[st_row width=”wide” background=”solid” solid_color_value=”#000000″ sticky=”yes” div_padding_top=”10″ div_padding_bottom=”10″ id_wrapper=”elm_5aeccd0e9f8ad_1_1″ ][st_column span=”span1″][/st_column][st_column span=”span2″ id_wrapper=”column_2_2b66273156501983a0669a2adeaa415b_1_1″ m_padding_left=”20″ m_width=”60″ ][st_logo appearing_animation=”slide_from_left” m_image_alignment=”left” id_wrapper=”logo_c34ce711feabd212578709feb1f7bbb5_1_1″ ][/st_logo][/st_column][st_column span=”span7″ id_wrapper=”column_2_fca81c70a2d1e9ce6673e50556ce1a63_1_1″ m_width=”31″ ][st_navigation el_title=”Menu” menu_location=”main-nav” div_margin_left=”100″ div_margin_right=”50″ style=”justified” bg_color=”#000000″ bg_opacity=”0″ normal_font_size=”18″ text_color=”#ffffff” text_active_color=”#e9cd52″ bg_active_color=”#000000″ item_height=”19″ dropdown_text_color=”#ffffff” bg_dropdown_color=”#000000″ appearing_animation=”fade_in” m_div_margin_top=”10″ id_wrapper=”navigation_4b592e6fe8f6fa423c93d034810a5c48_1_1″ ][/st_navigation][/st_column][st_column span=”span2″][/st_column][/st_row][st_row width=”wide” id_wrapper=”elm_5db6022455bde” ][st_column span=”span12″][st_image image_file=”https://d1016b.p3cdn1.secureserver.net/wp-content/uploads/2019/10/Threat-Solutions-Banner.png” image_size_wrapper=”” image_size=”full” image_alignment=”center” image_margin_left=”-10″ image_margin_right=”-10″ id_wrapper=”image_f92c07dcc4dd56d7285815b4c2eb331d” ][/st_image][st_spacer id_wrapper=”spacer_71fa3ce132da9e1522c08fdba66bb086″ ][/st_spacer][/st_column][/st_row][st_row background=”solid” id_wrapper=”elm_5b1f3e4a30b9c” ][st_column span=”span9″ border_width_value_=”2″ border_color=”#ffffff” id_wrapper=”column_2_2e8770ea55dc0ba00a27552659e313b8″ ][st_spacer height=”65″ id_wrapper=”spacer_5ed55d6ee111a0fc3930946fe9325cc6″ ][/st_spacer][st_text el_title=”Copy” text_margin_top=”15″ text_margin_left=”40″ text_margin_bottom=”50″ text_margin_right=”40″ font=”custom” font_face_value=”Georgia” font_style=”inherit” id_wrapper=”text_8a31a4ee4337f2ee515837d4e6e2c585″ ]

Create a Plan & Training Based on YOUR Needs, Not Someone Elses!

Customized Solutions Designed To Protect People, Reputations, and Bottom-Lines!

When it comes to protecting against workplace violence, some of the biggest mistakes that leaders make include:

  • Using borrowed, generic, Templated Policies created for someone else’s company or organization
  • Believing that a short, 6 minute video like “Run, Hide, Fight,” can protect there people from harm and the only option available to them for quick, efficient, employee training
  • Relying solely on deterrence while ignoring how to protect people during actual violence
  • Buying one-off, “canned” programs that:
    • Don’t work because only a few people will remember what was taught after the training is over
    • Expect none-security-minded people to know how to adapt the training to their own specific workplaces
    • Aren’t tailored for each tier of the organization’s ladder, and the responsibility each has in making the plan work
    • Believing that “zero-tolerance,” banned weapons lists, and threats of punishment will stop either the angry, irrational person; or the attacker specifically targeting your company or one or more of it’s people
    • Merely allow HR to check off the box in employee training records and nothing else
    • Are never added to the training schedule as refreshers after the course is over
    • etc…
  • Focus only on employee initiated violence, when their primary threats may be in other areas
  • Only focus on physical violence, completely ignoring the problems of lateral and vertical violence issues (bullying, harassment, verbal aggression, etc from coworkers and superiors) that could be bleeding money from your bottom line every day, from:
    • Lost time incidents
    • Lowered productivity and the need to pay for additional employees to do the same job
    • Loss of great talent and the cost of replacing them
    • Excessive turnover
    • stress and tension in the workplace
    • Interpersonal conflicts
    • Training and the time it takes to get new employees up to speed and accuracy
    • Recruitment and on-boarding expenses
    • etc.

