• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Professional Security Officers, Security Guard Services

Professional Security Officers, Security Guard Services

Sunstates Security

  • OUR SERVICES
    • Security Personnel
    • Specialized Markets
  • OUR APPROACH
    • Employee Engagement
    • Management Engagement
    • Training and Safety
    • Quality Assurance
    • Strategic Partners
  • WHY SUNSTATES
    • Founding Principles
    • Executive Leadership
    • Testimonials
    • Gallery
  • RESOURCES
    • News
    • Newsletter Subscriptions
    • Tools
  • CAREERS
    • Selection Process
    • e-Learning: Your Career Path
    • Employee Benefits
    • Apply Online
  •  CONTACT 
  •  EMPLOYEE 

Managing Modern Threats with Protective Intelligence

May 1, 2018

Managing Modern Threats with Protective Intelligence

managing modern threats Sunstates Security CompanySocial media makes it easier than ever for like-minded individuals not only to find one another, but also to organize demonstrations for their cause. Consequently, more companies are calling on security partners for assistance in identifying and preparing for pop-up protests and other potential disruptions. Technology can provide advance warning of such threats, but skilled human intervention continues to play a critical role in analyzing data and developing a sound strategy for risk management.

Sources of Intelligence

Advances in technology make security operations centers (SOCs) more affordable than ever, often providing in-house intelligence as needed. At the same time, organizations have other excellent information sources at their disposal for a fraction of the cost.

 • Local partnerships. The same technology used to organize protests and other demonstrations also keeps the public informed of local developments. Many law enforcement agencies have email alert systems to notify residents of unusual conditions, such as extreme weather, vehicle accidents, and police activity. Most large cities have downtown alliances for businesses and other organizations that operate in these districts; information-sharing among members is an important benefit. In addition to these publicly available resources, private security teams should cultivate strong working relationships with local authorities, which encourage a two-way flow of information.
 • Social media monitoring. Instead of relying on public alerts, more organizations are monitoring and analyzing social media activity, often through a partner with the tools and skills required to mine the raw data. Such monitoring efforts frequently focus on a specific geographic area for a discrete period of time. For example, social media monitoring can provide real-time intelligence to support traveling executives and company events or to prepare for public reaction to current affairs, such as the student protests following the Parkland shooting.

Planning and Prevention

Securing advance warning is only the first step. Managing potential threats requires more finesse than increasing the security staff in response to possible demonstrations.

• Staff management. While additional personnel may be required, a large, visible security presence may have the unintended effect of antagonizing protesters. Organizations should develop a strategy for making additional support available and ready to respond, without fueling already-high tensions.
• Building security. In some cases, it might make sense for an organization to go into lockdown mode and to prevent public access during a planned event. Even during a peaceful gathering, companies should have a plan for managing practical concerns, such as access control for employees and visitors and public runs on the restroom facilities.
• Training. Long before any potential threat materializes, security team members should complete training on non-violent crisis intervention. This specialized training teaches individuals how to defuse challenging situations before they escalate into crises.

To learn how Sunstates Security can assist your organization, please call 866-710-2019 or contact us.

Primary Sidebar


Categories

  • Awards
  • COVID-19
  • Security News
  • Sunstates News
  • Team
  • Uncategorized

Follow Us On Facebook

Footer

     

 

801 Corporate Center Drive
Suite 300
Raleigh, NC
27607
Toll Free: 866-710-2019

 

 
LICENSES:
CA - PPO120751,
VA-11-2948,
Texas B11167; A10515101; F01339
Illinois #122.001562
Nevada #3064

Copyright © 2023 · Sunstates Security All Rights Reserved · Privacy Statement · Disclaimer · Opt-Out Preferences

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
 

Loading Comments...
 

You must be logged in to post a comment.