Penn State Medical Center to Arm Security Guards

Penn State Medical Center to Arm Security Guards

These new safety and security measures come in light of an increase in violence against nurses and health care workers on the job. This year, Penn State Health has seen two violent incidents.

Some of the security guards at Penn State Health Milton S. Hershey Medical Center will begin carrying guns in the facility this month. Arming the security guards is one of multiple new security and safety measures aimed at protecting nurses and others from violence inside the hospital grounds.

The medical center’s president Deborah Berini said its security force has been expanded from 18 guards to 30, but not every officer will be armed. The “select group” of armed officers has special training in handling volatile situations as well as ongoing training in firearm proficiency. Berini did not disclose how many officers will be armed at any given time, citing security concerns, but armed security will be present “24-7.”

The decision to arm security guards and add other safety measures is part of “a tremendous amount of work that has been underway for several years” to improve security for staff, patients and visitors, Berini said. Other measures include signs throughout the medical center stating that aggressive behavior will not be tolerated and staffers who are trained in de-escalation of potentially violent situations.

The new signs hung around the center state that “Aggressive behavior toward patients, families, visitors and staff will not be tolerated,” listening examples that include abusive language, profanity, verbal or physical sexual advances and threats. According to the signs, security will be called if offenders don’t heed an initial warning.

Some staff members have been trained in de-escalation tactics for situations where a patient or visitor is upset and may become violent, and the center is creating a behavioral response team of these members. The center is also developing a risk assessment tool to help identify patients and situations that could potentially turn violent.

According to Berini, the new training and safety measures are intended to help hospital workers distinguish between patients and visitors experiencing health-related stresses and those who are genuinely, purposely aggressive. It’s difficult, she said, because illness and medication can sometimes mean patients are not in their right mind.

Berini said the center has created a database for recording incidents related to safety concerns or violence. A manager follows up each report, and there are new efforts to provide longer-term support to affected workers.

“I think people would be surprised by some of the verbal assaults that our staff endures,” Berini said.

These new safety and security measures come in light of an increase in violence against nurses and health care workers on the job. This year, Penn State Health has seen two violent incidents, one alleged attempted rape of a nurse and one physical assault of a nurse that resulted in injuries to the nurse as well as another nurse and a security guard to came to help.

According to recent studies, slightly more than half of hospitals have armed security officers. The increase in armed security coincides with a 40 percent increase in violence crimes in health care settings, with more than 10,000 incidents directed at health care workers between 2012 and 2014, according to a 2016 article from Becker’s Hospital Review.

“I believe they are moving in the right direction,” said Maureen Casey, a Penn State Health nurse who is part of a committee focused on security. “They are looking to us for our input, and they are looking to make wholesale changes to protect the nurses.”

According to Berini, the medical center will be adding more security and safety measures in the next few months, including a “panic button” device that allows workers to call for help. The center also is hiring a consultant to identify technology upgrades to improve security throughout the medical center campus.

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”