The first skill in any serious approach to home security isn’t a product, a system, or a policy. It’s the ability to look at your own house and answer one question honestly: what would I actually do, if someone tried to come through that door right now?

Most people can’t. That isn’t a failure of imagination — it’s a failure of having ever done the work. Threat assessment is the work. It’s the structured, deliberate exercise of looking at your home, your property, your routines, and your assumptions, and identifying where they’re thin. We do it before recommending products, alarms, fences, dogs, or any of the gear that the security industry would prefer to sell you, because all of that gear is wasted on a house whose owner hasn’t first asked the questions in this piece.

Threat assessment is also the most underrated skill in the entire field of home security. Done well, it costs nothing and produces an enormous return: a clear-eyed view of where your real vulnerabilities are, in priority order, so the time and money you spend afterwards goes where it actually matters. Done poorly, or not at all, you end up with a security camera covering the most photogenic angle and nothing watching the side gate.

What threat assessment isn’t

Before defining what threat assessment is, it’s worth being clear about what it isn’t, because the term gets used loosely.

It isn’t a list of statistically common crimes, lifted from a national dataset and applied to your house. The base rate of “burglary” in your country tells you very little about your specific risk. Your specific risk is shaped by your specific neighbourhood, your specific routines, your specific property, and your specific household. National averages are a starting point at best.

It isn’t a list of imagined worst cases. “What if a coordinated team of armed intruders breached the perimeter at 3am” is a fantasy, not an assessment. The vast majority of property crime is opportunistic, low-skill, and quick. Planning for the cinematic worst case at the expense of the actual most-likely case is the single most common error in amateur security thinking.

And it isn’t a security audit done by a stranger. A consultant can be useful, but the person best placed to assess your specific risk is you, because you know things about your house and your routines that no consultant ever will. The work of threat assessment is something you have to do yourself, even if you later get a professional involved.

The five questions

Threat assessment, at its most useful, is five questions answered seriously about your specific circumstances. The questions are simple. The answers, if you’re being honest, almost always reveal at least one weak point you weren’t tracking.

1. What are the realistic threats?

Not the imagined ones. The realistic ones. For most households, in most places, the realistic threats are, in rough order of probability:

  • Opportunistic property crime — burglary, vehicle theft, theft of items left visible. The most common threat by an order of magnitude.
  • Targeted property crime — someone who has specifically chosen your house, usually because they’ve observed something that suggests value, vulnerability, or routine.
  • Domestic and interpersonal threats — an estranged former partner, a disgruntled former employee, a person known to a household member.
  • Crimes of access during legitimate-seeming visits — a delivery person, a tradesperson, a door-to-door caller using the visit to assess the property for a later return.
  • Wider unrest — civil disturbance affecting a neighbourhood broadly. Geographically variable; in some places, the dominant concern.

Reasonable people in different places weight these differently. Someone living in central London weights opportunistic property crime higher than wider unrest. Someone living in a region where civil disturbance has happened in living memory weights it higher. The right weighting is the one that matches your actual circumstances, not the one that matches the most dramatic prepper-blog scenario.

2. What’s actually attractive about your property?

From the perspective of someone who is not you. Walk to the street. Look at your house the way a stranger would, on a slow walk past. What can they see? What does it tell them?

A house with a recently delivered courier package on the porch tells them you order things online and you’re not home. A house with the same car in the driveway every weekday between nine and five tells them when you’re home and when you’re not. A house with high-end gym equipment visible through a window tells them what’s worth taking. A house with an alarm system sticker — but no actual alarm, because half of “alarm system stickers” are bought separately to bluff burglars — tells them you’ve thought about security but haven’t actually done much. (This last one is real, and the bluff stops working when burglars test it; we’ve seen it.)

The exercise of standing at the street and writing down, plainly, what your house signals to a stranger is usually the first eye-opening moment of a serious threat assessment.

3. What are your honest vulnerabilities?

A vulnerability is the gap between what you’ve planned for and what would actually happen. Vulnerabilities tend to fall into a few categories:

  • Physical access points — doors, windows, garages, side gates, fences, and crucially the weakest one. Most properties are defended only as well as their weakest entry.
  • Sight lines — what you can’t see from inside the house, and what neighbours can’t see from theirs. Burglars love properties with high hedges or walls obscuring the entry from the street; they prefer privacy as much as you do.
  • Predictable routines — when you leave, when you return, when the house is empty, when you take the bins out, when the dog gets walked.
  • Information leakage — what your social media reveals, what your house signals to passers-by, what package deliveries say about your habits, what Google Street View shows about your perimeter.
  • Response capacity — what you would actually do in the first sixty seconds of a problem. Not what you imagine you would do; what you have actually rehearsed.

Be honest. Honesty is what separates threat assessment from theatre.

4. What are your existing strengths?

Often overlooked. People conducting their first assessment fixate on what’s wrong and miss what’s already working. Strengths might include: a neighbour who’s home most of the day; a dog that barks at strangers; a road that’s busy enough to make property crime uncomfortable; a security industry response company in your area; a household member who works from home; a yard whose layout naturally funnels approach to a single, observable point.

Listing strengths matters because the goal of an assessment is to identify where to invest, and investment goes against weak points — not against strong ones. Adding a security camera to a corner that your neighbour can already see is wasted money.

5. What would your first sixty seconds actually look like?

If something happened — right now, today, while you’re reading this — what would you do? Where’s your phone? Where are the people you care about? Do they know what to do? What’s the meeting point? Who’s the first call? What’s the second one if the first doesn’t pick up?

Most people have never thought through their first sixty seconds in any concrete way. The work of doing so isn’t expensive, isn’t exotic, and produces more genuine resilience than any amount of equipment.

What to do with the answers

The output of a threat assessment is not a feeling. It’s a list — three to five concrete vulnerabilities, in priority order, that you’ve decided are worth addressing. From there, the rest of security work is comparatively easy. You know what to fix, you know in what order, and you stop spending money on things that don’t address what you’ve identified.

We’ll cover specific responses — home hardening, perimeter, situational awareness, family planning — in the cluster posts that sit alongside this one. But none of those pieces matters until the assessment is done. The assessment is the foundation. Build it first.

There’s a closing point worth making, because it pushes back against the loudest voices in this field: most threat assessments don’t justify the most dramatic responses. The realistic threats most households face are addressed by a small number of unglamorous, inexpensive measures, applied consistently. The genuine work of security is repetitive and quiet. It rarely involves the products that get the most attention. It almost never involves the products with “tactical” in their name.

Do the assessment. Make the list. Fix the worst one first. The rest is detail.