Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

SECURITY SERVICES: Additional Training: Is It Necessary?

By Kevin Lee
February 6, 2006
Public relations should be part of additional officer training. Many posts include the need to interact with employees, visitors and the general public. Photo courtesy: Kastle Systems


A category most overlooked within security companies today is the amount and type of training that each individual officer receives. That is not to say that they are not being trained in one form or another.

What needs to be addressed is the officer receiving an extra amount of training at a specific post or job site. Many will ask why should there be any further need of instruction since they have experience or completed the required training. The answer to this would be many answers. For starters, there is need to ensure that they are knowledgeable of specific considerations requested by the client. They must have a grasp of any safety concerns. They need to have an understanding of any laws and ordinances; know how to respond in situations not covered in instructions or post orders; and why it is important for public relations.

Let us look at each of these reasons.

In most cases, a client will have some request of what and how they want a security officer to perform his duties. This should not be taken lightly and is why the client has hired the security firm. Such missions should be taught to the new officer, even if the officer is experienced and has been working with the company for many years, and just transferred in. Every client company will have its own different idiosyncrasies. And there is always a possibility that policy, procedures or even ownership has changed recently. For example: Know what type of forms, reports, sign-in list that the client will require.

For security officers working at a factory, industrial plant, chemical warehouse, petroleum refinery or other sensitive facility, it will be imperative, and probably mandated by federal and state Occupational Safety and Health Agency officials to receive some type of “awareness” training. In these locations, an officer will need to know what to do if there is a chemical spill, gas release or any other type of hazardous situation. The officer will need to know what the client company’s Standard Operating Procedures states, know how to read a Material Safety Data Sheet and know whom to call. He or she will need to know where these publications are kept.

As security officers must view more surveillance video, technology advances have expanded the size of command center displays.
Knowledge of safety is not limited to just factories and plants, but also at places such as offices. Different companies or corporations will have their own safety rules, regulations and policies. This could involve everything from cleaning supply (chemicals) storage and electrical wiring to fire alarm procedures (especially in high-rise buildings).

There may come a time when the officer has to deal with a problem or situation that is not covered in the post orders or in any training session. Then he or she needs to know whom to contact and how to contact them. Even something trivial could lead up to larger problems, and all because no supervisor or trainer took time to inform a new officer of a small procedure. They need to be instructed to the type of communication equipment (radio, land line phone, cell phone) and how to use it. If there is a secondary form of communication available, officers need to be informed and how to operate it. If there is an alternate person to contact or the person they were trying to contact is not available or if a situation or emergency arises and the security officer is required to contact a second person, then this information needs to be passed on to him or her.

Not all security officers will be dealing with the public. Yet it would probably be correct to say that most of them will interact with the public. It boils down to common courtesy. An officer should also maintain a good personal appearance. The officer’s uniform should look good and “sharp.”

If an officer is constantly coming across situations about which he or she was never instructed, this can create morale problems. If an officer has been fully trained for his or her job and the specific area, a sense of strong confidence will grow. This will lead to good morale, which produce positive work habits. When the client sees that officers are performing well, this renews a trust in the company.

There are different operational and training formats to use. One type is the “Brief Sheet.” This is the shortest and used when instructing just one or a couple of individuals.

The lesson plan is for much lengthier sessions. Ensure that the lesson plan covers all the subjects that the officers will need to know. It should not be equal to or a substitute of the post orders.

GPS Trackable Security Bags

Technology’s now available that allows enterprise organizations to track security bags being carried by security officers and delivery firms.

An example: A. Rifkin Co. of Wilkes-Barre, Pa., has a new generation security bag that allows users to pinpoint moving bags anywhere across the United States using GPS technology. The security bag is equipped with a miniature tracking device that requires no external power and is covertly placed or sewn directly into the bag. Upon user request, bags are “found” by the tracking satellites and location data is instantly relayed to the security end-user via an Internet-enabled computer or SMS-enabled cellular phone.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Lee, a native Texan, spent 20 years as a U.S. Marine. He has worked for several major national security service firms.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Employee Training is Key in Preventing Breaches, But is it Enough?

    See More
  • facialrecognition

    In the Age of Facial Recognition, The Human Element is Still Necessary

    See More
  • Unruly passengers on airplanes cause incidents of workplace violence

    Safety, security and self-defense for flight attendants becomes a necessary tool for risk mitigation

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing