With over 20 years of investigative experience in both the investigative field and background research departments; our investigators will help you find the information necessary to make educated business, financial, and legal decisions.

Organizations Must Be Ready to Assess Potential Security Risks to Protect Everyone

Organizations Must Be Ready to Assess Potential Security Risks to Protect Everyone

Frank Costa, President Nexgen Protection Services – 

Security leaders across environments — spanning retail stores, corporate businesses, residential communities and cities — should prepare for threats that will require fast and informed action. We all have experienced major cultural moments, including the 2020 election, COVID-19 pandemic, and nationwide protests. 

It is critical for organizations to put in place security protocols to preserve employee and public safety while respecting the rights of citizens.  Creating a plan and protocols to address these incidents will help you ensure a coordinated response.

  • Establish communication protocols. Create clear communication protocols that explain how information will flow to key parties, such as store or business leadership, employees, customers, neighboring businesses and law enforcement.

  • Assess physical defense measures. How can you protect your building from damage or control the flow of traffic and people?

  • Promote de-escalation tactics. Reinforce your communication protocols during this training. Ensure that the safety of every employee and customer is the number one priority, reminding them to not get involved if physical violence occurs.

  • Implement safety technology. Cameras, alarms, motion detectors, and motion-triggered lights can all bring visibility to situations, add necessary deterrence if you make the decision to close a location, and gather evidence to help law enforcement pursue bad actors. Revisit your existing security investments to assess their capabilities, and consider whether you need new solutions to cover your gaps.   

 

SOURCE: 

Kelley, M. 3 potential security risks to stay ahead of post-election, Security Magazine, 11/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

fruad

Mitigating fraud, theft and scam risks within financial institutions

Frank Costa, President Nexgen Protection Services – 

Social engineering schemes have been such an easy way for fraudsters to get money. To guard against this fraud exposure, banks and financial institutions have to work just as hard as the fraudsters, and stay on top of any new threats that emerge. 

One of the best ways to defeat a social engineering scam requesting payment is to make a phone call to a number that is on file and ask if the person you received the request from really sent those instructions. 

Confirming with the appropriate person on file through a verbal phone call that a funds transfer request can proceed is a smart way to identify scam (fraud) attempts. With possibly hundreds of thousands or even millions of dollars at stake, it’s worth taking the extra time to confirm the validity of a funds transfer request.

SOURCE: 

Alger, J. Mitigating fraud, theft and scam risks within financial institutions, 12/2/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Diversity & Inclusion In the Workplace – Fostering Understanding and Fairness

Diversity & Inclusion In the Workplace – Fostering Understanding and Fairness

Frank Costa, President Nexgen Protection Services – 

Federal laws prohibit discrimination based on characteristics like race, sex, religion, and disability. Promoting diversity and inclusion in the workplace encourages innovation, improves morale, and helps attract top talent. Training on bias, cultural differences, and inclusivity helps employees understand and respect their coworkers’ diverse backgrounds.

 

To foster diversity and inclusion in the workplace:

  1. Foster supportive dialogues.
    Encourage your employees to be vulnerable and honest. Don’t pretend that it’s all business as usual in the face of major political events. Instead, set up open, empathetic spaces for people to process and come together.

  2. Reaffirm your commitment to your values.
    Many company leaders talk about diversity, equity, and inclusion, but this is a chance to live up to your commitments and make sure your actions match your words. Take a moment to let your employees know that no matter what’s happening outside company walls, within them, your leaders are committed to fostering safe, inclusive environments where all employees feel empowered to be their best selves and do their best work.

  3. Train everyone in inclusion.
    Make sure all of your team members—not just people leaders, but also more junior employees and individual contributors—understand what it means to foster an inclusive environment and are clear on the role they play in doing so. Provide training and resources that give employees the skills to practice inclusivity at work.

