Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Dealing with the Risk of Workplace Violence

April 1, 2005
There are only three choices you have to deal with the risk of workplace violence:

  • To ignore the risk (in other words, you can throw the dice and believe that it won’t happen in your organization).

    This approach is the most frequent approach that is taken to dealing with the risk of workplace violence. This belief, better known as the ostrich approach, is the number one obstacle to managers taking a proactive preventative approach to dealing with workplace violence.

  • To transfer a portion of the risk via insurance.

    This approach is one in which the organization does what is legally required to do to address issues to minimize any legal liability.

  • To reduce a substantial amount of the risk by reducing “at risk” behaviors (individual and organizational behaviors that tend to increase risk).

This approach is the one taken by progressive organizations that actually operationalize their mission statement that people are their most important resource and genuinely focus on providing a safe workplace free of known hazards.

An effective approach for dealing with “at risk” behaviors is to classify them and then develop appropriate actions that need to be taken at each of the commensurate levels of risk. One model, which borrows from the threat levels used for Homeland Security, can be used to guide your actions.

SEVERE

Severe risk of workplace violence incident

HIGH

High risk of workplace violence incident

ELEVATED

Significant risk of workplace violence incident

GUARDED

General risk of workplace violence incident

LOW

Low risk of workplace violence incident

Low

  • Identify what are the risks of violence that your specific organization, industry or geographic location may be exposed to and develop a plan to mitigate any potential exposure.

  • Train your supervisors and employees to recognize the ”early warning signs” and how to report or intervene to effectively address them.

  • Proactively communicate the value of the EAP to employees and train your supervisors in how to effectively influence employees to use the program.


Guarded

  • Conduct a Facility Risk Assessment to ascertain vulnerabilities and take actions to address these and improve perimeter security particularly access control.

  • Establish a protocol with local law enforcement to expedite response to an incident. This includes familiarizing them with your facility and its physical layout.


Elevated

  • Conduct a desktop review or rehearsal of your workplace violence emergency response plan to test how the pieces work and learn where improvements are necessary.

  • Review Factors Common to Organizations that have a higher propensity for incidents of workplace violence and identify the departments that have a lot of the factors.

  • Conduct a Threat Assessment of individuals that are identified as “at risk.”

  • Using the input of your labor attorney, law enforcement, security management and workplace violence professional; determine appropriateness of obtaining an Workplace Restraining Order. Note that this should not be an automatic decision and should be well thought out because in many cases a restraining order can exasperate or escalate the situation.


High

  • Involve law enforcement to take preventative actions and/or enlist private security to conduct surveillance of the “at risk” employee.

  • If specific individuals have been identified as being potential targets, relocate their work location and/or provide security protection.

    Severe

  • Close the facility.



The bottom line is to really and intelligently face and act on the risks of workplace violence.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hospital-freepik67928.jpg

    How audio analytics reduce the risk of workplace violence

    See More
  • wokrplace violence second leading cause of death on the job

    Death on the Job report shows effect of COVID-19 on the workplace; workplace violence 2nd leading cause of occupational fatalities

    See More
  • Assessing Workplace Violence Risk to the Business

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing