Recent terrorist attacks, which share defining attributes of centralized intent and decentralized execution. Not only do these attacks demonstrate that the world has become more violent, but they also reveal that the public remains ill prepared for the changing face and tactics of terror attacks, culminating in a potential rise in death toll and injuries. 2017 has seen a wave of recent terrorist attacks, which share defining attributes of centralized intent and decentralized execution. Not only do these attacks demonstrate that the world has become more violent, but they also reveal that the public remains ill prepared for the changing face and tactics of terror attacks, culminating in a potential rise in death toll and injuries.As intelligence develops from recent tragic attacks, businesses and individuals increasingly need to bolster law enforcement efforts by prioritizing heightened situational awareness and implementing enterprise security measures that focus specifically on protecting human capital and “soft targets” and mitigate vulnerabilities to infrastructure.As a backdrop to individual and enterprise-wide efforts, global law enforcement is aggressively seeking to secure these locations to prevent future incidents, yet the low-tech nature of recent attacks (e.g. vehicles used as weapons) combined with less predictability in their occurrence proves to be difficult to anticipate and mitigate. However, businesses and individuals also need to understand the groundwork for developing adequate situational awareness in the face of attackers’ changing strategies, facilitating measured responses in the face of unpredictable and dynamic events.Business protectionWhile no single action or policy can avert every type of attack, the best risk management strategy aims to incrementally secure “soft target” locations, which may be susceptible to an attack. The below lists outline key areas of coverage for managing organizations’ soft target locations, protecting physical assets, raising awareness and addressing both local and international premises and employees. Prepare for potential threatsConduct threat analyses, vulnerability assessments, consequence analyses, risk assessments and security audits on a regular and ongoing basisReview, update and validate all emergency and crisis response plans across functional disciplines (police, fire, medical, private sector), and conduct exercises to test the plan’s executionEnsure all emergency communications equipment is operationalEstablish and implement an emergency communications system for personnel (i.e. phone trees)Establish safe areas within the facility for people to assemble and seek refuge during a crisisProtect the areaCommunicate and follow appropriate access control policies to facilities Provide appropriate signage to restrict access to nonpublic areasRemove vehicles parked for an unusual length of time, including at adjacent buildingsInstall secure locks and protection on all internal/external doors and windows, with quick-release capability from withinInstall fences or lightweight barriers that are easy to store and can be deployed quickly as necessaryMaintain an adequately sized, equipped and trained security forceRaise awarenessCreate a culture of security awareness within the businessReport suspicious activity to proper authorities, and train personnel to watch for:Unattended or suspicious vehicles on or near facilitiesRepeated visitors or outsiders who have no apparent business in nonpublic areasAbandoned parcels, suitcases, backpacks and packages Missing and stolen equipment, weapons, uniforms, etc. Identify threats to business travelDevelop business travel security programs that prepare employees in advance of, during and post-travel, addressing increased “duty of care” responsibilities that companies faceIdentify threats and vulnerabilities relevant to travelers in specific locations, and follow enterprise travel protocols commensurate with riskPrioritize designation of main stakeholders in contingency plan execution and tracking travelersDetermine means of communication with travelers abroad, implement logistics, and debrief on effectiveness with aim to inform future policy developmentPeriodically refresh country briefing information to reflect updates in weather or safety threats, as well as recent travel warnings, and update plans accordinglyIdentify and evaluate dynamic tracking capabilities via apps or other monitoring technology for travelersBrief travelers on on-the-ground conditions; ensure completion of vaccinations and awareness of app / tracking usage and proceduresMonitor travelers and local conditions through tracking technology over duration of tripDeploy on-the-ground security commensurate with level of riskDebrief travelers to identify and monitor any unusual activity or conduct follow-up risk assessment as needed While recent terrorist attacks underscore increasing global threats, they should not impede business operation or travel. Instead, understanding the threats that businesses face, as well as the pathways to mitigate vulnerabilities, will better insulate organizations and individuals from potential tragic scenarios. Developing and maintaining a sense of calm, combined with executing a measured response in the face of unpredictable and dynamic events will increase your organization’s and employees’ ability to react with speed and response commensurate with the threat. Related content opinion A guide to business continuity planning in the face of natural disasters Using the calm before the storm to prepare By Jonathan Wackrow May 03, 2017 5 mins Backup and Recovery Business Continuity Disaster Recovery opinion How to address civil unrest A checklist that enterprises can peruse in preparation, response, and mitigation of an incident. By Jonathan Wackrow Apr 06, 2017 5 mins Disaster Recovery Business Continuity Security opinion Surviving the attack Basics of self-preparedness By Jonathan Wackrow Mar 23, 2017 5 mins Disaster Recovery Security opinion Workplace violence: Prevention and response Critical elements for a critical problem By Jonathan Wackrow Mar 08, 2017 5 mins IT Strategy Physical Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe