Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementPhysical SecurityVideo Surveillance

Workplace Violence: How to Identify and Mitigate It in Your Enterprise

By Robin Baker
workplace violence
June 25, 2019

The Capitol Gazette in Annapolis, MD, the Inland Regional Center in San Bernardino, CA, and just recently, a disgruntled worker in Virginia Beach, VA who took his personal grievances out on his workers at a government office, killing 12 people. All recent examples of workplace violence that are becoming all too frequent.

According to a recent study by the Society for Human Resource Management (SHRM), approximately 1 out of 7 Americans do not feel safe at work. Nearly a quarter of employees polled said they had experienced an incident of workplace violence, with 14 percent of employees reporting incidents last year.

Even more, nearly one-third of American employees are unsure or don’t know what to do if they witness or are involved in a workplace violence incident.

And while the majority of HR professionals say their organization already provides workplace violence training to employees on how to respond to a workplace violence act, more than one-third do not provide such training to employees. Additionally, while almost all say their company has a process for identifying employees with a history of violence, more than half are unsure whether they have a workplace violence prevention program.

According to the research, Americans understandably feel safer when employers provide prevention and training response programs. Additionally, more employees know how to react if their organization already has a workplace violence prevention and/or employee response training program.

The Occupational Safety and Health Administration (OSHA) estimates that more than two million American workers are affected by workplace violence each year. Additionally, the Bureau of Labor Statistics estimated that more than 18,000 people suffered nonfatal injuries and more than 800 died as a result of workplace violence in 2017.

OSHA defines workplace violence as "any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site.” It can range from verbal threats to physical altercations or even homicide between employees, clients, customers or visitors.

How can workplace violence be identified and prevented? According to the US Department of Labor, indicators of workplace violence may include:

  • attendance problems
  • decreased productivity 
  • inconsistent work patterns
  • marked changes in personal grooming habits;
  • inappropriate comments, threats, throwing objects
  • evidence of possible drug or alcohol use/abuse
  • evidence of serious stress in the employee's personal life

The goal for enterprise security is to make your workplace a difficult target for violence, and if it does happen, be prepared to react quickly. If you make the investment in security and preparation, your employees will feel safer and respect you for valuing their safety and security.

This is where security technology, specifically, solutions that keep potential dangerous individuals out of your enterprise, can play a major role.

For example, watchlists of known perpetrators that are incorporated into a visitor management system are an effective tool to ensure that only authorized people enter your facility. With a quick swipe of an ID, visitors can be screened, checked in and badged or even turned away.

Integrations between perimeter protection detection systems (e.g., facial-recognition camera systems) with cloud-based visitor management systems, can sent alert your administrators, security personnel, Point of Entry (POE) Staff and even the local police to an unwanted visitor before they get to any of your entry points. It is not always possible to maintain a presence of security personnel at your front entrances. Here, self-service visitor management systems (i.e., kiosks) make it easy for contractors and other visitors to your facility to register themselves at an interactive kiosk and gain entry.

Individuals can often use a Driver’s License can be scanned at the visitor kiosk, or information can be entered manually into a system. Once your visitor has entered their information into a self-service kiosk, a system administrator, a security guard, or other personnel is alerted and can authorize or deny access based on any watchlist or sex offender entries. If a visitor who is denied access becomes a further threat, personnel can initiate any additional internal or external alarms, which may include alerting security personnel or initiating a hard lockdown.

Background screenings of visitors can quickly screen a visitor and decide if he or she should be welcomed or turned away. Premium solutions allow you to nearly instantly screen incoming visitors against the National Sex Offender Database, your own custom Watch List of unwelcome visitors, and your own custom VIP List. Many solutions allow you to quickly (and silently) communicate with your security team in the event of an emergency so you can initiate your emergency protocol.

If workplace violence does begin to unfold, you need to act quickly and appropriately. There are solutions available that allow your security team to lock down areas, even your entire facility, and alert first responders. When seconds count, emergency notifications can be sent to alert security to begin security protocol procedures, even before any hard-wired sirens or physical alerts are initiated. When a lockdown is called for, there are solutions that can send an audible siren to all users’ devices (computers and mobile devices) so even if they have headphones on or other applications running on their computers or mobile devices, they are able to hear the lockdown siren, look for their notifications, and take immediate action.

While more information on the causes of workplace violence and how to handle it is becoming known, violent situations do happen and unfortunately are happening more often. No enterprise is immune from workplace violence and no employer can totally prevent it. However, knowing some of the warning signs, employing security technology solutions, and providing security plans and training on security protocols can help to mitigate the risk of an event from taking place in your enterprise.

KEYWORDS: active shooter workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robin baker 2018
Robin Baker is the CTO of SilverShield Systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How Bullying Impacts the Risk of Violence in Your Enterprise

    How Bullying Impacts the Risk of Violence in Your Enterprise

    See More
  • workplace-violence

    5 Strategies to Mitigate the Impact of Workplace Violence

    See More
  • Could Wearables and Big Data Mitigate Workplace Violence?

    Could Wearables and Big Data Mitigate Workplace Violence?

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!