top of page
All Posts


UK Terrorism Risk in 2026: What Organisations Need to Know
Based on the Annual Terrorism Threat Report 2025 by Pool Re Solutions The UK’s terrorism threat level is currently assessed as SUBSTANTIAL , meaning an attack is likely . That assessment is set by MI5 and the Joint Terrorism Analysis Centre (JTAC). What Pool Re’s Annual Terrorism Threat Report 2025 does is explain what that threat looks like in practice, and what organisations should realistically be planning for as we move through 2026. This blog does not introduce new guid
info6674647
Feb 23 min read


AI, ChatGPT and Secure Working: What Organisations Need to Understand
Artificial intelligence tools such as ChatGPT, Copilot and other large language models (LLMs) are now widely used in the workplace. They are fast, accessible, and extremely effective at drafting text, summarising information and supporting decision-making. However, there is growing confusion between AI tools and secure working environments - particularly in sectors where information sensitivity, professional judgement and liability matter. Understanding the difference is crit
info6674647
Dec 12, 20253 min read


Weathering the Storm – What Extreme Weather Teaches Us About Resilient Businesses
UK headlines now feature extreme weather almost weekly — flash floods, high winds, and record-breaking heatwaves. These events no longer feel exceptional; they’re an expected part of the operating environment. For many organisations, the challenge isn’t predicting the next storm, but ensuring the business can withstand and recover when one hits. Physical: Strengthening Sites Against the Elements Extreme weather exposes weaknesses in buildings and infrastructure that normal co
info6674647
Oct 14, 20252 min read


Insider Threats – The Hidden Risk Within Your Business
Most organisations focus their security planning on external threats such as protests, cyberattacks, or hostile reconnaissance. Yet one of the most damaging risks often comes from within: the insider threat. An insider is anyone who has, or previously had, authorised access to people, processes, information, technology, or facilities. Their actions may be deliberate, negligent, or the result of coercion, but all have the potential to cause significant harm. Types of Insider A
info6674647
Oct 7, 20252 min read


Protect, Prepare, Perform – Building Security Resilience Step by Step
Resilience isn’t built overnight. It’s developed in stages, from strengthening the basics, to preparing your people and processes, to performing under pressure when it matters most. At State2 Security, we call this journey Protect , Prepare, Perform (PPP) . It’s the framework we use to deliver services to organisations across Manchester, Liverpool, Chester, Crewe, and nationally. Why Protect Prepare Perform? The world of security can feel complicated, with multiple moving pa
info6674647
Oct 5, 20252 min read


Overlooked Security Gaps That Amplify Cyber Crises
When a cyberattack hits, it is immediately treated as a full-blown crisis. Systems fail, operations stall, and leadership teams must respond under intense pressure. Yet while attention often focuses on IT and operational disruption, businesses frequently overlook physical vulnerabilities and gaps in security infrastructure, which can magnify disruption and extend recovery time. Access control, video surveillance, visitor management, and screening systems are often connected t
info6674647
Sep 30, 20252 min read


From Protest to Protection by State2 Security Ltd
From Protest to Protection - Preparing for Complex Disruptions Public demonstrations and hostile incidents are becoming more visible, more frequent, and sometimes more disruptive for businesses. Recent intelligence assessments suggest that extreme events are increasingly driven by a combination of multiple extremist motivations and grievance-driven narratives, rather than a single ideology. This creates unpredictable, multi-faceted scenarios that can involve pre-planned actio
info6674647
Sep 24, 20252 min read


Field Based Exercises by State2 Security
What are Field Based Exercises Field based exercises are practical drills designed to simulate real-world emergencies, allowing organisations to test their response plans, coordination, and procedures in a realistic, stressful environment. These exercises, often incorporating realistic scenarios like natural disasters, health crises, or security incidents, evaluate the capabilities of an organisation and its partners to mobilise resources, communicate effectively, and mana
info6674647
Sep 21, 20251 min read


Live Simulation Exercises by State2 Security
What are Live Simulation Exercises Live simulation exercises are interactive, real-time activities where participants, using actual or simulated equipment and environments, respond to a realistic emergency, disaster, or crisis scenario to test and improve their organisation's preparedness, response plans, and operational capabilities. Unlike discussion-based exercises, live simulations create a dynamic environment with real-world conditions and unpredictable events called "i
info6674647
Sep 21, 20251 min read


Table-Top Exercises by State2 Security
What are Table-Top Exercises A structured, discussion-based exercise where participants (like an organisation's incident management team) simulate a real-life event, such as a terrorist attack or natural disaster, to test decision-making, communication, and emergency plans in a controlled, informal environment. A facilitator guides the discussion, posing hypothetical situations and questions to help the team walk through their procedures, identify gaps, and improve their prep
info6674647
Sep 21, 20251 min read


Emergency Preparedness by State2 Security
What is Emergency Preparedness, Response and Recovery Emergency preparedness, response & recovery plans are structured guides that detail actions to take before, during, and after a crisis, like a fire, terrorism event, or natural disaster. These plans ensure safety, reduce damage, and maintain operations by including steps like receiving alerts, assembling emergency kits, identifying evacuation/dispersal routes, establishing communication methods, and assigning roles for pe
info6674647
Sep 21, 20251 min read


Crisis Communication Training
What is Crisis Communication Crisis communication is the strategic process of disseminating information to external and internal stakeholders during an emergency or significant event that could harm an organisation's reputation, operations, or credibility. Its primary goals are to provide accurate information, correct misinformation, maintain trust, minimise damage, and control the narrative to ensure transparency and accountability during a difficult situation. Benefits The
info6674647
Sep 21, 20251 min read


Crisis Management Training
What is Crisis Management Training Crisis management training prepares individuals and organisations to respond effectively to unexpected, high-pressure situations by developing strategic plans, improving decision-making skills, and fostering resilience. The training covers risk assessment, communication strategies, incident response, and post-crisis evaluation, ensuring teams are ready to mitigate damage, maintain business continuity, and emerge stronger from challenges. Ben
info6674647
Sep 21, 20251 min read


Incident Management Training
What is Incident Management Training Incident management training equips individuals and teams with the skills, knowledge, and decision making abilities to effectively respond to and resolve unplanned events. Training programs cover incident identification, notification, prioritisation, convening, communication, response and recovery, aiming to minimise business impact, restore normal operations quickly, and improve overall preparedness. Benefits of Incident Management Trai
info6674647
Sep 21, 20251 min read


Security Awareness Training
What is Security Awareness Training Security awareness training educates employees on identifying and responding to threats to an organisation’s assets and people, fostering a culture of security to prevent incidents like unauthorised access or damage. Effective programs use methods like e-learning, classroom instruction, and hands-on simulations, covering topics such as access control, surveillance, emergency response, and the reporting of suspicious activity. Training shoul
info6674647
Sep 21, 20251 min read


Event Assurance by State2 Security
Assuring security at events provides benefits including peace of mind for organisers and attendees, enhanced safety by preventing accidents and deterring crime, effective crowd management, protection of assets and VIPs, emergency preparedness, adherence to legal and regulatory compliance, a positive reputation for the event, and an improved overall guest experience. A well-managed security plan also helps to protect the event's financial and reputational standing, preventing
info6674647
Sep 21, 20251 min read


Security Policies & Procedures Assurance by State2 Security
How Do You Assure Security Policies & Procedures Assuring security policies involves a continuous, systematic process of assessing risks, defining clear objectives, drafting actionable guidelines, implementing and enforcing controls, and regularly reviewing and updating the policies to adapt to new threats and business needs. Key steps include conducting risk assessments, involving stakeholders in policy development, providing employee training, ensuring alignment with legal
info6674647
Sep 20, 20251 min read


Supply Chain Assurance
What is Supply Chain Assurance Assuring the supply chain involves a continuous, proactive approach to identifying, assessing, and mitigating risks to ensure the reliability, quality, and integrity of products and services from supplier to consumer. Key strategies include due diligence, risk assessments, supplier evaluation, and auditing, quality control measures, compliance monitoring, and implementing continuous improvement processes to build resilience and maintain operati
info6674647
Sep 20, 20251 min read


Security Infrastructure by State2 Security
How Do You Assure Security Infrastructure Assuring security infrastructure involves a holistic, ongoing effort to protect an...
info6674647
Sep 20, 20251 min read


Physical Security Deployments by State2 Security
How Do You Assure Physical Security Deployments Assuring physical security deployments involves a continuous, layered approach including...
info6674647
Sep 20, 20251 min read
bottom of page
