Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Education & Training

First Faces and Protected Spaces

Security Training for Receptionists and Greeters

By Bryan Warren
Receptionist
June 6, 2011
Receptionist Inbody

Receptionists and employees that are in a greeter type of position in a company carry with them a responsibility that has a definite effect upon the success of an organization: making a good first impression. It has been said many times: you do not get a second chance to make that first impression, but there is much more to this type of job than most people imagine. Receptionists, greeters and information clerks have to answer telephones, route and screen calls, greet visitors, respond to inquiries from the public and assist with way finding and providing information about the organization. Some are responsible for the coordination of all mail into and out of the office and for the delivery of packages and parcels and courier pick ups. There are myriad other functions that these employees provide for companies on a daily basis, but often they are overlooked when it comes to one of the most important roles that they can play – contributing to the overall security of your facility, employees and assets.

Receptionists and greeters can contribute significantly to the security of an organization by helping to monitor the access of visitors (a function that has become increasingly important) as well as being the “eyes and ears” of security. Security at any organization should be every employee’s responsibility, and your receptionists and greeters are certainly your first line of defense when it comes to spotting and reporting suspicious activity, stopping or identifying unwelcome visitors and protecting the perimeter of the facility. With the appropriate training on what to look for and how to respond to unusual activity or adverse incidents, these employees can be a huge asset and a force multiplier to any security program.

The first step is not to determine if these employees need training, but rather how much training and what types they should receive. One method is to conduct a risk assessment of the area based upon some objective security related issues that might occur and then formulate the probability and severity of the issue and determine how much risk actually exists. This step is especially important at larger, more complex organizations with multiple entry and reception points and differing levels of potential threats. For example, in a hospital setting, you may have a reception desk near the emergency department that routinely deals with persons that are ill, injured, emotionally unstable or suffering from behavioral health issues. Such a reception desk and its staff would likely need more specific types of training on how to handle the numerous types of security related situations that may arise than say a volunteer desk near the gift shop of the facility. Specific security related issues that might be considered include the probability of suspicious behavior (basically could occur anywhere at any time), dealing with peddlers or salespersons, those individuals that might be probing the facility to commit crimes of opportunity (common in office environments where internal security safeguards such the routine securing of personal items by staff is not observed) all the way up to direct threats of violence or physical assaults.

After this risk analysis is complete for a reception area, security training for the staff at these locations should be separated into levels or tiers based upon the overall risk and probability of a security related event. There should be a basic training program for all receptionists and greeters which educates them on issues such as what constitutes suspicious activity, what is their role in reporting such activity and what countermeasures currently exist that might help them in this task. As you progress up along the continuum of potential threats and their probability, a higher tier of training might include de-escalation techniques and how to deal with angry or intimidating behaviors and the warning signs of aggressive and non-complaint subjects. A third tier might then include all of the previous information as well as how to deal with direct threats of violence or physical assaults up to and including active shooter scenarios. By using this methodology, the training programs can be broken down in sections and presented as a series of continuing education for staff, each successive program building upon the last.Once these issues have been evaluated for their probability of occurrence as well as their impact upon staff, property and business operations, the levels of preparedness should then be considered. In an area with a high probability for emotionally charged confrontations involving the receptionist (such as the emergency department desk referred to earlier) certain countermeasures should be in place such as security in or near the immediate area, panic/duress alarms, a “safe room” that could be used by staff to shelter in place should an event occur, etc. While such countermeasures are very useful, the training on how and when to use such countermeasures is one of the most overlooked aspects of such preparations (after all, a panic button serves no purpose if the people working there are not aware of its existence or do not know when or how to use it).

In the first tier of training, basic customer service, some scripts for how to deal with unhappy persons and what behaviors should immediately be viewed as unusual or suspicious should be discussed as well as some basics of the job that may relate to security such as way finding directions on a list of commonly sought destinations within the company (such how to get to the human resources office) and a review of visitation polices and procedures. Access control procedures, visitor and employee ID badging processes and the dangers of “tailgating” secure doors by unauthorized personnel are certainly issues that need to be addressed at this basic level. The potential threat of peddlers, unwanted solicitations and would-be thieves or “probers” and crimes of opportunity should also be discussed and how to successfully combat or report such attempts when they occur. Depending upon the duties and responsibilities of the receptionist or greeter, common social engineering scams or other such issues such as pretext telephone calls to solicit confidential information or the theft of mail or packages should also be reviewed.

 

A Higher Tier

For a higher tier security training program, the issues of how to successfully deal with upset, angry or irate customers or visitors should be included and should incorporate techniques not just for face to face confrontation but also how to respond to telephone calls that might lead to aggressive behavior or even threats of violence (such as bomb threats or threats to “shoot up the place”). There are many great programs that teach such techniques and these can easily be integrated into your existing training program or you can create your own based upon specific needs. Such programs should minimally include information such as warning signs and levels of anxious or irate behavior, the stages of verbal aggression and actions that the receptionist or greeter can take to de-escalate such behaviors such as appropriate communication techniques, proper physical positioning and how and when to retreat and summon additional assistance.

The highest tier of training would be a culmination of all previous levels of instruction  plus advanced training on topics such as how to deal with physically threatening or aggressive actions, to include damage to property, attempts at unauthorized entry into the facility (i.e. forcing their way through an access controlled door), crimes in progress (such as assaults which might occur in or near the area which the receptionist or greeter might witness) and  the most serious incidents such active shooter situations. Staff that is in areas where such incidents have a high probability should be well versed in what countermeasures exist, what their role is in the event of such a situation, how to summon help, and where they can withdraw to for safety.

While receptionists, greeters and other staff in such roles are often recognized as the first and last impression of a company, they should also be viewed as the first line of defense for the safety and security of all other staff, clients and visitors of the facility in which they work. These are positions that are critical to the overall success of any organization, and while security related issues may not affect them on a routine basis, it is imperative that they be well prepared should such an event occur. Their vigilance, timely reporting and intervention could easily mean the difference between a minor disruption and a significant incident. By empowering such employees with the knowledge to protect themselves and others, you will be recruiting active team members into your security program and improving your overall security culture.  

KEYWORDS: first line of defense suspicious behavior

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bryan warren authorpic

Bryan Warren is Director of Corporate Security for Carolinas Healthcare System (based in Charlotte, N.C.). He holds a bachelor’s degree in Criminal Justice, an MBA with a focus on legal foundations of healthcare and more than 22 years of healthcare security experience. His certifications include Certified Healthcare Protection Administrator as well as Certified Protection Officer Instructor. He has been a contributor to numerous publications including Security Magazine, Campus Safety Magazine, the Journal of HealthCare Protection Management and Health Facilities Managementand has authored chapters for the IAHSS Basic, Advanced and Supervisory Training Manuals as well as a Workplace Violence Prevention chapter for the IAHSS Healthcare Safety Certification program. He is a two-time recipient of the Russell Colling Medal for Literary Achievement in Healthcare Security and currently holds the position of President of the International Association for Healthcare Security and Safety (IAHSS). He is the Sector Chief for Emergency Services in the FBI’s Infragard program in the Charlotte region and is a member of the American Society of Industrial Security International (ASIS), the International Law Enforcement Educators and Trainers Association, and the Southeastern Security and Safety Healthcare Council. In these roles he has provided numerous presentations nationally and internationally regarding security in the healthcare environment.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hospital

    Saving Money and Increasing Security with GTRI Training

    See More
  • Computer data thief

    Preventing Laptop Theft and Data Loss

    See More
  • healthupdate

    How 2012 Affected Healthcare Security

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!