Running the Gauntlet

Running the Gauntlet

Back to work needs to be well and good

Not long ago when visiting a colleague’s office, it was protocol to arrive early to run the gauntlet of the visitor management check-in that awaited, a process that might gladly be endured now if just for a brief return to some normalcy. Before the pandemic, many visitor management procedures were under scrutiny, with many organizations making visitor management improvements a top-level initiative. As we prepare our back-to-work efforts, visitor management will serve as the front lines for mitigating health risks in offices and facilities.

A TRUST RELATIONSHIP

Let’s take a step back. At its core, identity management helps an organization distinguish who it knows, while maintaining and improving this knowledge throughout an individual’s affiliation with the organization. When we make a new employee hire, for example, we use an I-9 or similar process by which we positively identify someone using government-issued identification. Often, background checks are in place to ensure suitability for the workplace, kickstarting a trust relationship rather than forming it organically over months and years.

Just as most organizations do not have the time to establish their employees’ identities and trustworthiness naturally, there is often less time for visitors. This is why visitor management is one of the highest-risk activities in a physical security program. The result of visitor management is an organization’s ability to routinely admit people they know the least about -- visitors who now walk among trusted employees -- as though the visitors were trusted in a similar fashion.

Prior to the pandemic, this risk was being addressed by “high assurance” visitor management systems. These systems work rapidly to establish a visitor’s identity, often before they arrive in the lobby. The day of the visit is preceded by continuous vetting and, upon arrival, the system binds a visitor to a high-assurance credential.

That credential allows for tracking of the visitor’s interaction with and passage through the access control systems also used by the employees. High assurance visitor management seeks to elevate identity management for visitors to mimic the degree of vetting that we already perform for employees. As COVID-19 vaccinations roll out and organizations form their backto- work plans, the need to balance identity management for employees and visitors has moved to center stage. Here’s why:

The word is suitability, but with a twist. In corporate identity management, suitability historically meant background checks on employees and occasionally visitors. At the most, forward-leaning enterprises and throughout the intelligence community, this is augmented with reputational data locally captured from previous interactions with a person and/ or behavioral deviations from a historical reputation baseline.

FAITH IN THE FUTURE

These are the generally accepted ways to gain confidence in suitability. It is often said that trust is faith in future performance based on past behavior, which is the way our brains are wired to trust. We listen more often to and believe in information that confirms what we want to believe.

Behavioral psychologists know this as confirmation bias. When it comes to making good security decisions, another aspect of our trust psychology works against us. The Harvard Business Review succinctly captures this in a 2009 article about rethinking trust: “Once we’ve made a decision to trust, we tend not to revisit it.”

These effects can be seen in our everyday lives right now. Our bias might lead us to believe our friends and families are at a lower risk of actively carrying COVID-19 than a coughing stranger in a store. These natural biases work against our ability to make good and repeatable security decisions, which challenges our back-to-work initiatives.

Organizations will ask their security teams to perform some degree of wellness checking on understandably anxious employees who just spent a minimum of a year and a half working from home. Employees will scrutinize security programs and back-to-work safety measures. An obvious area where a back-to-work program might falter is if an organization has different wellness requirements for employees and visitors. High assurance visitor management was designed to close the gap between the handling of employees and visitors in ways not seen by most employees. Wellness screening will now put disparities on full display.

Successful back-to-work initiatives necessarily include wellness screenings, which are the tip of the spear as we welcome people back into our spaces. However, not all wellness screening is created equal. Here are five things to consider as you move forward with your back-to-work initiatives. Pay special attention to the areas visible to your employees. Direct observation will help employees gain confidence in workplace safety.

Wellness is the new suitable. While wellness is a new dimension of suitability, it does not replace background checks. Background checks continue to be essential for higher security facilities. Wellness checking is important for every facility.

Wellness is a temporal and dynamic attribute. Wellness screenings must occur daily, as today’s results have no bearing on tomorrow. Employees we know and see in the office daily represent the identical wellness risk as a visitor we have never seen before. Wellness screenings must be done for everybody -- every day -- using the same process and same tools. If any person will be accessing any part of a facility where any of your employees might be, wellness screening must be done.

Wellness screening is for, not by humans. In any security discipline, the decision between manual security controls and investment in automated controls is expressed in two questions: Is this a repetitious activity (and inherently risks degradation over time)? What is the impact/cost of any failure of the control? Even without the bias challenges, wellness screening should not be performed manually.

Wellness screening can be efficient. Security programs have tried to make physical access and visitor management as low friction as possible and should do the same for wellness screening. Wellness screenings are here to stay, as we do not know what pandemic episodes loom in our future. If you make this necessity bearable, it won’t befall the same fate as other security initiatives that didn’t take user experience into account. A wellness screening process too cumbersome will first suffer active attempts to circumvent it, maturing to subversion and naturally concluding with abandonment.

Make wellness matter. Security programs measure the effectiveness of their security controls. If a wellness screening capability has no discernable effect, it will be both ineffective and obvious to the entire organization that it is just security theater. Demonstrating that wellness screening affects access to the facility in an automated way can generate confidence in the safety of a workplace.

An organization that implements a capability to automatically disable facility access for those who fail wellness screening (or disable access for everyone nightly) can inspire confidence with this suitability information. In this context, wellness screening is due diligence. Doing something with the knowledge gained is due care. Considering how liability has historically been apportioned in similar situations, this requires careful examination by risk, legal and human resource departments.

The best security capabilities deployed in recent times all share one quality: innovation. Systems that achieved their protective goal but brought other added value in so doing. As security practitioners, we should be looking for ways to do this. Back-to-work represents a possibly once-in-a-career opportunity to address a risk that no one has worked on before. Managing ever-changing and evolving risks is our norm. It’s up to us to make back-to-work, work well.

This article originally appeared in the April 2021 issue of Security Today.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.