Why Protection Services Are Critical for Small Religious Schools

Why Protection Services Are Critical for Small Religious Schools

By Frank Costa, President, Nexgen Protection Services

As threats against religious institutions rise across the country, security is no longer optional—it’s essential. In New York City, small yeshivas and other religious schools are often left vulnerable due to limited funding, despite facing the same risks as larger institutions.

New legislation aims to change that by providing millions in taxpayer funding to help these schools hire professional security guards. And this expansion couldn’t come at a more important time.

Leveling the Playing Field for Safety

Under current laws, only non-public schools with more than 300 students qualify for government-funded security. But many religious schools fall below that threshold. The proposed bill, championed by a Brooklyn councilman, would remove that size restriction, giving smaller institutions access to the same critical safety resources.

“This program has already proven successful—but now it needs to be expanded to protect every student, not just those in larger schools.”

Security Guards Do More Than Stand Watch

At Nexgen Protection Services, we know that effective school security is about more than a uniformed presence. It’s about trained professionals who understand how to de-escalate conflict, respond to emergencies, and create a calming presence for students and staff.

Here’s what our trained school security personnel bring to the table:

  • Visible deterrence against hate crimes and unauthorized entry
  • Emergency response coordination in the event of threats or incidents
  • Controlled access management for safer drop-offs and pick-ups
  • Ongoing vigilance during school hours, events, and transitions
  • Trauma-informed interaction with children and educators

All Children Deserve Equal Protection

There’s no question: every child in every school deserves to feel safe—regardless of school size, religious affiliation, or neighborhood. When safety measures are unevenly distributed, we not only put certain communities at greater risk, but we also send the wrong message about who deserves protection.

Security should not be a privilege—it should be a basic right for every student in New York City.

The Role of Professional Protection Services

While funding is a major step forward, the implementation is equally important. Partnering with professional protection providers ensures that taxpayer dollars are being used to deploy trained, licensed, and vetted security personnel who understand the sensitive environments of religious and educational institutions.

At Nexgen, we take pride in supporting schools with custom-tailored protection services that address their specific vulnerabilities—from threat assessments to on-site security staffing.

Let’s protect all our children, not just some of them. Expanding funding is the first step. Partnering with the right security professionals is the next.

#SchoolSafety #ReligiousSchoolSecurity #PrivateSchoolProtection #NYCSecurity #ProtectionServices #SafeSchools #SecurityGuards #EquityInSafety #HateCrimePrevention #NexgenProtection

 

Source:
Campanile, C. (October 6, 2024).Small NYC yeshivas, other religious schools would receive millions in taxpayer funds for guards under new bill: ‘Grim new reality’ NY Post. 

 

Can Your Security Measures Be Turned Against You

Can Your Security Measures Be Turned Against You?

By Frank Costa, President, Nexgen Protection Services

In cybersecurity, one of the most unsettling truths is this: even your most trusted security tools can become vulnerabilities. History has repeatedly shown that when protective security measures are not rigorously monitored and maintained, they can be weaponized by the very threats they’re designed to stop.

When Protection Becomes Exposure

In 2015, a critical flaw in FireEye’s email protection system allowed attackers to execute arbitrary commands and potentially take full control of the device. Fast forward to recent years, and similar concerns have resurfaced. A vulnerability in Proofpoint’s email security service was exploited in a phishing campaign impersonating global brands like IBM and Disney—highlighting how attackers actively target security solutions to breach systems under the guise of legitimacy.

Now, Microsoft’s Windows SmartScreen is under scrutiny.

Originally launched with Internet Explorer and integrated deeply into Windows since version 8, SmartScreen is designed to block malicious websites, software downloads, and phishing attacks. It leverages URL filtering, application reputation, and cloud-based heuristics to flag suspicious content and warn users before they proceed.

Officially a feature of Microsoft Defender, SmartScreen can be centrally managed via Microsoft Defender for Endpoint Manager. But even if Defender isn’t your primary antivirus solution, SmartScreen remains active—thanks to its deep integration with Microsoft Edge and other core components.

