Displaying results 171 - 180 of 195

… example, installing locks on doors will have the dual impact of frustrating both criminals and terrorists. By … how to strengthen the security of your premises and taking action, you can better prepare for, manage and recover from … guidance available to you across the website. COMPLETE the ACT Awareness e-Learning course . SHARE resources on …
… Unit at the National Counter Terrorism Security Office (NaCTSO) has recently commissioned the Protective Security Lab …
… against the threats we face. To further explore this area, NaCTSO commissioned Coventry University to investigate … by the acronym ‘EVIL DONE’, can be used to identify attractive and vulnerable targets within a UK context. … review our understanding of target vulnerability and attractiveness.  To facilitate such an understanding, academics …
… are aware of the risks and have a plan for immediate action should an attack occur. This will help save lives and … for each scenario, does the plan specify how it will be enacted during an incident? Every second counts and has the … Know which roles are responsible for completing which actions and practice them. Empower and equip those with …
… from the scheduled itinerary an emergency point of contact telephone number who you are going to see how you will … with the hotel for callers to leave their name and contact details with reception. This will reduce the risk of …
… consists of five key stages that capture the following core activities: Stage 1:  Identify the risks Stage 2:  Assess … the risks Stage 3:  Treat the risks Stage 4:  Record your actions Stage 5:  Review The above activities are supported by the ProtectUK risk assessment …
… risk assessment process is concerned with recording your actions.    Risk recording should document your … you select.  An accurate and up-to-date risk assessment acts as documented evidence of action having been performed by your organisation in line …
… state-sponsored espionage. It is likely terrorist cyber activity against the UK is limited to social media and … this will create more vulnerabilities for hostile cyber actors to exploit. There is difficulty in attributing hostile cyber activity to specific named terrorist groups or their …
… unlikely in the next 12 months. This is due to a number of factors including the need for technical expertise and … purposes, including terrorism. How much illegal drone activity is there in the UK? A wide variety of UAVs are … available in the UK. As of 31 March 2023 there were 513,860 active drone flyers and operators registered 2 in the UK …