By Greg Hussey, Vice President of Engineering, SIGNET Implementing a sound security technology solution has never been more important. Yet making informed decisions can be overwhelming considering the amount of available security technology options. Regardless of how advanced or expensive, any security technology is essentially rendered useless if no one knows how to properly use it. As an example, in February 2018, we learned during the Stoneman Douglas High School shooting that an individual using the video surveillance system to inform first responders of the shooter’s location was mistakenly viewing pre-recorded video. This person assumed they were accessing the video surveillance in real time, but the shooter had already left the school campus. Emergency personnel was prevented from entering the building based upon this inaccurate information. It also has been reported that only one school resource officer had experience in the practical use of the school’s surveillance system while not even one staff member from the county Sheriff’s department had any prior knowledge of the system’s existence or operation, nor location of surveillance cameras. We have got to do better. No matter the setting: school, hospital, retail, office, etc., purchasing a security solution is only half of the solution. Those staff members selected to use these systems must be proficient with operating them – which requires training to be the number one priority. Prior to purchasing a security solution, consider the following:
- find solutions that can become an integral part of your day-in/day-out business
- weigh technology versus ease of use – you need to find a system that will provide the protection you need, but also will be easily utilized by on-site staff in an emergency situation.
- locate cameras that take into account not just the need for forensic video but the ability to track individuals throughout your facility
- make an integral part of the final solution multiple methods to administer and gain access to the system i.e. wi-fi, cell phones, personal computers, remote access, etc.
- implement a plan that requires the continual testing and, when possible, use of the system developed with all parties and stakeholders