That integration, however, has become a double-edged sword.

SmartScreen Exploited: A Wake-Up Call

Since mid-2023, several critical vulnerabilities in Windows SmartScreen have been actively exploited by threat actors. These flaws allowed attackers to bypass warning prompts, distribute malicious payloads, and even trick users into trusting compromised content—undermining the very foundation of SmartScreen’s protections.

This is more than just a flaw in one tool. It’s a broader warning for all security leaders: no control is infallible.

Turning Defense into Proactive Strategy

To avoid having your security measures turned against you, organizations must embrace a continuous, risk-based approach to cybersecurity. Here’s how:

  • Identify and Assess Vulnerabilities: Proactively investigate known issues in SmartScreen and other embedded controls to understand your current exposure.
  • Analyze Threat Actor Behavior: Study recent attack patterns, techniques, and exploits used to compromise trusted systems. This insight can inform and refine your detection and response strategies.
  • Conduct Automated Risk Assessments: Use automation to evaluate vulnerabilities, threat groups, and security controls holistically. This enables rapid, scalable decision-making.
  • Audit Across All Layers: Security isn’t limited to endpoint tools—evaluate the effectiveness of network, application, identity, and cloud protections to ensure layered defense.

Final Thoughts

The exploitation of tools like SmartScreen underscores a hard truth: Security controls are not immune to compromise. When attackers turn defense mechanisms into entry points, the impact can be devastating.

Cybersecurity resilience today means assuming every tool is a potential target and acting accordingly. Continuous testing, layered defenses, and proactive threat analysis are essential to ensuring that your safeguards stay one step ahead of the attackers—not the other way around.

Source:
Keller, Y.  (February 7, 2025). Can Your Security Measures Be Turned Against You? Cyber Defense Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Recognizing Cybersecurity as a Revenue Growth Strategy

Recognizing Cybersecurity as a Revenue Growth Strategy

By Frank Costa, President, Nexgen Protection Services

Revenue Growth

Walk into any department today—from procurement to production—and you’ll hear the same concerns: rising cyber risks, the need to protect proprietary information, and questions about system vulnerabilities. Sound familiar?

Despite cybersecurity’s growing relevance across the business, it too often remains siloed within IT, viewed as a purely technical function focused on firewalls, ransomware defense, or patching systems. What’s missing? A strategic mindset. One that sees cybersecurity not as a cost center, but as a critical driver of business continuity, trust, and revenue growth.

Breaking Out of the IT Silo

In many organizations, cybersecurity still lacks a clear, centralized home—let alone a champion to push for enterprise-wide integration. This outdated structure leads to a reactive posture:

  • “Are we safe from ransomware?”
  • “How fast can we fix vulnerabilities?”

These are valid concerns, but they’re inherently tactical. They address symptoms, not the strategic opportunity cybersecurity represents in today’s risk landscape.

Shift to Resiliency Thinking

To unlock cybersecurity’s full potential, businesses must shift from a remediation mindset to a resiliency perspective. This change must start at the top—with the CISO acting as a business leader, not just a tech steward, and with boards embracing cybersecurity as a strategic enterprise function.

This perspective shift means:

  • Viewing cybersecurity as essential to safeguarding not just data, but brand reputation and revenue streams
  • Allocating cybersecurity funding based on enterprise risk exposure, not just as a subset of the IT budget
  • Empowering cybersecurity teams to collaborate across business units, influencing product development, vendor selection, compliance, and even customer trust initiatives

Cybersecurity Is Revenue Protection

In the digital economy, trust is currency. Customers, partners, and investors expect companies to demonstrate resilience against cyber threats. A breach doesn’t just threaten data—it threatens customer loyalty, stock value, and long-term revenue. Conversely, strong cybersecurity can be a differentiator in highly competitive markets.

Positioning cybersecurity as a growth enabler rather than a back-office cost unlocks new possibilities for competitive advantage.

Final Thoughts

It’s time to reframe cybersecurity as foundational to the business, not just its infrastructure. The organizations that thrive in the face of escalating cyber threats will be those that elevate cybersecurity to a core pillar of their strategy—resourced appropriately, integrated deeply, and led with intention.

Cybersecurity isn’t just protecting your operations. It’s protecting your future.

 

Source:
Hochrieser, R. (April 16, 2025). Recognizing cybersecurity as a revenue growth strategy. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Behind the Signal Leak: Vulnerabilities in High-Security Communication

Behind the Signal Leak: Vulnerabilities in High-Security Communication

Behind the Signal Leak

By Frank Costa, President, Nexgen Protection Services

In the realm of digital communication, Signal has long held the crown for privacy. Launched in 2014 by tech visionary Moxie Marlinspike, the app promised what many believed impossible: end-to-end encrypted conversations so secure, not even the NSA could pry them open.

With over 40 million monthly users, Signal is far more than just another messaging platform. It has earned its reputation as a fortress of digital privacy, used and trusted by journalists, cybersecurity experts, whistleblowers, and privacy advocates worldwide.

The Leak That Shook the Corridors of Power

But even the strongest fortresses can be compromised—and the weakest link is often human.

In a startling national security blunder, Signal became the unlikely stage for one of the most significant government leaks in recent memory. Senior members of the Trump administration—including Defense Secretary Pete Hegseth and National Security Adviser Mike Waltz—used Signal to coordinate discussions about sensitive military operations.

Signal’s encryption didn’t fail. Its security architecture remained rock-solid. What failed was protocol—and basic operational discipline.

The breach occurred when an unauthorized participant was mistakenly added to a Signal group chat. That single error rendered the platform’s military-grade encryption irrelevant. Once inside the group, the participant had full access to the entire thread, including details of classified discussions.

The Real Lesson: Technology Alone Can’t Protect You

This incident highlights a critical truth: the most advanced encryption in the world can’t compensate for poor security practices. In fact, the more secure a system is perceived to be, the more catastrophic the fallout can be when users grow complacent.

The Signal leak is a textbook case of how human error can unravel even the most secure digital environments. It reinforces the need for ongoing training, strict access control, and real-time monitoring of secure communications—particularly in high-stakes contexts like national security, corporate strategy, or critical infrastructure operations.

Final Thoughts

Signal remains one of the most secure messaging platforms ever created—but it is not immune to misuse. True security demands more than encryption; it requires vigilance, policy, and accountability.

As organizations increasingly rely on digital tools for sensitive communications, this breach serves as a wake-up call: technology is only as secure as the people using it.

 

Source:
Torossian, R. (April 15, 2025). Behind the Signal leak: Vulnerabilities in high-security communication. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



For cargo loss prevention to be effective, it must be grounded in a comprehensive understanding of where losses originate.

Cargo Loss Prevention Starts with Business Unit Alignment

By Frank Costa, President, Nexgen Protection Services

Effective cargo loss prevention begins with a strategic, business-aligned approach. Before any control measures can be put in place, companies must conduct a shortage control sufficiency review—a structured process that starts by identifying all areas where the business is exposed to potential shrink.

Step One: Identify Shrink Exposure

The foundation of any loss prevention strategy is understanding where and how losses are likely to occur. In this context, exposure refers to any area, process, practice, or condition that either contributes to ongoing loss or presents a high likelihood of future loss. These exposures can’t be addressed until they are clearly identified.

Loss prevention professionals must begin by analyzing the unique risk landscape of the business. Only with a full understanding of where shrink occurs can appropriate shortage control measures be designed and deployed to mitigate or eliminate it.

The Three Categories of Exposure

Shrink exposure in cargo operations typically falls into three main categories:

  1. Operational Exposure
    These are losses tied to day-to-day business processes and procedures. Examples may include miscounts during loading or unloading, mislabeling, incorrect documentation, or delays that create vulnerability during transit.
  2. Administrative Exposure
    This category includes systemic issues such as poor recordkeeping, inadequate oversight, lack of accountability, or policy gaps. Administrative weaknesses can create loopholes that are easily exploited—either accidentally or intentionally.
  3. Physical Exposure
    This refers to the environmental or infrastructure-based conditions that can lead to loss. It might involve unsecured loading docks, lack of surveillance, or poor access control at warehouses and transit points.

The Interconnected Nature of Exposure

It’s important to recognize that these three exposure categories are interrelated. A change in one area—such as improving a physical control like gated access—can have a ripple effect on operational or administrative practices. This symbiotic relationship requires a holistic, cross-functional approach, where departments align to assess impact and adjust strategies accordingly.

Conclusion: Build on Alignment

For cargo loss prevention to be effective, it must be grounded in a comprehensive understanding of where losses originate. That understanding starts with alignment—among business units, departments, and leadership—around exposure identification and control priorities. Once these areas of vulnerability are known, meaningful and measurable control efforts can be deployed to reduce loss and strengthen supply chain integrity.

Source:
Seidler, K. (September 12, 2016). Cargo Loss Prevention Starts with Business Unit Alignment. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Creating a Grocery Loss Prevention Strategy

Creating a Grocery Loss Prevention Strategy

By Frank Costa, President, Nexgen Protection Services

Effective loss prevention in the grocery sector goes beyond deterring theft—it requires a comprehensive, data-driven strategy that minimizes shrink across all areas of the business. As grocery stores face unique challenges such as perishable inventory, high transaction volume, and broad employee access, a tailored approach is essential. Below are nine key components of a successful grocery loss prevention strategy.

1. Minimize Perishable Food Waste

In grocery, loss prevention starts with managing perishables. Spoilage and product expiration account for a significant portion of shrink. Investing in better forecasting, rotation practices, and inventory controls can greatly reduce waste and improve margins.

2. Identify External Theft and Fraud

While spoilage leads shrink, external theft and fraud are still major concerns. From organized retail crime to small-scale shoplifting and fraudulent returns, grocers must implement physical deterrents, surveillance, and digital tools that help detect and respond to these losses in real time.

3. Detect Internal Theft and Fraud Early

Employee theft is an unfortunate reality in any retail environment—including grocery. Early detection through exception reporting, transaction monitoring, and access control systems can minimize financial impact and help protect store culture.

4. Adopt a Cross-Functional Mindset

Loss prevention cannot operate in a silo. LP leaders are uniquely positioned to partner with merchandising, store operations, supply chain, finance, marketing, and HR. Sharing insights across departments helps embed a loss prevention mindset throughout the organization, making loss reduction a shared responsibility.

5. Become a Hub for Operational Insights

By integrating multiple data feeds—POS transactions, video analytics, inventory tracking—LP teams gain a comprehensive view of customer behavior and operational vulnerabilities. Sharing these insights with peers in operations and finance builds credibility, encourages collaboration, and positions LP as a strategic business partner.

6. Balance Loss Prevention with Customer Experience

Security solutions should protect inventory without compromising the customer experience. While locked display cases may deter theft, they can frustrate shoppers and impact sales. The best strategies are those that strike a balance—designed in partnership with merchandising and operations to be effective yet minimally disruptive.

7. Refine Hiring, Training, and Awareness

A successful loss prevention program starts with people. Hire employees who align with company values, then train them well—not just on store operations, but on the importance of loss prevention. When staff understand the controls in place and their role in protecting the business, they are less likely to engage in fraud and more likely to actively support LP efforts.

8. Measure Success Holistically

To gain organizational support, LP must demonstrate value in both tangible and strategic terms. This includes identifying enterprise-wide issues, quantifying financial impact, setting goals, and tracking performance. From margin protection and shrink reduction to specific metrics like refunds, voids, or cash variances, success should be measured across the full spectrum of the P&L.

