Over the past two decades, the workforce has drastically changed. As mobile devices became increasingly affordable and the demand for multiple offices, distributed campuses and globalisation has increased, many employees who once commuted to on-site corporate offices now spend their time working remotely or traveling between sites. In 1997, only 9.2 million U.S. workers (7 percent of the U.S. workforce) were working remotely for at least part of each week. By the end of 2015, the mobile worker population had grown to 96 million people and continues to grow. Mobile workers are expected to surpass 105 million by 2020—meaning that nearly three quarters of the total U.S. workforce will be mobile.

With an increasing number of employees traveling and working remotely, the days of a dedicated worker who commutes to and from a single location every day of the week are just about over. Today’s digital workforce no longer works in a corporate office, meaning businesses have new physical security challenges in regards to tracking an employee’s location, which can be necessary during natural disasters or other significant public incidents (an active shooter, for instance).

That said, security professionals must take a second look at their policies and procedures for employee safety. To protect employees in this new mobile world, where people, assets and brand reputation threats may face higher than normal levels of safety and security risks, businesses must focus less on securing physical, four-wall perimeters and instead take a global approach to security that focuses on protecting traveling, remote and lone workers.

Travel System Integration

First and foremost, organizations with mobile workforces must integrate a multi-modal communications system into their security plan. While we can never predict when emergency events will occur, mass communications systems allow security managers to notify employees quickly after such events—based on their preferred method of contact—and provide actionable guidance that employees can follow to minimize confusion and stress, which will ultimately keep them safe.

While we can never predict when
emergency events will occur,
mass communications systems
allow security managers to notify
employees quickly after such events

In a traditional corporate setting, notification systems that allow for communication across multiple contact paths would likely have been sufficient to ensure that critical messages were delivered to all employees, as everyone was expected to be in the office. Any incidents occurring outside of the office did not need to be considered. In today’s mobile world, communication systems should be integrated with other systems, such as travel itineraries and corporate travel systems, so that in the event of an emergency incident, organizations can quickly assess if they have any employees in or traveling to the affected areas and warn people heading towards potentially dangerous situations.

Ensuring Local Compliance

For organizations with globally distributed employees, contractors, customers, or partners, additional capabilities must be integrated into their security practices. Namely, support for local dialects, languages and preferred communication methods should be integrated into emergency alert systems. During an emergency, it can be increasingly difficult to perform even simple tasks quickly and accurately. Organizations can reduce the difficulty of communicating tasks under pressure and increase recipient comprehension by delivering messages in a local language that is familiar to the recipient.

Notification systems must also comply with all local data privacy and security laws to ensure messages are received by employees in different parts of the world. These laws can differ by region and often restrict the transfer of data over country borders. The best systems for today’s mobile world have the capability of storing and segregating contact information in specific data stores around the world, ensuring that this data will not leave defined jurisdictional boundaries, while also guaranteeing that valuable information reaches the necessary contacts during emergency situations.

With strong location data and analytics, organisations have the capability to maintain robust databases of where their employees are
Knowing where your employees are helps identify who you should be communicating with and better refine your response

Location-based Alerting

When a location-based emergency occurs, companies need to make certain that they can quickly communicate key information, directives and important updates to their employees—no matter where they are located—to help ensure their safety. Knowing where your employees are helps identify who you should be communicating with and better refine your response to a specific security incident.

Security managers can automatically keep employee locations current, even when they’re traveling or moving between buildings and campuses, by integrating location intelligence into an incident management platform. With strong location data and analytics, organizations have the capability to maintain robust databases of where their employees are, where they’re expected to be and where they were last—and then use that data to send targeted notifications and alerts to the relevant people that are affected by a specific incident. Solutions like Safety Connection enable this location data to be collected from an organization’s various physical systems, including:

  • Access control and badging systems
  • Wired and wireless network access points
  • Hoteling systems
  • Corporate travel management systems

Mobile Employee Safety

Imagine a scenario where an armed man enters one of the office buildings on an organization’s campus. Usually there are 200 people on campus, but that day 40 people are working remotely, traveling or at home sick. Another 30 employees from other offices are on-site for a sales meeting. Based on each employee’s location and proximity to the intruder, the company’s security team can automate building evacuation and muster directives much more efficiently.

 With location-based analytics, the
security team would know exactly
who to send critical information
and emergency alerts to

With location-based analytics, the security team would know exactly who to send critical information and emergency alerts to and how many people they should expect to receive confirmations of safety from; whether employees are in their assigned location or a location they are visiting. In this case, the security team would focus their efforts on protecting the 160 people who normally work on campus, plus the 30 visiting employees, as they know the 40 people off-campus are out of harm’s way.

In our increasingly global and mobile world, organizations cannot afford to limit their critical communications to physical facilities. By ensuring mass communication systems are integrated with travel systems, comply with local data and privacy laws and leverage location-based analytics, organizations ensure that critical messages are delivered and received both locally and globally and can rest easy knowing that their growing mobile workforces are safe.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Annie Asrari Director of Product Management, Everbridge

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.