Sunday, January 24, 2010

Soft Targets Are Elevated In Luxury Hotels

While large occupancy hotels focus more on conference services and large groups, however, luxury hotels are more focused in providing individualized services. Luxury hotels cater to a clientele that is very demanding in their services and products they use. This poses many problems and emphasizes soft targets. Soft Targets are those organizational entities wherein security proactive measures are not the highest within the organization's objectives whereas security measures do not coincide with budgetary constraints.

There is large human traffic in general population areas, this holds true even more so with convention hoteliers and often within management practices in convention hotels. Hotels fixed location normally with limited exit strategies, and shallow security proactive measures and perimeters are most vulnerable. Hotels in general are considered soft targets, however, within luxury hotels, this can be elevated due to the heightened service oriented environment that has potentially large threats in access.

Because of these threats, improvements must be made to address the casual environments hotels soft targets seem to convey. Security measures can improve through awareness of daily activities of guests and patrons, collaboration with local law enforcement agencies and emergency response teams, and informed and trained staff members of situational awareness and emergency response procedures. This process requires security practices that embrace the importance of asset protection and investing in the security upgrades that will provide products and services to act as proactive measures rather than reactive measures. And although, security departments are under budgetary constraints most of the time, it is often the last department that funding applies to rather than automatically planned for. The toll of asset loss has been great, especially in monetary value, however, investment in security, most particularly in the hotel industry, proves both to guests and patrons of hotels that management has a commitment to their overall safety and protection.

Stay safe!

Sunday, January 17, 2010

Yesterday’s Lessons and Tomorrow’s Application

As we ushered in the twenty first century, many sectors of society held high degrees of apprehensiveness and anxiety about cyber and real world criminal activity that would disable many sectors with the Y2K bug, and other possible criminal elements. The first decade of the twenty first century introduced American to terrorist organizations such as Al Qaeda and those fragments that support a philosophy and direction of criminal activity that devalued life to emphasize its agenda. The ripple effect and its consequences gave way to the re-prioritization of security and its role from back drop and least concerned to the forefront of operational significance, not just in cyberspace but in many other segments, e.g. airports, subways, interstate commerce, and historic sites throughout North America.

Yes, the first decade was special and the events that transpired were memorable, but if we cannot gain insight from those lessons learned, then how are we to progress and apply those teachings into applications wherein we demonstrate our new found knowledge.
Security operations and its application, regardless to its origin, is crucial to the assurance we have polices and procedures in place to employ proactive measures that prevent the destruction of assets and the obliteration of human life to support criminal agenda.

The old saying, “Time Waits for No Man” is applicable in the security industry because it says that we cannot be apprehensive nor indecisive about the lessons gained from past vulnerabilities and the implementations of those polices and procedures that corroborate conceptualization, training, and implementation, of sound direction for security that protects against terrorism, both foreign and domestic. However, the second decade appears to be heading into redundancy of the first unless we learn from our mistakes and create innovative security solutions. The lessons learned failed yet again and we are again faced with organizations that have no trepidation about engaging in activity that place humans into harms way or the probability of asset loss.

It behooves us as an industry to re-evaluate lessons learned and applications of sound management practices and policies implementation that demonstrate we can now move in the direction that alleviates ambiguity in security efficiency, effectiveness, and operational significance. Robinson Security Consultancy (RSC) finds its role in this process to be a competent information provider; information that facilitates industry practice and sound application that exudes proficiency and expertise.

Friday, November 20, 2009

Situational Awareness and Security Competency

One of the key factors that evaluate the level of organizational efficiency in its security operations is the ability of the organization to instill in its personnel the significance of environmental dynamics. The educational processes of personnel of how these variables impact the approach to a given scenario and how its resolution is weighted heavily upon organizational training and industry knowledge. A training concept, Situational Awareness (SA), involves being aware of what is happening around you, to understand how information, events, and your own actions will impact your goals and objective, both now and in the very near future.

Gaining in-depth insight on this process is a valuable knowledge-base of an organization’s emphasis on continual security training of heightened security discernment. Comprehending the needs of the client(s) in conjunction with the proper application of expectations versus reality renders successful goal attainment. A security professional must continuously demonstrate clarity and relevancy of the current sate in order to manage tactical situations. Moreover, it is just as vital to communicate to the client(s) what is functionally appropriate for the level of security desired.

When evaluating this method, it becomes essential that the more enlightened the security professional is to the environmental dynamics, the increased probability that sound decision making will be the end result. The consequences of failed or inadequate SA techniques can be detrimental to an individual and/or group’s ability to appropriately function within a given environment, thus its ramifications can be irreversible. To posses comprehensive, error free and the most up to date SA is critical when engaging technological and situational perplexities and decision making becomes the focal point.

When new information or situations arise, professionals must be able to be flexible in delivering solutions and understand consequences of decisions in order to take appropriate action in critical situations. For the security professional the application of SA can be a difference maker and a developer of loyal consumers for quality service.


References:

Dostal, B. C. (2007). Enhancing situational understanding through the employment of unmanned aerial vehicles. Army Transformation Taking Shape ...Interim Brigade

Combat Team Newsletter, No. 01-18. Retrieved November 7, 2007, from http://www.globalsecurity.org/military/library/report/call/call_01-18_ch6.htm

Fracker, M. L. (1991b). Measures of situation awareness: Review and future directions (Report No. AL-TR-1991-0128). Wright-Patterson Air Force Base, OH: Armstrong Laboratories.

Moray, N. (2004). Ou sont les neiges d'antan? ("Where are the snows of yesteryear?"). In D. A. Vincenzi, M. Mouloua & P. A. Hancock (Eds), Human performance, situation awareness and automation: Current research and trends (pp. 1–31). Mahwah: LEA.

Monday, July 27, 2009

Security Training for ALL staff members

ABC's Good Morning America captured on video (link below) very frightening but yet common security incidents at two hotels. This happens all too often because the understanding of security is under-represented. Security belongs to ALL staff members at any facility. In the video, housekeeping, valet, bellman all were the targets for a crafty and relaxed con by security analysts. Hotels and other facilities that interact or house guests should readdress security training. The emphasis should be placed on procedures. Follow procedures and protocols for ANY and ALL guests related issues. This is absolutely a deterrent for any potential crime.

In the video, clearly ALL staff members were too trusting that could have been potentially fatal in both cases. But, not only is hotel staff (housekeeping, valet, bellman, etc.) should be trained, but executives and top managers so that all understand the importance of security, not only for our guests, but for employees and the company. Marketing should be aware of such incidents to advertise or communicate security efforts to existing and loyal customers. Front office could perhaps emphasize safety upon check-in and communicate hotel policy for requesting entrance without a key. If everyone is involved, exercising security processes will not only benefit the guests, but will encourage safety stewardship.

Re-examine your security procedures and perhaps hold quarterly/semi-annual refresher courses for everyone. Better Safe than sorry!


References:
Hotel Security GMA video

Wednesday, July 8, 2009

Successful Venue Security through Collaboration

Providing security services for large and/or unorthodox venues can present challenges. Achieving success in such venues requires the organization to often think on a collective or unified scale. The culmination of conceptualization, planning, implementation and follow through of security services is a collective enterprise. This endeavor can be achieved with the development and fostering of joint organizational partnership with local and state operated security and/or law enforcement entities. The most critical component to this process is establishing and cultivating an effective communication channel wherein respect is extended toward those law enforcement and/or security organizations that are now serving as allies.

Security operations in unfamiliar jurisdictions require the forging of commonality with the lead organization’s interest in extending to the client sound security practices. Therefore, garnishing support with partners becomes a must. Accomplishing this endeavor will call upon the lead security organization’s ability to value the contributions of those organizations in their expertise. Remember, the organization spearheading the effort toward ascertaining data about this venue and the most efficient application of S.W.O.T. (Strengths, Weakness, Opportunities, and Threats) analysis, must do so to avoid scenarios of ambiguity and complexity. In conclusion, the most effective methodology of addressing the venue and the needs of the client is providing services rendered in a unified methodology, appreciating the collective contributions of local or state law enforcement and/or security organizations that can facilitate a successful conclusion or preclude an unforgettable debacle.

Related Articles:
1. Daniels, Rhianna.
Securing History. July 7, 2009. http://www.securitydirectornews.com/?p=article&id=sd200907dy1s2V
2. Long, Josh.
Political Protection: Securing the 2004 Conventions. http://www.publicvenuesecurity.com/articles/451feat1.html
3. Hall, Stacey.
Effective Security Management of University Sport Venues. http://www.thesportjournal.org/article/effective-security-management-university-sport-venues

Friday, July 3, 2009

Documentation critical in Security liabilities

One key component of security operations and its efficiency regarding service delivery is documentation. This area directly and indirectly impacted by documentation and its contents are not only protecting information deemed proprietary; the documentation generated can be used in civil and criminal court proceedings. Therefore we must assure its accuracy and thoroughness for recalling incidents and abnormalities that impact operations of the department, division, and/or organization as a whole. A point of emphasis to note, in order for security operations to be a vital component of business operations, processes directed toward problem resolution must be redirected from the reactive methodology often observed, to cultivating and fostering a proactive philosophy in all aspects of conceptualization, planning, training and implementation. This point of emphasis is especially vital in the area of documentation.

Monday, June 29, 2009

Ultra Luxury Hotels Go High-Tech

As we move forward into the future at an accelerated rate, technology becomes the key component for this advancement. This rapid acceleration is even more so a reality in the security industry and the service rendered to the consumer. For the ultra luxury hoteliers there is more technology induced connection with key systems that are biometric (retina and fingerprint) and alleviates the probability of fraudulent activity. Because many ultra luxury properties serve the dual destination of hotel and private residences, these systems are a very efficient end effective tool, due in part because of its high-tech access footprint to combat criminal elements. The investment pays for itself immediately and more and more establishments are looking at high-tech components to bring high and fast ROIs. Safety is the ultimate goal, but tracking any criminal activity is a great deterrant to uninvited activities.

High-Tech gadgets helping secure your assets and give you peace of mind.

Stay Safe!