Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Security Stacking: How to Address the Challenges it is Creating

By Johnathan Tal
Security stacking is affecting security professionals and their organizations
October 26, 2020

As this was being written in mid-September 2020, fires are ravaging the West Coast, from California to Oregon; millions of acres have been burned and 33 people have lost their lives. Conflicting comments about climate change have been exchanged for years.

However, today, there is a much bigger situation "boiling," and I use the word "boiling" purposely. Clashing commentary about the fires and climate change are all part of a stew, boiling on the stove, one step away from exploding and causing civil unrest throughout the country.

The term for this boiling situation heard in some circles in the corporate and executive security industry is "stacking." Stacking can be defined as the piling of layers and layers of sudden lifestyle changes, serious health concerns due to COVID-19, social and economic problems, racial issues and social injustice, the growth of conspiracy theories and conspiracy groups, personal insecurities about the future, and conflicting visions about the direction of this country, all at once.

The United States is certainly not new to uncertainties and conflicts. However, we typically deal with one or two at a time:  

  • The 1918 Spanish Flu was long gone before the Great Depression began in the 1930s, allowing us to focus just on our economic issues.  
  • There were few conflicting visions when the Japanese struck Pearl Harbor. Millions of Americans signed up, virtually overnight, all with one focus: to protect and defend the country.

But now we are all grappling with several major issues at the same time. Further, these issues are threatening corporate security and the safety of our employees and executives. Challenges have developed for many firms, their top executives, their staff, and their assets, both tangible and intangible, that did not exist just a few months ago.  

Further, these issues are threatening corporate security and the safety of our employees and executives. Challenges have developed for many firms, their top executives, their staff, and their assets, both tangible and intangible, that did not exist just a few months ago.  

This means that as corporate security professionals, we have a lot on our plates. To address these situations, we need to know what steps we can take - and take quickly - to ensure our clients are safe and their business operations continue, and to help them manage through these exceedingly complicated times.

Defining Who We Are and Moving Forward

An effective working definition of corporate security professionals is the following: Corporate security professionals identify and effectively lessen, mitigate, or manage, situations and events that have the potential to threaten the resilience and continued survival of a corporation, the safety of its top executives, staff, and assets.  Corporate security professionals oversee, manage, and coordinate a variety of tasks, within and outside a company, to ensure its security, continuity, and safety.

Building on this basic definition, we can now consider several steps we can take to keep our clients safe and their businesses operating.

Ensure Cybersecurity

COVID-19 has caused millions of workers in the United States to stop commuting to their places of work. Just to see how quickly things have changed, as recently as March 1, 2020, the idea of having entire companies shift to remote work was unheard of.  Now, most companies have some if not most of their staff working remotely.

This migration to remote work was born of necessity. But it happened so quickly that many IT professionals did not have time to implement data security programs that would allow people to cooperate safely and securely from home.  Steps must be taken now to ensure remote workers can interface freely and securely with corporate databases and information sources.

Guarantee a Healthy Reopening

Businesses and employers should plan to protect the health of their staff when they return to work. To do this, businesses must take proactive steps. They must continue to monitor credible news sources that provide information about the virus and how people can protect themselves against it.

Corporate security professionals must also ensure that their clients strictly adhere to the guidance provided by the government and public health authorities. This would include the following:

  • Identify a workplace coordinator who will be responsible for COVID-19 health issues and their impact in the workplace.
  • Review all cleaning strategies in place to ensure they are designed to minimize the spread of the infection. 
  • Implement flexible sick leave and supportive policies and practices for employees.
  • Determine how the business will operate if absenteeism spikes from increases in sick employees.
  • Decide what steps to take if staffers must stay home to care for sick family members or children unable to go to school.
  • Implement protocols to ensure adherence to mask-wearing and social distancing.

Physical Security

When we discuss physical security, we are referring to the bodily protection of an organization’s executives and staff, both on- and off-site. This would also include when they are traveling for the organization.

In the coming months, our industry should expect to see several changes when it comes to physical security, including:

  • Demand for security guards will increase sharply. This will necessitate training in crowd control, “temperature monitoring” of crowds, attending civil unrest events, accurately reporting on these events, overcrowding prevention, and how to control situations before they get out of hand.
  • Organizations may face an urgent need to engage with executive protection (EP) vendors due to an increase in social unrest, crime or other factors associated with the “stacking” of issues we are facing.  You should consider that during these “spikes” everyone will be looking to engage these services which will be in short supply.  Consider retaining a service now in anticipation of spikes.  This may be the prudent step to take.
  • Retailers and other organizations will need to provide curbside delivery for customers while still ensuring minimal points of contact, and contactless delivery of products will need to be developed. In all cases, social distancing and personal and site hygiene will be required.
  • New passive and active monitoring, reporting, and enforcing technologies will be necessary to offset the high cost of paid guards. However, while physical safety is the goal, existing and evolving technologies must still comply with privacy requirements.

These changes will dictate revisions to best practices, which will then have to be taught to management and staff. Further, to ensure physical security, organizations will need to make several changes to their facilities (most of which were not even a consideration just a few months ago), such as compartmentalization of staff to help minimize personal interactions; social distancing markers; plexiglass barriers and other social separation devices; and temperature monitoring stations.

In some jurisdictions, these changes and others are not only recommended but may be required, making businesses and other organizations responsible for their proper implementation.

Business Continuity

There is hardly any business that has been immune to the ravages of COVID-19. Addressing the impact, organizational resilience, and the ability to make changes quickly is key to successful business reopening and continuity.

Corporate security professionals must develop solid business continuity protocols for their clients based upon a three-pronged approach:

  • Prepare. Get ready for what is coming next. Allocate resources, assign roles, set priorities, establish a command center, train, and practice.
  • Predict. Create the tools required to monitor vulnerabilities and threats and bring them to the attention of decision-makers.
  • Prevent. Prevention will largely depend on resilience as well as evolving and established security procedures and preparations that can be leveraged to help in a crisis, no matter what form it takes.

 This three-pronged approach, in conjunction with the other steps, should help ensure a safe, secure, and healthy reopening for businesses around the globe. Further, and just as important, sound business continuity protocols can help ensure that businesses stay open.

The virus has already caused too many businesses to fall by the wayside. As corporate security professionals, our goal is to help ensure our clients avoid that fate, remain viable, and remain in operation.

KEYWORDS: business continuity security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jt photo tg3 b

Johnathan Tal is CEO of TAL Global. Based in Silicon Valley, TAL Global is a leading risk management, security consulting, and investigative agency serving clients all over the world. The company has a large client base, with a focus on the High-Tech, Hospitality, Manufacturing and Financial industries. He can be reached through his company website at www.talglobal.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • globe COVID-19

    Reimagining risk assessments in global crises

    See More
  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    3 Lesser-Known Campus Security Challenges and How to Address Them

    See More
  • financial-freepik

    Why the threat of wire fraud is particularly high for private capital markets – and what’s being done to address it

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!