Workplace Security Awareness
This course provides guidance to individuals and organizations on how to improve the security in your workplace. No workplace—be it an office building, construction site, factory floor, or retail store—is immune from security threats.
Employees are often the target of these threats as well as the organization's first line of defense against them. Threats endanger the confidentiality, integrity, and security of your workplace, as well as your virtual workplace and computer systems. This course presents information on how employees can contribute to your organization's security.
Security Begins With You
We live in a world of ever-increasing risk. No workplace – be it a construction site, office building, factory floor, or retail store – is immune from these threats. Risks threaten worker safety, employee morale, and your company’s economic livelihood.
Some threats are intentional acts, such as sabotage and violence. Others are caused by natural disasters or man-made accidents. No matter the threat, all employees have a responsibility to help their company protect its employees, information, data, and facilities.
Employees are often the target of these threats as well as the organization's first line of defense against them. Threats endanger the confidentiality, integrity, and security of your workplace, as well as your virtual workplace and computer systems.
As an employee, you are an integral part of your organization’s security solution. From the mailroom to the boardroom, security is a shared responsibility. Simply put, security begins with you!
Upon completing this course, the participant will be able to:
- Identify potential risks to workplace security.
- Describe measures for improving workplace security.
- Determine the actions to take in response to a security situation
Actions taken at the workplace will be dependent upon circumstances. However, you can contribute to your workplace security by:
- Identifying threats and vulnerabilities that affect workplace security.
- Avoiding complacency.
- Observing with all your senses.
- Being aware of unusual changes in your surroundings.
- Noticing unusual or suspicious behavior.
- Knowing whom to call if something is not right.
- Getting assistance. Do NOT try to “handle it” yourself.
Topics that will be discussed:
- Components of Risk
- Workplace Security
- Understand the Threats
- Access and Security Control Threats
- Access Control Procedures
- Typical access control procedures include:
- ID Badges
- Access Controls
- Criminal and Terrorist Threats
- Suspicious Behaviors
- Unusual Events or Suspicious Items
- Unattended or Suspicious Vehicles
- Bomb Threat Procedures
- Suspicious Mail and/or Package
- Theft and Diversion
- Workplace Violence
- Indicators of Potential Violence
- Information and Cyber Threats
- Protecting Information
- Information Security
- Telephone Interactions
- Email/Web Interactions
- Cyber Threats and Vulnerabilities
If your company or organization is interested in active shooter training please contact us at 603-566-1727