Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Enterprise ServicesSecurity & Business Resilience

Understanding and acting on the risks the pandemic has brought to your business

By Jeremy Prout
Operational resiliency and assessing risk; how enterprise security leaders can mitigate risk amid COVID-19
January 28, 2021

In the tumultuous year that 2020 has been, it’s no surprise that International SOS’ 2021 Risk Outlook report found that risk perception for employees is at a five year high — up to 79%. The last peak that high was reported in 2016, following a series of domestic and workplace terrorist attacks in the west.

In 2021, as enterprise security leaders look to better understand and tackle their organization’s risks as it relates to the COVID-19 pandemic, following this model can be helpful: designate a dedicated response team; analyze how risks have changed and what new types of risks there are; consider the appetite for taking risks and prioritize them. Let’s talk about each of these actions separately.

Set up a crisis team

If you haven’t already, the first step for enterprises is to set up a specific crisis response team for COVID-19, but also for the future in anticipation of other risks. These teams can, and should, include a wide spectrum of expertise from multiple teams, such as: HR, medical, security, facility, operations and more, depending on your organization's size and makeup.

These teams will create synergies your business may not have had before. At my organization, for example, we have seen increased activity between HR and operations because we need to know who can come into the office and who can’t from an HR perspective, and security hands in access controls to HR.

With that being said, there are financial challenges that may have arisen in 2020 that impact these teams, such as layoffs, so a best practice heading into the new year is to understand what organizational changes are anticipated and how those changes will affect your crisis response teams.

Asses your risks

To understand your organization's risk baseline, or what risks the organization has, you need to closely review and assess what has changed from a business operations perspective and what holes these changes have created in your risk strategy in order to identify where threats are going to be in the future. In wake of the COVID-19 pandemic, it’s important to look at your risk profile from two perspectives:

New risks

  • With employees working from home, the home setting has essentially become a branch of many businesses and has created a variety of risks. These can include but are certainly not limited to:
    • Cybersecurity: Remote workers are accessing business VPN/drives from all over the world, opening up more opportunities for hackers to access sensitive information that is critical to business operation.
    • Domestic violence: Employees may have viewed the office as an “escape” from a dangerous home setting and are now stuck at home a majority of the time, causing not only the immediate safety risk, but also heightened stress and anxiety.
    • Tech: With many parents working from home, office technology such as computers can now be easily accessed by children and/or pets, putting hardware and more at high-risk for breakage, insider threats and other problems.

Old risks

  • Many of the same prior risks remain, but it’s important to think about how they have evolved, for example:
    • Natural disasters: If struck by a natural disaster, medical response and rescue is greatly impacted due to social distancing suggestions.
    • Theft: There are no, or less, people in your office now - opening opportunities for theft.
    • Supply chain: Social distancing has brought up a lot of supply chain issues, due to a variety of factors including short staffing and lack of materials.
    • Workplace violence: Where an employee may have bullied another previously, this can move to online - which in some cases can be worse.

Survey/talk to others

It’s important to look at your risks from a multi-staff approach, by talking to your entry, middle and senior level employees, as well as C-suite leaders about what worries them in their specific roles to help fill gaps at every level. In addition, while your business has its specific needs and risks, talk to partner and peer organizations similar to yours to get an idea of what others are doing.

Risk appetite and priorities

The first step in prioritizing your risks is to determine your organization's appetite for them by balancing the potential benefits and threats of each, and the changes that they could bring.

Once you’ve determined what risks your enterprise can safely take without severely impacting the safety or goals of your business and business people, you need to prioritize which risks to tackle, based on severity and staffing. If something is going to harm employees or business continuity, address that first.

In addition, if something has a low level of effort, do it immediately to cross it off the list. For lower level, and/or larger time required items, try to find a stop gap for the time being and then, with the additional time given by using the stop gap, develop a full project plan to eventually deal with these situations and risks, as you do not want to leave any unaddressed.

Overall, in wake of the COVID-19 pandemic and the vast changes it has had on business and personal lives, it’s security leaders and risk professionals that must take a step back and evaluate how the current situation has impacted their employees and businesses, and evolve organizational crisis management and security plans for the future.

KEYWORDS: business continuity business continuity planning coronavirus COVID-19 operational security risk analysis risk appetite risk mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeremy prout international sos

As Security Director, Security Solutions for International SOS, Jeremy Prout is responsible for providing travel security assistance and assessments for clients in the Eastern United States. Prior to joining International SOS, he served as a Security Manager for several premier organizations. Prout served for six years as a Marine Corps Officer, specializing in overseas security, training, and risk management. Prout holds an M.S. in Global Affairs from Rutgers University and is a Certified Protection Professional, Board Certified in Security Management.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1020-Business-Feat-slide1_900px

    Mitigating the risks of business travel during the pandemic

    See More
  • cyber laptop freepik

    The pandemonium of the pandemic: How working from home has changed the cybersecurity formula

    See More
  • Dim lightbulb

    Understanding the security risks of outdated software

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing