SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How can security technologies protect lone workers?

4 Oct 2023

How can security technologies protect lone workers?
Larry Anderson
Larry Anderson
4 Oct 2023

Editor Introduction

There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?" 


Card image cap
David Senf Bell

“Lone workers” can be many things, from people working at home to those working in harsh or remote field locations. While all these scenarios are vastly different, they have one main thing in common: the worker is operating outside of the network perimeter set up by the company. This increases the potential of that worker to act as a conduit through which attackers can access corporate systems and data. Zero-trust network access is one technology that can help reduce the likelihood of this happening. By gating access to both on-premises and cloud applications, it can determine whether a device and user are legitimate or not. That makes it harder for attackers to move laterally from a lone worker’s machine into CRM, ERP, and other critical applications. Additionally, endpoint detection and response solutions and strong multi-factor authentication policies can help determine if a user’s device is doing something anomalous and should be blocked. 

Card image cap
James Stark Wachter, Inc.

Lone workers are often more at risk of employee theft or injury due to the lack of supervision and assistance as these employees conduct their work independently, isolated from others. Examples in retail would be overnight security personnel, sales floor employees, workers assigned to the stockroom, or warehouse workers operating forklifts. Because of this isolation, there is an increased risk of physical harm, theft, or worse. Retailers can mitigate these risks by conducting risk assessments and implementing modern surveillance technology. With intelligent surveillance, AI-driven analytics can provide real-time alerts that can alert security or store management if there is an accident like a box falling on a lone worker, or if the individual slips and falls. By installing network solutions, there is an added level of protection and creates a sense of safety and a better work environment. 

Card image cap
Sean Foley Interface Systems LLC

As businesses attempt to reduce labor costs while keeping pace with customer expectations, many are increasingly relying on lone workers for opening, closing, third shifts, curbside deliveries, and other outside customer interactions. An interactive remote monitoring solution with video and two-way audio capabilities enables trained security staff to see, hear, and communicate with lone employees to ensure their personal safety and make sure the premises remain secure 24/7. Virtual guard services can scan the location to look for any potential threat throughout the day and night. Wearable personal protection monitoring solutions can also be directly integrated with interactive 24/7 Command and Control Centres. A properly designed personal protection device delivers comprehensive situational awareness by sending time/location stamped GPS coordinates to authorities. It also captures evidentiary-grade photos providing hard evidence for law enforcement. Being cellular-based, there’s no limit to how far an employee can be from the business. 

Card image cap
Chuck Randolph Ontic Technologies

Lone actor attacks are challenging to anticipate because there’s less information to infiltrate or intercept. Despite this, organisations can disrupt these types of incidents with tools and processes to integrate, analyse, and disseminate intelligence to multiple teams that manage risk in the enterprise. While there may be less information to consider, lone assailants can leave important clues regarding their intentions throughout the attack cycle. Weaving together data and intelligence, corporate security teams can use holistic security technology to identify indicators and work together to mitigate attacks before they occur. Technology provides a convergence element for security and risk groups, including those responsible for human resources, cybersecurity, and physical security, by dissolving silos by sharing intelligence across departments and creating a comprehensive threat picture. Although one perpetrator is harder to spot, integrated data from multiple sources promotes collaboration and gives corporate security teams a distinct boost in identifying threats from lone actors. 

Card image cap
Jack Li Anviz Global Inc.

To select the proper security technology for lone workers, we must know the industry and working scenario of each lone worker. There are various sources of danger, including: 

  • From oneself, for example, sudden physical illness, or mental breakdown.
  • From misoperation, for example, not using equipment according to specification.
  • From omission of management, for example, the disrepair of infrastructure, or the wrong placement of goods.
  • From other people, for example, violence, aggression, or injury from customers.
  • From nature, for example, floods, thunderstorms, or attacks from animals. 

The most common solution is to install security cameras and sensors to identify the potential and existing risks in the first place. For example, to design intelligent behavior algorithms to analyse the operation of workers. If the worker doesn’t follow the specification, the worker will receive a warning and management will be notified. If the security cameras and sensors detect any difference in infrastructure or area by comparing it with the normal data, it will give an early warning of potential danger. Some security cameras have object identification and crowd detection, which will help to identify dangerous goods like knives or guns or to detect mass disturbances. Wearable security technologies can help to protect lone workers, especially in confined spaces, open indoor areas, or working outdoors. For example, the smartwatch could monitor the heart rate, blood pressure, blood oxygen, and so on. If the lone worker is suffering from sudden danger, the measurement will give fast reflection to the monitor platform and send a notification to other people. 


Editor Summary

Security strategies and technologies provide a range of alternative approaches when it comes to keeping a lone worker safe. Security challenges of lone workers include cybersecurity risk and vulnerability to outside attacks. Lone workers also face the possibility of physical injury, sudden illness, or a mental breakdown. In any organisation, maximising the safety and security of a lone worker, ironically, involves teamwork and the involvement of multiple stakeholders whose top priorities are safety and security.  

  • Related links
  • Anviz CCTV software
  • Anviz Access control software
  • Axis Communications CCTV software
  • Axis Communications Access control software
  • Axis Communications Digital video recorders (DVRs)
  • Anviz Network video recorders (NVRs)
  • Axis Communications Network video recorders (NVRs)
  • Axis Communications Video signal devices & accessories
  • Card Access control cards/ tags/ fobs
  • Event Network video recorders (NVRs)
  • Biometric Access control software
  • ANPR Software CCTV software
  • Magnetic Stripe Access control cards/ tags/ fobs
  • Access Control Software Access control software
  • Real Time Network video recorders (NVRs)
  • Card Access control software
  • Control Software CCTV software
  • Intelligent motion detection Video motion detectors
  • 10BaseT/100BaseT Ethernet Video motion detectors
  • Mifare Access control cards/ tags/ fobs
  • Contact Access control software
  • Detection Software CCTV software
  • Proximity Access control cards/ tags/ fobs
  • Fob Access control cards/ tags/ fobs
  • Tag Access control cards/ tags/ fobs
  • Real Time / Timelapse Network video recorders (NVRs)
  • Mifare Access control software
  • Drawing Software CCTV software
  • Smart Card Access control cards/ tags/ fobs
  • IP Surveillance Software CCTV software
  • Wiegand Access control cards/ tags/ fobs
  • Proximity Access control software
  • Management Software CCTV software
  • Timelapse Network video recorders (NVRs)
  • Smart Card Access control software
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Transmission Software CCTV software
  • Server software for MSDE Access control software
  • Video loss alarm unit Video signal devices & accessories
  • Video Signal Generator Video signal devices & accessories
  • User tool for control panel Access control software
  • Version Upgrade Access control software
  • Warning Sign Video signal devices & accessories
  • Warning Sticker Video signal devices & accessories
  • Visitor Management tool Access control software
  • Related categories
  • CCTV software
  • Access control software
  • Digital video recorders (DVRs)
  • Access control cards/ tags/ fobs
  • Network video recorders (NVRs)
  • Video motion detectors
  • Video signal devices & accessories
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Enhancing physical access control using a self-service model

Enhancing physical access control using a self-service model

Download
Related articles
HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Kindoo expands reseller program in North America

Kindoo expands reseller program in North America

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Round table discussions
About this page

"Explore how innovative security technologies provide enhanced protection for lone workers. Learn from industry experts on navigating unique security vulnerabilities in isolated environments."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec