Protect the Seniors in Your Community with Age Safe Senior Home Safety Specialist™ Training

 

Keeping Seniors Safe in Their Own Homes

 

The desire to remain in our own homes as we age has been significantly increased over the past few years. The COVID pandemic highlighted that our home is our haven. COVID also focused some negative thoughts about our current senior institutional living arrangements in Canada.

 

With the increased demand of the public for answers and solutions for remaining in their own homes we have been seeing an increase in the overall awareness by healthcare professionals, government, and financial institutions to make ready for the massive wave of need. A simple and acceptable means to help with these changes is to start making more robust plans and budgets that support Aging in Place.

 

Most communities have developed programs and infrastructure for seniors because they remain an integral part of your community’s heart and soul.  We believe that a part of those programs should include an assessment of the current living arrangements of elderly citizens in their homes by professionals and volunteers. This assessment serves as a baseline and risk indicator for your support mechanisms and your elderly citizens. Having the background knowledge of general safety concerns including the ever-present risk of falling will be a crucial learning for all involved.

 

A Senior Home Safety Specialist™ designation gives the users an underpinning of knowledge to help identify risk and help plan the next steps to safe Aging in Place.

 

The course is on-line, self-paced (5-6 hour), self-directed and hits the salient points to make practical decisions about safety within the home.

 

Volunteer groups, municipal staff, community policing, EMS services and senior groups have found that this training not just empowers the messages of safe living and falls prevention but also can be viewed as another risk mediator for staff and volunteers who are entering private homes on a regular basis and therefore by extension expanding their own workplace. This training can assist in protecting themselves as well.

 

We are happy to speak to any and all interested parties and look forward to having this curriculum be accepted as the navigational source for safety in the seniors’ home.

 

For more information, visit Age Safe Canada.

 

Share

Change takes time. The Future is approaching.

So, our first piece of advice is to start thinking about it now. And yes, you can ease into the future; it does not have to happen tomorrow.

When organizations are planning out their new, or enhanced physical security needs we are often asked what are the trends that are likely to shape physical security in the future?

The same question is usually followed up with… “If we do this, or if we buy this, will this sustain us in the future?”

Which also can be interpreted to… “So, we don’t have to buy something else, and that this will last us a long time, right?”

Good questions, but always a challenge to answer. Many factors play out as resistance or even catalysts to these questions and their subsequent decisions. Risk exposure, budgets, actual realized events, change in the organization’s focus, change in the organization’s leadership, campaign promises, or even change in some environments, regulation or legislation “forcing” a change, all impact the ‘future’ question.

What are those future trends shaping physical security? Some trends outlined in the list below may be a surprise, some may appear too futuristic.

  1. Increased use of biometric security measures: Biometric security measures, such as fingerprint scanners and facial recognition technology, are becoming more popular as they offer a high level of accuracy and are difficult to bypass.
  2. Rise of smart security systems: Smart security systems are becoming more common, and these systems often use artificial intelligence (AI) and machine learning to analyze video footage and detect potential threats.
  3. Greater emphasis on cybersecurity: As more security systems become connected to the internet, cybersecurity is becoming an increasingly important consideration. Companies are investing in measures to protect against cyber-attacks that could compromise their security systems.
  4. Increased use of drones: Drones or Remotely Piloted Aircraft System(s) (RPAS) are being used more frequently for security purposes, such as patrolling large areas, inspecting high-risk locations or even in response to incidents in providing real-time surveillance.
  5. Greater use of virtual reality (VR) and augmented reality (AR) in training: VR and AR are being used to train security personnel in simulated environments, allowing them to practice their skills and respond to potential threats in a safe and controlled setting.
  6. Integration of physical and cybersecurity: As threats evolve and become more sophisticated, it is increasingly important for physical security and cybersecurity to work together to provide comprehensive protection. This integration may involve integrating cybersecurity measures into physical security systems, such as installing firewall protection on security cameras.

Biometrics, smart security systems, cybersecurity emphasis and the integration of physical and cybersecurity have been on our radar for several years now and have been introduced into our past and current projects with great adoption by our client base.

The trend not mentioned here but remains a constant for us, is the due diligence required to ensure the “paperwork” is complete, up to date, used and enforced. Your policies, and procedures, training programs, guidance documents and standards are the backbones for all these physical security tools to work in the manner they were intended for your organization.

Of course, great planning and the execution of that plan is essential. Planning is a cyclical process that can start, stop, and reset when required. The future is changing. Be prepared.

Plan the Work. Work the Plan.

Reach out. We can help.

Should your Municipality need assistance, contact Michael White Group International today, and we will be happy to answer your questions. Visit michaelwhitegroup.com/contact/

Share

UCaaS is critical for any authority service improvement

what is UCaaS?

Unified Communications as a Service (UCaaS)  is a network of cloud-based telephone system that controls the flow of calls coming in and out of your organization. We replace your on-premises PBXs, as well as your SIP, PRIs, and POTS lines. UCaaS enables you to use a variety of hosted programs and services (including instant messaging, video conferencing, file sharing, and email) over the Internet from any location and at any time.  In addition, UCaaS provides security, allows flexibility, and integrates well with your other software applications including MS Teams. UCaaS systems are updated frequently by the provider ensuring that your communication methods will always be up-to-date in our ever-evolving world.

Why UCaaS is critical for all customer-guided corporations?

 
GUARANTEES YOUR BUSINESS CONINUITY & SECURITY

Experteers can easily answer this for all municipalities and companies who care about their customers.

First of all we have to emphasize about the importance of continuity in all circumstances, UCaaS provides the best option to avoid your business any hiccups along the road because of any reasons. UCaaS is available on any communication device, laptop, or PC anywhere at anytime to be able to efficiently communicate with your customers.

Security is another crucial requirement for all connected networks, voice calls, video conferencing, and instant messaging are parts of all departments communications to enable them to work properly and deliver services. Experteers, as part of security provider, enable first layer of security by having all our servers in Canada, maintaining 100% availability by having four communication centers in main four cities in Canada in Montreal, Calgary, Vancouver, and Toronto, and to maintain the second layer of security by having all SOC certified centers.

INCORPORATES THE LATEST FEATURES

When you have UCaaS, you’ll be able to use all the latest functions and features without any additional cost. You’ll also have the assurance that your information is kept safe and secure in a reliable data center. Having the ability to keep your communications up-to-date allows you to remain competitive and helps to increase your overall performance.

 

OFFERS FLEXIBILITY AND SCALABILITY

UCaaS allows organizations to add and remove users (for example, temporary employees) without any significant infrastructure changes or capital investments. UCaaS also provides seamless work experiences for your employees since they are cloud-based and accessible from any location – great for those working remotely.

 

PROMOTES PRODUCTIVITY

By using a UCaaS system, your productivity increases. All of your employees have unified communications support that is sharable amongst all departments, and UCaaS integrates well with your other software applications (like CRM). UCaaS keeps communication lines open and provides ways for your employees to log into various devices to access their information (such as voicemails).

 

LAST BUT NOT LEAST

SAVES YOU MONEY

When switching to UCaaS, there are minimal upfront hardware costs – you only need phones. You will also have the ability to choose the services you need (and not waste money on the ones you do not). UCaaS allows you to concentrate on growing your business by decreasing your dependence on capital investments.

 

UCaaS

 

We at EXPERTEERS are helping municipalities, utility companies, and medical centers increase employee productivity by adding a state of the art Unified Communications Solution, enhancing collaboration and increasing employee efficiency.

  • Enable your team to work remotely (hybrid)
  • Train employees more efficiently with sentiment analysis
  • Monitor key performance metrics with automated reports
  • Boost company performance through detailed analytics & collaboration
  • .. and more

Let us help you improve your client experience, call us at EXPERTEERS to learn how we can help enable your business for success in 2022.

 

Experteers is a system integrator SI and managed service provider MSP for the following services:

– SASE / SD-WAN: to secure all ur networking between all branches.

– NGFW: Next Generation Fire Wall centralized to keep all networks secured in almost real-time updated system.

– NMS: Network Managed System to keep your visibility on all network elements and servers to improve your systems availability.

– Cyber-Security on all endpoints and servers

EXPERTEERS CORPORATION

WWW.EXPERTEERS.COM

Share

2022 Security Risk Budget Outlook

Moving on up

At the onset of the pandemic, Security Risk budgets decreased as organizations shuttered their doors and employees left the office, and organizations under duress looked for places to cut costs. Many found their savings in the Security budget. But now, the potential to double or triple budgets in 2022 maybe a reality.

Our research shows approximately two-thirds of security budgets increased in 2021 from 2020, but still have yet to reach or return to 2019 levels. 2022 has the potential to change that.

As organizations are set to come back to life in 2022 security risk events have not gone away. In fact, the COVID-19 pandemic created new security challenges. The new challenges have yet to be solved, and as schools and businesses reopen / remain open during potential future surges, the security risks of the past return as well. In order to protect themselves from past, current, and future threats, organizations need to reinvest in physical security.

Really watch

Real camera surveillance and real-time monitoring integrated with a uniformed security guard force that is properly trained may be for some organizations the order of the day. High-caliber uniforms security guards and training necessary to protect against threats to an organization cost more than $15-20 an hour. Challenges will emerge to protect your organization, your information, your IP, your personnel. All of this may lead to an explosion of security requirements, and the budget.

Another factor contributing to budget increases in 2022 is executive protection. According to the Ontic 2021 Mid-Year Outlook: State of Protective Intelligence Report, 58% of CEOs and senior leaders who expressed a stance on political issues received physical threats. Senior Public Officials and local health department leadership who encouraged health measures like vaccination or mask-wearing have also become targets of physical threats. Against the backdrop of this increased threat landscape, executive protection has grown in importance among physical security professionals.

An inner look

These aforementioned types of threats could also come from inside an organization. Leadership will either take a stand, or not take a stand. The personnel of an organization expect their leaders to take a stand, whatever that might be, for or against a particular issue or concern. Unfortunately, pent up frustration surrounding decisions may not even be pandemic related, and at times still result in leaders being threatened. In many areas of the country, threats against “leadership” is foreign territory for many organizations.

Integration

The threat landscape has always been uncertain and rapidly changing. With many advancements in approach, strategy, and technology, organizations can protect themselves with integrated security risk strategies.

As both physical and cyber threats compound, organizations are tasked with protecting themselves on all sides. With increased and realized threats there is one unfortunate downside. Higher security costs as risks to supply chains, cyber and physical security risks increase. During this pandemic many organizations have unfortunately learned that their security profile may not be or has been at a level they had hoped it to be. New gaps have been found, existing weaknesses have become even weaker and due to other impacts of the pandemic, organizations may have struggled to get the necessary supplies, purchases and even personnel in a manner to which they were once accustomed.

Plug it

Identify your shortfalls, your gaps and plug the holes. A comprehensive risk assessment will assist in that process. If organizations fail to plug those holes, and as they begin to re-open even more, they unfortunately will remain or fall back into a vulnerable position.

Proactive hard work

Technology enhancements, uniformed security, executive protection, education, and plain old attentiveness and proactive behaviour towards security risks to quickly address existing and newfound challenges brought forth because of the pandemic will require increases in security budgets in 2022.

Now more than ever we need to move beyond reactive, and proactively secure our organizations.

It all simply starts with a plan.

We can Help.

Plan the Work. Work the Plan.

 

Should your Municipality need assistance, contact Michael White Group International today, and we will be happy to answer your questions. Visit michaelwhitegroup.com/contact/

 

Share

Municipal Work Opportunities for Our Professional Members!

Ontario Supports Modernization of Small and Rural Municipalities

The Ontario government is providing up to $24 million to support the modernization of 224 small and rural municipalities across the province. This investment will help improve the delivery of critical programs and services that people rely on every day, while saving taxpayers’ dollars.

A total of 254 projects have been approved for funding under Intake 2 of Ontario’s Municipal Modernization Program. Municipalities will use the funding to find efficiencies and implement a wide range of initiatives to digitize, streamline and/or integrate programs and services with neighbouring communities.

The funding will help municipalities administer the cost savings measures in time for the 2022 municipal budget cycle.

Here’s the List of Municipalities who received funding for various Municipal Service Delivery & Efficiency Projects.

If you offer any of the services these municipalities are looking for, select the municipality you would like to work with and watch their websites for RFPs for any Third-Party Review or Implementation opportunities.  You might also want to watch muniSERV’s Find RFP’s section and/or bidsandtenders listings.

For more information on the Municipal Modernization Program and the June 30th announcement, click here.

Share

How have the pandemic adaptations affected your Physical Security?

Well into the COVID19 pandemic, organizations, governments big and small have had to take measures and make changes to their environments to adapt to the needs of their staff, customers, their service delivery model, requirements of health science, government agency regulations and perhaps “new” industry best practices and of course the ever-changing virus.

These measures have evolved into many different things. We’re going to specifically focus on physical security devices.

Two of the pervasive items that have been introduced in many environments are plexiglass and signage.

Organizations have installed plexiglass barriers at intersection points of personnel as they have the potential to interact with other personnel, customers, vendors, etc.

Informative signage itemizing physical distancing rules, self assessment health protocols have been placed all around in both strategic and random locations within the environment to ensure every opportunity for personnel and visitors to be informed.

Funny thing about all of this plexiglass barriers and signage.

In some cases, not all, we have inadvertently defeated some or many of the installed security devices functionality and purpose. That is, their ability to monitor, detect and alert (alarm).

  • Motion detectors blocked, unable to provide proper coverage
  • Cameras experiencing sun flare reflection off plexiglass
  • Nuisance alarms due to swinging signage on the increase
  • And other unforeseen affects

There are incidents where this is enough of this added material, that areas, although devices are active and functioning as per specifications, are unable to detect properly – leaving areas with no security detection or proper monitoring.

We have the answers.

Let’s go for a (physically distanced) walk and have a conversation.

Your security risk plans are more than just a motion detector or even a strategic camera placement.

We can Help.

Plan the Work. Work the Plan.

Should your Municipality need assistance, contact Michael White Group today, and we will be happy to answer your questions or provide quotations.

Share

Physical Security Risk: know how to assess it

 

Many small to medium sized business (and even large enterprise businesses)  and government, have limited budgets, let alone spending a lot on risk and security.

Before you do go and spend a lot of capital on risk and security mitigation measures (aka security cameras, access control, bars and locks, lighting, training, fencing, etc.), you need to know what you’re buying for.

That is, you need to know what risks you are addressing.

Risk dial

Having a Risk Assessment completed on your municipality narrows the focus of your spending and aligns your purchasing with the specific types of risk and security mitigation measures you need.

To get a little technical…Risk assessment is the overall process of risk identification, risk analysis and risk evaluation. It involves the process of identifying internal and external threats and vulnerabilities, identifying the probability and impact of an event arising from such threats or vulnerabilities, defining critical functions necessary to continue the organization’s operations, defining the controls in place necessary to reduce exposure and evaluating the cost of such controls.

That is a mouthful. Let us break this down a bit.

If you have a threat, but there is no vulnerability, then there is no risk.

If you have a vulnerability but no threat, no risk.

Perhaps something many can relate to, you went online and purchased some products, and they are set to be delivered to your home. And no, we are not going to discuss online security…a topic for another day perhaps.

The packages are delivered to your home. But because of your daily routine, errands, off to the office, or shop, you are not always home. The shiny object is the packages just delivered. The vulnerability or sometimes referred to as a gap, is you are not home, and the packages now sit on your front step unattended. The threat, someone will take those packages right from your front step.

So, going back to the assessment. The key is once you know what your largest threats are (and yes you need to be able to determine that), it is important that you take action (implement risk and security mitigation measures) to lower your vulnerability.

Why not eliminate the vulnerability?

Great question, thanks for asking.

Eliminating the vulnerability may not always be possible.

Some business sectors and industries simply have built-in threats. But, if we focus on lowering the vulnerability, we lower the risk of a loss.

The assessment is complete, and we have identified risks. The next important step is finding the risk and security measures that are going to be the most effective in mitigating the identified risk. These measures come in all different shapes and sizes, video surveillance, locks and safes, lighting, security focused training, etc.

Where in doubt, reach out to us or find your trusted Independent Risk and Security consultant.

Yes, we highlighted Independent. That is definitely a topic for another day.

It all starts with a conversation.

We can Help.

Plan the Work. Work the Plan.

Should your Municipality need assistance, contact Michael White Group today, and we will be happy to answer your questions or provide quotations.

 

Share

Municipalities Build Back Better With Whole Person Care

 

 

 

 

 

 

 

 

There is a lot of talk about a Build Back Better approach in our communities during the Covid 19 pandemic.  One strategy that helps address those in need is a Whole Person Care approach using a digital platform to collect and measure outcomes for wrap around programs which can be fully funded under the new Canada Healthy Communities Initiative.

With the arrival of Covid 19, the amount spent on healthcare is increasing in every community. While the amount invested in healthcare is increasing, municipalities are spending up to 25% of their healthcare costs to support non-value add aspects in their healthcare system. Value-based care models help optimize what is spent to get the best outcomes. How do communities do more with less as Covid 19 increases health and economic risk? In the short term we will need to work together with what we have and find ways to get better outcomes for less.

We know that Covid 19 is accelerating value-based healthcare approach in communities. Whole-person care is not far behind.

Whole person care describes a wrap around approach that addresses complete physical health, behavioral health and social wellbeing. Communities that work together as a team to provide care for individuals with poorly managed conditions including diabetes, heart disease, obesity and COPD are better equipped to improve health outcomes for less. Helping to manage care for this population most at risk relies on seamless information exchange, tele-health, care co-ordination and consumer engagement. All of these conditions are closely related to the social determinants of health.

Post acute care including home health, hospice and senior living facilities and human service including community mental health centers, addiction treatment centers and social service agencies in every community need to have the technology and skills to work as equal partners. Every community now has a chance to build back better with whole person care. 

Whole person care gets even better when amplified with data science and analytics that are driven with a prescriptive approach to patient care. To prepare our communities to deliver better outcomes during the pandemic, municipalities need to look at systems that offer interoperability – a framework that supports bidirectional exchange of data across systems and providers of care, a network to network bridge, policy agreements, discrete data and support for client consent and sharing that consent with others.

Consumer engagement with a patient portal makes it easier for hospitals and physicians to work with clients. Automated referrals, tele-health and patient information integration create a public care eco-system that serves the public in Covid 19 times. Building Back Better with the help of funding from the Canada Healthy Community Initiative makes it possible to accelerate the care you need in every community. Let us know if you need help with your digital transformation as you build back better in your community.

 

Learn more: Contact Athena Software

 

Share

Do you know what you want or need?

It is important that you know what you are asking for…so that it’s not risky.

You have asked for an Assessment. Stakeholders are concerned about security. Is the goal to look to identify your Security Risks, Threats, Consequences or Vulnerabilities? Or all of them? Collectively, there is a formula for that.

Risk = Threats + Consequences + Vulnerability

Do not be taken in by someone who says all assessments are the same.  A risk assessment, threat assessment, vulnerability assessment, security audit or even a business impact analysis are not the same as each other.

Square peg, round hole.

A Threat assessment looks to understand what entities may have an interest in creating a security concern or problem for your organization.

A Security Audit is a validation or verification that security measures that are currently in place are actually in place and doing what they intended to do. This audit focuses specifically on the effectiveness of security and determines if a known vulnerability is being addressed. It does not measure risk.

Vulnerability Assessments look to understand both consequences and vulnerabilities. Threats however within a vulnerability assessment are assumed to be at a high level. At the end of a Vulnerability assessment organizations quite often implement increased security measures to address the vulnerabilities and lower the consequences. This happens because the level of threat and the probability of an occurrence from happening is not actually analyzed.

The Consequence focused Business Impact Analysis identifies the most critical of assets to an organization and sets out to build resiliency around these identified assets, most commonly as a business continuity plan.  Business Impact Analyses do not address threats or vulnerability.

The Risk Assessment is the most effective means of determining security adequacy as it considers all three elements of risk – threat, vulnerability, and consequence.  A Risk assessment should be the methodology of choice if you are seeking to determine your security adequacy and avoid the potential pitfalls of not having all of the information.

But all is not lost. It is okay if your organization needs to only conduct one or several of the assessments mentioned above. There may be cause for you to do one assessment over another, resulting in a more intimate understanding of that particular assessments output.

We can assist your organization in determining which of these assessments is best for you given your organization’s current security risk landscape.

We can Help.

Plan the Work. Work the Plan.

Should your Municipality need assistance, contact Michael White Group today, and we will be happy to answer your questions or provide quotations.

Share

An Artist’s Eye to Risk & Security Program Success

 

 

Michelangelo famously created the sculpture David and JK Rowling famously revealed characters that already existed. Two completely different types of artists and art.

But how did Michelangelo actually approach this masterpiece? Did he take a stone and begin to carve, and David was eventually the result, or did he know that David was already in the stone and he had to carve away the waste to reveal him? JK Rowling did the latter.

Which approach applies to your organization?

Do you work to reveal the security practices that are already intuitively imbedded by hard working staff doing the right thing and expand on these, or realize that you need to start fresh and create something new?

Let us take a look. Your organization is well established. Many operational and strategic programs and processes are in place. But your now are faced with ramping up your security program. Create policies, procedures, establish the

With both approaches your personnel, all personnel, security or otherwise play the most significant part in the immediate and continued success of your Risk & Security program.

At a high level view, your Risk & Security program has 3 major components;

  1. Plans/Procedures: you need purpose, direction, and accountability
  2. Hard/Soft tools: software, hardware, technical systems…such as cameras, card access, etc.
  3. And the third piece that actually holds it all together and makes it work, people (personnel).

Of course, while the various plans/procedure, technical systems and devices assist in the assurance of security – it all ultimately boils down to personnel.

But they don’t just get there on their own.

There needs to be a commitment within your program to educate, cooperate, and involve personnel to be successful.

Not sure where to begin? We can help.

It all starts with a conversation.

Plan the Work. Work the Plan.

Should your Municipality need assistance, contact Michael White Group today, and we will be happy to answer your questions or provide quotations.

Share