Monday, July 27, 2009

Security Training for ALL staff members

ABC's Good Morning America captured on video (link below) very frightening but yet common security incidents at two hotels. This happens all too often because the understanding of security is under-represented. Security belongs to ALL staff members at any facility. In the video, housekeeping, valet, bellman all were the targets for a crafty and relaxed con by security analysts. Hotels and other facilities that interact or house guests should readdress security training. The emphasis should be placed on procedures. Follow procedures and protocols for ANY and ALL guests related issues. This is absolutely a deterrent for any potential crime.

In the video, clearly ALL staff members were too trusting that could have been potentially fatal in both cases. But, not only is hotel staff (housekeeping, valet, bellman, etc.) should be trained, but executives and top managers so that all understand the importance of security, not only for our guests, but for employees and the company. Marketing should be aware of such incidents to advertise or communicate security efforts to existing and loyal customers. Front office could perhaps emphasize safety upon check-in and communicate hotel policy for requesting entrance without a key. If everyone is involved, exercising security processes will not only benefit the guests, but will encourage safety stewardship.

Re-examine your security procedures and perhaps hold quarterly/semi-annual refresher courses for everyone. Better Safe than sorry!


References:
Hotel Security GMA video

Wednesday, July 8, 2009

Successful Venue Security through Collaboration

Providing security services for large and/or unorthodox venues can present challenges. Achieving success in such venues requires the organization to often think on a collective or unified scale. The culmination of conceptualization, planning, implementation and follow through of security services is a collective enterprise. This endeavor can be achieved with the development and fostering of joint organizational partnership with local and state operated security and/or law enforcement entities. The most critical component to this process is establishing and cultivating an effective communication channel wherein respect is extended toward those law enforcement and/or security organizations that are now serving as allies.

Security operations in unfamiliar jurisdictions require the forging of commonality with the lead organization’s interest in extending to the client sound security practices. Therefore, garnishing support with partners becomes a must. Accomplishing this endeavor will call upon the lead security organization’s ability to value the contributions of those organizations in their expertise. Remember, the organization spearheading the effort toward ascertaining data about this venue and the most efficient application of S.W.O.T. (Strengths, Weakness, Opportunities, and Threats) analysis, must do so to avoid scenarios of ambiguity and complexity. In conclusion, the most effective methodology of addressing the venue and the needs of the client is providing services rendered in a unified methodology, appreciating the collective contributions of local or state law enforcement and/or security organizations that can facilitate a successful conclusion or preclude an unforgettable debacle.

Related Articles:
1. Daniels, Rhianna.
Securing History. July 7, 2009. http://www.securitydirectornews.com/?p=article&id=sd200907dy1s2V
2. Long, Josh.
Political Protection: Securing the 2004 Conventions. http://www.publicvenuesecurity.com/articles/451feat1.html
3. Hall, Stacey.
Effective Security Management of University Sport Venues. http://www.thesportjournal.org/article/effective-security-management-university-sport-venues

Friday, July 3, 2009

Documentation critical in Security liabilities

One key component of security operations and its efficiency regarding service delivery is documentation. This area directly and indirectly impacted by documentation and its contents are not only protecting information deemed proprietary; the documentation generated can be used in civil and criminal court proceedings. Therefore we must assure its accuracy and thoroughness for recalling incidents and abnormalities that impact operations of the department, division, and/or organization as a whole. A point of emphasis to note, in order for security operations to be a vital component of business operations, processes directed toward problem resolution must be redirected from the reactive methodology often observed, to cultivating and fostering a proactive philosophy in all aspects of conceptualization, planning, training and implementation. This point of emphasis is especially vital in the area of documentation.