The safety and security of our ports and shipping matters to all of us. Ensuring that terrorists can’t use them to cause harm starts with a few of our unique tools and by following the guidance that can be found on ProtectUK and from NaCTSO’s experienced advisors.
You may have seen reports in the media this week about a man from Surrey, who was reported to Counter Terrorism Policing after IT repair men noticed suspicious content on his laptop. It’s a timely reminder of the important part business can play in stopping terrorist activity early.
You will be aware of the tragic terrorist attack at Heaton Park Synagogue in Crumpsall, Manchester yesterday (02/10/2025). The thoughts of everyone in policing go out to the victims, the affected families and communities, particularly Jewish communities, at this difficult time. 
… e-Learning course, register with ProtectUK.   Brief action cards covering the above subjects can be found on the …
The advice contained in this section is intended to assist Returning Officers to develop a security plan to avoid major disruption to the election process. The recommendations will not be applicable in all cases and should be regarded as a menu of options that could be implemented, taking into account the nature of the threat together with the…
The Act is not yet in force. This means that the requirements do not need to be complied with at this time. Outside the requirements in the Act, there are plenty of things you can do to develop a good security culture. A good security culture should take account of accessibility requirements and the experience of visitors.
… consequences of a change in policing Research should be carefully conducted, peer reviewed and transparent about its … the best available, if it is gathered and documented in a careful and transparent way. This could include professional …
… all these areas makes it harder for terrorists to plan and carry out attacks. It also helps reduce the risk of other …
  Keywords: 
             Attack Methodology
      ,       PALs
      ,       PALs Guidance 
      ,       publicly accessible places
      ,       Security Culture
      ,       security planning process
      ,       Crowded Places
      ,       Stay safe
      ,       Public events
      ,       public spaces
      ,       Threat
      ,       Risk 
      ,       Run Hide Tell
      ,       protect crowds
      ,       Protective Security
      ,       Counter Terrorism Security Advisors 
      ,       Events
      ,       Advice
      ,       Guidance
      ,       NaCTSO
      ,       Security measures
      ,       Business
      ,       Personnel Security
      ,       Physical Security
      ,       Cyber Security
  
  … how you can be vigilant and reduce your vulnerability while carrying on as normally as possible.   Reducing the Risk … times to speed up security screening and entry, such as not carrying unnecessary or forbidden items; • Ensuring that … leaders apart from each other; • Providing a contact card for each participant giving a number to call if …
… hostile vehicle mitigation (HVM) schemes.   The NVTMU carry out vehicle dynamic assessments to assess the eligible …
  Keywords: 
             Vehicle
      ,       Transport
      ,       Vehicle as a Weapon 
      ,       Weapons of Terrorism
      ,       Attack
      ,       Threat
      ,       Mitigation
      ,       National Security
      ,       Protective Security