Online Exclusive: How Crowd-Sourced, Global Intel is Changing Travel Risk Management

Online Exclusive: How Crowd-Sourced, Global Intel is Changing Travel Risk Management

During this era of globalization, Fund For Peace classifies over 130 countries as unstable due to ongoing social upheaval, war, terrorism, or high levels of crime. Weather events, poor infrastructure, political demonstrations and transportation disruptions also contribute to the level of risk faced by travelers.

The business community is responding, by creating duty-of-care and corporate travel policies to protect their employees, clients and assets before an emergency happens. Travel risk management is a rapidly growing field. In the last 10 years, the number of dedicated Chief Risk Officers overseeing risk management in a company has increased by 89 percent. And global technology is making their jobs easier.

Crowd-sourced, global data provides granular, real-time information on occurring threats and events. Actual on-the-ground contributors report geo-tagged incidents that they witness or experience, as they are actually happening, resulting in more accurate, up-to-date information. Compared to archived, aggregated media data which can be delayed in reporting, this instant reporting is invaluable for both travelers and locals alike, in situations where mere minutes can make a difference in the decisions they make to stay safe.

But more than just threats, they can also validate the condition existing infrastructure, and report on the safety and security of the surrounding area. They can verify the accuracy of each other’s information, as well as the accuracy of travel risk analysts’ reports.

This results in an up-to-the-minute, hyper local database that can be used to assist businesses, governments, risk managers and travel agencies decide how they want to conduct business. Along with safety and infrastructure in an area, this data identifies key trends and events, and verifies the quality of potential vendors, partners and offerings in that area.

Is your company trying to plan a trip for your c-level executives? The company’s risk management or executive protection team can use this data to be sure the chosen hotel and the neighborhood it’s located in, is up to safety standards and in proximity to necessary infrastructure, such as transit, the airport, convention center, hospital and police station. They can also research what threats exist in the area and what type of crime might occur.

Does your company want to expand operations in an area or establish an expat community? Use this hyper local database to decide how to further build out and keep everyone connected with their people. Research whether you want to authorize dependents to travel there and decide what parts of the city you want to provide housing.

Do you have clients interested in going to Tonga? Or the Philippines? Or Venezuela? Is it an up and coming area? Use the crowd’s data to identify what kind of crime is happening there, and where it’s happening. Verify that the luxury hotel they choose is really a luxury hotel. If the hotel bills itself as “secluded,” see whether it’s truly remote or just has private areas fenced off/hidden from public view, but is still accessible to public transportation, nightlife and beaches.

Or maybe the local government of this up and coming tourist area is trying to promote themselves as safe and luxurious. They too can use this hyper local data to help market and promote the area, and identify crime occurring in the area. This will help them determine if and where to increase overt security and police presence to deter pickpockets or crack down on beach hotel scams.

These are just a few examples of what a geo-tagged, crowd-sourced travel risk management database can help your business accomplish. Use granular, on-the-ground and up-to-the-minute intel to plan a safer, smarter travel experience.

About the Author

Toby Houchens is the Founder and CEO of Travel Recon.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.