2017 has seen a wave of recent terrorist attacks, which share defining attributes of centralized intent and decentralized execution.\u00a0 Not only do these attacks demonstrate that the world has become more violent, but they also reveal that the public remains ill prepared for the changing face and tactics of terror attacks, culminating in a potential rise in death toll and injuries.As intelligence develops from recent tragic attacks, businesses and individuals increasingly need to bolster law enforcement efforts by prioritizing heightened situational awareness and implementing enterprise security measures that focus specifically on protecting human capital and \u201csoft targets\u201d and mitigate vulnerabilities to infrastructure.As a backdrop to individual and enterprise-wide efforts, global law enforcement is aggressively seeking to secure these locations to prevent future incidents, yet the low-tech nature of recent attacks (e.g. vehicles used as weapons) combined with less predictability in their occurrence proves to be difficult to anticipate and mitigate. However, businesses and individuals also need to understand the groundwork for developing adequate situational awareness in the face of attackers\u2019 changing strategies, facilitating measured responses in the face of unpredictable and dynamic events.Business protectionWhile no single action or policy can avert every type of attack, the best risk management strategy aims to incrementally secure \u201csoft target\u201d locations, which may be susceptible to an attack. The below lists outline key areas of coverage for managing organizations\u2019 soft target locations, protecting physical assets, raising awareness and addressing both local and international premises and employees.Prepare for potential threatsConduct threat analyses, vulnerability assessments, consequence analyses, risk assessments and security audits on a regular and ongoing basisReview, update and validate all emergency and crisis response plans across functional disciplines (police, fire, medical, private sector), and conduct exercises to test the plan\u2019s executionEnsure all emergency communications equipment is operationalEstablish and implement an emergency communications system for personnel (i.e. phone trees)Establish safe areas within the facility for people to assemble and seek refuge during a crisisProtect the areaCommunicate and follow appropriate access control policies to facilities Provide appropriate signage to restrict access to nonpublic areasRemove vehicles parked for an unusual length of time, including at adjacent buildingsInstall secure locks and protection on all internal\/external doors and windows, with quick-release capability from withinInstall fences or lightweight barriers that are easy to store and can be deployed quickly as necessaryMaintain an adequately sized, equipped and trained security forceRaise awarenessCreate a culture of security awareness within the businessReport suspicious activity to proper authorities, and train personnel to watch for:Unattended or suspicious vehicles on or near facilitiesRepeated visitors or outsiders who have no apparent business in nonpublic areasAbandoned parcels, suitcases, backpacks and packages\u00a0Missing and stolen equipment, weapons, uniforms, etc.\u00a0Identify threats to business travelDevelop business travel security programs that prepare employees in advance of, during and post-travel, addressing increased \u201cduty of care\u201d responsibilities that companies faceIdentify threats and vulnerabilities relevant to travelers in specific locations, and follow enterprise travel protocols commensurate with riskPrioritize designation of main stakeholders in contingency plan execution and tracking travelersDetermine means of communication with travelers abroad, implement logistics, and debrief on effectiveness with aim to inform future policy developmentPeriodically refresh country briefing information to reflect updates in weather or safety threats, as well as recent travel warnings, and update plans accordinglyIdentify and evaluate dynamic tracking capabilities via apps or other monitoring technology for travelersBrief travelers on on-the-ground conditions; ensure completion of vaccinations and awareness of app \/ tracking usage and proceduresMonitor travelers and local conditions through tracking technology over duration of tripDeploy on-the-ground security commensurate with level of riskDebrief travelers to identify and monitor any unusual activity or conduct follow-up risk assessment as needed\u00a0While recent terrorist attacks underscore increasing global threats, they should not impede business operation or travel. Instead, understanding the threats that businesses face, as well as the pathways to mitigate vulnerabilities, will better insulate organizations and individuals from potential tragic scenarios. Developing and maintaining a sense of calm, combined with executing a measured response in the face of unpredictable and dynamic events will increase your organization\u2019s and employees\u2019 ability to react with speed and response commensurate with the threat.