Everyday threats like natural disasters, workplace violence, disgruntled employees, and cyber-attacks put your workforce, property, and operations at extreme risk. When these threats occur, you want to ensure your organization is prepared, protected, and ready to communicate.
Having worked with hundreds of clients to help them protect their workforce and their businesses, Agility Recovery would like to share the “Best Practices” we have implemented across our customer base to safeguard organizations’ business continuity. In this guide, our seasoned team of experts has provided business continuity methodologies and best practices to help you prepare for and respond to the following workplace emergencies. Read this post in its entirety and download our free guide that offers more detail on the four aspects of workforce safety.
1. Natural Disasters: How to Shelter-in-place
Often, when there is an imminent threat or hazard, the public is told to “shelter-in-place.” Sheltering in place is a precautionary routine to keep you as safe as possible while indoors during an emergency event. Someone who is not well-versed in emergency preparedness, however, may interpret the instruction as stay exactly where you currently are. That tactic could, in fact, put you in danger. Situations that may require you to shelter in place include natural disasters, accidental or intentional release of chemical, biological or radiological material; or an emergency safety situation, such as in the event of an active shooter. There are seven key steps to follow to effectively shelter-in-place at work. Download our free guide to learn more.
2. Hostage Situations: How to Prepare and Respond
Hostage situations and other acts of workplace violence are completely unpredictable. If you acknowledge the fact that one can’t be fully insured against a hostage situation taking place at your office, it’s time to define and plan what you and your team need to do in this situation. Unfortunately, many business owners do not consider planning for instances such as the hostage situation until it happens to their employees. The biggest misconception is that establishing a procedure for these types of events will cause panic among employees. With proper planning and training, your employees and teammates are more likely to respond to an emergency situation and be safe and sound. Emotions can get in the way, creating life-threatening conditions not only for the individual but everyone else. A risky situation such as this one needs to be handled with extreme care.
There are six proven best practices to improve safety for everyone involved in a hostage situation. Download our guide to learn the tactics.
3. Disgruntled Employee: How to Handle The Situation Before They Retaliate
Having a plan for workplace violence doesn’t indicate that you don’t trust your employees and coworkers. It means that your business cares about the wellbeing of your colleagues and want to protect them by implementing plans that will keep them safe in the worst-case scenarios.
a. Identify a disgruntled employee
To prevent an incident from happening, one must identify the signs indicative of anger or hostility. If an employee demonstrates open aggression, if they own weapons or talk about resorting to violence as a solution, then you have signs of a disgruntled employee. Although, the biggest sign and the most dangerous type of disgruntled employee is one with criminal activity, especially when it pertains to violence.
b. Handle a disgruntled employee
Once you have identified that person, it is imperative for you and the company to make this your top priority and handle the situation carefully to avoid the aggression from the employee.
We recommend the following four steps to avoid or mitigate causing additional issues. Learn about them in our Workforce Safety Guide.
4. Cybersecurity: Intentional vs. Unintentional Threats
When you think of a cybersecurity threat, you may recall a movie where the villain (or hero) intentionally breaks into a company’s network to steal sensitive documents or information. Hollywood does a great job of entertaining us by bringing these fictitious hackers to life in the spellbinding, edge of your seat stories. Intentional external hacking has increased over the past few years.
In 2017, the number of cyber attacks worldwide doubled to 160,000. And even though the loss of revenue and additional costs can come from malicious acts, frequently these events happen because of technical glitches or a human error.
While there are many instances where external hacking may be the case, there are also many threats that can be considered unintentional leaks of sensitive information. And these threats can happen from both inside and outside of your organization by both people and technology. There are certain types of unintentional and intentional threats. Our guide Keeping Your Workforce Safe explains the difference between the two.