9. Continue to Refine

Loss prevention is an evolving discipline. As the grocery landscape shifts—due to new sales models, technology, or economic pressures—LP strategies must adapt. The most effective programs are agile, constantly testing new tools and refining techniques to stay ahead of emerging risks and protect profitability.

Final Thoughts

A modern grocery loss prevention program isn’t just about stopping theft—it’s about building a culture of awareness, leveraging data, and embedding security into every part of the operation. When done well, it not only protects the bottom line but enhances overall store performance and customer trust.

 

Source:
Seidler, K. (February 03, 2016). Walmart’s Neighborhood Market Loss Prevention and Safety Program Featured in the Latest Magazine Edition. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


As Retail Theft Surges, Loss Prevention Becomes a Cornerstone of Store

As Retail Theft Surges, Loss Prevention Becomes a Cornerstone of Store Operations

By Frank Costa, President, Nexgen Protection Services

Retail theft is surging across the United States, forcing companies to reevaluate how they protect their assets, employees, and operations. As the scale and sophistication of retail crime grow, loss prevention has evolved from a behind-the-scenes function into a central pillar of store strategy.

Loss Prevention Moves to the Forefront

Loss prevention is no longer confined to surveillance cameras and backroom investigations—it has become a core part of strategic planning. Retailers are partnering with law enforcement, technology providers, and frontline staff to proactively address emerging threats. The goal is clear: stay ahead of crime before it disrupts the business.

Safety: The New Priority

It’s not just merchandise that’s at risk—employee safety is becoming a major concern. Sales associates and managers are increasingly exposed to potentially dangerous confrontations, especially when dealing with repeat offenders or organized retail crime groups.

To reduce risk, many retailers are training staff in de-escalation techniques and establishing clear protocols that discourage direct intervention. Employees are instructed to prioritize safety over apprehension and to alert management or law enforcement instead of attempting to stop theft themselves.

Advocacy and Legal Support

Beyond internal policy changes, some retailers are advocating for tougher legal penalties for retail theft and calling for improved cooperation with law enforcement. Organized retail crime rings often cross state lines and require more robust, coordinated responses from the justice system.

A Proactive Approach Yields Results

Despite the mounting challenges, industry experts agree: a proactive, well-resourced loss prevention strategy can make a measurable difference. From advanced surveillance technology to community partnerships and employee education, the most effective retailers are those that treat loss prevention as an investment—not just a cost center.

Final Thoughts

Retailers who prioritize loss prevention as a strategic function—not just a reactionary measure—are better equipped to navigate the evolving threat landscape. By investing in people, technology, and collaboration, they not only reduce shrinkage but also create a safer, more resilient environment for employees and customers alike.

Source:
As Retail Theft Surges, Loss Prevention Becomes a Cornerstone of Store Operations. (April 07, 2025). The D&D Daily.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


Employees who attempt to stop or detain suspected shoplifters without proper training expose themselves and the business to significant risks

The Cost of Untrained Store Employees Stopping Shoplifters

By Frank Costa, President, Nexgen Protection Services

In many states—including New Jersey—retailers are legally permitted to detain suspected shoplifters. However, this authority comes with serious responsibility. If you’re a store owner, manager, or loss prevention officer, and your store has a policy allowing detention of shoplifters, it is critical to establish clear guidelines and provide proper training for all involved staff.

Why Training Matters

Employees who attempt to stop or detain suspected shoplifters without proper training expose themselves and the business to significant risks—including injury, legal liability, and reputational damage. To minimize these risks, staff must be trained on the following:

  • Establishing Probable Cause: Employees must understand what qualifies as probable cause or reasonable suspicion. Detaining someone without it can lead to legal claims against the business.
  • Non-Confrontational Approach: Any interaction with a suspected shoplifter must be calm, non-accusatory, and non-threatening. Staff should maintain a safe distance—at least six feet—to avoid physical altercations, especially if the suspect becomes violent.
  • No Chases: If a suspected shoplifter attempts to flee, employees should never pursue them. Chases can lead to serious injury or legal liability for both the employee and the business.
  • Handling Non-Compliance: If a suspect refuses to comply, employees should disengage immediately, allow the individual to leave, and notify law enforcement.

The Safer, Smarter Approach

If your company maintains a zero-tolerance policy on shoplifting, the safest and most effective solution is to hire off-duty police officers or licensed professional security personnel. These individuals are trained to handle confrontations and detentions lawfully and safely.

Allowing untrained store employees—or even loss prevention officers—to act as security personnel and use force is both reckless and irresponsible. No employee should ever be placed in a situation where they’re expected to physically confront a shoplifter.

Conclusion

The cost of having untrained staff engage with shoplifters can far outweigh the loss from stolen merchandise. Protect your team, your customers, and your business by implementing clear policies, prioritizing safety, and leaving physical enforcement to professionals.

Source:
Blaettler, J. (2025, January 27). The Cost of Untrained Store Employees Stopping Shoplifters. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


Enhancing Retail Security with a Holistic Loss Prevention Strategy

Enhancing Retail Security with a Holistic Loss Prevention Strategy

By Frank Costa, President, Nexgen Protection Services

A holistic loss prevention strategy combines cutting-edge technology with a strong culture of awareness and collaboration.

The Role of Technology in Proactive Loss Prevention

In today’s retail environment, adopting advanced technologies is essential to effective loss prevention. Modern tools such as AI-powered video monitoring systems do more than just record footage—they analyze live feeds in real time to detect suspicious behavior and potential security breaches. These intelligent systems can immediately alert loss prevention teams, allowing for rapid intervention before a theft occurs.

Radio Frequency Identification (RFID) technology is another key component, offering real-time visibility into inventory. By identifying discrepancies as they happen, RFID helps retailers respond quickly to potential losses, minimizing shrinkage and operational disruption.

Predictive analytics further strengthens this proactive approach. By analyzing historical data, retailers can forecast when and where theft is most likely to happen. This insight enables better resource allocation, allowing stores to bolster security during high-risk periods or in vulnerable areas. As a result, businesses not only reduce losses but also enhance overall store efficiency and the customer experience.

Engaging Staff and Strengthening Community Collaboration

A truly effective loss prevention strategy goes beyond technology—it involves people at every level. Engaging non-LP (Loss Prevention) staff is critical in creating a culture of security. Training employees to recognize and report suspicious behavior empowers them to play an active role in theft prevention.

Moreover, collaboration with other retailers, law enforcement, and community organizations can significantly enhance the effectiveness of loss prevention efforts. Sharing information about known offenders, common theft tactics, and emerging threats allows for a united, informed approach to combating retail crime.

Conclusion

By leveraging AI, RFID, and data analytics while actively engaging employees and the broader community, retailers can stay ahead of threats, reduce shrinkage, and create safer, more efficient retail environments.

 

Source:
Norton, S. (2025, September 09). Enhancing Retail Security with a Holistic Loss Prevention Strategy. Intersectgroup.net.

Hashtags:
#Metrics #ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Credential Harvesting: A Serious Threat to Your Organization’s Security and Privacy

Credential Harvesting: A Serious Threat to Your Organization’s Security and Privacy

By Frank Costa, President, Nexgen Protection Services

Credential harvesting is a serious threat to your organization’s online security and privacy. It can lead to identity theft, financial fraud, account takeover, and unauthorized access to confidential information—affecting both your employees and your users.

Social engineering and phishing attacks are commonly used to compromise retailers’ systems and gain access to sensitive data or credentials.

Cybercriminals employ various methods to obtain sensitive information, including bot fraud, phishing emails, fake websites, and social engineering techniques that exploit human vulnerabilities.

Credential harvesting attacks pose significant threats across various industries, especially in the financial services sector. These attacks can have devastating consequences, ranging from financial losses and reputational damage to costly regulatory penalties.

Source:
Meyer, C. (2025, March 12). Retail Cybercriminals Turn to Credential Harvesting. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats