Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyIdentity ManagementPhysical SecurityVideo SurveillanceCybersecurity News

5 minutes with Nick Heywood - Security considerations for the hybrid workplace

By Maria Henriquez
5mw Heywood
June 23, 2021

Nick Heywood, Associate Vice President at Guidepost Solutions, talks to Security magazine about the physical, environmental, and cybersecurity issues behind long-empty offices that are reopening as restrictions lift. 

 

Security: What is your background? And current responsibilities?

Heywood: As Regional Associate Vice President and a member of the Guidepost Solutions Leadership Team, I am responsible for driving and leading our Western Region team to deliver and exceed client expectations with security design and consulting services that deliver value and support the continual evolvement and progression of our clients’ security programs. Identifying solutions and promoting growth opportunities for clients is an essential element of my role, as well as ensuring our team engages in trusted advisory relationships with clients.

 

Security: The workplace is once again shifting and coming into focus as restrictions lift and more people are vaccinated. Are office environments safe from a physical and cybersecurity perspective?

Heywood: Before the pandemic lockdown, many businesses operated with robust physical security programs and cyber hardening measures that placed an emphasis on maintaining the safety and security of their people, and a focus on preventing outsider threats from penetrating critical network infrastructure and sabotaging intellectual property. While many of those pre-pandemic office and business operations environments remain, it may be risky to make assumptions that the conditions left behind a year ago will be found in the same state. Business leaders should be asking will the pre-pandemic conditions meet the ‘new’ working environment that employees expect?

We have seen business owners and operators acknowledge that change to the working environment must and will occur. To ensure that the workplace remains safe, we recommend assessing several important contributors to the security posture. These include environmental security, physical security, and cybersecurity. Assessing change to these factors as return-to-office gathers pace cannot be overlooked, the status quo security measures of pre-pandemic are likely not sufficient in the changed working environment.

 

Security: What are some of the physical, environmental, and cybersecurity issues that security leaders will have to address prior to the return of employees to facilities and offices?

Heywood: Here's what you should consider:

Physical Security

In terms of physical security, the factors to consider may include reassessing the security technology currently deployed. Do your systems still function in a manner that meets new operational needs? Is the pre-pandemic functionality of systems reflective of current and new operational needs? Are electronic security technology systems supported by back-up power measures and are they functioning as intended? Are there any compromises to the built environment that need to be remediated? Does the built environment path of travel for pedestrians flow in a manner that supports and maintains potential future social distancing needs? Is there seamless touchless entry and egress capability? Are there maintenance issues that need to be addressed that compromise your physical security program and are electronic security program updates current, have systems been maintained during the work from home period?

Environmental Security

Examine what has changed about your business location in the past year. Has there been an uptick in crime since the pandemic hit? Consider the impact of crime on your business operation and the safety and security impact upon your business assets and people. Are there specific trends and patterns in crime activity, i.e., unauthorized entry, vagrants, serious crime including aggravated assault, rape, and homicide? Consider how crime statistics, both existing and future forecast, may affect your security program and current mitigation plans. Do you need to update your security program policies and procedures to reflect the new environment of operation?

Cybersecurity

Cybersecurity measures to secure critical network infrastructure play just as an important part of your security posture as business location and physical security measures. Cyber measures serve to prevent an often-silent breach to gain unauthorized access to protected data and intellectual property. Implementing measures and employee training to generate good cyber awareness and prevent against phishing, ransomware, malware, and other cyber-attacks should be considered. If your business did not consider or implement cybersecurity measures pre-pandemic, now is the time to address and correct the situation. The returning workforce lives in a world that thrives on the Internet of Things (IoT). Personal devices are a source of weakness and penetration when connected to your business networks. Implementing cyber measures to mitigate risk and maintain business continuity should be at the forefront of your return-to-work process.

 

Security: How can security plans be adjusted to meet the new safety and health expectations from employees?

Heywood: Security plans should already be subject to regular review and revision based on business operational needs. The adjustment of plans in this situation should be no different. Reviewing, amending, and reissuing of security plans to all employees should be a standard practice. The post-pandemic return to work operational security changes is key to demonstrating to employees that change has occurred, it has been addressed and the business is formalizing those changes and communicating them to provide guidance and set expectations of the new working environment. The security plans are a component of the bigger picture and should be tackled just as health and safety plans are being rewritten to meet the changed working environment.

 

Security: How can security leaders update and retool their network infrastructure to support remote workers, hybrid workers, and full-time in-office employees?

Heywood: The unprecedented COVID-19 pandemic confirmed that the way we conduct our business has changed, and the hybrid work environment is appearing to be the new normal, with some employees not wanting to return to the office full time. Legacy systems and on-prem solutions may not work for the new hybrid workforce. IT and security leaders should be looking into a mix of on-prem and cloud-based solutions to support the digital needs of employees both onsite and remote based. However, remote access and cloud solutions will increase cybersecurity vulnerabilities. Businesses should be looking to mitigate risk by considering the following:

  1. Implement encryption.
  2. Ensure all applications support multifactor authentications.
  3. Block the firewall traffic by default, allow only necessary traffic, and monitor user access.
  4. Implement cybersecurity screening policies for IoT devices.
  5. Train all employees on how to maintain the security of work IoT devices and computers.

 

KEYWORDS: cyber security hybrid workforce physical security risk management workplace security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 m w Brent Johnson

    5 minutes with Brent Johnson - Hybrid is the new remote (workplace)

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More
  • SEC_Web_5Minutes-Tavakoli-0222_1170x658.jpg

    5 minutes with Oliver Tavakoli: Remote and hybrid work strategies for increased enterprise security

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing