Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

INTEGRATED Systems: Top Choice to Avoid Work Violence

February 1, 2004
There are three choices in dealing with the risk of workplace violence. First, you can ignore the risk, throw in the towel and believe that it won’t happen in your organization. This is the most frequent approach when dealing with the risk. The belief, call it an ostrich approach, is the top obstacle for managers and security executives who should be proactive. Generally, ostriches conduct a formal or intuitive assessment of the statistical risk of violence occurring in their workplace. Because the odds are very small, not much is put into addressing the issue.

A second choice is to transfer a portion of the risk via insurance. Here the organization does what’s legally required to minimize liability. However, fundamentally these firms just trade the cost of taking preventative efforts for getting payment to cover costs in the event of an incident. The bosses rest easier knowing that the financial impact of a violent incident on the continuity of business has been mitigated. Unfortunately, the real impact on people injured or whose lives are damaged is not necessarily mitigated.

People and the Environment

The third choice: reduce a substantial amount of the risk by reducing “at risk” behaviors, those individual and organizational behaviors that tend to increase risk.

This latter approach is the one taken by progressive organizations that actually operationalize their mission statement that people are their most important resource. They genuinely focus on providing a safe workplace free of known hazards.

These organizations focus on a comprehensive strategy to prevent injuries before they occur and recognize the importance of assessing both individual and organizational risk factors.

Avoid Single Focus

One danger is to place the sole focus on individual behaviors. Too often, firms and their security operations spotlight early warning signs, behavioral profiles and individual threat assessments for those identified as “being at risk.” More progressive organizations instead take a 360-degree view by combining the individual threat assessment approach with one that also assesses endemic organizational behaviors that may create a hostile work environment. The bottom line: recognize elements that make things ripe for “the perfect storm.” Such elements can include a potentially violent or at-risk individual; an organization, facility, department or group with a hostile work environment or one that’s violence prone; and when the at-risk individual is exposed to a stressful event.

A solid first step is a facility risk assessment to determine a sound preventive physical security program as well as an organizational assessment to identify management behaviors, polices, practices, environmental and organizational factors that may lead to a higher propensity for workplace violence.

Security and other appropriate managers need to classify at risk behaviors and then develop appropriate actions at each of the commensurate levels of risk. One model borrows from the threat levels used for Homeland Security.

LOW

Identify what risks of violence are inherent to your specific organization, industry or geographic location. Develop a plan to mitigate any potential exposure.

For example, if it’s a warehouse in an area where several robberies or assaults have occurred in other company parking lots, consider steps such as more and better lighting, security video and escorts for employees to and from their cars, when requested.

Train security officers, supervisors and employees to recognize early warning signs and how to report or intervene to effectively address them.

Proactively communicate the value of the security program and any employee assistance resources to employees and train supervisors how to influence employees to use the programs.

GUARDED

Conduct a facility risk assessment to ascertain vulnerabilities. Take actions to address these weaknesses, including improved perimeter security, particularly access control.

Establish a protocol with local law enforcement to expedite response to an incident. This includes familiarizing public safety officials with a facility and its physical layout.

ELEVATED

Conduct a desktop review or rehearsal of your workplace violence emergency response plan to test how the pieces work and learn where improvements are necessary.

Review factors common to organizations with a higher propensity for incidents and identify the areas within the organization possessing a lot of these factors. Conduct an organizational assessment in these specific areas and develop a positive employee-relations plan to address the problems identified.

Conduct a threat assessment of individuals identified as at-risk. This may include a background check, a threat assessment or “fitness for duty” evaluation. Take specific actions based on the information learned. One action, often with input from the organization’s counsel, a labor attorney, law enforcement or workplace violence professional, is to determine appropriateness of obtaining a workplace restraining order. This should not be an automatic decision but well thought out because a restraining order could escalate the situation.

HIGH

Security can conduct surveillance of the at risk employee with, in appropriate cases, the involvement of law enforcement. If specific individuals have been identified as being potential targets, relocate their work location and/or provide additional security protection.

SEVERE

Consider closing a facility or area. The most effective way to deal with work violence is to identify what the real risks are, develop mitigating strategies to reduce or eliminate the risks and have a comprehensive strategy focused on early identification and averting issues.

With the value of hindsight, after an incident, security and management generally are able to identify how the incident could have been prevented. So the trick is to anticipate incidents through “what if” scenarios and then implement preventative actions in real-time. For example, in a 2003 New York City Hall shooting, if authorities had required all personnel to go through metal detectors, the killings probably would not have happened.

With serious planning and diligent application of proactive measures, most security operations and their top management have the capability of preventing most incidents.

About the Author

W. Barry Nixon is executive director of the National Institute for Prevention of Workplace Violence, Inc. The private firm’s Web site is www.Workplaceviolence911.com. Contact Nixon at wbnixon@aol.com.

SIDEBAR 1: CLASSIFY WORK VIOLENCE RISK

Security can take a page from the Homeland Security risk alert model.

Severe — Severe risk of an imminent incident

High — High risk of an incident to occur

Elevated — Significant risk because of identified person or situation

Guarded — General risk that something could happen

Low — Low risk thanks to progressive policies and ongoing reviews

SIDEBAR 2: ACTIONS TO TAKE

There are actions which security executives and management can take matched to each level of infrastructure.

Basic building blocks include:

  • Workplace violence prevention policy
  • No weapons policy
  • Threat assessment team trained in how to deal with crisis and emergency situations
  • Crisis communication plan
  • Employee assistance program or pre-identified resources to assist employees in dealing with stressful situations and personal problems
Ongoing actions include:
  • Clearly defined and communicated employee problem resolution processes periodically assessed for perception of fairness and effectiveness
  • Frequent and regular communication about the organization, its direction, changes, performance, etc.
  • Progressive human resource and security policies and practices that address issues such as sexual harassment, reference and background checking, safety, security, fair and respectful treatment of people, among others.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • iot-enews

    How to prioritize security and avoid the top 10 IoT stress factors

    See More
  • alarm-security-fp1170x658v4.jpg

    The hidden costs of alarm systems (and how to avoid them)

    See More
  • New Magazine Launched to Help Select Top Talent and Avoid Making Bad Hires

    See More

Related Products

See More Products
  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing