- Home
- Search Result
Search Results
Filter
Topics
Industry
Threats
Article Type
Document Types
1714 results
Mail Screening Matters - Screening Levels Wheel (Print - Editable Zip)
Mail Screening Matters - Screening Levels Wheel (Print - Editable Zip)
Mail Screening Matters - Email Template (Editable - Zip)
Mail Screening Matters - Email Template (Editable - Zip)
Procuring the Services of a Specialist Security Consultant PDF
This guidance looks at aspects of sourcing, procuring, tasking and retaining specialist security consultants.
Attack at Manchester Arena PDF
You will have seen media reporting on the attack at Manchester Arena on 22nd May. This is being treated as a terrorist incident. Note that the UK threat level remains unchanged at SEVERE, indicating a...
Who We Work With
NPSA works with partners, such as NCSC, UKNACE and the National Counter Terrorism Security Office (NaCTSO) to identify risks and vulnerabilities to the UK’s national infrastructure, and to offer advic...
Attack on London Bridge and Borough Market PDF
This report is in relation to the attack on London Bridge and Borough Market on 3rd June. This is being treated as a terrorist incident.As with the recent attacks on Westminster in March and Mancheste...
London Protect - London Bridge Incident Update (04/06/2017) PDF
London Protect udate on London Bridge incident
Identifying Security Behaviours
What does good security behaviour look like in your organisation?
CCTV for CNI Perimeter PDF
CCTV for CNI Perimeter Security guidance - Helping you get the most out of your perimeter security CCTV
Monitoring and Assessment
Monitoring and assessment is an essential element of good personnel security
Operational Requirements
An essential tool to enable you to produce a clear, considered, high-level statement of security needs based on the risks faced
Cyber Assurance of Physical Security Systems (CAPSS)
Electronic attack of physical security systems is the means of carrying out a localised cyber-attack specifically on the security system. This can be to corrupt data, open a portal or disable alarms.