Our research came up with over 200 different incident types. These vary from high severity types like fire, flood or IT system failure to more widely occurring incidents that can cause disruption and risk to the business i.e. accident or injury at work.
Our Incident Library provides a comprehensive list of incidents that you can deploy straight away. The incidents can be personalised with the option of easy to consume media assets associated to the task, for example short 'how to' videos. These media assets make it easy for people to absorb information quickly in a crisis situation.
A rich set of pre-configured incidents, and the ability to instantly communicate with the right people are core capabilities that underpin the credibility of the crisis response component of your risk management strategy.
Notifications and Alerts
If you are not receiving emails from Crises Control it is probably because your Network Spam filters are blocking incoming email or they are going to your Junk folder.
Spam filters are customizable and can block emails containing specific words, and some networks or organisations have strict rules that automatically block or mark messages sent outside of a whitelist. You can whitelist www.Crises-Control.com so they aren't blocked by your organisation.
Whitelist Information for Crises Control
Domains & IP Blocks
If you're behind a firewall that blocks access to all traffic except for certain domains or IPs and the network has granted access to just www.crises-control.com, the network administrator needs to add all our domains, subdomains, and IP blocks for the site to work properly. Otherwise, you might experience issues, for example certain pages won't load or you won't be able to upload or view files or you can’t see tutorial videos on "how to do things".
The asterisk (*) is a wildcard used to account for any subdomains we use. The last item in the list is for Vimeo, which we use to host video tutorials and training materials.
Of course there may be some things that may not be possible, for example if your mobile cannot receive emails this option will not be available.
Phone number validity
- Incorrect/non-existing phone number
- Recipient phone number inactive
- Incorrect international country code
- Sending a message to a landline
- Incorrect sender ID
- Keyword filtering
- Repeated messages
- Using cheap routes
- Portability issues
Message delivery can also be affected because of several reasons, such as a recipient’s inbox becoming full, frozen messaging application, roaming limitations, and errors on operator’s SMS servers.
Some phones cannot accept some types of messages, such as WAP push messages, binary text messages, or texts with special characters.
Different operators and countries stipulate different SMS encoding standards. So, when a text message fails to send, it could mean the wrong encoding was used. For example, some carriers in Europe will not deliver messages sent in Unicode characters.
Trial, Billing and Upgrades
You can continue to use Crises Control until your account automatically closes at the end of your current billing period. To see when your account will close, click View billing details from Your Account.
The way it works is as follows:
You pay for what you have used. You buy credit for the calls and SMS text message services in advance. You can pay for this by credit card. Once you have used your credit, you top up again. We maintain a current statement for your account so that at any point you know how much you have used and what it cost. A monthly detailed account statement will be available on the web portal on the 1st day of the month.
When using the SMS and Call notification features, these are charged per unit according to the price package agreed with the customer. Price packages do offer the benefit of discounts for bulk purchases. Unit price varies according to the length and geographical location. One unit is equivalent to an SMS message containing less than 160 characters, or a local phone call of under 1-minute duration. Conference call rates vary according to the destination, the duration of the call and the number of participants on the call.
Or you can add a NEW user from SETTINGS > SETUP USERS and ADD USER ensuring that you set their USER ROLE to "Key Holder".
The Task Manager Module includes new functiionality that makes allocating, tracking and managing tasks easier then ever before. This unique module can simplify the process of risk management, compliance monitoring and root cause analysis. Learn more about Task Manager.
- Creation of task lists in advance or during a real time incident
- Allocation of each task to a task owner or group, plus an alternative owner
- Setting of timeline KPIs for when tasks must be accepted and also completed
- Escalation process if first task owner does not accept within KPI
- Delegation option for first task owner
- Workflow option to set predecessors before a task can be completed
- Tracking of task completions
- Post-incident audit trail with complete timelines
Please contact our sales team to obtain a quote for this Module to be added to your system.
Technical, Security and Resilience
Crises Control is wholly owned by Transputec, a privately owned limited company. Transputec is an established IT services and solutions company with more than 30 years of IT innovation and excellent customer service. It was founded by two computer science students from Imperial College in their dorms, starting by developing applications for the banking industry and then migrating to a full IT services organisation.
Transputec is a premier business partner of IBM and a select partner of CISCO. Our clients include Danone, Swissport, Incisive Media, Boden and Nandos. We have an international presence with offices based in London, Dubai, India and Manila and over 150 employees worldwide.
The Crises Control website and web applications are protected behind Cloudflare a state-of- the-art virtual firewall. This web firewall has the OWASP ModSecurity Core Rule Set alongside Cloudflare's own ruleset and rulesets for popular web applications. Cloudflare protects the Crises Control portal and website against DoS attacks, hacking and viruses.
Cloudflare's advanced Distributed DoS protection, implemented as a service at the network edge, can be used to protect against DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks.
Crises Control chose Cloudflare to protect its website and portal as it is one of the largest DDoS protection networks in the world and for its proven record of protecting high-value online assets worldwide.
ThreatSpike is used to protect the Transputec systems from any unauthorised internal or external network activity. ThreatSpike collects, records and continuously analyses network traffic in order to detect harmful activity. ThreatSpike learns about your network and acts like a detective, continuously linking together information and key events in order to build a detailed narrative and timeline of security incidents as they occur.
Our primary messaging partner (SMS and voice calling) is Twilio which is based in the US and is a leader in the industry, with clients including the American Red Cross, ebay and DELL. Twilio maintains redundant inbound and outbound connectivity with dozens of network carriers around the world. Their real-time systems dynamically route each call or message via the carrier with the best connectivity at any point in time, responding automatically to carrier availability and reliability.
Twilio's infrastructure is hosted in multiple data centers, utilizing state-of-the-art practices for fault tolerance at each level of system infrastructure, including power, cooling and backbone connectivity. If disruption events occur, Twilio's software is architected to detect and automatically route around these issues in real time to ensure a consistent customer experience.
Our alternative UK based, tele-conferencing partner is X-On. Their dual site data locations in London Docklands and Suffolk ensures the service runs 24/7 with a higher than average industry up-time. Backup and duplication of systems allows them to bypass external and 3rd party failures, and to distribute call loads effectively, thereby ensuring services remain online.
Each of X-On's data centres can operate independently and handle normal load traffic in the event of site failures at the two remote sites. In normal operation, replication ensures that all service and configuration data is present on each site. Inbound numbers are dynamically routed on the BT core network or by using third party provider routing plans. Outbound Voice calls are fail-over routed by X-On to available suppliers.
We have an alternative command and control centre already in place and are currently in the process of setting up a secondary remote replication/disaster recovery site.
The Crises Control servers are located in a Tier 4 data centre in Milton Keynes UK, with mirroring at a Tier 3 data centre in Park Royal, London UK. The 2nd data centre provides replication and offsite backup for business continuity and DR.
Crises Control is on the UK government digital service framework G-cloud 10. Our solution is hosted on a Government Community Cloud platform suitable for Information Assurance needs up-to "OFFICIAL" and is connected to the public internet as well as non-secure government networks including PSN, N3 and JANET.
|1||A fault exists that results in a total loss of service or functionality affecting a whole site (sites), or whole system or services.||15 minutes to respond.
4 working hours to resolve.
|95% of all Severity 1 Incidents will be resolved within the SLA.|
|2||A fault exists which results in partial loss of service or functionality affecting multiple users.||1 working hour to respond.
8 working hours to resolve.
|95% of all Severity 2 Incidents will be resolved within the SLA.|
|3||A fault exists which results in loss of service or functionality for a single user.||1 working hour to respond.
24 working hours to resolve.
|95% of all Severity 3 Incidents will be resolved within the SLA.|
- If you have an Apple iPhone or an iPad, then you will need to go to the Apple App Store (search for Crises Control)
- If you have an Android phone or tablet, then you will need to go to the Google Play Store (search for Crises Control)
- If you have a Windows phone or tablet, then you will need to go to Windows-8 apps Store (search for Crises Control)
PING is like your own private and secure "WhatsApp" but much more powerful. PING can be used to send messages between people in your organisation securely because it is private for you organisation.
The messages are transmitted from device to device encrypted and can have associated photos and or videos, however the photos and videos are not sent to the message receiver. Therefore, they are not downloaded to their device, they are kept in our cloud and only a link is sent to the message receiver. GDPR rules require PII to be protected from unauthorized or unconsented distribution.
Yes, like WhatsApp you can do that however the photos and videos are not sent to the message receiver's device, they are kept in our cloud and only a link is sent to the message receiver. GDPR rules require PII to be protected from unauthorized or unconsented distribution.
Yes, you can to any person or combination of people, Groups and Locations that you have rights to.
All messages in transit are SSL encrypted (256bit).
SSL (Secure Sockets Layer) is a standard security protocol for establishing encrypted links between a web server and a browser in an online communication. The usage of SSL technology ensures that all data transmitted between the web server and browser remains encrypted.
When a Photo or Video is sent you from another user, you do not receive the photo or video with the message, you receive a link to the Crises Control cloud where you can view the Photos and Video.
Yes, our communication network is very extensive and covers most of the world. There are some places like China where communication services can be partially blocked for Geopolitical reasons.
You can use one or all four communications channels to send a PING message. It depends on your preference. The more channels you use the greater the certainty that your message will be received by the recipient.
The Crises Control App and the web portal both display the people that have Acknowledged and those that have not, in real time.
Yes, you can set up different response options as a multiple choice.
You can send up to 250 character in one PING message.
Yes, by configuring the Data Protection and Data Segregation options to suit your requirements you can restrict the Personal Identification Information (PII) you chose to display to other users.
An incident is an unexpected event that can cause disruption to the normal running of your business.
For example, an incident, in the context of occupational health and safety, is an unintended event that disturbs normal operations.
An incident, in the context of information technology, is an event that is not part of normal operations that disrupts operational processes.
An incident may involve the failure of a feature or service that should have been delivered or some other type of operation failure. Security incident are events that indicate that an organization's systems or data may have been compromised.
An incident can be: fire, flood, denial of access, loss of internet, loss of telecommunications, injury or death at workplace, power outage, cybercrime, data breach, supply chain disruption by severe weather, damage to an aircraft, bomb, terrorism, and many more incidents that require you to rapid make people aware and share information with them.
Yes, the incident can have different types of media assets that complement the incident. For example, these can be documents, diagrams, photos, web links, videos, and sound files.
Yes. You can customise your Standard Operating Procedure based on your needs. You can add Standard operating procedure to an incident by following the steps below:
Once you have created the Standard Operating Procedure you need for the specific incident, go to set up incident, click on add incident > create incident > under incident details, look for Standard Operating Procedure field, click on file action, select SOP.
Yes. You can create Tasks that are assigned to People and set up timeline on when they need to respond and accomplish the task and add a person that the task can be escalated to when the 1st person assigned to the task is unable to attend to it on the set time and date.
You can go to an incident with the task > go to incident Tasks Tab > either click on add task to add new tasks and fill out the details of the new task related to the incident > Under assigned to User and/or Dept. / Group, select user(s) and Dept. /Group, choose the person and dept. /group the tasks needs to be assigned to and under escalation table > choose the time to accept and time to complete or modify.
A Tasks serves as a guide for respective users and dept /groups in the incident you created. You can assign tasks to different users within your dept/group that will help you overcome incidents that might occur within your organization. It has the ability to escalate different assigned tasks of other users who are unable to fulfill the same tasks which can serve as your back up.
Yes. Under iSOP Wizard Menu, click on Add new Document > On New SOP Document page, fill out the details related to your SOP including frequency on when you need to review SOP so that you can modify or update it on a specific timeframe. Fill out next Step labelled as Sections and under Section content, enter the details of your Standard Operation Procedure and on Step 4 under Generate Document, you can attach your SOP related to the incident.
You can create a new one by going to iSOP Wizard menu and Add new document. On New SOP Document Page, fill out the details below:
- Basic Details
- Generate Document
Yes. Customize your Standard Operation Procedure and simply go to iSOP Wizard menu > Add new document and fill out the details below:
- Basic Details
- Fill out the details of your Standard Operation Procedure related to your incident
- Generate Document
Yes. You can store most file formats associated with the following:
- Images (tif, tiff, bmp, jpeg, jpg, gif, png, pdf)
- Word ( doc, docx, etc)
- Spreadsheet ( xls, csv)
- Audio file
Yes. Once you have created your Standard Operation Procedure, it will be available to you by attaching it to the incident it is related to.
Yes. You can enter the date and frequency on when you would want to review your Standard operation Procedure. The system can send a review reminder email if you choose.
Definitely. You can run simulation anytime.
You can schedule Incidents or Pings. A Ping / Incident will provide you option via the Scheduler > Schedule Settings for you to customise on when you would want to do the Simulation.
Yes as long as the monitoring software has the ability to send an email.
Yes. Once you have set up your location and added users in that location, they will receive your incident alert worldwide.
Yes. Once you have set up your Dept. /Group and added users in that Dept. /Group, they will receive your incident alert worldwide.
Yes. You have the liberty of choosing which users you would want in each Dept. /Group and have them be part of any of the Dept. /Group whenever you think necessary.
Yes. You can choose the incident @ location when you launch the incident so that users know where the incident occurred.
Yes. Before you launch the incident, you need to ensure you click the radio button and choose track our people and that location is turned on in their respective devices.
Yes. In their devices, they can go to settings and use the slide button across the "Track Me during Travel" and "Track Me During incident" options.
Yes. They click on SOS button for any emergency situation.
Yes. On your launched incidents menu, click on actions then go to incident timeline to check on current status of the incident you launched and you can also click on actions and then go to view reports to get updated Incident summary, incident stats, incident message listing and BCM listing where you can view the Map and locations of users you notified.
You can inform as many users as needed. This will also depend as well on your company’s contract agreement with Crises Control on numbers of users, administrators and Key holders allowed. They can always increase anytime and modify the contract by contacting our Sales team.
Yes. Go to the incident you want to clone and click on edit. Once you are inside the incident, click on the clone incident at the top right of your screen.
You can create as much incident as possible that is customized based on the need of your company. You can even add incidents that you can use for simulation.
Task manager is designed to ensure that all activities needed for a specific incident is carried out.
Task Manager Module allows Administrators and Key holders outline different activities (Tasks) that needs to happen during the incident and assign these tasks to specific users.
It help distribute and manage the assignment of Tasks to your people, it help the people to report progress by disseminating information to other stakeholders, it make it easier for incident commanders to monitor people's activities and progress, it speeds up the time to recovery and it helps you to learn and improve.
Once you have laid out different type of Tasks applicable to your incidents, you benefit from the orderly distribution of these tasks to the assigned people, supporting your operatives with information and help, the capturing of data during the incident life cycle and the data analysis for improvements.
We offer you full 24/7 technical support to assist you when you need it. We recognise the importance of a rapid response to and resolution of any issues that you encounter. Our team will aim to resolve your issue immediately over the phone.
Standard Support is provided by e-mail for day-to-day questions and issues for Business solution customers. We will aim to respond to your query within 2 hours and resolve it within 8 hours. Exceptionally, where you need urgent assistance for an emergency notification and you are experiencing difficulties, all users can call our Emergency Live Operator phone line and a representative will assist you in sending a broadcast notification.
Premium Support is provided by e-mail or by telephone for day-to-day questions and issues for Enterprise solution customers. We will aim to respond to your query within 2 hours and resolve it within 4 hours. In addition to the support options noted above, we also offer a Concierge Service. This includes proactive assistance in helping you to get the most out of your Crises Control service.
If you are the registered administrator you can get support at any time of the day.
We offer 24/7 English email support for all customers - even on holidays! (Email support in a variety of languages is available during limited hours.)
English phone support is a Premier feature. We offer phone support 24/7 via our service desk. Call our Help Desk on: +44 (0) 20 8584 1385 (option 2).
Regardless of the type of support you have, the one constant for all support organisations is that we are here to help resolve issues.
- Send an email
- Call you on the telephone
All support requests, from all channels, become Crises Control Support tickets. Tickets capture your initial request for support and all the conversations your people have with our agents along the way to solving the support issue.
- Demonstrate its ability to consistently provide product that meets customer and applicable statutory and regulatory requirements.
- Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity to customer and applicable statutory and regulatory requirements.
- The QMS is applicable to the design, build, integration, implementation and support of business software and hardware solutions, hardware and software product sales, with associated support, provision of fully managed service contracts, including full infrastructure and platform services, support contracts, contract fulfilment and consultancy services.
Transputec is also fully certified according to the ISO 27001 Information Security Management Standard. In order to achieve the certification, Transputec's compliance with ISO 27001 standards was validated by a leading independent audit firm, Lloyds Register Quality Assurance, after demonstrating an ongoing and systematic approach to managing and protecting company and customer data.
ISO 27001 certification ensures that controls are in place to reduce the risk of security threats and avoid any system weaknesses being exploited. It provides assurance and confidence to customers, suppliers and trading partners that all security risks are being addressed on an ongoing basis.
The scope of the ISO certification includes design, build, integration, implementation and support of business software and hardware solutions. It also includes the provision of full IT managed services, including infrastructure platform services, support contracts, contract fulfilment and consultancy services.
Start using Crises Control today
An efficient, user friendly, mass notification system made to support you when you need it the most