Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical Security

A workplace security framework: Mitigating employee-related threats

By Alan Saquella
Three women in a serious meeting

Image via Unsplash

June 24, 2024

In the modern discussion on workplace security, the focus often centers around preventing active shootings and violence stemming from terminated or disgruntled employees. The article “Publicly Humiliating Events: A Precursor to Workplace Violence” by Karie Gibson, Lauren Brubaker and Andre Simons rightly highlights the crucial role that public humiliation plays in triggering such violent acts. However, beyond the immediate threat of homicide, there exists a broader spectrum of potential risks posed by former employees, including acts of sabotage, espionage, vandalism and cyberattacks, all of which demand attention and proactive measures from security professionals.

The prevalence of non-violent acts perpetrated by former employees is often underreported and underestimated, yet their impact can be just as devastating, if not more so, both financially and in terms of public safety. For example, consider the case of a terminated telecommunications employee who sabotaged a fiber trunk line, resulting in a catastrophic communications outage that not only incurred millions of dollars in damages and fines but tragically led to the loss of a life due to the inability to reach emergency services. Similarly, deliberate tampering with natural gas distribution lines by a former employee of a gas company led to unsafe conditions and significant financial losses.

While preventing workplace homicides remains paramount, it is imperative to adopt a holistic approach that encompasses all potential threats posed by terminated employees. While fostering a supportive workplace culture and providing training on respectful behavior are crucial steps in mitigating the risk of violence, additional measures are necessary to address the broader spectrum of potential threats.

Drawing from experience in critical infrastructure security, two key components emerge as essential supplements to traditional risk mitigation strategies: post-termination monitoring and the implementation of comprehensive “softeners” for separated employees.

Post-termination monitoring involves staying vigilant and maintaining contact with former employees, particularly those who exhibit red flag behaviors or indicators of potential risk. This monitoring should be conducted discreetly, utilizing covert methods such as social media surveillance to gather intelligence and detect any signs of retaliatory actions. In one notable instance, a former employee’s ex-girlfriend reported plans of sabotage, providing critical intelligence that enabled law enforcement to intervene and prevent a potentially catastrophic event. This underscores the importance of proactive monitoring and the value of leveraging external sources for threat detection.

Additionally, the implementation of robust softeners, including generous severance packages, counseling services and continuation of benefits, can help mitigate feelings of humiliation and resentment among separated employees. While these measures may entail significant costs, they pale in comparison to the potential repercussions of unchecked retaliation or violence.

By adopting a proactive and comprehensive approach to addressing workplace violence, organizations can better safeguard their employees, assets and reputation. Collaboration between security, human resources and leadership is essential in identifying, assessing and mitigating potential threats at every stage of the employment lifecycle. From pre-termination assessments to post-termination monitoring, it’s imperative to remain vigilant and responsive to evolving risks.

While the prevention of workplace homicides remains a critical priority, it’s essential to broaden our perspective and recognize the many forms of threats posed by former employees. By implementing proactive measures such as post-termination monitoring and comprehensive softeners, organizations can mitigate the risk of violence and create a safer, more secure work environment for all. By addressing the root causes of workplace violence, including feelings of humiliation and resentment, businesses can foster a culture of respect, empathy and accountability, ultimately reducing the likelihood of violent incidents and preserving the well-being of employees and the integrity of the organization.

Expanding on the concept of post-termination monitoring, it’s essential to consider the long-term implications and potential for escalation of risks. Former employees may harbor grievances or feelings of resentment that can fester over time, leading to retaliatory actions months or even years after their departure. As such, ongoing surveillance and intelligence gathering are crucial components of a comprehensive security strategy. By staying informed and proactive, organizations can detect and mitigate potential threats before they escalate into serious incidents.

Furthermore, the implementation of robust softeners should be tailored to individual circumstances and risk profiles. While generous severance packages and counseling services can help ease the transition for separated employees, additional measures such as job search assistance and continued access to company resources may also be warranted. By providing comprehensive support, organizations can demonstrate empathy and mitigate the risk of retaliation or malicious intent.

Moreover, proactive engagement with law enforcement and relevant regulatory agencies can enhance threat detection and response capabilities. By sharing intelligence and collaborating on risk assessments, organizations can leverage external expertise and resources to strengthen their security posture. Additionally, participation in industry-specific forums and information-sharing initiatives can provide valuable insights into emerging threats and best practices for prevention and mitigation.

Finally, ongoing training and education are essential components of a proactive security strategy. By raising awareness and empowering employees to recognize and report potential threats, organizations can create a culture of vigilance and accountability. Regular drills and simulations can help reinforce security protocols and ensure readiness in the event of an emergency all as part of a Business Continuity Plan (BCP) and Exercise program.

Addressing workplace violence requires a multifaceted approach that extends beyond traditional risk mitigation strategies. By adopting a holistic framework that encompasses proactive monitoring, comprehensive softeners, collaboration with external stakeholders and ongoing training and education, organizations can mitigate the risk of violence and create a safer, more secure work environment for all stakeholders. By investing in prevention and preparedness, businesses can safeguard their employees, assets and reputation, ultimately preserving their long-term viability and success.

KEYWORDS: asset protection employee monitoring employee risk workplace safety workplace violence prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan

Alan Saquella, CPP, is an influential security and investigations expert with more than 30 years of security and investigations experience in corporate and public organizations at the executive level. He served for many years as the Security Operations and Investigations Director at Cox Communications before assuming his current role as a faculty team member at Embry-Riddle Aeronautical University — College of Business, Security and Intelligence. Saquella is also the Director, Investigations and Research at Verensics and a Member of the Identity Theft Advisory Board. Image courtesy of Saquella

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fist in black and white

    Creating a safer workplace: California Senate Bill 553 becomes law

    See More
  • Puzzle with missing piece

    A critical challenge: Understanding and addressing insider threats

    See More
  • Small business store fronts

    Protect small businesses: Addressing security threats and insider risks

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!