Or, worse yet…

  • Ignore the problem altogether as though violence will never touch them, thereby leaving their employees in danger, and their company exposed to liability, negative press, damaged reputations and, if the loss is too great… closing it’s doors!

[/st_text][/st_column][st_column span=”span3″][st_call_to_action el_title=”Call to Action Box” text=”Schedule Your Free Discovery Call
” cta_button_text=”Choose a Time That Works Best for Your Schedule” cta_button_open_in=”new_browser” cta_button_type_url=”https://calendly.com/jmmillerconsultancy/15min” cta_button_custom_color=”#023f6d” div_margin_top=”50″ size=”container” wrapper_shadow=”3″ id_wrapper=”call_to_action_06a8c8a6610e3386d01c6230bfaa8876″ ][/st_call_to_action][st_text text_margin_top=”50″ id_wrapper=”text_6ea7ad2e9c4191deb0770fe317908f44″ ]PLEASE NOTE: If you’d like to schedule an in-person meeting instead, please use our Contact Form and I or one of my people will contact you to set up a time.[/st_text][/st_column][/st_row][st_row width=”full” background=”solid” solid_color_value=”#eab499″ row_bg_opacity=”65″ border_width_value_=”5″ border_color=”#dcdcdc” shadow=”2″ id_wrapper=”elm_5b1f3e4a30b9c” ][st_column span=”span1″][/st_column][st_column span=”span2″][st_spacer height=”55″ id_wrapper=”” ][/st_spacer][st_image el_title=”John Healy pic” image_file=”https://d1016b.p3cdn1.secureserver.net/wp-content/uploads/2018/05/John-Healy.jpg” image_size_wrapper=”” image_size=”thumbnail” image_alt=”workplace violence training” image_container_style=”img-circle” id_wrapper=”image_28ddb199531d9e816d9181ecbe1bace3″ ][/st_image][/st_column][st_column span=”span9″][st_spacer height=”55″ id_wrapper=”spacer_1b070a5eea123794bda70a459d5c8ec2″ ][/st_spacer][st_text font=”custom” font_face_value=”Georgia” font_style=”inherit” id_wrapper=”text_3b044693b538db100133fc4fde99ee08″ ]“Mr. Miller teaches effective tactics for dealing with all stages of a developing situation, but his brains-over-brawn approach emphasizes the use of awareness and strategy to help avoid the need for physical confrontation. His methods are highly effective.”

John Healy
Senior Manager of Software Engineering
Carbonite
Oakville, Ontario
[/st_text][/st_column][/st_row][st_row id_wrapper=”elm_5db620df8615f” ][st_column span=”span7″][st_spacer height=”55″ id_wrapper=”” ][/st_spacer][st_text font=”custom” font_face_value=”Georgia” font_style=”inherit” color=”navy” id_wrapper=”text_5108acf87031df6338c9c3afae4ee5af” ]

Helping You Develop Solutions that Work to Prevent, Respond to, and Recover From Actual Violence

When you partner with the Jeffrey M. Miller Consultancy, we will assess the gaps, vulnerabilities, and needs of you and your people to come up with a solid plan and support training.  Every company and workplace is different, just as every industry has different types of operations and common problems.

Here’s a list of common and not-so-common threats and problem areas related to workplace violence in it’s many forms where we can help you:

  • Stress and Overwhelm That Could Cause a Problem
  • Domestic Violence Bleeding Over Into Your Workplace
  • Heavy-Handed Leadership Triggering Problems
  • Disgruntled Current & Former Employees
  • “Lone-Wolf,” Attackers
  • Radicalized Terrorists
  • Aggressive Political Activists and Domestic Terrorists
  • “Love Triangles” Gone Bad
  • Hostile Guests and Visitors to Your Workplace
  • Outside Sales, Delivery, and Other Employees Attacked on the Job
  • Violent Patients, Family Members, and Visitors in Healthcare Facilities
  • Random Targeting By Mentally Unstable Individuals
  • Recently Terminated or Reprimanded Employees Wanting Revenge
  • Temporary and (Sub)Contracted Help Becoming Aggressive
  • Vendor, Delivery, & Shipping Company Employees Entering Your Workplace
  • Threats to Patient Advocacy, Customer Service, and Other Personnel
  • Veiled Threats and Intimidation from Passive-Aggressive Employees
  • Disciplinary and Termination Meetings Going Bad
  • etc.

Protecting Yourself, Your People, and Your Company Requires More Than Just a “Zero Tolerance” Policy!

Schedule a complimentary discovery call or meeting with me to discuss your concerns and how I can help.

[/st_text][st_button el_title=”Schedule Your Discovery Call Now” button_text=”Schedule Your Discovery Call Now” button_type_url=”https://calendly.com/jmmillerconsultancy/15min” icon=”fa fa-phone” button_alignment=”center” button_size=”btn-lg” button_color=”btn-danger” custom_h_color=”#c11b17″ id_wrapper=”button_d696e2c3933a1efb52924f309fa4960b” ][/st_button][st_spacer id_wrapper=”” ][/st_spacer][/st_column][st_column span=”span1″][/st_column][st_column span=”span4″][st_spacer height=”55″ id_wrapper=”” ][/st_spacer][st_image el_title=”Assessment offer” image_file=”https://d1016b.p3cdn1.secureserver.net/wp-content/uploads/2019/10/Self-Assessment-Offer-pic.png” image_size_wrapper=”” image_size=”full” link_type=”url” open_in=”new_browser” image_type_url=”https://warrior-concepts.lpages.co/workplace-violence-assessment/” id_wrapper=”image_e37621f93bb88cc10f2421f053c00a3b” ][/st_image][st_spacer height=”55″ id_wrapper=”” ][/st_spacer][st_image el_title=”Backwards Thinking Report” image_file=”https://d1016b.p3cdn1.secureserver.net/wp-content/uploads/2019/10/Backwards-Thinking-REPORT.png” image_size_wrapper=”” image_size=”full” link_type=”url” open_in=”new_browser” image_type_url=”https://warrior-concepts.lpages.co/backwards-thinking-report/” id_wrapper=”image_e2b973c4dbcb75a4af9da3882fc24e2a” ][/st_image][/st_column][/st_row][st_row width=”full” background=”solid” solid_color_value=”#000080″ id_wrapper=”elm_5e0525203b13d” ][st_column span=”span12″][st_heading el_title=”Here’s how the Consultancy can help:” text_align=”left” normal_font_color=”#ffffff” wrapper_padding_top=”20″ id_wrapper=”heading_aeacc9552515afe2a20f9396cee62c73″ ]Here’s how the Jeffrey M. Miller Consultancy can help:[/st_heading][st_spacer height=”18″ id_wrapper=”spacer_4125f54a0a549e86845977c0ed8273e8″ ][/st_spacer][st_row_2 id_wrapper=”elm_5e0525203b13d” ][st_column_2 span=”span6″][st_text id_wrapper=”text_075fc4773c7a47a64fd84967a62d5050″ ]

  •  Physical Security Assessment
  • Gap and/or Needs Analysis
  • SOP or Response Action Plan Review
  • Assistance With Presenting Initiative to Decision-Makers
  • Tailoring “RUN, HIDE, FIGHT,” etc. to your unique workplace(s)
  • Liability-Conscious Personal Safety, Attack-Avoidance, & Self-Defense Training

[/st_text][/st_column_2][st_column_2 span=”span6″][st_text normal_font_color=”#ffffff” id_wrapper=”text_f5aff2446e2b68ebb451e7452dc596c0″ ]

  • Team Focus Group Surveys
  • Current and Future Trend Research Consulting
  • Customized, Employee-Level-Based Training Programs
  • Security / Threat Assessment / Core Response Team Development & Training
  • Determining O.S.H.A. “General Duty” Clause Compliance
  • Train-the-Trainer Program Design & Certification

[/st_text][/st_column_2][/st_row_2][/st_column][/st_row][st_row id_wrapper=”elm_5e056ae39f80d” ][st_column span=”span12″][/st_column][/st_row][st_row width=”wide” height=”window” id_wrapper=”elm_5b157d1040d4c_1″ ][st_column span=”span12″][st_spacer height=”75″ id_wrapper=”spacer_88da8bf8bd2ef8a566b4ad2305cd5d78″ ][/st_spacer][/st_column][/st_row]