Focus on Metrics: Measuring and Communicating Security Effectiveness

Focus on Metrics: Measuring and Communicating Security Effectiveness

By Frank Costa, President, Nexgen Protection Services

Security operations rarely generate profit for the organization. While security is seldom recognized for all the preventive work done, it is often praised for responding to incidents—although this response typically represents only a small, yet critical, portion of our time.

We should focus more on demonstrating our value through smart, innovative metrics that are easily communicated, understood, and actionable for everyone on our team—and especially for all employees.

Source:
Rhatigan, D. (2025, March 17). Metrics to Make Security Shine Beyond the Numbers. Security Magazine.

Hashtags:

#Metrics #ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

The ROI of Security: Preventing Breaches Leads to Profit and Trust

The ROI of Security: Preventing Breaches Leads to Profit and Trust

By Frank Costa, President, Nexgen Protection Services

There are several ways to quantify security ROI, including cost savings from prevented breaches, regulatory compliance, and enhanced business continuity.

At its core, ROI is a financial metric that evaluates the profitability of an investment. In the context of security, ROI refers to the financial benefits gained from investing in security measures relative to the costs incurred. Calculating ROI can be complex in this context due to the intangible nature of many security benefits, such as risk mitigation and enhanced reputation.

Consumers are increasingly concerned about the security of their personal information. Businesses that prioritize security not only differentiate themselves from competitors but also build trust with customers. A strong security posture demonstrates a company’s commitment to protecting customer data, enhancing brand loyalty and attracting new customers.

 

Wood CPP, P. (March 17, 2025). How to Measure Your Security and Resilience ROI. Security Management.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Top Ten Factors to Consider to Offset Shrink

Top Ten Factors to Consider to Offset Shrink

By Frank Costa, President, Nexgen Protection Services

Retail shrinkage, or “shrink,” refers to the difference between the inventory a retail company is supposed to have on hand according to their records and the actual inventory physically verified in-store. This loss of inventory is primarily caused by factors such as shoplifting, organized retail crime, employee theft, human or paperwork errors, vendor fraud, and other related issues. Shrink can significantly harm a retail business, eroding profits that are vital to its survival.

By taking a closer look at these and other challenges, as well as addressing the practices, concerns, and opportunities within stores, retailers can make an immediate and impactful difference in shrink performance. 

While some factors may be beyond our control, there are several areas that can be addressed directly to mitigate shrink:

  1. Unsatisfactory Customer Service
    Poor customer service can drive away shoppers and create an environment where theft goes unnoticed.
  2. Poor Operational Controls
    Weak operational processes and oversight allow opportunities for shrink to occur, whether through inefficiencies or gaps in security.
  3. Lack of Store Cleanliness
    A cluttered or dirty store can create hiding spots for stolen goods and negatively impact inventory management.
  4. Substandard Merchandising Practices
    Disorganized product displays and poorly stocked shelves can increase theft opportunities and lead to inventory discrepancies.
  5. Ineffective Hiring Practices
    Hiring unqualified or dishonest employees increases the risk of theft, either by employees themselves or by facilitating external criminals.
  6. Cluttered Stockrooms
    Messy or disorganized stockrooms make it harder to track inventory and may contribute to inventory losses going unnoticed.
  7. Unattended and Untidy Fitting Rooms
    Fitting rooms that are poorly maintained or left unattended provide opportunities for customers to steal items without being caught.
  8. Poor Attention to Detail
    A lack of attention to small details—like inventory discrepancies, damaged goods, or missing items—can compound shrink over time.
  9. Unmotivated or Uninspired Employees
    Employees who are disengaged or unmotivated may fail to notice suspicious activities, contributing to losses.
  10. Closed Minds
    A reluctance to adopt new technologies or strategies in loss prevention can result in missed opportunities to reduce shrink.

By addressing these common characteristics and improving the practices that lead to shrink, retailers can better protect their profits and ensure long-term business success.

 

Source:
Brittain, LPC, J. (February 6, 2025). 10 Common Characteristics of High-Shrink Stores. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

A Deep Dive Into the Landscape of Gun-Related Incidents Across the United States

A Deep Dive Into the Landscape of Gun-Related Incidents Across the United States

By Frank Costa, President, Nexgen Protection Services

While active shooter events—where individuals enter a space with the intent to kill—are relatively rare, the most common gun-related incidents are often the result of personal disputes that escalate into violence. Other frequent incidents include weapons being discovered but not used, as well as shooting threats.

Two of the most powerful predictors of gun violence are:

  1. History of Aggression
    Individuals with a history of aggressive behavior are more likely to engage in violent acts. Prior incidents of aggression should be closely monitored to assess potential risks.
  2. Substance Abuse
    Substance abuse, particularly involving alcohol and drugs, has a strong correlation with violent behavior. This factor should be considered when assessing threats.

GUN RELATED INCIDENTS

In many cases, retailers may not own the parking lot or outdoor spaces surrounding their stores. However, they can still enhance security by installing exterior cameras that monitor these areas. Additionally, considering the placement of in-store cameras, integrating gun detection software into existing security systems, and providing specialized training for security personnel can further improve safety measures.

Source:
Wolfe, C. (February 13, 2025). Retail Spaces Top the List of Gun Violence Targets in New Report. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Loss Prevention in an Uncertain Economic Outlook

Loss Prevention in an Uncertain Economic Outlook

By Frank Costa, President, Nexgen Protection Services

The U.S. economy entered 2025 with momentum, but uncertainty looms as debates over immigration, tariffs, deregulation, and taxes continue to shape the economic outlook. This mix of policy discussions creates a complex and unclear narrative for the future.

Effective retail loss prevention requires a blend of security technologies—such as access control systems, alarm networks, and cybersecurity tools—alongside robust organizational policies and ongoing staff training. However, for these strategies to succeed, leadership must gain full buy-in from employees and continuously refine their approach.

While deregulation and tax cuts could offer a boost, immigration restrictions and tariffs present risks that could negatively impact the economy. Though recent economic data remains strong, the potential for downside risks remains a concern.

The ultimate goal of loss prevention should be to minimize losses before they occur. Achieving this requires a sustainable, proactive program built on three core principles: consistency, visibility, and innovation.

Source:
Wolfe, C. (March 4, 2025). NRF Chief Economist Says Data ‘Remains Strong’ But Public Policy Uncertainties ‘Blur the Economic Outlook’ for 2025. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Response Time Has a Significant Impact on Crisis Outcomes

Response Time Has a Significant Impact on Crisis Outcomes

Frank Costa, President, Nexgen Protection Services, on the Need for Crisis Management

A well-communicated and effectively executed crisis management plan significantly increases the likelihood of mitigating the effects of a crisis, regardless of the circumstances. The response component of a crisis plan must account for the unpredictable nature of emergencies while providing a structured approach to managing related activities. Developing a plan that enables swift, confident, and appropriate responses is essential for effective crisis resolution.

During a crisis, it is crucial to quickly assess the situation, determine its severity, identify the need for medical, police, or fire response, implement evacuation protocols, secure assets, and communicate efficiently with all relevant agencies through a structured system. A primary objective of crisis management planning is to establish standardized responses for these critical actions, ensuring they can be applied to a wide range of crisis scenarios.

In any crisis, delivering a fast, efficient, and appropriate response is vital. This process should be guided by a well-defined crisis response framework, reinforced by strong communication strategies and resources.

Source:
Brittain, J. (February 24, 2025). AP Fundamentals: Crisis Response. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

People Counting Technology Enhances Security and Provides Key Customer Insights

People Counting Technology Enhances Security and Provides Key Customer Insights

Frank Costa, President, Nexgen Protection Services, on the Need for Advanced Technology

Recent advancements in machine learning and deep learning have significantly enhanced the capabilities of video analytics, driving increased interest across industries. Along with improved accuracy and efficiency, these technologies have become more cost-effective and accessible. As a result, organizations are looking beyond traditional security applications to leverage video analytics for business optimization and operational efficiency.

People counting and crowd estimation tools initially gained traction among retailers for health and safety applications. Today, with continued technological advancements, these analytics have evolved into essential tools for a wide range of applications.

With people counting analytics, management can access actionable insights while eliminating the need for labor-intensive, manual foot traffic and occupancy tracking. Retail organizations use this data both for real-time responses and to inform strategic business decisions.

Retailers can analyze customer behavior, calculate conversion rates, and assess the ratio of visitors to actual buyers. Beyond sales and marketing insights, people counting tools also enhance store security. By analyzing historical data, management can determine peak hours and seasonal trends to optimize staffing levels.

Additionally, people counting technology enables real-time security alerts. The system can notify security teams of potential risks, such as individuals or groups spending prolonged periods unsupervised in high-value aisles. This allows management to assess whether increased monitoring or intervention is necessary.

Source:
Ebeid, N. (February 25, 2025). 3 Ways to Leverage People Counting for Operational Efficiencies. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


Ghost-Ransomeware-Attack

Ghost Ransomware Widespread Attacks on Organizations Internet-Facing Devices

Frank Costa, President, Nexgen Protection Services on Ghost Ransomware: 

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have issued a joint advisory on Ghost ransomware (also known as Cring).

The advisory, which is primarily aimed at network defenders, provides critical details on Ghost ransomware activities, including:

  • Indicators of compromise (IOCs)
  • Tactics, techniques, and procedures (TTPs)
  • Detection methods

The data used to compile the advisory comes from FBI investigations into Ghost ransomware incidents. It highlights how Ghost actors are launching widespread attacks by targeting organizations that use outdated software and firmware on internet-facing devices. These threat actors often exploit publicly available code linked to Common Vulnerabilities and Exposures (CVEs) to gain access to vulnerable systems.

The advisory urges network defenders to carefully assess the risks and take appropriate measures to mitigate them. CISA also recommends reviewing the advisory and implementing its suggested mitigations. For additional guidance on ransomware protection, detection, and response, refer to the #StopRansomware initiative and the associated guide. More information on CISA’s Cross-Sector Cybersecurity Performance Goals (CPGs), including recommended baseline protections, is available on their website.

Source:
Alger, J. (February 21, 2025). CISA and FBI Issue Warning for Ghost Ransomware Activity. Security Magazine.
Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats

 

Phishing Threats Are on the Rise: Organizations Must Assess Their Vulnerability

Frank Costa, President of NEXGEN Protection Services on Phishing Threats:

As AI-powered tools become more accessible, phishing threats are aon the rise. Attackers are increasingly targeting multiple channels to bypass security measures, beginning with phishing emails that contain links to video meetings featuring a deep fake.

Phishing attacks are becoming increasingly sophisticated, making it essential for organizations to assess their vulnerability. Hackers now have access to advanced AI-powered tools that enable them to craft email messages, create malicious payloads, and even generate deep fakes. These technologies—and the cyberattacks they facilitate—are more accessible than ever, particularly as cybercriminals tap into the growing “Crime as a Service” (CaaS) ecosystem. Providers now sell everything from attack tools to pre-packaged phishing kits designed to bypass native defenses and secure email gateways (SEGs).

Threat actors can leverage AI at every stage of a phishing attack, from speeding up the intelligence-gathering process on potential targets to automating the creation and distribution of highly personalized attacks. The use of AI accelerates and scales up attack creation, allowing even less-experienced cybercriminals to launch sophisticated campaigns. 

Impersonation attacks are another common tactic. The most frequent form involves attackers posing as the recipient’s company, accounting for 16% of phishing emails. The Human Resources (HR) department is often impersonated in these attacks. Cybercriminals also use platforms like LinkedIn, company websites, and news announcements to identify new hires at target organizations. These newly hired employees are then targeted in impersonation and social engineering attacks. New employees are frequently the victims of phishing emails impersonating VIPs, particularly in CEO fraud schemes.

To strengthen defenses, organizations can adopt best practices that help build a “human firewall.” The first step is to understand and communicate what constitutes normal behavior for brands and suppliers, which can aid in detecting impersonation. Organizations should also standardize and validate communication channels, especially for roles like HR and IT. Finally, companies should assess their vulnerability to supply chain and vendor-based compromises.

Source:
Alger, J. (February 20, 2025). Mobile Phishing Threats Are Evolving, According to New Research. Security Magazine.

 

Loss Prevention Strategies

Loss Prevention Strategies for Combating Organized Retail Theft

Frank Costa, President of NEXGEN Protections Services on Loss Preventions Strategies:

Organized retail theft (ORT) impacts more than just a retailer’s bottom line; it creates dangerous environments for both staff and shoppers. The increasing incidents of violence and aggression have pushed retailers to invest heavily in loss prevention strategies. In response, major retailers are partnering with technology innovators to strengthen their defenses. 

(ORT) involves coordinated efforts by professional thieves to steal large quantities of merchandise from retail stores. Unlike casual shoplifting, ORT is systematic, with stolen goods often resold through various channels, including online marketplaces. This form of theft has seen a significant rise in recent years, resulting in billions of dollars in annual losses for retailers.

Companies such as Walmart, Target, Lowe’s, Kroger, Macy’s, CVS, and others are at the forefront, using cutting-edge technology to deter and detect criminal activity. From advanced video surveillance systems to biometric cameras and autonomous security robots, retailers are deploying a formidable arsenal to combat the growing threat of ORT. Central to this technological revolution is the integration of artificial intelligence (AI), which enhances the sophistication and effectiveness of existing security measures.

Source:
Danielson, R. (February 20, 2025). Retail Resilience: Technology Strategies to Combat Organized Theft. Security Magazine.
Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats