Can you help us with an active shooter response plan

Valentina, a Reno-based manufacturing firm, lost $850,000 in a single week after a ransomware attack crippled their production line. They had insurance, but the reputational damage and delayed fulfillment contracts meant lost clients and a severely eroded market share. While ransomware gets the headlines, the reality is that many businesses are far more likely to face a different, terrifying threat: an active shooter situation. And being unprepared isn’t just a financial risk—it’s a life-or-death one.

What are the biggest misconceptions about surviving an active shooter event?

Most businesses focus on fire drills and basic emergency procedures, believing those cover all potential crises. But an active shooter demands a drastically different response. The traditional “lockdown and wait” approach, while seemingly logical, can be tragically ineffective if the shooter is already inside or systematically breaching doors. It lulls employees into a false sense of security, turning them into stationary targets. Another common mistake is assuming “it won’t happen here.” Sadly, active shooter incidents are becoming more frequent and geographically diverse, impacting businesses of all sizes.

What proactive steps can we take before an incident?

Preparation is paramount. We at Morris IT Solutions, with over 16 years of experience helping businesses navigate complex security challenges, advocate for a tiered approach. It’s about far more than just IT security; it’s about building a culture of preparedness.

  • Risk Assessment: Begin with a comprehensive assessment of your facility. Identify potential vulnerabilities – unsecured entrances, lack of visibility, areas where individuals could be easily trapped.
  • Employee Training: This is the single most critical investment. We recommend the “Run, Hide, Fight” methodology, adapted for your specific workplace. Employees need to understand:
    Run: If there’s a clear and safe escape path, evacuate immediately. Forget belongings; prioritize survival.
    Hide: If evacuation isn’t possible, secure the room. Barricade doors, turn off lights, and remain silent.
    Fight: As a last resort, if your life is in imminent danger, be prepared to fight back using any available means.
  • Communication Systems: Invest in a mass notification system that can quickly alert employees of an active shooter situation. This should include options for mobile alerts, desktop notifications, and potentially even public address announcements.
  • Emergency Contacts: Maintain up-to-date emergency contact lists for all employees.
  • Collaboration with Law Enforcement: Build a relationship with your local police department. Invite them to conduct a security assessment of your facility and provide feedback.

How should we respond during an active shooter event?

Every situation is unique, but clear, decisive action is crucial.

If you encounter the shooter: Your immediate priority is self-preservation. Do not attempt to reason with or confront the shooter. Focus on escaping or hiding. If forced to engage, act aggressively and commit to your actions.

If you are sheltering in place: Maintain complete silence. Turn off cell phones and other devices that could make noise. Spread out within the room to minimize the risk of multiple casualties. If possible, use furniture to create barricades.

After the shooting stops: Do not assume the danger has passed. Remain in your secured location until law enforcement arrives and gives the all-clear. Follow their instructions precisely. Be prepared to provide information about the shooter and any injuries.

What legal and regulatory considerations apply to active shooter preparedness?

While no federal law mandates specific active shooter training, ignoring this threat can expose your business to significant legal liability. Nevada Revised Statute (NRS) 603A.215 requires businesses to maintain “reasonable security measures” to protect employees and customers. Failure to provide adequate training or implement basic security protocols could be considered negligence in the event of an incident, potentially leading to lawsuits. Furthermore, if the incident results in a data breach (e.g., theft of employee or customer information), you may be obligated to comply with breach notification requirements outlined in NRS 603A.010 et seq. Finally, automatic renewal provisions in any security contracts you hold (NRS 598.950) must be clearly disclosed if services are interrupted by an incident.

  • Incident Reporting: Establish a clear protocol for reporting the incident to law enforcement and other relevant authorities.
  • Post-Incident Support: Provide access to counseling and support services for employees who have been traumatized by the event.

To discover more about these topics, check out these resources:

Key TopicCommon Question
GovernanceWhat happens if my business fails a compliance audit?
SecurityHow can I prevent phishing scams in my company?

Is your current backup plan “insurance-ready”?

Insurance policies often deny claims if “reasonable security measures” (NRS 603A) weren’t in place before the disaster. Don’t guess. Let our Reno-based team audit your disaster recovery plan to ensure you are fully compliant and recoverable.


Schedule Your Continuity Gap Analysis »


No obligation. 100% Local.


About Scott Morris and Reno Cyber IT Solutions LLC.

🖊️ Authored by the Reno Cyber IT Solutions Editorial Team

This content is curated by our technical writing team under the strategic guidance of Managing Partner, Scott Morris. We combine diverse industry perspectives to ensure every article meets our rigorous standards for accuracy and local relevance.

Reno Cyber IT Solutions LLC. is more than just a tech vendor; we are your local partners. Founded by Scott Morris, a 3rd-generation Reno native, we possess a deep understanding of the unique challenges facing businesses in Reno and Sparks. Our mission is to deliver personalized, human-focused IT solutions that eliminate tech stress and foster long-term growth for local companies, non-profits, and seniors.

We specialize in “Defense in Depth”—a multi-layered cybersecurity strategy designed to protect your data from every angle. Proudly named NCET’s 2024 IT Support & Cybersecurity Company of the Year, we are committed to providing unparalleled customer service.

Visit Reno Cyber IT Solutions LLC.:

Address:

An experienced tech consultant monitoring network systems related to the article Address
Reno Cyber IT Solutions LLC.
500 Ryland St 200
Reno, NV 89502
(775) 737-4400

Hours: Open 24 Hours

★★★★★
5.0/5.0 Stars (Based on 22 Client Reviews)


Similar Posts