Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Recognize. Respond. Survive. A new approach to workplace violence prevention

Take a proactive approach to preventing violence.

By Chad Ayers, Andy Sexton
SEC0121-Active-Feat-slide1_900px
SEC0121-Active-slide2_900px
SEC0121-Active-Feat-slide1_900px
SEC0121-Active-slide2_900px
January 11, 2021

If an armed assailant started shooting in your facility, could you, your employees and your organization survive? When we ask organizations that question, we get many different answers that range from an absolute ‘yes’ to ‘I have no idea.’

Many of our clients even tell us that it could never happen because they have layers of protection such as a no weapons policy, locked doors and surveillance cameras. These layers of protection are great, but they are only one part of an effective plan for protecting an organization and its employees from an act of violence.

Currently most organizations take a reactive approach to addressing these concerns. We believe in having a proactive prevention and response plan that goes beyond a checklist or survival manual. Does your plan include training that empowers all employees to: recognize a threat, effectively respond, and survive an act of workplace violence?

 

Recognizing a Threat

A 2019 U.S. Secret Service study indicates that 41% of assailants demonstrated observable behavior changes prior to the attack. The same study reveals that 87% of assailants experienced at least one stressor.

Although these early warning signs are often present prior to the incident, they are rarely reported. There are a multitude of reasons or excuses given for not reporting concerning behaviors. Learning to recognize these warning signs and creating a culture where reporting concerning behavior changes is accepted and expected is an important first step in prevention.

Awareness training of what constitutes a concerning behavior and how the organization is prepared to assist an employee is needed.

Some of the early warning signs you should be looking for are development of personal grievances, uncharacteristic drop in work performance, inappropriate interest in weapons and acts of violence, and experiencing a recent significant personal loss.

Most assailants also experienced multiple exterior stressors like financial strain, disciplinary action taken by an employer, and relationship issues. Although organizations often have an Employee Assistance Program (EAP) in place to help employees overcome these personal issues, most employees are not aware of the EAP, what it can help them with, or how to activate it.

The availability of an anonymous reporting system is an important factor in encouraging employees to report concerning behaviors. Regular training for all employees on how to recognize concerning behaviors, how to report these behaviors and the benefits of an employee assistance program are a must to any effective workplace violence prevention program.

Recognizing early warning signs is important. It is also important that the immediate signs of violence are recognized as well. Increasing situational awareness is how to accomplish this.

Often people that were present when the first shots rang out said they heard the shots but did nothing to respond because they did not know it was gunfire.

Think about a manufacturing plant and the variety of loud bangs and noises you hear daily. Educating employees on how to identify gunfire in their work environment is an effective way to overcome this problem.

You must also have a good way to communicate immediate threats to allow people to respond appropriately. Mass communication through a PA system, handheld radios, or a notification app are all great ways to quickly spread information. The information should be spread using plain language not secret codes that could be easily misunderstood or miscommunicated.

 

Responding to the Threat

Commonly, individuals will indicate that if a shooting happened, they would hide behind their desk or a filing cabinet. Since most desks and filing cabinets are not bulletproof, taking passive actions like these are not your best option if you intend to survive.

We believe training should empower employees to develop the necessary habits to make survival the outcome, not a coincidence. Equipping your employees with proven response options makes this possible. Getting out and removing yourself from the area affected by the violence gives you the best chance for survival.

Organizations typically have great markings for fire escape paths but in an active assailant event this option may not be the safest way out. Building familiarity of alternative exits is needed in case common exit routes place an individual in unnecessary danger. It is not possible to exit in all situations, so understanding how to barricade a given area and limit access by the assailant is an additional option.

We can’t stop there because, as hard as we try to prevent access, the bad guy may still make it in, so we need to be prepared to fight. Many popular training programs only encourage fighting as a last resort. This is great until your survival hinges on fighting as the first and only option. Most of these attacks are committed by a solo gunman.

Identifying improvised weapons and using power in numbers are options that should be considered quickly to end violence. Seeking the assailant is never a good idea, but you may come face to face with the person and need to fight right away. Training individuals to only fight as a last resort might cause hesitation and lead to death or injury that would have been avoided if swift aggressive action was taken immediately. Everyone may not be comfortable fighting an armed assailant, therefore regular training is important. Simple methods can be taught that educate people on proven methods to gain control of a weapon and the assailant.

 

Surviving the Threat

Once the attack stops, we must shift from responding to the threat to surviving: surviving as individuals and as an organization. Emergency responders will be there to help in this step, but they may not be there as fast as you would expect. Law enforcement will be there within minutes, but their primary objective will be to find the assailant and stop him from hurting anyone else. Fire and EMS workers will also be there, but they cannot enter until it is safe for them to do so. In some cases, this can take more than 20 minutes.

According to the Hartford Consensus, having bleeding control equipment and training people to use it can significantly decrease the number of deaths. In instances that have resulted in many injured people, professional first responders have used bleeding control equipment that was already on site when they ran out of what they brought in with them.

In the days and weeks after the violence, individual mental health recovery and organizational survival should be the focus. Expect the physical facility to be shut down for an extended period during the criminal investigation and clean-up of the crime scene.

Business continuity plans often cover natural disasters or civil disturbances but often overlook acts of violence in the workplace. If you don’t have a solid business continuity plan that addresses surviving an act of violence, you may never re-open.

The idea of training employees to respond to acts of violence in the workplace is not new. Security professionals too often fall back on outdated or ineffective practices to save money or because “nothing has happened yet.” With all the stress and division in our country currently, there has never been a better time to evaluate your organization’s readiness. Does your current training prepare every employee to recognize early warning signs so you can prevent future attacks; are the response options proven; and have you taken reasonable steps to increase the survival odds for each employee? The cost of providing minimal training that just checks the box could be of significant value. The value of providing training proven to empower individuals to survive cannot be measured.

KEYWORDS: access control physical security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chad Ayers is Co-Founder of ProActive Response Group. He served as a Sheriff’s Deputy for Greenville County in South Carolina for 12 years. Ayers was a member of the SWAT team, where he served as an assistant team leader. He is experienced in hostage negotiations and rescue as well as active shooter events. Ayers also assisted in the creation and implementation of the Greenville County Sheriff’s Office active shooter response program. In 2006, he was named Greenville County Sheriff Rookie of the Year. In 2008, Ayers received a Distinguished Service Award, and in 2009, he was awarded two Letters of Commendation for undercover work. He was the recipient of the Greenville County Sheriff’s Medal of Valor in 2011 and 2012.

Andy Sexton is Co-Founder of ProActive Response Group. He spent 12 years with the Greenville County Sheriff’s office in South Carolina, where he held the rank of Uniform Patrol Sergeant. Sexton was a member of the SWAT team for six years and served as an assistant SWAT team leader. He was involved in numerous high-risk incidents, including hostage rescues as well as the protection of high-level dignitaries. Sexton served on the training committee for Greenville County Sheriff’s Office. He was also chosen to assist in the creation and implementation of the Greenville County Sheriff’s active shooter response curriculum. In 2012, Sexton was awarded the Medal of Valor.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Workplace Violence Prevention Plan

    Workplace violence prevention: How to formulate a plan

    See More
  • Rodriguez podcast news header

    Prevent workplace violence with a mental health-based approach

    See More
  • health-workers-freepik1170x658v7.jpg

    Understanding H.R. 1195: The Workplace Violence Prevention for Health Care and Social Service Workers Act

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing