Security Articles

The Rush to Hire in Security is Important, but the Rush to Train Needs to Take Front Stage

Read More
All Posts

The Rush to Hire in Security is Important, but the Rush to Train Needs to Take Front Stage

The recent Astroworld tragedy was truly a sad event that cost many lives. And while we sit here in the aftermath, investigators are beginning to uncover significant gaps in the capabilities of the security teams hired to work the event.

In some cases, the security officers didn’t have instructions on who their supervisor was, what their role was, and how to manage a crisis should an incident arise. While we are not going to investigate this incident itself, we will look at some of the key elements required to ensure that security teams train and prepare with risk in mind.  

  1.  Proper training is the most important component: We are currently in a hiring crisis in the security industry. Guard firms cannot get officers hired quickly enough to sit on a post, and when they go, they are driving to get them on the front line as soon as possible.  However, without proper training, you run a number of risks that can threaten your team's safety, and the safety of those they are there to protect.  Make sure that your hiring process includes an extensive onboarding program to ensure that officers are knowledgeable about not only their role but the post they will be working on.  Also, you want to make sure that when you schedule these officers that you are not putting officers on a post that they haven’t completely been trained on. 
  1. Proper post orders that continue throughout the shift:  Post orders are a critical component of the operation as they are the direct link from the command center to the front line. Having a solution that will drive post-order notifications in real-time with instructions and updates on the current situation will give the team a clearer picture of what is going on and how to handle the risk.  Failure to get information out can cause gaps in communication and result in challenges that threaten the safety and security of the operation. 
  1. Lone worker protection and proper dispatch methods:  The challenge with a distributed security operation is that with fewer and fewer resources, it’s hard to get officers coordinated to converge on higher-risk locations.  This is where having a good lone work communication and dispatch process is critical in communicating threats and getting a real-time response.  Whether it is a panic button, push-to-talk, or simple notification, an officer can immediately contact the command center and have them look for the nearest officer and dispatch them to the location to assist. This way, officers can converge on where the highest risks are and avoid safety and security issues. 

Could training and better communication have prevented the tragedy in the Texas concert event?  Perhaps, perhaps not; but there were definitely gaps in the security operation that contributed to the escalation of the events that happened there. Regardless, for your operation, there some of the tools and processes that can help create knowledgeable officers that can rely on the tools at their disposal to ensure that they are communicating, they are able to respond quickly to new threats and create processes to enable the team to converge on where the threats are and quickly de-escalate and mitigate the risk and help protect what matters, when it matters.

Tim Lozier
Tim Lozier
Tim Lozier is the VP of Marketing at Trackforce Valiant. Tim has an extensive background in software technology and has been involved in the development of leading-edge technologies and strategies for workforce management solutions. Tim is responsible for fostering the direction of and providing strategic leadership for Trackforce Valiant a comprehensive platform for workforce management, with uniquely tailored solutions for Time and Labor Management, Guard Touring Management, Billing/Payroll Management, and Human Resource Management.

Related Posts

3 Emerging Physical Security Technologies Shaping the Future of Private Security

From the humble beginnings of locks and keys, physical security has transformed over the years. Technological advances like RFID badges and facial recognition software have merged our digital and physical spaces. Security technology continues to evolve to stay one step ahead of increasingly intelligent and tech-savvy criminals. Several emerging physical security technologies will heavily impact the future of security in the next few years. Let’s dive into three of those advancements.

Call for Webinar Speakers & Guest Blog Posts

This is your opportunity to share your insights, knowledge, and experience with the Thinkcurity audience. The call for webinar speakers, guest authors, and article contributors for 2024 is now open!

Striking the Balance: Prioritizing Customer Service Without Compromising Security

A Customer-Centric Approach to Physical Security When organizations choose to invest in physical security as a service, they reap the benefit of not having to self-manage a security team while keeping their people, assets, and premises protected. However, it could be said that proper security protocols hinder customer service at times and an organization’s ability to create a positive experience for visitors. Stringent policies around entry or access can have customers feeling distrusted and uneasy. So how can security firms find the right balance between keeping up with proper physical security measures while still providing the best possible customer experience? The answer lies in taking a client-centric approach to security strategies that leave customers feeling heard and appreciated. Let’s dive into what those strategies could look like and why finding that balance is so important.