Posts

Financial Consequences of Ignoring Security Debt

Financial Consequences of Ignoring Security Debt

Frank Costa, President Nexgen Protection Services – 

Security, though crucial, is often treated as an afterthought. Ignoring security means long-term consequences, and paybacks are investments and resources needed to deal with the threat. 

The message is simple: unchecked accumulated software vulnerabilities can be the dilapidated foundation that brings the entire system crashing down. 

The cost of investing in minimizing security debts is lesser than the potential cost of a security breach incurred in the future due to incident response, fines, loss of customer and investor trust, and possibly litigation.

 

SOURCE: 

Worcel, E., Financial consequences of ignoring security debt in 2024, Security Magazine, 5/21/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Tips to Stop Email Address Harvesting

Tips to Stop Email Address Harvesting

Frank Costa, President Nexgen Protection Services – 

Without a doubt chatbots or large language models lower the barrier for entry to cybercrime, making it possible to create well-written phishing campaigns and generate malware that less capable coders could not produce alone. 

When sharing your email address online, consider obfuscating it. For example, use “user [at] domain [dot] com” instead of the actual email format. This makes it harder for automated bots to recognize and harvest.

Be cautious about clicking on links in emails or on websites, especially those promising prizes, discounts, or freebies. These could be traps designed to harvest email addresses.

 

SOURCE: 

Kowski, J. S., Email obfuscation tactics elude security protections, Bloomberg.com, 6/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Employee-Safety-in-the-Face-of-Organized-Retail-Crime

Employee Safety in the Face of Organized Retail Crime

Frank Costa, President Nexgen Protection Services – 

The rash of flash-mob-style robberies in Los Angeles prompted several task forces of local and federal agencies to target the thefts, as well as work with retailers to enhance security and deterrence measures.

To overcome the ongoing threat of organized retail crime, pairing safety technology and ongoing safety training can keep employees and customers safe.

 

SOURCE: 

Hernandez, S. Smash-and-grab robbers coordinated crimes on social media. Eight culprits now face prison, Los Angeles Times. 7/30/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats



honeypot can give you equally good information about internal threats and show vulnerabilities in such areas as permissions that allow insiders to exploit the system.

Honeypot Techniques Expose Internal and External Threats

Frank Costa, President Nexgen Protection Services – 

One honeypot definition comes from the world of espionage, where Mata Hari-style spies who use a romantic relationship as a way to steal secrets are described as setting a ‘honey trap’ or ‘honeypot’. Often, an enemy spy is compromised by a honey trap and then forced to hand over everything he/she knows.

In computer security terms, a cyber honeypot works in a similar way, baiting a trap for hackers. It’s a sacrificial computer system that’s intended to attract cyberattacks, like a decoy. It mimics a target for hackers, and uses their intrusion attempts to gain information about cybercriminals and the way they are operating or to distract them from other targets.

Firewalls also won’t help against an internal threat – an employee who wants to steal files before quitting their job, for instance. A honeypot can give you equally good information about internal threats and show vulnerabilities in such areas as permissions that allow insiders to exploit the system.

Overall, the benefits of using honeypots far outweigh the risks. Hackers are often thought of as a distant, invisible threat – but using honeypots, you can see exactly what they’re doing, in real time, and use that information to stop them getting what they want.

 

SOURCE: 

Grant, D., New honeypot techniques for addressing targeted attacks, Security Today. 07.25.2024. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

This new legislation, effective July 1, 2024, mandates all employers establish, implement, and maintain an effective Workplace Violence Prevention Plan (WVPP).

Developing an effective anti-violence policy is a cornerstone of any prevention program.

Frank Costa, President Nexgen Protection Services – 

In response to increasing concerns over workplace safety, California’s Governor Gavin Newsom signed Senate Bill 553 (SB 553) into law, a significant step towards ensuring a safer work environment for all employees. 

This new legislation, effective July 1, 2024, mandates all employers establish, implement, and maintain an effective Workplace Violence Prevention Plan (WVPP). SB 553 underscores the state’s commitment to enhancing workplace safety by requiring employers to proactively address and mitigate the risks associated with workplace violence.

