NEXGEN Protection Services committed to providing our clients the exceptional customer service that they are looking for by utilizing and employing the absolute best security teams in the industry.

Improve Morale with Easy-to-Use Security Access Control for Employee Well Being

Improve Morale with Easy-to-Use Security Access Control for Employee Well Being

Frank Costa, President, Nexgen Protection Services

Employee wellbeing extends beyond the four glass walls of the office. To support employee well being, offices need security access control solutions that are easy to use, flexible, and integrate smart technologies.

From hassle-free access to effortless key overrides, when it comes to employee wellbeing, the less friction and the more flexibility, the better. Simplifying security systems and giving employees the freedom to choose how they interact with them can lead to improved morale and, ultimately, increased productivity.

 

SOURCE: 

Welty, M. The Key to Wellbeing in the Office, Security Today, 11/12/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

Building Agile Security Strategies Adaptable to the Rapidly Changing Landscape

Building Agile Security Strategies Adaptable to the Rapidly Changing Landscape

Frank Costa, President, Nexgen Protection Services

The future of network security is both exciting and challenging. Organizations must stay ahead of emerging trends by building agile security strategies that are adaptable to the rapidly evolving threat landscape.

Retailers, in particular, must demonstrate daily flexibility to protect their workers, meet sales goals, and attract customers—all while maintaining safe and efficient operations. Retail is a complex web of interconnected elements.

To stay competitive, organizations need technology that is “future-proof”—capable of meeting shifting consumer demands, ensuring operational efficiency, and safeguarding against potential security threats, both internally and externally.

Cybercriminals are increasingly leveraging a combination of tactics, techniques, and procedures (TTPs), targeting multiple areas at once to breach defenses. We can expect an increase in the sophistication and evasion tactics of web-based attacks, file-based attacks, DNS-based attacks, and ransomware, making it more difficult for traditional, siloed security tools to effectively defend against modern threats.

Preventing these attacks will require multiple security services working together as part of an integrated platform to stop every attack along the cyber kill chain.

 

SOURCE: 

Davidson, B. Cutting Retail Losses, Security Today, 11/13/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Do’s and Don’ts of GenAI for Security Metrics

Do’s and Don’ts of GenAI for Security Metrics

Frank Costa, President, Nexgen Protection Services

 

Security teams must get it right—there’s no room for error.

Do you use ChatGPT or other AI generators for your business security? Regardless of how you implement GenAI, what truly matters is what you do—and don’t do.

There’s no doubt that GenAI models are powerful tools. When adopted responsibly, they can help streamline security protocols, optimize time, and more. However, it’s crucial to remain fully aware of the limitations of GenAI models.

For starters, never underestimate the importance of keeping the human touch in your work. As smart as AI might seem, it cannot capture the intangibles that come from human intuition.

AI lacks a sense of bias and is unaware of what constitutes correct or incorrect facts. Therefore, it is vital to proofread any AI-generated content and verify all facts before acting on the data.

GenAI models are trained on vast amounts of data from multiple sources, meaning there is always a risk that AI-generated content could contain plagiarized text.

 

SOURCE: 

Shelmire, A. Liars in the wires: Getting the most from GenAI without getting duped, Security Magazine, 09/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Aligning your metrics to key security processes within the organization is what’s really important. The challenge is to measure the right things.

Understand What Security Processes Are Essential For The Business To Succeed

Frank Costa, President Nexgen Protection Services – 

Aligning your metrics to key security processes within the organization is what’s really important.  The challenge is to measure the right things.

Security managers need to speak to senior leaders in familiar business language, offering measurable results that correlate with investment. Without compelling metrics, security managers and their budgets rely largely on the intuition of company leadership.

Experts agree, saying what’s important isn’t just about the numbers used but how those measures highlight that business story while solving problems to further business goals.

 

SOURCE: 

Randolph, C. Metrics that matter: How security professionals can show value, Security Magazine, 11/05/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Organizations Must Be Ready to Assess Potential Security Risks to Protect Everyone

Organizations Must Be Ready to Assess Potential Security Risks to Protect Everyone

Frank Costa, President Nexgen Protection Services – 

Security leaders across environments — spanning retail stores, corporate businesses, residential communities and cities — should prepare for threats that will require fast and informed action. We all have experienced major cultural moments, including the 2020 election, COVID-19 pandemic, and nationwide protests. 

It is critical for organizations to put in place security protocols to preserve employee and public safety while respecting the rights of citizens.  Creating a plan and protocols to address these incidents will help you ensure a coordinated response.

  • Establish communication protocols. Create clear communication protocols that explain how information will flow to key parties, such as store or business leadership, employees, customers, neighboring businesses and law enforcement.

  • Assess physical defense measures. How can you protect your building from damage or control the flow of traffic and people?

  • Promote de-escalation tactics. Reinforce your communication protocols during this training. Ensure that the safety of every employee and customer is the number one priority, reminding them to not get involved if physical violence occurs.

  • Implement safety technology. Cameras, alarms, motion detectors, and motion-triggered lights can all bring visibility to situations, add necessary deterrence if you make the decision to close a location, and gather evidence to help law enforcement pursue bad actors. Revisit your existing security investments to assess their capabilities, and consider whether you need new solutions to cover your gaps.   

 

SOURCE: 

Kelley, M. 3 potential security risks to stay ahead of post-election, Security Magazine, 11/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

soft skills

Soft Skills Pay Off for Retailers Creating Safer Workplaces

Frank Costa, President Nexgen Protection Services – 

De-escalating volatile situations starts with communication skills, which can help in understanding and then talking down a challenging customer. The overall goal in this stage is to calm the person down and bring him or her to a more reasonable interaction.

For sales floor associates, framing a conversation around collaboration or finding a solution to appease the customer is another tactic that can de-escalate a volatile shopper into a satisfied one.

Communication skills have broad benefits, helping sales associates communicate and provide customer service to shoppers who may enter a store in an aggressive mood.

Non Confrontational engagement with customers through the sharing of knowledge and tools on mitigating volatile situations ensures everyone is able to enjoy the shopping experience. 

 

SOURCE: 

Mosqueda, S. Soft Skills Pay Off for Retailers Creating Safer Workplaces, Security Management, 2/12/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

fruad

Mitigating fraud, theft and scam risks within financial institutions

Frank Costa, President Nexgen Protection Services – 

Social engineering schemes have been such an easy way for fraudsters to get money. To guard against this fraud exposure, banks and financial institutions have to work just as hard as the fraudsters, and stay on top of any new threats that emerge. 

One of the best ways to defeat a social engineering scam requesting payment is to make a phone call to a number that is on file and ask if the person you received the request from really sent those instructions. 

Confirming with the appropriate person on file through a verbal phone call that a funds transfer request can proceed is a smart way to identify scam (fraud) attempts. With possibly hundreds of thousands or even millions of dollars at stake, it’s worth taking the extra time to confirm the validity of a funds transfer request.

SOURCE: 

Alger, J. Mitigating fraud, theft and scam risks within financial institutions, 12/2/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Security Firm Agents Identify Threats That AI Simply Cannot

Security Firm Agents Identify Threats That Artificial Intelligence (AI) Simply Cannot

Frank Costa, President Nexgen Protection Services – 

Artificial intelligence (AI) has become deeply integrated into both our personal and professional lives. From dynamic pricing to healthcare diagnostics, businesses across sectors leverage AI to improve efficiency and outcomes.

AI can efficiently sift through thousands of résumés, highlighting candidates with the right keywords for specific roles.  Human recruiters excel at evaluating soft skills, emotional intelligence, and adaptability—traits that are crucial to success in almost any role. These insights come through interviews, personal interactions, and even informal conversations that AI simply cannot replicate.

Combining AI’s strengths with human intuition, organizations can build diverse, talented teams that support long-term success.

SOURCE: 

Ruiz, V. Background Checks for Security Businesses, Security Info Watch Magazine, 11/7/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Background Checks Can Spot Red Flags On Applications

Background Checks Can Spot Red Flags On Applications

Frank Costa, President Nexgen Protection Services – 

For security integrators and consultants, background checks play an obviously vital role, as many employees are placed in a position of high trust for customers.   

During the hiring process, a company may conduct a background check to ensure that a candidate does not have a criminal background that could create a danger in the workplace or is being truthful about their employment history. 

Background checks verify a wealth of information about prospective candidates:

 

Identity: 

Background checks can help verify a person’s identity. Checking against records like social security numbers and fingerprint databases ensures that a person is actually who they say they are and has no malicious intentions.

 

Credit: 

Depending on who conducts a background check, it may include a detailed or abbreviated credit history report. Credit history is a crucial determinant of whether a lender will approve a loan to someone, while employers can check a prospective employee’s credit history to gauge how responsible they might be.

 

Criminal history: 

Background check providers will compare a person against several criminal databases on a state, national, and international level to ensure any relevant criminal charges in an applicant’s past are brought to light. Knowing this information is especially important for employers, especially for jobs in the security industry.

 

Employment, academic, and licensure verification: 

Background checks can also verify essential qualifications such as employment history, academic credentials, and licenses. Since these qualifications are often legally required for jobs, verifying them with a background check ensures that new hires meet all legal requirements.

 

SOURCE: 

Coats, K. Background Checks for Security Businesses, Security Info Watch Magazine, 11/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Acquire the necessary skills to survive an active shooter incident.

Acquire the necessary skills to survive an active shooter incident.

Frank Costa, President Nexgen Protection Services – 

The A.L.I.V.E. Active Shooter Survival Training Program is a comprehensive training program designed to provide individuals with the necessary skills and knowledge to survive an active shooter incident. Its emphasis on situational awareness and decision-making makes it a practical and effective approach to active shooter situations. By empowering individuals to take proactive measures to protect themselves and others, the program can help prevent tragedies and save lives.

A.L.I.V.E. stands for Assess, Leave, Impede, Violence, and Expose. These are the steps that anyone can take to more effectively respond should you ever be confronted with an active shooter situation, terrorist attack, violent attacker in the workplace, and other potentially deadly events.

 

SOURCE: 

Lasky, S. Staying A.L.I.V.E. During Active Shooter Incidents with Michael Julian, Security Info Watch Magazine, 112/27/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats