Artificial Intelligence: Challenges and Strengths Come Down to Human Error

Artificial Intelligence: Challenges and Strengths Come Down to Human Error

Frank Costa, President, Nexgen Protection Services

Automated threat detection and prevention, advanced intelligence, and AI-driven supply chain attacks—AI today has evolved significantly beyond the days of basic pattern matching.

While human error and uncertainty may initially amplify AI risks, it is ultimately the oversight of AI—the collaboration between humans and algorithms—that will enable us to safely innovate and explore this technology. AI itself is designed to be a positive force, unlocking value and improving efficiency.

However, AI cannot be left unchecked. The best way for organizations to mitigate AI risks is through increased education and employee training. People must know what to look for, and more broadly, you can never overemphasize the importance of cyber awareness training. Even beyond AI, there are countless ways to compromise an individual system or its information, and the digital landscape is constantly evolving.

The more we can educate employees and strengthen security measures across the board, the better prepared organizations will be to remain compliant, resilient, and scalable in this new era.

Source:
(2025, Jan 17). 3 Ways AI Will Transform Security in 2025. Security Education & Training.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats

 

Loss Prevention Strategies to Fight Shrink in the Retail Space

Loss Prevention Strategies to Fight Shrink in the Retail Space

Frank Costa, President, Nexgen Protection Services

When grocers address loss prevention strategies to combat shrinkage, it is typically framed within the context of preventing theft.

Major Sources of Shrinkage

  • Employee Theft: Surprisingly, one of the biggest contributors to shrinkage is employee theft. This can range from stealing products directly to manipulating cash registers or other financial records.
  • Shoplifting: Another significant source of shrinkage is shoplifting. Despite advances in surveillance and security, shoplifters often find creative ways to steal products.
  • Administrative Errors: Mistakes in recording inventory, pricing errors, and other administrative mishaps can also contribute to shrinkage. While these errors might seem minor individually, they can add up over time.
  • Vendor Fraud: Sometimes, the problem lies with suppliers. Vendor fraud includes issues like short shipments, where the vendor delivers less than what was ordered but charges for the full amount.

Implementing a Comprehensive Loss Prevention Program

While individual strategies can make a difference, a comprehensive loss prevention program that combines multiple approaches is often the most effective. Here’s how retailers can implement such a program:

  1. Conduct a Risk Assessment:
    Start by assessing the specific risks and vulnerabilities in your retail operation. Identify areas where shrinkage is most likely to occur and prioritize them for intervention.
  2. Train Employees:
    Employee education is crucial in preventing shrinkage. Train your staff on loss prevention techniques, including how to spot suspicious behavior, handle inventory accurately, and report discrepancies promptly. Encourage a culture of honesty and accountability among employees.
  3. Implement Security Measures:
    Invest in security measures such as surveillance cameras, electronic article surveillance (EAS) systems, and security tags. These tools can act as deterrents to potential thieves and provide valuable evidence in case of theft.
  4. Monitor and Analyze Data:
    Regularly monitor and analyze inventory data to identify patterns or anomalies that may indicate shrinkage. Use data analytics tools to gain insights into your inventory management and pinpoint areas for improvement.
  5. Collaborate with Vendors:
    Work closely with your vendors to ensure transparency and accuracy in deliveries. Establish clear communication channels and conduct regular audits to verify the accuracy of shipments. Building strong relationships with vendors can help prevent fraud and discrepancies.

Source:
Smirles, J. (2023, July 13). How Supermarkets Can Reduce Fresh Food Shrink. Loss Prevention Magazine.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats

 

Organized Retail Crime: Strategies for Mitigating Loss

Organized Retail Crime: Strategies for Mitigating Loss

Frank Costa, President, Nexgen Protection Services

To effectively combat organized retail crime, retailers must establish strong partnerships with industry associations, law enforcement agencies, and other relevant stakeholders. Such collaboration enables the exchange of intelligence, best practices, and emerging trends, allowing for a proactive response to the evolving nature of organized crime.

Partnership with Law Enforcement:
Close collaboration with law enforcement is critical. Retailers should establish direct communication channels with local police departments and develop protocols for promptly reporting organized crime incidents.

Training Store Associates:
Education and awareness are key to preventing organized crime. Retail employees must receive comprehensive training on identifying organized crime indicators, understanding theft patterns, and implementing effective prevention techniques.

Source:
Brittain, J. (2025, January 14). Retail’s Dangerous Triangle: Trafficking, Trucking, & Organized Theft. Loss Prevention Magazine.

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


How Security Is Shaping the Cannabis Industry

How Security Is Shaping the Cannabis Industry

Frank Costa, President, Nexgen Protection Services

A surveillance system can help protect your business from theft, particularly employee theft, which is a widespread issue in the cannabis industry. For large outdoor growing operations, having a monitoring system in place provides peace of mind by securing your property from all angles at all times.

Source:
Baxter, K. (2025, January 13). How security is shaping the cannabis industry. Security InfoWatch.

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



Security Protection to Ensure the Safety and Well-Being of Students

Security Protection to Ensure the Safety and Well-Being of Students

Frank Costa, President, Nexgen Protection Services

To ensure the safety and well-being of students, security protection should encompass both physical measures—such as secured perimeters, surveillance systems, and controlled access points—and proactive approaches, including anti-bullying policies, mental health support, positive student-teacher relationships, and comprehensive emergency response plans. All of this should be implemented while fostering a safe and inclusive school environment.

Source:
Intelligent Security for Safer Schools. Security InfoWatch (January 2, 2025).

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



Mitigate Losses to the Supply Chain with Robust Security Protection

Mitigate Losses to the Supply Chain with Robust Security Protection

Frank Costa, President, Nexgen Protection Services

Companies lose billions of dollars annually due to cargo theft. Many manufacturers don’t realize their shipments have been stolen until it’s too late, often discovering the issue only when the shipment fails to arrive on the expected date.

To mitigate losses in the supply chain caused by security threats, key protection measures include:

  • Thorough vendor vetting
  • Robust access controls
  • Data encryption
  • Continuous monitoring
  • Incident response planning
  • Supply chain visibility through technology
  • Diversifying suppliers
  • Implementing strong cybersecurity practices across all tiers of the supply chain, ensuring all partners adhere to the same security standards.

Source:
Fryer, N. (2025, January 18). How transportation management systems mitigate supply chain risks for manufacturers. Security InfoWatch.

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



Active Shooter Situations: Handling Conflicts & De-Escalation Tactics

Active Shooter Situations: Handling Conflicts & De-Escalation Tactics

Active Shooter Situation

A violent altercation at an AutoZone auto parts store on Broadway in Newburgh, Orange County, left one man dead from a gunshot wound and another injured from stab wounds.

Frank Costa, NEXGEN Protection Services

NEXGEN Protection offers 24/7 security for your business with armed guards trained to protect and de-escalate conflicts. Our team of professional, armed guards is rigorously trained and experienced in handling complex security challenges, ensuring safety, peace of mind, and compliance with regulations.

Two men were injured—one sustained stab wounds, while the other was shot. Officers immediately rendered medical aid to both individuals. The man with stab wounds was treated for non-life-threatening injuries, while the man with the gunshot wound was pronounced dead at the scene.

The Rise of Physical Security De-escalation Tactics

The Rise of Physical Security De-escalation Tactics

Frank Costa, President, Nexgen Protection Services

In recent years, one of the most pressing issues at the center of national conversations has been the use of excessive and unnecessary police force. This topic will continue to be a focal point, and one major shift in the security industry will be the increased emphasis on de-escalation tactics and training for safety officers, with a focus on making this a first resort.

De-escalation training equips security personnel with the tools they need to resolve emergencies without the use of force. It empowers officers to slow down, assess situations more effectively, and communicate clearly with both the individual involved and their team. Just as importantly, it helps mitigate the risk of liability and reduce the potential for injuries to security personnel.

While having a physical security or human guarding team on-site is crucial and can prevent further escalation, hybrid security strategies that incorporate technology are becoming increasingly important. The remote work revolution is well underway, and many companies have adopted a hybrid office model, allowing employees to spend time both on- and off-site.

SOURCE: 

Weingot, D. Guard trends to watch in 2022. Security InforWatch, 02/14/2022.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Remote Video Monitoring: The Future of Security for Businesses

Remote Video Monitoring: The Future of Security for Businesses

Frank Costa, President, Nexgen Protection Services

The future of security isn’t just on our doorstep — it’s breaking down the front door.
The security industry has experienced unprecedented advancements in technology and public policy, reshaping the way we approach safety and protection. And this rapid pace of change shows no signs of slowing.

Remote video monitoring (RVM) is poised to become a non-negotiable security tool for businesses — and soon, for homes.

2025 is not just about better security; it’s about smarter, proactive protection. RVM will be at the center of this shift.

This innovative approach addresses the limitations of on-site security guards and traditional surveillance systems. By integrating AI into RVM, businesses can mitigate human error, significantly reduce costs, and set new industry standards. Those who harness the power of AI for RVM will be well-positioned to thrive in this new era.

 

SOURCE: 

Selinger, D. 2025 will mark a turning point in physical security tech. Here’s why. Deep Sentinel, 12/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Frank Costa, President, Nexgen Protection Services

The cybersecurity landscape continues to evolve at an unprecedented pace. With the rise of sophisticated attack methods, the integration of new technologies, and increasing connectivity across sectors, businesses are facing more complex cybersecurity threats than ever before. Staying informed and prepared is critical to protecting data, maintaining trust, and ensuring business continuity.

Supply Chain Attacks

As businesses increasingly rely on external vendors and partners, supply chain attacks have become a significant cybersecurity concern. In these attacks, threat actors infiltrate a company’s system by compromising a third-party provider, gaining access to multiple organizations through a single vulnerability.

How to Prepare:

  • Vendor Risk Assessments: Conduct thorough security assessments for all vendors and partners to identify potential vulnerabilities.
  • Contractual Security Requirements: Include cybersecurity clauses in vendor contracts to ensure security standards are upheld.
  • Network Segmentation: Isolate critical systems from external partners to prevent attackers from moving freely within your network.
  • Continuous Monitoring: Use real-time monitoring to track vendor activity and detect any unusual behavior early.

 

SOURCE: 

Top Cybersecurity Threats to Watch in 2025: How Businesses Can Prepare, Boston Institute of Analytics, 11/14/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats