Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSectorsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical SecurityHospitals & Medical Centers

Integrated Solutions

Combat workplace violence with security technology

As Congress debates healthcare workplace violence prevention legislation, security leaders can look to technology to help employees stay safe at work.

By John Nemerofsky
healthcare worker

ozgurdonmaz / E+ via Getty Images

author

John Nemerofsky

healthcare worker
author
August 15, 2022

Workplace violence in the United States has reached epidemic proportions. There is no shortage of data that illuminates assaults, or the constant threat of assault, that occur in organizations of all sizes and across all industries.

The extent of the violence against workers is staggering. According to the Occupational Safety and Health Administration (OSHA), each year an average of almost 2 million U.S. employees report having been a victim of violence while on the job. The financial burden from the assaults cannot be ignored either. The Department of Justice puts the estimated annual cost to employers of workplace violence at $121 billion.

These incidents fuel rising apprehension across society, especially involving healthcare providers. Consider that three in five Americans (60%) report being concerned about the safety and security of loved ones in a hospital or medical facility, according to a recent consumer survey from Global Healthcare Exchange (GHX). The widespread unease is not unfounded: OSHA has declared workplace violence a “recognized hazard” for hospitals and related facilities.

According to OSHA, security technology plays an important role in a broader strategic approach to mitigate workplace violence. Where appropriate to the facility, OSHA advocates installing video surveillance, extra lighting and alarm systems and minimizing access by outsiders with ID badges, electronic keys and security guards.


Call to Action for a Strategic Approach

The urgency to act and formally develop a response to the preponderance of assaults is being deliberated in Congress. In the U.S. Senate, the recently reintroduced Workplace Violence Prevention for Health Care and Social Service Workers Act would direct OSHA to issue a standard requiring healthcare and social service employers to implement a comprehensive workplace violence prevention plan. The House version of the bill was approved last year.

“Our nurses, doctors, social services workers and healthcare professionals deserve to work in a safe environment free from violence,” said U.S. Senator Tammy Baldwin (D-WI), who introduced the legislation. “Healthcare workers have faced unprecedented obstacles just to stay healthy and do their jobs through the pandemic, and on top of it all, they have seen senseless violence against them. It is unacceptable, and we must provide basic protections and safety standards to a workforce that serves people during some of their most vulnerable times.”

The legislation cites generalized technology requirements that include “monitoring systems” and “barrier protection,” along with “systems to identify and flag clients with a history of violence.” Security leaders have many technology options to turn to when looking to prevent workplace violence.

Beyond access control and visitor management systems, some of the most fundamental workplace applications of technology begin with weapons detection, which expedites the passage of people without having to be frisked. These systems allow personnel to identify and confiscate a range of lethal instruments — such as firearms, knives, Tasers and more — before they can be carried into a facility.

Artificial intelligence (AI) is now being applied to weapons detection, with the potential to greatly advance situational awareness. These software platforms can be integrated with an organization’s existing networked camera system and video analytics to detect weapons in real time and accelerate automated threat alerting.

Still, other types of audio analytics are helping alert security personnel to identify aggressive behavior by sensing raised voices. Again, the emphasis is on real-time detection, immediate alerting and quick response to engage and neutralize a potentially lethal incident.

A mobile duress system can also help prevent or diffuse violent acts by involving real-time location systems (RTLS). Pressing the button on a worn device, such as a badge or pendant, allows a staff member to summon help and transmit the precise location to security guards and others. These solutions may include wireless call functionality and help decrease response time if an incident occurs.

And don’t be surprised when security robots start patrolling the hallways of healthcare facilities, among other commercial, industrial and campus settings. Increasingly, these autonomous devices are being deployed to serve as a force multiplier for security departments. They can pack an array of capabilities, with 360-degree HD video streaming, thermal cameras, two-way audio communication, automated messaging, object avoidance, smart navigation and more.

The necessity to enhance worker safety is plain, if not an organization’s obligation. Investment in security technology is a natural piece to a comprehensive workplace violence prevention plan.


For more information on preventing workplace violence, check out these articles:

  • Recognize. Respond. Survive. A new approach to workplace violence prevention
  • Reining in workplace violence in healthcare: What strategies work?
  • Healthcare leadership and employees have different perspectives on workplace violence programs
KEYWORDS: crisis management healthcare safety mass shooting risk management workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John nemerofsky 500

John Nemerofsky is chief operating officer for Kent, Ohio-based Sage Integration. His experience includes serving as president of SST, where John grew the company to $140 million in yearly sales with offices throughout the US and Canada. In 2009, John became the Senior Vice President of Stanley Security Systems. During his tenure at Stanley, John oversaw wide-scope projects that included several turnaround initiatives, operational changes, sales and market expansions, and customer acquisitions. He managed an $800M P&L and a team of 13 managers with a dotted line to more than 500 team members. In 2017, John took his management experience to an entrepreneurial endeavor as President of CGL Technologies. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Regulatory Changes Top C-Suites’ List of Enterprise Risks for 2017

    Selling Security to the C-suite

    See More
  • shipment ports

    Protecting our ports

    See More
  • Access card reader, ominous

    OSDP: The future of access control

    See More

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing