Ensuring Safety and Reducing Disruptions
With Election Day only a week away, businesses and community leaders are in the final sprint to prepare for any potential disruptions. While there may not be time for long-term strategies, impactful, practical steps can still help keep teams and property safe. And remember, political unrest can extend beyond Election Day—leaders should stay vigilant through at least inauguration day, or further. Here’s how to use this week effectively to safeguard your organization.
Revisit and Reinforce Your Crisis Communication Plan
A strong crisis communication plan is essential in a high-stakes environment. Use this week to review and ensure that emergency alerts, PA systems, and messaging groups are up-to-date and ready to deploy.
- Prepare Messages Now: Draft clear, reassuring messages for scenarios like shelter-in-place orders, lockdowns, or early closures.
- Assign Roles: Ensure each team member knows their communication role, whether it’s alerting employees or coordinating with local authorities.
For a quick reference on effective crisis communication, see our guide here.
Secure Your Premises for Immediate Protection
With limited time, focus on practical, high-impact steps to secure your physical environment. Review access points, locks, and ensure cameras are positioned in high-visibility areas.
- Control Access: Limit entry points and verify that only authorized personnel have access. Pre-authorize security and engineering teams to lock down entry access when necessary.
- Enhance Surveillance: Place visible cameras in high-traffic areas and test systems to ensure they’re working properly.
- Reduce Risks: Secure high-value or sensitive items out of sight, and remove any objects that could aid in unauthorized entry or property damage.
- Add Temporary Barriers: Consider temporary fencing if protests or large gatherings are expected nearby.
- Notify Tenants and Customers: Inform all stakeholders about your safety measures and let them know updates will follow as needed.
For more guidance, check out our article on securing businesses during public events.
Connect with Local Authorities and Security Teams
Even with limited time, a quick call or email to local law enforcement or security partners can go a long way. Being on the same page helps ensure quicker response times and effective communication.
- Quick Check-In: Touch base with local authorities to learn about any planned election presence or strategies.
- Update Contacts: Ensure employees have the latest emergency contacts, and that key personnel know whom to contact in a crisis.
Brief Employees on Safety Protocols and Options
Hold a brief, focused meeting with employees to cover actionable safety procedures and provide reassurance.
- Review Protocols: Go over shelter-in-place procedures, evacuation routes, and any temporary changes to entrances and exits.
- Clarify Remote Work Options: Remind employees about any remote work policies in case of increased activity near your location.
- Prepare Support Personnel: Inform security and facilities teams about the possibility of extended shifts or blocked access, allowing them to plan accordingly.
Plan for Follow-Up Beyond Election Day
Election-related tensions can linger, so maintain extended vigilance through early January. Consider scheduling a post-election debrief to assess your protocols and keep the team prepared.
- Extend Surveillance: Keep crisis communication plans and safety protocols on standby beyond Election Day, as incidents may arise well into January.
Conclusion
In this final stretch, effective preparation is key to maintaining organizational stability. By reinforcing security, guiding your team, and staying prepared for the longer term, you’re creating a safer environment for all. Chesley Brown is here to support your planning and security needs—connect with us today to discuss strategies for keeping your team safe and operations smooth.
Sign up!
For industry-leading guides and analysis sign up for our blog below.
Latest News
Podcast | Risk Takers Series #04 Brad Orsini – Community-based Security
Visiting our places of worship shouldn’t be dangerous. Unfortunately, faith-based organizations are facing the difficult challenge of how to protect their congregations from religion-motivated violence, and still maintain the welcoming, open environment community members expect.…
Read MorePodcast | Risk Takers Series #3 Surveillance Detection Routes (SDR)
Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It’s a frightening thought. You’ve spent years building your business, but all it takes is one…
Read Morerisk-takers #3 Surveillance Detection Routes (SDR)
Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It’s a frightening thought. You’ve spent years building your business, but all it takes is one bad day to compromise that dream. In this week’s episode Brent sits down with FBI Special Agent (Ret.) Dell Spry to discuss surveillance detection routes, what they are, and how they can be used as a spy detector device to find out if you are under surveillance.
Read MoreHow to Prepare for Economic Risk
Best Strategies for Building Resiliency How to position your business for uncertainty If there is one aspect of business that is certain, it’s uncertainty. It might also be the understatement of the year to say…
Read Morerisk-takers #2 Terry Fisher — Electronic Countermeasures
Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business with a product or service has something a competitor or adversary could use. And if you’re being honest, you probably haven’t fully considered all the ways they might get their hands on that information. You’ve spent years building your business, but all it takes is one bad day to compromise that dream. In this week’s episode Brent sits down with FBI Special Agent (Ret.) and engineer Terry Fisher to discuss corporate espionage, electronic countermeasures (sweeps), bugging, and the common methods bad actors have used throughout history to gain access to proprietary information.
Read More