Preventing a case of violence happening at the workplace is objective. Devising an effective anti-violence policy is a cornerstone of any prevention program. Don’t make the mistake of formulating violence prevention program without due deliberations in risk evaluation.

Nexgen Protection Services can help you in devising a prevention policy after thorough risk assessment.

 

SOURCE: 

Saquella, A., Creating a safer workplace: California Senate Bill 553 becomes law, Security Today. 07.25.2024. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Provide training about the ways to spot deepfakes, and foster a culture of skepticism,

Deepfakes can cause financial and reputational damage to your organization.

Cybersecurity and fraud prevention are inextricably intertwined. Most organizations have robust firewalls, secure operating systems and intrusion detection systems. Deepfakes bypass these preventative firewalls through social engineering techniques. 

Individuals receive an email from a seemingly reputable source requesting employees give up sensitive information over email. Once this information is provided, hackers infiltrate company’s databases extracting sensitive information. 

Educate your employees about the existence of deepfakes. Provide training about the ways to spot deepfakes, and foster a culture of skepticism, similar to the way that employees are now on guard for phishing emails.

 

SOURCE: 

Collot, B., Are deepfake fraud risks overhyped? Where enterprises are exposed, Security Today. 07.26.2024. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Loss prevention specialists are leveraging technology to mitigate losses.

Loss prevention specialists are leveraging technology to mitigate losses.

Frank Costa, President Nexgen Protection Services – 

Organized retail crime (ORC) has become widespread. Artificial Intelligence, AI-based cameras with advanced analytics can extend the reach of loss prevention specialists by accurately alerting staff to certain behaviors such as loitering of people and vehicles. 

 

SOURCE: 

Foley, S., Addressing Unique Challenges, Security Today. 07.21.2023. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

The-effectiveness-of-audio-security-surveillance-is-often-underestimated

The effectiveness of audio security surveillance is often underestimated.

Frank Costa, President Nexgen Protection Services – 

In the world of security and video surveillance, the value of audio is often underestimated. While audio plays a pivotal role in intercom systems, its significance in broader security and event management contexts is frequently overlooked.

Audio analytics can also enhance situational awareness in areas where video is not allowed. For example, restrooms are a no-go area for cameras, but an analytic that detects glass breaks and yells can prevent such an area from being a complete blind spot.

By effectively addressing privacy concerns, audio analytics allow for the responsible utilization of audio capabilities in security cameras. Pairing AI-enabled cameras with audio analytics is an effective strategy for success.

 

SOURCE: 

Barbosa, R., Enhanced Situation Awareness, 07.24.2024. Security Today. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Retailers have become increasingly vulnerable to riots and looting.

Retailers have become increasingly vulnerable to riots and looting.

Frank Costa, President Nexgen Protection Services – 

Businesses must strike a balance between providing a seamless shopping experience and implementing robust security measures.

Modern surveillance systems incorporate high-resolution cameras that provide clear, detailed footage of your store. AI-powered surveillance can identify suspicious activity, track customer movements, and even analyze customer behavior to optimize store layouts and product placements. 

Staying updated with these technologies is not just a matter of protecting your assets; it’s about providing a secure, enjoyable shopping experience for your customers.

 

SOURCE: 

Wolfe, C., Storefront Security and Emergency Response 2024, 07.09.2024.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Do-autonomous-security-guard-robots-provide-the-protection-you-need

Do autonomous security guard robots provide the protection you need?

Frank Costa, President Nexgen Protection Services – 

Robots are a low cost alternative to meeting the unique challenges of on site security. They patrol the hallways, vigilant for signs of trouble – and report their findings to a human-staffed call center.

These robots are equipped with a depth camera, heat-detecting thermal sensors, 4K cameras that can see 360 degrees, as well as a Microphone array for listening and PA system for announcing.

It’s not all smooth sailing. Security robots have had their share of mishaps, from minor accidents to malfunctioning in critical situations. And there’s the human factor to consider. 

For now, human intelligence is still the most effective means of deterring and mitigating threats in the workplace.  

 

SOURCE: 

Knutsson, K., Is this autonomous security guard robot the protection you need?, FOX News, 05,17 2024.

 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats