Displaying results 91 - 96 of 96

… Consistently emphasise that to run is a person’s best option if they are caught up in an attack. In trials, it has been demonstrated that people may instinctively be more inclined to hide … works where you are (like a shop assistant, bus driver, or security guard), a police officer if you can see one, or an …
… Information and Intention The purpose of a search regime is to … might want to cause harm do not understand and exploit your security search methods.   Method Search Regime Overview: … by the organisation and site, and correspond with other security measures in place. It may be appropriate to …
… Information and Intention There are a number of supporting … security related technologies which play a role in the security operations of an organisation. These include: …
… The third stage of the risk assessment process involves treating risk.      To achieve this, you will be using your professional judgement to select a risk treatment option and appropriate control measures.  A control … may find it helpful to consult with management and staff, security specialists / experts, local and national bodies, …
… Information and Intention Prior to an event being held, a threat , … should be used as the basis for determining the protective security requirements and identifying appropriate protective security measures.  The temporary nature of an event may …
… of the risk assessment process involves analysing and evaluating risk.    To achieve this, you will be using the risk … with members of your team, such as management, HR, IT and security staff when carrying out this activity. These … target attractiveness.  You may also wish to consult with security specialists and experts for additional insight. …