Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSectorsSecurity Leadership and ManagementHospitals & Medical Centers

Workplace Bullying: How Security Professionals Can Help

Bullies poison their work environment with low morale, fear, anger, gossip and depression. The employer pays for this in lost efficiency, absenteeism, high staff turnover, severance packages and lawsuits.

By Jim Sawyer
Workplace Bullying: How Security Professionals Can Help
April 1, 2017

Workplace bullying is not a topic often explored by enterprise security professionals. However, this will likely change in the coming years, given the scope and the immensity of the problem.

How do we define workplace bullying? The Workplace Bullying Institute defines it as repeated, health harming mistreatment of one or more persons (the targets) by one or more perpetrators. It is abusive conduct that is threatening, humiliating or intimidating; constitutes work interference or sabotage; and can be physical or verbal.

An additional definition includes: “Workplace bullying is repeatedly attacking someone verbally or physically with the intent of causing hurt, humiliation, belittlement, isolation and discrimination.”

Sexual harassment, in addition to racial, gender, disability and age discrimination are also forms of workplace bullying. The bully can be an employer, peer, subordinate or even client or a supplier.

Workplace bullying is driven by the perpetrators’ need to control the targeted individual(s), and it is initiated by bullies who choose their targets, timing, location and methods. It can be acts of commission (doing things to others) or omission (withholding resources or information from others). Workplace bullying can escalate to involve others who side with the bully, either voluntarily or through coercion, and it undermines legitimate business interests when the bully’s personal agenda takes precedence over his or her work (and the work of their victim). Altogether, workplace bullying is akin to domestic violence at work, where the abuser is on the payroll.

The typical bully uses aggression and violence to compensate for overwhelming feelings of inadequacy. Some bullies suffer from mental health disorders (i.e., narcissistic, paranoid and antisocial personality disorders).

Most bullies lack self-discipline, the ability to pursue long-terms goals or to work in a team. According to the United Kingdom (UK) National Workplace Bullying Advice Line, bullies feel entitled to special treatment, seek attention, lack empathy, are full of rage and envy. Bullies are consummate liars, and they exploit and then discard their co-workers. In other words, bullies are emotionally immature and exploitative control freaks.

Bullying is a traumatic, stressful experience that often results in the mental breakdown and otherwise ill-health of the victims. Physical and mental health problems, fatigue, low functioning and suicide are common. The victims can no longer be productive at work and are sometimes forced to resign, even as the bully is rewarded and promoted.

Surveys in the UK, Canada, Australia, Ireland and the U.S. indicate that physical violence in the workplace is rare, but one in five workers is exposed to verbal and emotional abuse. The direct and indirect costs – in healthcare: increased workloads, stunted creativity, staff turnover, reduced productivity, absenteeism and corporate dysfunction – may amount to $40 billion in the UK and $200 billion in the United States.

Only few countries, such as Sweden and the United Kingdom, have specific laws that tackle workplace violence, abuse and bullying.

Workers and employers lack education on how to recognize abuse, curb it and effectively cope with its aftermath.

 

Workplace Bullying Prevalence

An estimated 37 percent of the U.S. workforce, or 54 million Americans, report being bullied at work, and an additional 12 percent witness it. This totals 40 percent of workers. This is a “silent epidemic,” as 40 percent never report it.

But bullying can have personal side effects, such as anxiety, panic attacks, depression and PTSD.

In addition, a targeted victim has a 64 percent chance of losing their job for no reason, as 72 percent of workplace bullies are in supervisory roles.

 

How to Mitigate Bullying

Teach your staff that bullying is bad for business. Workplace bullying will cause:

  1. High turnover, which is expensive for companies as they invest in hiring a new employee only to lose them shortly thereafter, possibly to a competitor;

  2. Low productivity, since employees are not motivated to do their best and often out sick due to stress-related illnesses;

  3. Lost innovations, since the bully is more interested in attacking people advancing the company, and the victims become less likely to generate other ideas; and

  4. Difficulty hiring quality employees as word spreads that the company has problems in the work environment.

 

From the outset, the 10 common mistakes that may foster or enable workplace bullying are:

  1. Accepting it as part of the enterprise’s culture.

  2. Minimizing the problem.

  3. Not encouraging reporting.

  4. Protecting bullies.

  5. Not documenting events.

  6. Neglecting to educate staff about the problem.

  7. Not engaging a bully.

  8. Not following up with the victim.

  9. Not involving Human Resources.

  10. Allowing situations to fester.

 

A key point for security executives is that workplace bullies don’t just pick and single out the “odd duck” and loner in the crowd.  They will target outstanding staff with strong interpersonal skills – in many cases those who are well liked and respected. Remember: one motivation for workplace bullying is jealousy. Security executives should also divorce themselves from any mindset that workplace bullying is just a matter of cultural sensitivity that never affects production. That belief is fiction. Consider and stress to your team that between 10 percent to 52 percent of a bullied employee’s work time is spent defending themselves, networking, stressed, becoming de-motivated and coping with their bullied existence. These are realities that impact the bottom line.

Teach your team the six signs that a workplace is “toxic.” They include widespread anger or frustration among the staff; the bully is admired while victims are belittled; work progress is dysfunctional; staff can identify dysfunctional relationships; there is obvious hypocrisy in the company; or there are cold-hearted ways established and used to control people.

Security officers need to learn the many forms workplace bullying takes. This includes: verbal abuse or swearing; staff being singled out or excluded; actions are taken that humiliate staff members; or “practical jokes” being repeated time and again.

Officers need to report their observations immediately and intervene as needed to support the victims of workplace bullying. Security staff should also familiarize themselves with the negative impacts staff feel when bullied, including stress, absenteeism or low productivity, lowered self-esteem or depression, anxiety, digestive upsets, high blood pressure, insomnia, trouble with relationships due to stress over work, and even post-traumatic stress disorder.

This is why security staff needs to be trained and attuned and actively invested in both preventing and identifying workplace bullying.

Workplace bullying is not always the world of a lone actor, either. In a “mobbing” situation, co-workers, subordinates or superiors can gang up on someone to force them out of the workplace through rumor, innuendo, intimidation, humiliation, discrediting and isolation. This emotional abuse in the workplace can be malicious, nonsexual, nonracial or general harassment, but it’s essentially psychological terror or aggression.

In many cases security staff may be the company’s best bet to address “mobbing” and sanctioned group bullying.

So what strategies can your security team take to offset a bully or mob?

  1. Break up cliques – they can lead to “mobbing.”

  2. Do not tolerate scapegoating.

  3. Be aware of biases.

  4. Prevent gossip – showcase professional behavior.

  5. Investigate bullying reports immediately.

  6. Create a strong, well-known reporting process.

  7. Provide ongoing mentor support for bullied staff.

  8. If the bully is a supervisor, go higher in the organization.

  9. Terminate the bully if nothing changes.

When investigating workplace bullying, be sure to capture the names of those involved, the times and places, any witnesses, an incident summary (including quotes) and contact information.

There is one golden rule regarding workplace bullying that managers need to pursue and promote: have a policy on workplace bullying. If the word “bullying” is not in the policy, then you have no policy.

To help emphasize the scope and importance of the problem, advise your staff collectively that there is a link between workplace bullying and self-injurious behavior – suicide.  Left unchecked, workplace bullying will have a damming impact on the workplace and the staff caught up in the poisonous culture that bullying promotes.

KEYWORDS: security risk management workplace security workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim Sawyer, Contributing Writer

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • school-enews

    How Security Professionals Can Help Create Positive School Memories

    See More
  • slashpro-1

    How Slash Resistant Clothing Can Help Protect Security Professionals

    See More
  • office space with employees working

    How empathy can help prevent violence in the workplace and in schools

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!