 

SOURCE: 

Ruiz, V. B3 Essential Employee Trainings For Your Company Curriculum, 10/7/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Security Firm Agents Identify Threats That AI Simply Cannot

Security Firm Agents Identify Threats That Artificial Intelligence (AI) Simply Cannot

Frank Costa, President Nexgen Protection Services – 

Artificial intelligence (AI) has become deeply integrated into both our personal and professional lives. From dynamic pricing to healthcare diagnostics, businesses across sectors leverage AI to improve efficiency and outcomes.

AI can efficiently sift through thousands of résumés, highlighting candidates with the right keywords for specific roles.  Human recruiters excel at evaluating soft skills, emotional intelligence, and adaptability—traits that are crucial to success in almost any role. These insights come through interviews, personal interactions, and even informal conversations that AI simply cannot replicate.

Combining AI’s strengths with human intuition, organizations can build diverse, talented teams that support long-term success.

SOURCE: 

Ruiz, V. Background Checks for Security Businesses, Security Info Watch Magazine, 11/7/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Background Checks Can Spot Red Flags On Applications

Background Checks Can Spot Red Flags On Applications

Frank Costa, President Nexgen Protection Services – 

For security integrators and consultants, background checks play an obviously vital role, as many employees are placed in a position of high trust for customers.   

During the hiring process, a company may conduct a background check to ensure that a candidate does not have a criminal background that could create a danger in the workplace or is being truthful about their employment history. 

Background checks verify a wealth of information about prospective candidates:

 

Identity: 

Background checks can help verify a person’s identity. Checking against records like social security numbers and fingerprint databases ensures that a person is actually who they say they are and has no malicious intentions.

 

Credit: 

Depending on who conducts a background check, it may include a detailed or abbreviated credit history report. Credit history is a crucial determinant of whether a lender will approve a loan to someone, while employers can check a prospective employee’s credit history to gauge how responsible they might be.

 

Criminal history: 

Background check providers will compare a person against several criminal databases on a state, national, and international level to ensure any relevant criminal charges in an applicant’s past are brought to light. Knowing this information is especially important for employers, especially for jobs in the security industry.

 

Employment, academic, and licensure verification: 

Background checks can also verify essential qualifications such as employment history, academic credentials, and licenses. Since these qualifications are often legally required for jobs, verifying them with a background check ensures that new hires meet all legal requirements.

 

SOURCE: 

Coats, K. Background Checks for Security Businesses, Security Info Watch Magazine, 11/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Acquire the necessary skills to survive an active shooter incident.

Acquire the necessary skills to survive an active shooter incident.

Frank Costa, President Nexgen Protection Services – 

The A.L.I.V.E. Active Shooter Survival Training Program is a comprehensive training program designed to provide individuals with the necessary skills and knowledge to survive an active shooter incident. Its emphasis on situational awareness and decision-making makes it a practical and effective approach to active shooter situations. By empowering individuals to take proactive measures to protect themselves and others, the program can help prevent tragedies and save lives.

A.L.I.V.E. stands for Assess, Leave, Impede, Violence, and Expose. These are the steps that anyone can take to more effectively respond should you ever be confronted with an active shooter situation, terrorist attack, violent attacker in the workplace, and other potentially deadly events.

 

SOURCE: 

Lasky, S. Staying A.L.I.V.E. During Active Shooter Incidents with Michael Julian, Security Info Watch Magazine, 112/27/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Conduct Vulnerability Assessments to Mitigate Violent Threats

Conduct Threat & Vulnerability Assessments to Mitigate Violent Acts

Frank Costa, President Nexgen Protection Services – 

UnitedHealthcare CEO Brian Thompson was fatally shot Wednesday morning in what authorities described as a ‘deliberate and targeted attack’ outside a Manhattan hotel hosting the health insurer’s investor conference.

The rise in violent incidents within the healthcare industry can often be traced back to personal frustrations with healthcare decisions, such as claim denials or unsuccessful procedures. These experiences can trigger strong emotional reactions, leading some individuals to express their anger through violent behavior. 

To mitigate these risks, healthcare organizations should conduct regular threat and vulnerability assessments using data-driven tools to identify exposures. Implementing layered security measures, such as access control systems, surveillance and secure office environments, can significantly enhance safety.

 

SOURCE: 

Bosch, R. Targeted killing of UnitedHealthcare CEO raises executive protection questions, Security Info Watch Magazine, 12/4/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Mitigate the Risks Associated with Seasonal Hiring

Mitigate the Risks Associated with Seasonal Hiring

Frank Costa, President Nexgen Protection Services – 

Businesses increasingly rely on temporary employees to meet fluctuating demands, particularly during peak seasons. However, the pressures of economic instability and reduced organizational resources make this workforce particularly vulnerable to unethical behaviors, such as theft and fraud, which can have significant financial and reputational repercussions for businesses.

Seasonal hires are particularly prone to engaging in employee crime or counterproductive behaviors due to several factors, including a lack of commitment to the organization, insufficient training, and limited supervision. 

To mitigate these risks, retailers can implement several strategies:

  • Ensure that background checks are completed even during rapid hiring phases to identify individuals with a history of criminal activity or connections to ORC.
  • Pre-employment screening assessments that measure job‑related integrity, nonviolent attitudes, safety orientations, drug-avoidance tendencies, service orientations, and tendencies to avoid collusion with ORC organizations can be instilled.
  • Provide all employees, including seasonal workers, with robust training on loss prevention and the consequences of ORC to raise awareness and deter participation in illegal activities.
  • Enhance supervision and monitoring of seasonal workers, particularly in high-risk areas, to help detect and prevent potential collusion with ORC groups.

 

SOURCE: 

Jones, J. W. Safeguarding Seasonal Success: Psychology-Informed Loss Prevention with Temporary Employees, Loss Prevention Magazine, 11/25/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

TSA Final Rule Enables Continued Acceptance of Driver Licenses at Airport Security Checkpoints

TSA Final Rule Enables Continued Acceptance of Driver’s Licenses at Airport Security Checkpoints & Federal Buildings

Frank Costa, President Nexgen Protection Services – 

Consistent with the Transportation Security Administration’s (TSA) efforts to enhance the passenger experience, TSA published a final rule in the Federal Register that would allow passengers to continue using mobile driver’s licenses (mDL) for identity verification at TSA airport security checkpoints once REAL ID enforcement begins on May 7, 2025.

The final rule, effective November 25, 2024, allows states to apply to TSA for a temporary waiver of certain REAL ID requirements written in the REAL ID regulations. Once approved, those state mDLs will continue to be accepted at TSA airport security checkpoints. TSA will publish on its website a list of states where mDLs are approved for federal acceptance. After emerging industry standards and federal guidelines are finalized, TSA intends to issue a future rule making to set more comprehensive requirements for mDLs that will eventually replace the waiver provisions established by this rule.

 

For more information on REAL ID, please visit TSA.gov/real-id. For more information about TSA’s use of digital identification, please visit TSA.gov/digital-id.

 

SOURCE: 

Anderson, L. TSA final rule enables continued acceptance of mobile driver’s licenses at airport security checkpoints, federal buildings, Security InfoWatch, 10/25/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

Personal Identifiable Information: What You Need to Know

Personal Identifiable Information: What You Need to Know

Frank Costa, President Nexgen Protection Services – 

 

Smartphone apps collect data on us and our behavior, tracking shopping habits and browsing history. These apps can also obtain data regarding a user’s personal identifiable information: gender, age, and—importantly—geographical location. 

Many consumers are not aware that app publishers enhance their revenue by granting access to in‑app advertisers, which use the data collected to target prospects with precision. Their efforts are greatly enhanced by the ability to monitor the prospects’ movements.

Law enforcement and other agencies can legitimately access a person’s cell phone data after obtaining a search warrant. In that regard, the data is considered like any other personal property—subject to privacy rights unless there is “probable cause” of criminal activity.

 

SOURCE: 

Meehan, T. Cellphone Tracking: The Good, the Bad, and the Ugly. Loss Prevention Magazine, 09/25/2024
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats