Bomb Threat Guidance
In 2023, The Secure Community Network identified 927 bomb threats, an increase of 1,016.8%from 2022. Following the Hamas terrorist attacks of October 7th, SCN identified…
- High Holidays
- Incident Response
Best-practice guidance documents, training materials, security protocols and checklists, and templates, and more– all developed by leading experts in communal security.
The use of a vehicle as a weapon in a terrorist attack is not new. Recent terrorist incidents and violent extremist propaganda demonstrate that the use of vehicles as a weapon continues to be of interest by those wishing to cause harm. Attacks of this nature require minimal capability, but can have a devastating impact in crowded places with low levels of visible security.
Across America, Jewish communities are on heightened alert and are wondering what role armed security should play in their security plans.
Does hiring a private security firm make Jews safer?
Search
Filter By
In 2023, The Secure Community Network identified 927 bomb threats, an increase of 1,016.8%from 2022. Following the Hamas terrorist attacks of October 7th, SCN identified…
This document represents a compilation of existing best practices, considerations, and information intended to assist individuals and organizations with general financial preparedness planning guidance and basic considerations. It is not intended to provide comprehensive, organization-specific advice or policy guidance on financial matters nor is it meant to replace the advice of a financial professional or legal counsel. For comprehensive individual or organization-specific financial advice and recommendations, a financial professional should be consulted. SCN specifically disclaims any and all responsibility for and is not responsible for any loss or damage arising out of the use, nonuse, or misuse of this information.
What is Cyber Security? A set of principles and practices designed to safeguard your computing assets and online information against threats. Why is Cyber Security important? Studies consistently show that 85-95% of cyber security incidents/data breaches are attributable to "end users" or human error. As individuals and organizations, we have a critical role to play in the security of our data, personal information and systems.
Simply saying “Hello” can prompt a casual conversation with a new person, providing an opportunity to observe and establish a connection. The OHNO approach–Observe, Initiate a Hello, Navigate the Risk, and Obtain Help–enables staff to observe and evaluate suspicious behaviors, empowering them to lower risk and obtain help when necessary
"This quick reference checklist is designed to help employees and decision makers respond to a threat or harassment in an orderly and controlled manner with the first responders and other stakeholders. Threats may be received by phone, email, social media, in person, or by vandalism/graffiti. Act quickly but remain calm and obtain information with the checklist on this sheet, if possible. In case of emergency, call 9-1-1."
Secure Community Network’s Nonprofit Security Grant Program (NSGP) Threat, Vulnerability & Risk Assessment (TVRA) Tool was developed in response to a recognized need in the Jewish…
A guide for forming a security committee from inception to assembly. Includes guidance and checklists for a successfully established security committee.
Join the Secure Community Network (SCN) and co-sponsors, The Jewish Federations of North America, the Conference of Presidents of Major American Jewish Organizations, and the Anti-Defamation League (ADL) for a pre-Passover briefing on the threat environment and best practices to keep this Passover season as safe, secure, and welcoming as possible.