In today’s increasingly globalised economy, the movement of employees across international borders is more frequent, presenting numerous opportunities with heightened security risks. As employees travel through regions with diverse geopolitical climates and varying safety standards, multinational corporations face a critical challenge — ensuring the safety of their workforce in a world where threat levels are unmistakably rising.
The Risk Outlook 2024, based on research done by International SOS involving 675 senior risk professionals from 82 countries, highlights a growing perception of security risks in the global business environment. This comprehensive study predicts a significant impact from conflict and crime on businesses and employees within the next year, with over a 50 percent likelihood of such incidents affecting global operations. This trend demands a comprehensive revaluation of security protocols and a robust approach to safeguarding a business’ most valuable asset — its people. The question is not whether there is risk, but how to effectively protect employees against these escalating threats.
In today’s security landscape, lone wolf attacks present unique challenges. Executed by individuals rather than organised groups, they are harder to predict and counteract. Such attackers, driven by factors like extremism, online radicalisation, or psychological issues, require few resources but can cause substantial harm, particularly in crowded spaces like malls and transport hubs. A series of three unrelated incidents — a shooting at Kuala Lumpur Airport, a stabbing in a Sydney mall, and an attack in a Sydney church — over three days underscores the vulnerabilities in densely populated areas. These attacks signal a broader trend of security
breaches and the pressing need for more robust security measures in public spaces and transport hubs globally.
This spectrum of risks underscores the urgent need for robust security measures. The sudden and severe nature of these threats, along with their recurring occurrence, demands that companies with international travellers develop comprehensive and adaptive strategies. These measures are crucial for both proactively protecting against future incidents, and responding to immediate dangers when they arise, ensuring the safety of employees in high-risk environments.
Strategies to Secure the Workforce
To effectively safeguard employees, organisations must adopt comprehensive and proactive security measures. This entails recognising threats and equipping personnel with skills in advance, ensuring readiness and effective responses are at hand to mitigate risks and protect individuals during potential incidents.
Preparation for Potential Security Breaches
- Risk assessment and monitoring: Continuously analyse and monitor global security conditions and adjust travel plans accordingly. Utilise real-time monitoring systems to provide travellers with timely alerts to anticipate possible threats, key dates, and potential hotspots to avoid.
- Employee training: Equip employees with knowledge and strategies to respond to threats, focusing on the “Run, Hide, Tell/Fight” protocol. This comprehensive training should be relevant to the local authorities’ methodologies and should ideally include:
- Run: Teach employees how to recognise danger quickly and evacuate effectively, utilising knowledge of escape routes and maintaining situational awareness.
- Hide: Instruct on choosing secure hiding places, such as rooms with thick walls, lockable doors, and minimal windows, and how to barricade oneself effectively.
- Tell/Fight: Train employees on how and when to communicate critical information to authorities safely during an incident and, if necessary, tactics on how to incapacitate an assailant if escape is not possible.
In responding to security breaches such as lone wolf attacks, mere training and preparation may prove insufficient. Organisations must also have access to tools and capabilities to effectively manage the response phase, ensuring a swift and coordinated reaction to mitigate the impact of such incidents.
Response to Security Breaches
- Technological integration: Leverage advanced travel safety applications and real-time alert systems to keep travellers informed of potential dangers. Implement systems that integrate data analytics to assess risks and deliver actionable intelligence.
- Communication protocols: Develop and rehearse clear communication strategies for crisis situations, ensuring that employees know how to alert their peers and headquarters about their status and any immediate threats.
- Collaboration with security experts: Partner with security professionals like International SOS to tailor security plans that fit specific organisational needs and contexts. This collaboration ensures that all measures are up-to-date and reflect the best practices in travel safety and crisis management.
An example of effective partnership with security professionals is reflected in how organisations coordinated with International SOS during the Bangkok shooting incident in October 2023. With a rapid response system, International SOS issued timely alerts, demonstrating the advantages of 24/7 global monitoring and expert local knowledge. This approach provided organisations with critical updates and guidance, helping to secure the safety of their personnel and navigate the consequent travel disruptions with informed and calm precision. It underscores the strategic value of integrating expert security partnerships into organisational protocols.
In conclusion, navigating today’s complex global landscape demands a robust and multifaceted security strategy for businesses with international operations. By integrating comprehensive risk assessments, advanced technology, effective training, and strategic collaborations, organisations can protect their employees and enhance operational resilience. These proactive measures are crucial for mitigating current and future security threats, ensuring that businesses can maintain their global presence while safeguarding their most valuable asset-their workforce.
About the author


