Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

As Violence Prevention

July 1, 2005
Access control is to workplace violence prevention as a fire extinguisher is to preventing a fire. No business that is serious about providing a safe and secure work environment would dare be caught without either. The whole point of effective access control is to keep the bad guys out, or at least give an early alert so help can be called. This sometimes gets lost in the shuffle of high tech mania and “let’s get the latest gadget.” A truly effective access program is based on one part common sense and another part strategic thinking and business strategy alignment as well as some organizational cultural tinkering. Throw in some policies and, of course, some technology.

Common sense

As Voltaire once quipped, “Common sense is not so common.” Access controls should allow an organization to consciously control access to their facilities, which, simply put, means all ways of accessing the facility should be controlled. Most firms tend to do a good job at the obvious places where high volumes of people enter the facility, such as the front door, etc. However, much more attention needs to be given to that door that is propped open in the middle of the day or late at night to let some air in the facility. It is not only employees who know that this is an easy way into the facility.

How vulnerable?

A standard part of any site vulnerability or risk assessment is to come to the facility unannounced. In 10 years of doing assessments this author is still surprised by the high number of facilities that we are able to get into. My favorite one is to come around 10:00 p.m., when the janitorial crew is cleaning up. We often find a door propped open with no one in sight. Easy pickings.

The point here is that security personnel need to regularly conduct risk assessments by showing up unannounced and finding what we find – a lot of violations of their security procedures or practices that are contrary to effective access control.

Security and access control need to be aligned with the organization’s business strategy. For example, any public entity must have public access to its facility, whereas a top secret skunk works operation must carefully scrutinize every person’s entry through several layers of security.

Organizational culture

Security professionals too often focus on creating draconian policies and procedures to direct people’s behavior; but a much more powerful way to control behavior is through the creation of an overarching set of principles that are embedded in the culture to create self and peer control. Lou Gerstner, former CEO of IBM, put it best when he said, “I have learned…the importance of articulating a set of principles that drive people’s behavior and actions. And that’s a much more powerful leadership tool than a bunch of procedures and guidelines.”

An area where this is directly applicable is the concept of creating a security-conscious work environment, where every employee becomes an extension of the security department because they understand the nature of the issues the firm faces and the impact that their behavior can have. A company will never achieve this level of commitment and behavior by simply creating more and/or better policies.

Not that policies should be forgotten; far from it. But once a company has completed the creation of a masterful set of access control policies and procedures its work is not finished. Warning – if the policies are not integrated and in alignment with safety, human resource and of course, legal requirements those policies will amount to nothing more than a waste of time.

Companies should make sure to work closely with the training folks to bring its policies to the masses in a way that they not only learn what the correct procedures and guidelines are, but more importantly in a way that they will be remembered or easily accessed as a reminder. For a policy to be effective, it must be communicated, understood and followed. It is security’s job to make sure this happens.

There is no shortage of technological tools to choose from in today’s security conscious environment. The key is to match the technology to the organization’s needs and to remember that “form follows function.” First, be very clear on the function and outcome trying to be achieved, and then choose technological solutions that fit this. Don’t be fooled into believing that the technology can drive the business where it needs to go and eventually the business will catch up, as this rarely works.

In the end, an effective access control program is one that is well thought-out based on the business realities of the organization – a program that appropriately aligns with the overall business strategy of creating a safe and secure work environment.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Blog Logo

    Workplace Violence Incidents at Two Hospitals as Security Seeks Prevention Strategies

    See More
  • Nurse puts on gloves

    Investigating violence prevention and healthcare workplace violence programs

    See More
  • terror

    DHS Policy’s Targeted Violence and Terrorism Prevention program (TVTP) hosted 5th Digital Forum on Terrorism Prevention

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • Security of Information and Communication Networks

See More Products

Events

View AllSubmit An Event
  • September 19, 2024

    Mastering the Fundamentals: Mitigation, Prevention, and Response to Violence

    ON DEMAND: Organizations face a plethora of threats, including altercations, overdoses, robberies, intruders, angry clientele, and active shooters. Mastering the fundamentals of safety is key to reducing all forms of violence and disruption, not only in the K-12 space but in other industries as well.  
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing