Do’s and Don’ts of GenAI for Security Metrics

Do’s and Don’ts of GenAI for Security Metrics

Frank Costa, President, Nexgen Protection Services

 

Security teams must get it right—there’s no room for error.

Do you use ChatGPT or other AI generators for your business security? Regardless of how you implement GenAI, what truly matters is what you do—and don’t do.

There’s no doubt that GenAI models are powerful tools. When adopted responsibly, they can help streamline security protocols, optimize time, and more. However, it’s crucial to remain fully aware of the limitations of GenAI models.

For starters, never underestimate the importance of keeping the human touch in your work. As smart as AI might seem, it cannot capture the intangibles that come from human intuition.

AI lacks a sense of bias and is unaware of what constitutes correct or incorrect facts. Therefore, it is vital to proofread any AI-generated content and verify all facts before acting on the data.

GenAI models are trained on vast amounts of data from multiple sources, meaning there is always a risk that AI-generated content could contain plagiarized text.

 

SOURCE: 

Shelmire, A. Liars in the wires: Getting the most from GenAI without getting duped, Security Magazine, 09/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Building a Diverse, Resilient Team to Enhance Effectiveness

Building a Diverse, Resilient Team to Enhance Effectiveness

Frank Costa, President, Nexgen Protection Services

 

Resilient teams possess four key traits that contribute to their success: collaboration, diverse skill sets, camaraderie, and positivity.

In today’s fast-paced and ever-changing business landscape, resilience is essential. It is the ability to respond to events or crises in a coordinated manner, minimizing damage and enabling a sustainable path forward. And it all starts with building resilient teams.

These teams are prepared to navigate disruptive events—or a series of events—with cohesion and precision. As a result, when they emerge on the other side, the need for damage control is minimal, and resuming operations and returning to business as usual is both straightforward and sustainable. That’s the goal.

Don’t avoid conflict—tackle it head-on. Even if it’s as subtle as a silent expression in a meeting, leave no stone unturned when it comes to gauging your team’s sentiments and perspectives. Build a culture of transparency and honesty, and make sure to listen to your people.

 

SOURCE: 

Horton, M. Building organizational resilience for sustainable success, Security Magazine, 10/03/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Aligning your metrics to key security processes within the organization is what’s really important. The challenge is to measure the right things.

Understand What Security Processes Are Essential For The Business To Succeed

Frank Costa, President Nexgen Protection Services – 

Aligning your metrics to key security processes within the organization is what’s really important.  The challenge is to measure the right things.

Security managers need to speak to senior leaders in familiar business language, offering measurable results that correlate with investment. Without compelling metrics, security managers and their budgets rely largely on the intuition of company leadership.

Experts agree, saying what’s important isn’t just about the numbers used but how those measures highlight that business story while solving problems to further business goals.

 

SOURCE: 

Randolph, C. Metrics that matter: How security professionals can show value, Security Magazine, 11/05/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Organizations Must Be Ready to Assess Potential Security Risks to Protect Everyone

Organizations Must Be Ready to Assess Potential Security Risks to Protect Everyone

Frank Costa, President Nexgen Protection Services – 

Security leaders across environments — spanning retail stores, corporate businesses, residential communities and cities — should prepare for threats that will require fast and informed action. We all have experienced major cultural moments, including the 2020 election, COVID-19 pandemic, and nationwide protests. 

It is critical for organizations to put in place security protocols to preserve employee and public safety while respecting the rights of citizens.  Creating a plan and protocols to address these incidents will help you ensure a coordinated response.

  • Establish communication protocols. Create clear communication protocols that explain how information will flow to key parties, such as store or business leadership, employees, customers, neighboring businesses and law enforcement.

  • Assess physical defense measures. How can you protect your building from damage or control the flow of traffic and people?

  • Promote de-escalation tactics. Reinforce your communication protocols during this training. Ensure that the safety of every employee and customer is the number one priority, reminding them to not get involved if physical violence occurs.

  • Implement safety technology. Cameras, alarms, motion detectors, and motion-triggered lights can all bring visibility to situations, add necessary deterrence if you make the decision to close a location, and gather evidence to help law enforcement pursue bad actors. Revisit your existing security investments to assess their capabilities, and consider whether you need new solutions to cover your gaps.   

 

SOURCE: 

Kelley, M. 3 potential security risks to stay ahead of post-election, Security Magazine, 11/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

fruad

Mitigating fraud, theft and scam risks within financial institutions

Frank Costa, President Nexgen Protection Services – 

Social engineering schemes have been such an easy way for fraudsters to get money. To guard against this fraud exposure, banks and financial institutions have to work just as hard as the fraudsters, and stay on top of any new threats that emerge. 

One of the best ways to defeat a social engineering scam requesting payment is to make a phone call to a number that is on file and ask if the person you received the request from really sent those instructions. 

Confirming with the appropriate person on file through a verbal phone call that a funds transfer request can proceed is a smart way to identify scam (fraud) attempts. With possibly hundreds of thousands or even millions of dollars at stake, it’s worth taking the extra time to confirm the validity of a funds transfer request.

SOURCE: 

Alger, J. Mitigating fraud, theft and scam risks within financial institutions, 12/2/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Acquire the necessary skills to survive an active shooter incident.

Acquire the necessary skills to survive an active shooter incident.

Frank Costa, President Nexgen Protection Services – 

The A.L.I.V.E. Active Shooter Survival Training Program is a comprehensive training program designed to provide individuals with the necessary skills and knowledge to survive an active shooter incident. Its emphasis on situational awareness and decision-making makes it a practical and effective approach to active shooter situations. By empowering individuals to take proactive measures to protect themselves and others, the program can help prevent tragedies and save lives.

A.L.I.V.E. stands for Assess, Leave, Impede, Violence, and Expose. These are the steps that anyone can take to more effectively respond should you ever be confronted with an active shooter situation, terrorist attack, violent attacker in the workplace, and other potentially deadly events.

 

SOURCE: 

Lasky, S. Staying A.L.I.V.E. During Active Shooter Incidents with Michael Julian, Security Info Watch Magazine, 112/27/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Conduct Vulnerability Assessments to Mitigate Violent Threats

Conduct Threat & Vulnerability Assessments to Mitigate Violent Acts

Frank Costa, President Nexgen Protection Services – 

UnitedHealthcare CEO Brian Thompson was fatally shot Wednesday morning in what authorities described as a ‘deliberate and targeted attack’ outside a Manhattan hotel hosting the health insurer’s investor conference.

The rise in violent incidents within the healthcare industry can often be traced back to personal frustrations with healthcare decisions, such as claim denials or unsuccessful procedures. These experiences can trigger strong emotional reactions, leading some individuals to express their anger through violent behavior. 

To mitigate these risks, healthcare organizations should conduct regular threat and vulnerability assessments using data-driven tools to identify exposures. Implementing layered security measures, such as access control systems, surveillance and secure office environments, can significantly enhance safety.

 

SOURCE: 

Bosch, R. Targeted killing of UnitedHealthcare CEO raises executive protection questions, Security Info Watch Magazine, 12/4/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Why Local Businesses Should Build Strong Relationships with Law Enforcement

Why Local Businesses Should Build Strong Relationships with Law Enforcement

Frank Costa, President Nexgen Protection Services – 

Building strong relationships with law enforcement has always been crucial to a successful loss prevention program. Historically, the relationship between retail stores and local law enforcement has been a part of both community safety and retail performance, reinforcing the critical elements of security and well-being.

Trust and respect are essential, along with a general understanding of how we can work together to keep our communities safe and our businesses successful.

SOURCE: 

Brittain, J. Fostering Next-Level Partnerships That Make a Difference, Loss Prevention Magazine, 11/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Cargo theft involves the manipulation of data and identities to gain access to freight under false pretenses.

Cargo theft involves the manipulation of data and identities to gain access to freight under false pretenses.

Frank Costa, President Nexgen Protection Services – 

Organized retail crime (ORC) has been the buzzword in the retail loss prevention world for well over the past decade. During that time, the lack of support from the criminal justice system has certainly negated most of those efforts.

Criminals will establish fake trucking and brokerage companies with the sole intention of stealing cargo. They go through the same process as legitimate carrier information, registration, obtaining insurance, and operating authority. These companies then start completing legitimate jobs to establish a history of work performed. Once established, the thieves target high-value loads within their customer network to steal.

Insist on placing disposable GPS trackers inside your high-value loads. These cost-effective devices eliminate reverse logistics and device management while providing complete visibility of your freight, in real-time, from anywhere around the world. If and when a theft were to occur, you could follow the load in real-time from your phone to assist law enforcement in finding its exact location.

As of now, there is no silver bullet that will stop these thefts from occurring. But understanding the problem, training your staff, and installing protective measures will certainly act as a shield to help fend off these criminals.

SOURCE: 

Tabor, J. Strategic Cargo Theft: What It Is, How It Started, and What You Can Do to Stop It, Loss Prevention Magazine, 10/01/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Rising Workplace Violence Necessitates The Need For Implementing A Structured, Approach To Incident Response.

Rising Workplace Violence Necessitates The Need For Implementing A Structured, Approach To Incident Response.

Frank Costa, President Nexgen Protection Services – 

Every year, thousands of American workers report being victims of workplace violence, with assaults resulting in 57,610 injuries in 2021-22 alone, according to the National Safety Council. 

These alarming statistics underscore the urgent need for managers and safety professionals to implement a structured, approach to incident response. By adopting this proactive strategy, businesses can not only respond effectively to violent incidents but also mitigate future risks, ensuring a safer environment for all employees.

Most Common Challenges in Proper Incident Response

  • Information overload can occur in the chaos following an incident, making it difficult for staff to capture all relevant details accurately. As a result, important information may be missed or recorded inconsistently.
  • Communication breakdowns often arise when attempting to quickly alert nearby locations about potential threats, especially in the absence of a standardized communication system.
  • Connecting the dots between incidents can be challenging without a centralized system that allows for data comparison across different locations and time periods, making it difficult to determine if an incident is isolated or part of a larger trend.
  • Resource allocation becomes guesswork when there are no data-driven insights to guide decisions about where to deploy additional measures, particularly in high-risk areas or during specific time periods.
  • Learning from incidents is hampered when there isn’t a systematic way to analyze past events, leading to missed opportunities for implementing lessons that could prevent future incidents.
  • Balancing speed and thoroughness is a common challenge, as the urgency to respond quickly to violent incidents often conflicts with the need for thorough data collection and analysis.

 

These challenges require a thoughtful, systematic approach to incident response. By addressing these issues head-on, businesses can significantly improve their ability to respond to and prevent violent incidents, creating safer environments for employees and customers alike.

SOURCE: 

Workplace Violence Reporting: Proper Responses to Violent Incidents, Loss Prevention Magazine, 09/26/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats