Displaying results 21 - 30 of 39

… the UK have demonstrated a willingness from those individuals caught up in the attack to help where they can, and in particular, provide first aid to those who are injured.  The types of injuries during a …
… Assessment Hostile attacks against UK cyber-space are considered a Tier 1 national security risk. Cyber attacks … activity and the ability to anonymise or obfuscate one’s identity means unless a specific group openly claims to have … conducted an attack, terrorist cyber activity is not always identifiable.   What is a Cyber-Attack? Hostile attacks …
… hoaxes. Items left insecure on site, such as flammable liquids, tools, scaffolding poles and ladders, could be used by … the number of places where devices may be left by considering the following points: avoid the use of litter bins in vulnerable areas (e.g. near …
… hosted by the ProtectUK team. This webinar aims to provide you with insights on how to effectively navigate the … resources. Led by the ProtectUK team, this webinar will guide you through the various functionalities and features of … kindly request all delegates to refer to our 'how to use' guides, conveniently located at the top of our webinar sign-up …
… or action that maintains or modifies risk. Once you have decided on a risk treatment option, you will then calculate a … you have planned and implemented. This is known as your residual risk score .  Residual risk is the level of risk that remains after …
… a mix of permanent and temporary solutions. If you decide to make significant changes to the premises, consider consulting your insurance company for guidance and to notify them of changes to the building. …
… insurance coverage are at the heart of our mission: to provide financial protection from the impact of terrorism, and … shopping centres and local traders to airports and power grids; across sectors of the economy such as real estate, … in Northern Ireland.  Sadly, terrorist continues to provide a sinister risk, and to date we have paid claims in …
… introduces some of the key components you need to consider before undertaking a risk assessment, including: … internal and external context of your organisation should guide the risk management process, helping to inform the … Objectives and policies Organisational culture Standards, guidelines, models and best practice adopted by the …
… and Intention Search and screening protocols will provide you with a good capability to detect threat items … significant deterrent. Vehicle screening should only be considered as a supplement for other risk reduction measures. … of target items is likely to contain some which are considered essential to detect, some that it is desirable to …
… be kept low, not exceeding 1.0 metre in height, to remove hiding places and provide good natural surveillance side and rear boundaries should provide robust defensive …