Understanding terrorist targeting is an essential part of our efforts to protect the public and prepare against the threats we face.
To further explore this area, NaCTSO commissioned Coventry University to investigate whether a prominent risk assessment framework, known by the acronym ‘EVIL DONE’, can be used to identify attractive…
To further explore this area, NaCTSO commissioned Coventry University to investigate whether a prominent risk assessment framework, known by the acronym ‘EVIL DONE’, can be used to identify attractive…
This checklist has been created to assist businesses during periods of increased visitor footfall within the retail and night time economy premises, such as the lead up to the New Year and national holidays. During this period we can see a significant increase in the number of people visiting retail and night time economy premises. This checklist…
Whether you’re at home, at work, on the move or online, our guide to personal security provides advice on how to stay safe.
Keywords:
Run Hide Tell
, Abroad
, Security online
, Security at home
, Personal Security
, Social media
, Cyber
, Cyber Security
You may have seen reports in the media this week about a man from Surrey, who was reported to Counter Terrorism Policing after IT repair men noticed suspicious content on his laptop. It’s a timely reminder of the important part business can play in stopping terrorist activity early.