Displaying results 91 - 100 of 101

… or other areas that are critical to the safe management and security of your operation. This tactic is linked to TACTIC … assists organisations to invest proportionately in their security measures, enabling them to implement an integrated … law. If you are making decisions around capturing personal data as a controller, or joint controllers, you are …
… aim of inspiring others to consider a career in national security and policing. For some of the women involved it’s …
… and briefings; How to minimise queuing times to speed up security screening and entry, such as not carrying … airports don’t linger unnecessarily on the public side of security screening. If there has been a terrorist incident … best practice to help counter terrorism and increase security awareness: • Modules include how to identify …
… method for your organisation, the  National Protective Security Authority  (NPSA) offering of Protective Security Risk Management (PRSM) may be suitable for you. You …
… against UK cyber-space are considered a Tier 1 national security risk. Cyber attacks against UK businesses take a … against UK cyber-space is considered a Tier 1  national security risk, alongside international armed conflict, … also suffered a ransomware attacked by ‘LockBit’ where the personal data of UK staff members was accessed. In August …
… to be of considerable benefit where there is little or no Security Control Room capacity. The use of any system is … to suspicious activity. These briefings will allow your security officers to understand the importance of proactive … was delivered to staff, then it should be recorded in their personal record, to evidence the fact they have undertaken …
… Levels provide a general indication of the protective security measures that should be applied at a given time. … and risk. There are a variety of site-specific security measures that can be applied in each building … information recorded (e.g. attendance record for briefing, personal record etc.). It is important to test and exercise …
… and the people that govern its use. To ensure the security of your site, you should consider the use of an … trained staff. This also includes the need for a good security culture which will help ensure your site remains … policies. Consideration must be given regarding the personal health and safety of security staff in the …
… uses of UAS continue to develop. As this usage increases, security risks are also emerging.  An Unmanned Aerial … or organisation can respond effectively to UAV-related security risks.  If there is a shared use of a site, the security and C-UAV/UAS plan may need to be adopted by …
… may find it helpful to consult with management and staff, security specialists / experts, local and national bodies, …