These folks should never be more than a few steps away from being able to report a problem. We cannot responsibly respond to a crisis situation if we are unaware that a crisis situation exists. As a caution do not disregard your employees and visitors as first responders. They have a vested interest in their safety and security and when properly trained and provisioned can be a force multiplier in rapid response and resolution to emerging events. What they need from you is the means to communicate.

Outbound communications are the communications we use to instantly notify, fire, police, crisis management teams, decision makers, employees, visitors, and stakeholders. Further, outbound communications facilitate cooperation for effective and efficient responses. Additionally, outbound crisis communication permits your crisis management team and first responders to organize an efficient response to contain the event and control panic.

DEFINING THE SCORECARD FOR SYSTEMS SELECTION

So, what are the tools we need to put in the hands of the stakeholders?

Interoperability. Are you able to integrate voice and messaging into your core security systems such as access control and video? Do you have the systems or have you considered the systems which allow for two-way integrated mass communications? These include computer desktop technologies, mobile devices, public area devices which permit rapid communications such as campus open areas, parking areas, and public venues? Does your system leverage social media tools and applications?

Intelligibility. Do not install systems that cannot meet the need to hear, be heard and be understood within any situation. Benchmark this across all vendors. You will see a broad spectrum of audio capability. Many security executives have rued the day they deployed based on a response to an RFP, without testing this core capability.

There is nothing worse in a crisis situation than not being able to understand someone who is trying to communicate critical information. Have you considered the various factors which impact critical communications such as background noise, reverberation, distance and stress (such as someone who may be screaming)? Do your systems allow for intelligibility, clarity and articulation?

Portability of Data. Data and data analytics are crucial to any crisis event and should be considered in three contexts; before the crisis occurs, during and after.

We all know what failure in crisis communication looks like. All you have to do is tune in to any news outlet to quickly understand failure. We also know what success looks like. During the recent terrorist attack in San Bernardino 14 people were killed, however more than 3,000 were saved. The success of the 3,000 was attributed to having a plan, communicating the plan, training the plan, and having the multifaceted layers of communication which facilitated an orderly and rapid evacuation while simultaneously notifying emergency first responders.

At the end of the day, if you considered the various crises which can impact your enterprise, planned and trained a response, and can clearly and intelligibly communicate between people across platforms to ensure the safety and security of your employees, visitors, and stakeholders while assuring the continued success of your organization, then when I watch the news will I see you as a success.

This article originally appeared in the September 2016 issue of Security Today.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.