SAFEVISITOR BLOG
Is your security toolkit complete?
One of the things that separates law enforcement professionals from average civilians is how the two groups approach a situation. When the average person walks into a building, his or her attention tends to be focused solely on the destination or the purpose for the visit. But when a police officer enters the same building, he or she instinctively scans in every direction, looking for any potential threat sources, mapping out escape routes, and evaluating what’s happening.
Similarly, when businesses or organizations talk about security, they tend to talk about specific things. Maybe we need cameras. Or a badge system. Or a stronger door. But when those of us who have worked in law enforcement talk about security, we take a more holistic approach. That’s because true security encompasses many different elements that work together in a synergistic fashion. Any one of those elements offers some protection; multiple elements work together in ways that provide a much higher level of safety.
When I’m asked about how a school, a company, or another organization should approach facility safety, I suggest they develop what I call a security toolkit. Just as your toolkit at home includes a variety of devices to help you perform an even wider variety of tasks, your security toolkit should include multiple items that address many different aspects of security. What are the tools that belong in your kit?
Start with a Security Assessment. Invite a professional consultant or local law enforcement to walk through your facility, identify potential vulnerabilities, and make recommendations.
Create a Policy. A security policy explain the reasons behind security, everyone’s responsibility, and the steps to take when something goes wrong, such as who is authorized to dial 911. When people aren’t sure how to approach a situation, that policy provides guidance.
Threat Assessment Team. Create a group from your organization (and possibly pair them with representatives from local law enforcement). Give them the responsibility to think about and identify the threats your organization might face and steps that could be taken to address them.
Background Checks. You won’t be surprised that the head of a background check provider advocates background checks, but it’s one of the most effective ways to prevent problems. A resume tells you how someone wants you to think about them, but a background check can share what they don’t want you to know.
Visitor Management. If someone doesn’t belong in your facility, you shouldn’t let them in. If you do allow them to visit, you should know where they are and what they’re doing. Formal systems like SafeVisitor help, but you can also use policies such as ensuring that visitors are always escorted through your facility.
Anonymous Reporting. After most workplace shootings, we hear that someone knew that something wasn’t right, but they were afraid to say anything. So provide ways that employees can call attention to strange behavior or situations without having to identify themselves. An employee who jokes about bringing a gun to work probably isn’t kidding around.
Integrated Communication. Have the equipment and processes in place so decision-makers and first responders can communicate clearly in an emergency situation.
Training. The training your team needs depends on your situations and activities. For example, if your team members travel frequently, make sure they know how to protect themselves on the road. Also provide training about domestic violence awareness, so employees can recognize when there’s a problem and so the entire team knows how to protect victims.
Hardware/Construction/Renovations. This is the physical part of your toolkit, eliminating and minimizing vulnerabilities by using technology and physical alternations to your facility. No single approach is right for every organization. Make your choices based upon the vulnerabilities your assessment identifies.
Finally, your security toolkit should also address what you’ll do if your security is breached. We’ll hope that your security toolkit prevents that from happening, but it’s wise to have a plan just in case.
Contact us for more information on creating a security toolkit.
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019