Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical Security

A workplace security framework: Mitigating employee-related threats

By Alan Saquella
Three women in a serious meeting

Image via Unsplash

June 24, 2024

In the modern discussion on workplace security, the focus often centers around preventing active shootings and violence stemming from terminated or disgruntled employees. The article “Publicly Humiliating Events: A Precursor to Workplace Violence” by Karie Gibson, Lauren Brubaker and Andre Simons rightly highlights the crucial role that public humiliation plays in triggering such violent acts. However, beyond the immediate threat of homicide, there exists a broader spectrum of potential risks posed by former employees, including acts of sabotage, espionage, vandalism and cyberattacks, all of which demand attention and proactive measures from security professionals.

The prevalence of non-violent acts perpetrated by former employees is often underreported and underestimated, yet their impact can be just as devastating, if not more so, both financially and in terms of public safety. For example, consider the case of a terminated telecommunications employee who sabotaged a fiber trunk line, resulting in a catastrophic communications outage that not only incurred millions of dollars in damages and fines but tragically led to the loss of a life due to the inability to reach emergency services. Similarly, deliberate tampering with natural gas distribution lines by a former employee of a gas company led to unsafe conditions and significant financial losses.

While preventing workplace homicides remains paramount, it is imperative to adopt a holistic approach that encompasses all potential threats posed by terminated employees. While fostering a supportive workplace culture and providing training on respectful behavior are crucial steps in mitigating the risk of violence, additional measures are necessary to address the broader spectrum of potential threats.

Drawing from experience in critical infrastructure security, two key components emerge as essential supplements to traditional risk mitigation strategies: post-termination monitoring and the implementation of comprehensive “softeners” for separated employees.

Post-termination monitoring involves staying vigilant and maintaining contact with former employees, particularly those who exhibit red flag behaviors or indicators of potential risk. This monitoring should be conducted discreetly, utilizing covert methods such as social media surveillance to gather intelligence and detect any signs of retaliatory actions. In one notable instance, a former employee’s ex-girlfriend reported plans of sabotage, providing critical intelligence that enabled law enforcement to intervene and prevent a potentially catastrophic event. This underscores the importance of proactive monitoring and the value of leveraging external sources for threat detection.

Additionally, the implementation of robust softeners, including generous severance packages, counseling services and continuation of benefits, can help mitigate feelings of humiliation and resentment among separated employees. While these measures may entail significant costs, they pale in comparison to the potential repercussions of unchecked retaliation or violence.

By adopting a proactive and comprehensive approach to addressing workplace violence, organizations can better safeguard their employees, assets and reputation. Collaboration between security, human resources and leadership is essential in identifying, assessing and mitigating potential threats at every stage of the employment lifecycle. From pre-termination assessments to post-termination monitoring, it’s imperative to remain vigilant and responsive to evolving risks.

While the prevention of workplace homicides remains a critical priority, it’s essential to broaden our perspective and recognize the many forms of threats posed by former employees. By implementing proactive measures such as post-termination monitoring and comprehensive softeners, organizations can mitigate the risk of violence and create a safer, more secure work environment for all. By addressing the root causes of workplace violence, including feelings of humiliation and resentment, businesses can foster a culture of respect, empathy and accountability, ultimately reducing the likelihood of violent incidents and preserving the well-being of employees and the integrity of the organization.

Expanding on the concept of post-termination monitoring, it’s essential to consider the long-term implications and potential for escalation of risks. Former employees may harbor grievances or feelings of resentment that can fester over time, leading to retaliatory actions months or even years after their departure. As such, ongoing surveillance and intelligence gathering are crucial components of a comprehensive security strategy. By staying informed and proactive, organizations can detect and mitigate potential threats before they escalate into serious incidents.

Furthermore, the implementation of robust softeners should be tailored to individual circumstances and risk profiles. While generous severance packages and counseling services can help ease the transition for separated employees, additional measures such as job search assistance and continued access to company resources may also be warranted. By providing comprehensive support, organizations can demonstrate empathy and mitigate the risk of retaliation or malicious intent.

Moreover, proactive engagement with law enforcement and relevant regulatory agencies can enhance threat detection and response capabilities. By sharing intelligence and collaborating on risk assessments, organizations can leverage external expertise and resources to strengthen their security posture. Additionally, participation in industry-specific forums and information-sharing initiatives can provide valuable insights into emerging threats and best practices for prevention and mitigation.

Finally, ongoing training and education are essential components of a proactive security strategy. By raising awareness and empowering employees to recognize and report potential threats, organizations can create a culture of vigilance and accountability. Regular drills and simulations can help reinforce security protocols and ensure readiness in the event of an emergency all as part of a Business Continuity Plan (BCP) and Exercise program.

Addressing workplace violence requires a multifaceted approach that extends beyond traditional risk mitigation strategies. By adopting a holistic framework that encompasses proactive monitoring, comprehensive softeners, collaboration with external stakeholders and ongoing training and education, organizations can mitigate the risk of violence and create a safer, more secure work environment for all stakeholders. By investing in prevention and preparedness, businesses can safeguard their employees, assets and reputation, ultimately preserving their long-term viability and success.

KEYWORDS: asset protection employee monitoring employee risk workplace safety workplace violence prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan

Alan Saquella, CPP, is an influential security and investigations expert with more than 30 years of security and investigations experience in corporate and public organizations at the executive level. He served for many years as the Security Operations and Investigations Director at Cox Communications before assuming his current role as a faculty team member at Embry-Riddle Aeronautical University — College of Business, Security and Intelligence. Saquella is also the Director, Investigations and Research at Verensics and a Member of the Identity Theft Advisory Board. Image courtesy of Saquella

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fist in black and white

    Creating a safer workplace: California Senate Bill 553 becomes law

    See More
  • Employer sitting with employee

    Preventing Workplace Violence: A Strategic Imperative for Today’s Organizations

    See More
  • Puzzle with missing piece

    A critical challenge: Understanding and addressing insider threats

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing