Why and how hostile reconnaissance is conducted, and the principles of how to disrupt threats during the reconnaissance phase, along with practical measures on how to reduce the vulnerability of their site
How to develop and maintain a professional, motivated, and attentive guard force and CCTV team
The intelligent, co-ordinated promotion of protective security provision to the hostile.
Increase awareness relating to fraudulent documentation and improve the vigilance of your security personnel
How to ensure your organisations stay secure through the information you publish online.
This guidance supplements existing Security Minded Communications guidance and provides tailored advice for UK organisations which have remote or rural locations as part of their estate in the UK.
Auditors are individuals who attend premises and outside spaces with the aim of capturing staff and property on camera, the content from which is often uploaded to social media and video platforms
Hostile reconnaissance is the term given to the information gathering phase by those individuals or groups with malicious intent
This guidance provides the client requesting a Vehicle Dynamics Assessment (VDA) an awareness of the subject and a checklist of questions to ask a potential VDA provider.
Vehicle-borne threats range from vandalism to sophisticated or aggressive attack by determined criminals or terrorists
This guide provides information and impetus to those responsible for integrating Hostile Vehicle Mitigation (HVM) into the public realm, in order to manage the threat from terrorist vehicle attacks
This guidance presents an overview of the principles behind Vehicle As a Weapon (VAW) detection, the different technologies available & considerations regarding the environments in which they may operate
Guidance on reducing the impact of Hostile Vehicle Mitigation on spectator flow
An introduction for Local Authorities, Event organisers, and similar end user groups on using temporary Vehicle Security Barriers (VSBs) as part of a HVM scheme - which itself should be one piece of a wider security plan.
Screening vehicles can help reduce the likelihood of explosive devices, weapons and other hazardous or prohibited items or materials being brought into buildings or onto sites
Employment screening comprises the procedures involved in deciding an individual's suitability to hold employment in a given job role.
Effective education and training is necessary to ensure individuals know what policies, standards, guidelines and procedures are in place to maintain security.
Appropriate investigation and disciplinary practices are essential in ensuring that disproportionate actions are minimised and adherence to security policies and processes are reinforced.
An insider risk programme should integrate effectively with the organisation’s overall communications’ strategy.
This webpage outlines five key principles underpinning NPSA advice and guidance
Insider Threat Practitioners and Stakeholders will need to be engaged across business areas to provide specialist insight and ensure a successful implementation of a working Insider Threat Programme.
Understanding what security risks your organisation faces is essential for developing appropriate and proportionate security mitigation measures within the insider threat programme.
A programme of monitoring and review should be in place to enable potential security issues, or personal issues that may impact on an employee's work, to be recognised and dealt with effectively.
Ensuring proportionate policies, standards, guidelines and procedures are in place that are understood and consistently enforced is critical in any insider risk programme.
Discover how to deter, detect and deny those seeking to cause harm
Positive and visible Board level support for, and engagement with, protective security is vital to demonstrate to staff the value placed on security and the insider threat strategy.
Strong security leadership can ensure you have effective security strategies
Maintain a productive workforce by developing effective practices that counter the insider threat
Monitoring and assessment is an essential element of good personnel security
Assess your organisation’s personnel security maturity to build resilience
A good security culture in your organisation is an essential component of a robust protective security regime and helps to mitigate against insider risks and external people threats.
If you are a high-risk individual, you may consider the use of a safer area to protect yourself and those living with you from immediate threats to your personal safety and security
This guidance helps you to recognise suspicious adverts and recruiter behaviours and understand how you can protect yourself and your organisation by reporting concerns and ceasing engagement if something doesn’t look right
This guidance provides advice on Home Security Systems, which primarily comprise of Intruder Alarm Systems, Home Security Camera Systems and the communications network required to enable these systems to pass critical information
Guidance for high-risk individuals and those advising them on protecting premises from the
threat of forced entry
Protect yourself and your family by improving the security at your home.
Protect sensitive information about your activities and people connected to you.
Protect your personal information to reduce the opportunity for people to target you.
High-risk individuals may be exposed to threats to their personal safety and security. If you are a high-risk individual, this guidance aims to help you protect yourself and those close to you from a range of threats
High-risk individuals may be approached by people experiencing distress, frustration, anger, or exhibiting threatening behaviour. These encounters can take place, face-to-face, online or over the phone.
Protect yourself when you are travelling, working or at events.
Prepare to respond to incidents that may take place either at home or when you are elsewhere.
Developing situational awareness skills will help you to recognise the early signs of a threat and enable you to react and respond quickly to potential danger.
Organisations have an obligation to identify, assess and manage risks to their people, particularly those who are considered high-risk individuals.
If you are in immediate danger, concerned about threatening or abusive behaviour or suspicious activity: know what to do, who to call and what information to provide.
Being able to spot the signs of suspicious activity, social engineering, and online threats can help to protect you and your information.
Be aware of what is happening around you. Assessing the situation and acting swiftly can help reduce or avoid risk.
If implemented early enough, mitigations will be a necessary part of risk management when doing business with overseas parties.
This guidance is designed to help workspace providers provide the safety and collaboration that your users seek.
Developing a risk based plan to doing business with overseas parties is essential to ensure success.
Being aware of government’s business screening requirements will allow you to be mindful of any national security threats.
Good governance and proactively considering security in business plans with overseas parties sets the tone of your risk appetite.
Hostile actors can use international business and engagement as a way of gaining access and influence in order to harm your interests or the national security of the UK.
If taken in a timely manner, practical steps to manage risks will protect your reputation, prosperity and the national security of the UK.
Secure Business, an open approach to international business and engagement to protect your long-term profitability, reputation, and the UK's national security
This guidance is for users of shared workspaces and provides practical advice tailored to your workspace and activities
Guidance aimed at Users and Providers of shared workspaces, offices, coworking spaces and laboratories to encourage basic security practices and enhance your security awareness
This guidance is for users of shared workspaces and provides practical advice tailored to your workspace and activities
The core security measures suggested below will help early-stage technology businesses protect their IP, information, and data
Competition to succeed in emerging technology can be intense. This guidance is for founders or CEOs of innovative startups, and will help you to protect your technology and reputation.
NPSA and the NCSC’s new Secure Innovation Action Plan will provide you with tailored guidance to help you take the next steps on your security journey
This guidance is for early-stage investors in emerging technology companies.
Secure Innovation, navigating the emerging technology landscape securely. This is a joint campaign between NPSA and NCSC.
This guidance is designed to help workspace providers provide the safety and collaboration that your users seek.
Guidance aimed at Users and Providers of shared workspaces, offices, coworking spaces and laboratories to encourage basic security practices and enhance your security awareness
Passport to Good Security - Soft Measures: ensure security information is clearly and regularly communicated to staff, contractors and suppliers.
Trusted Research aims to support the integrity of the system of international research collaboration, which is vital to the continued success of the UK’s research and innovation sector
Aimed at academics who are involved in international research collaborations, this provides advice and guidance on some of the main challenges presented when working or travelling overseas.
Short videos designed for academics, based on real events in UK academia to help improve awareness of research security risks and how to mitigate them.
This guide is to assist industry in forming long-term, trusted and secure relationships with academia which are valued by both partners.
International collaboration is the cornerstone of the research and innovation sector in the UK. This guidance is designed for senior University leaders to have the key issues and questions at their fingertips.
Learn more about the risks associated with international collaboration and how to protect your research.
Guidance aimed at Users and Providers of shared workspaces, offices, coworking spaces and laboratories to encourage basic security practices and enhance your security awareness
This guidance is for users of shared workspaces and provides practical advice tailored to your workspace and activities
This guidance is designed to help workspace providers provide the safety and collaboration that your users seek.
Supporting our customers in assessing and mitigating the security risks posed by uncrewed aerial systems (UAS), also known as UAV or drones
Providing guidance for customers wishing to utilise the benefits of UAS to protect sites and assets