SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

The role of private security in a hybrid working world

The role of private security in a hybrid working world
Christian Roddy
Christian Roddy
Contact company
Contact CDX Security Group
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Private security crucial in hybrid working to safeguard offices during unpredictable occupancy.
  • On-site security and alarm response essential for protecting vacant premises and valuable assets.
  • Hybrid work increases demand for keyholding services and trained private security personnel.
Related Links
  • What change would you like to see in security in 2022?
  • 5 intelligence-based capabilities for boosting executive protection

COVID-19 has undoubtedly impacted all industries, leaving its mark for years to come. Multiple lockdowns forced businesses across multiple sectors to reassess the way they worked, with many adapting to working from home due to the various stay-at-home orders.

Data from a 2021 ONS survey revealed that 25.7 percent of the UK workforce, or 8.4 million people, worked from home during the pandemic, more than doubling the 2019 figure of 12.4 percent. A further nine million people were placed on furlough, meaning they were absent from offices, required to stay at home.

Alarm response services

While a national lockdown and the introduction of furlough meant a general drop in crime, as more people were at home, it unfortunately left workplaces more open and potentially vulnerable to attacks than ever before, as they were left empty and abandoned.

The benefits of having on-site security came to the fore during this turbulent time

Here, Commercial Director at CDX Security, Christian Roddy, explores the evolving role of private security in relation to this shift to hybrid working and how the industry has come into its own during this time. The benefits of having on-site security came to the fore during this turbulent time, and three main service areas became increasingly instrumental as many offices, retail spaces, and hospitality venues closed their doors: private security, and keyholding and alarm response services.

Remote working model

From taking a look at Google search trend data, the search volume for ‘security officers’ reached an all-year high in the week of 20th March 2020 when the UK entered its first lockdown. More people than ever were searching for security officers to guard their premises as we transitioned to a temporary remote working model.

With the PM having recently revoked the latest work from home order, many businesses will be ready to return to office working. However, there’s no doubt that many companies will be embracing a hybrid model, with two in five companies saying they are willing to embrace hybrid working by 2023. Hybrid working leaves many UK businesses needing similar types of support to reinforce this increased flexibility. While offices will be busy some days, they could be empty the next – leaving them unprotected and potentially vulnerable to crime.

Private security firms

Private security firms quickly became a necessity for many UK businesses, with many offices, warehouses

Property security became a number one priority throughout lockdown as many buildings were left unprotected and unmonitored. Private security firms quickly became a necessity for many UK businesses, with many offices, warehouses, factories, restaurants, bars, and more closing their doors to both staff and the general public – potentially with valuable equipment and stock being left in the premises.

The security industry was able to offer the reassurance that these companies needed that their premises and any valuable contents were kept safe during this time. While it’s unlikely we’ll see a full lockdown again, the introduction of hybrid working in the corporate world means businesses, particularly those occupying office spaces, will continue to need support from private security firms.

Hybrid working world

Having on-site, private security can be an efficient way to safeguard against security threats and is a visible way of warding off potential criminals. Whether it be trespassing, an intruder, or a burglary, security guards can quickly solve the task and this additional layer of protection will be essential to businesses as we move into a hybrid working world.

Having on-site, private security can be an efficient way to safeguard against security threats

The pandemic also saw an influx of keyholding services requests as site managers found themselves away from premises due to government restrictions. Keyholding involves the employment of a 24-hour mobile response team that acts as a point of contact to an alarm monitoring company.

In the event of a break-in, emergency, or any suspicious activity, keyholders are on hand to handle the situation and gain safe entry to the building. An internal keyholder is not always available out of hours, so private security can step in when needed most.

Trained security personnel

Alarm response has also become more prevalent in the wake of the pandemic, with independent, third parties being employed to respond to potential intruders or disturbances.

Alarm response has also become more prevalent in the wake of the pandemic

Trained security personnel can be on hand for any potential issues, providing invaluable peace of mind for business owners and employees alike. The seismic cultural shift we’ve seen in the workplace over the past two years has completely transformed the way we work, meaning business owners are more flexible with how they expect their staff and businesses as a whole to operate.

Mitigating potential threats

Security services are always operating in the background, keeping employees, visitors, and the general public safe and mitigating potential threats. Remote and hybrid work has shone a light on the importance of having this additional layer of protection, providing a reassuring security presence on-site during quiet periods as well as over the weekend and during the holidays.

Businesses should not underestimate the importance of investing in dedicated security services. Not only does 24-hour private security eliminate risk to anyone on site, it also means you can rely on trained security professionals to take care of things on your behalf, quickly and safely.

Find out about secure physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Retail surveillance
  • Shop security systems
  • Mall security
  • Public sector security
  • Shopping centre security
  • Security devices
  • Intrusion detection
  • Security guards
  • Store security
  • Store surveillance
  • Public security
  • Retail security
  • Door security
  • Door access control
  • Security service
  • Physical Security Information Management (PSIM)
  • Cyber security
  • Warning Devices
  • COVID-19
  • Related links
  • Biometric Access control software
  • TFT CCTV monitors
  • Access Control Software Access control software
  • GSM / GPRS Intruder alarm communicators
  • Area Lockout Option Access control software
  • TFT LCD CCTV monitors
  • ISDN Intruder alarm communicators
  • Contact Access control software
  • Mifare Access control software
  • Radiowave Intruder alarm communicators
  • Proximity Access control software
  • Central Monitoring Option Access control software
  • Centrally managed access solution Access control software
  • TCP/IP Intruder alarm communicators
  • Combined online/offline solution Access control software
  • IP / GPRS Intruder alarm communicators
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • Issuance and identification system Access control software
  • License Access control software
  • Management Systems Upgrade Access control software
  • Redundant System Software Access control software
  • Remote software for telecode door entry phone system Access control software
  • Server software for MSDE Access control software
  • Visitor Management tool Access control software
  • Articles by Christian Roddy
  • Related categories
  • Access control software
  • Intruder alarm communicators
  • CCTV monitors
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Explore private security's role in the hybrid working world, ensuring safety and mitigating cyber threats, both on-site and remotely.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec