Posts

Security Fundamentals

Back to Basics: Why Security Fundamentals Matter More Than Ever

By Frank Costa, President, Nexgen Protection Services

In today’s complex threat landscape, advanced tools and analytics are important — but the fundamentals of security protection matter more than ever.

  • Effective security operations are built on:
  • Ethical decision-making
  • Fact-based, unbiased investigations
  • Clear, defensible documentation
  • Alignment with enterprise risk and compliance objectives

When these basics are weak, even the most sophisticated technology cannot compensate. Investigations become inconsistent. Documentation fails under scrutiny. Risk decisions drift away from governance standards.

The foundation for disciplined security work is well established. ASIS International emphasizes structured investigative processes and documentation standards to ensure credibility, transparency, and defensibility (ASIS International, 2015). Likewise, the framework developed by the Committee of Sponsoring Organizations of the Treadway Commission (COSO) reinforces that internal controls, risk assessment, and governance alignment are essential to protecting organizational value (COSO, 2017).

Security leaders should equip their teams with a clear Investigations Standard — outlining principles, processes, reporting protocols, and oversight mechanisms. This ensures:

  • Consistency across cases
  • Protection of employee rights
  • Legal and regulatory defensibility
  • Alignment with enterprise risk strategy

Strong security fundamentals create operational integrity. Operational integrity builds executive trust.  And executive trust strengthens enterprise resilience.

In security protection, excellence is rarely about doing something extraordinary. It’s about doing the ordinary — exceptionally well.

References (APA 7th ed.)
ASIS International. (2015). Investigations standard. ASIS International.
Committee of Sponsoring Organizations of the Treadway Commission. (2017). Enterprise risk management—Integrating with strategy and performance. COSO.

#SecurityLeadership #Investigations #CorporateSecurity #RiskManagement #Governance #Compliance #OperationalExcellence #EnterpriseRisk

 

Corporate Security

Corporate Security Doesn’t Collapse Overnight — It Drifts.

By Frank Costa, President, Nexgen Protection Services

In Corporate America, major security failures rarely begin with one dramatic breach. They develop through small gaps, missed indicators, and delayed decisions.

  • An access badge that isn’t deactivated.
  •  A phishing email that isn’t reported.
  •  A vendor risk review pushed to “next quarter.”
  •  An employee who hesitates to escalate a concern.

Over time, these small gaps align — and the result is financial loss, reputational damage, regulatory exposure, or even physical harm.

High-performing corporate security programs operate differently.

Drawing on the principles outlined by Karl E. Weick and Kathleen M. Sutcliffe, High Reliability Organizations (HROs) maintain a preoccupation with failure and a constant awareness of operational risk (Weick & Sutcliffe, 2015). They assume vulnerabilities exist and actively search for them.

Similarly, James T. Reason’s model of layered defenses reminds us that breaches occur when multiple minor control failures align — not because of one catastrophic error (Reason, 1997).

For corporate security leaders, this means:

  • Treating near-miss cyber incidents as intelligence
  • Escalating anomalies early — even when data is incomplete
  • Empowering employees to report suspicious behavior without fear
  • Stress-testing physical, digital, and vendor controls regularly
  • Ensuring executive leadership visibly supports security culture

Security resilience is not built in crisis response — it’s built in everyday vigilance.

The strongest organizations don’t wait for certainty.
They act on weak signals.

Because in corporate environments, failure is rarely sudden.
It’s cumulative.

References (APA 7th ed.)
Reason, J. T. (1997). Managing the risks of organizational accidents. Ashgate.
Weick, K. E., & Sutcliffe, K. M. (2015). Managing the unexpected: Sustained performance in a complex world (3rd ed.). Jossey-Bass.

#CorporateSecurity #EnterpriseRisk #SecurityLeadership #OperationalRisk #CyberSecurity #PhysicalSecurity #RiskManagement #BusinessResilience

 

Digital Threats

The Digital Threats You Can’t Afford to Ignore

The Digital Threats You Can’t Afford to Ignore — And How to Stay Ahead

Cybercrime isn’t slowing down — it’s getting smarter. The good news? So can we.

By Frank Costa, President, Nexgen Protection Services

Here’s what everyone should know right now:

  • The #1 Venmo Scam
    Fraudsters are exploiting “accidental payment” schemes — sending money, claiming it was a mistake, then asking you to return it before the original transfer is reversed. Never send money back without confirming directly inside the app and contacting support.

  • The Biggest Mistake Almost Everyone Makes Online
    Reusing passwords. One breach = access to multiple accounts. Use a password manager and enable multi-factor authentication (MFA) everywhere possible.

  • If Your Phone Is Lost or Stolen – Act immediately:
    1️Lock the device remotely
    2️Change critical passwords (email first)
    3️Contact your carrier
    4️Monitor financial accounts

    Your phone is a digital master key — treat it that way.

  • How to Freeze Your Credit (And Why You Should)
    A credit freeze prevents new accounts from being opened in your name. It’s free and can be temporarily lifted when needed. This is one of the strongest identity theft prevention steps available.

  • The Fastest Way to Spot Scams
    Look for urgency + emotion.
    “Act now.” “Your account will be closed.” “You’re in trouble.”
    Scammers rely on panic. Pause. Verify independently. Never click links from unsolicited messages.

This isn’t about fear. It’s about preparation.

Because digital mistakes can be instant — but recovery can take years.

#CyberSecurity #FraudPrevention #IdentityTheft #OnlineSafety #ScamAwareness #DigitalSecurity #RiskManagement #PersonalSecurity

Surveillance

Effective Surveillance in Investigations

Conducting Effective Surveillance in Investigations: Why It Matters and How to Do It Right

By Frank Costa, President, Nexgen Protection Services

Effective surveillance remains one of the most powerful tools in professional investigations — but it’s more than just “watching someone.” By blending benefits, legal awareness, and tactical modalities, investigators can gather high-value intelligence while staying within ethical and legal boundaries.

Surveillance offers real-time insight into a subject’s behavior, patterns, and interactions — critical for criminal, civil, and fraud investigations. Whether through mobile (tailing a subject) or static (fixed observation) surveillance, investigators can collect evidence that supports case development, aids in pattern recognition, and enhances understanding of complex behaviors.

Modern investigations also leverage electronic and digital modalities — such as video footage, aerial systems, and online open-source intelligence — to extend observational reach without direct contact. These tools increase accuracy and evidence richness when used responsibly.

However, legalities are foundational: investigators must heed privacy laws, trespass restrictions, and regulatory limits. Licensed professionals cannot enter private property without permission, ignore clearly established privacy barriers, or employ deceptive or intimidating practices. Violations not only risk evidence being excluded in legal proceedings but can also result in civil and criminal liability or disciplinary action.

Preparation is equally pivotal. Successful surveillance depends on comprehensive planning — from understanding the subject’s routines, vehicles, and associates to pre-identifying observation points and ensuring communications readiness. Detailed documentation turns what was observed into actionable intelligence with integrity and defensibility.

In investigations, effective surveillance balances skill, technology, and law — yielding insights that assist in uncovering truths while upholding ethical standards.

Reference (APA 7th ed.)
Gaspar, J. M., & Luizzo, A. J. (2026, February 12). Conducting effective surveillance in investigations: Benefits, legalities, and modalities. Security Management. https://www.asisonline.org/security-management-magazine/articles/2026/02/investigation-surveillance/

#Investigations #Surveillance #LawEnforcement #Ethics #Privacy #RiskManagement #Evidence #SecurityProfessionals #InvestigativeBestPractices

 

retail loss prevention

Surveillance Is Transforming Retail Loss Prevention

More Eyes, Fewer Losses: How Expanded Surveillance Is Transforming Retail Loss Prevention

By Frank Costa, President, Nexgen Protection Services

Retailers are increasingly expanding surveillance coverage to combat shrinkage and strengthen loss prevention strategies — and the data shows why this matters. With advances in real-time video monitoring, smarter camera placement, and AI-driven analytics, organizations are gaining greater visibility into suspicious behavior and inventory movement, allowing security teams to act faster and more effectively.

Strategic deployment of cameras across entrances, aisles, self-checkout stations, and high-value product zones not only deters opportunistic theft, but also helps retailers identify patterns, flag risks, and reduce blind spots that traditional systems often miss. Real-time monitoring and intelligent alerts give loss prevention teams the ability to intervene as events unfold — boosting both security and operational efficiency.

One compelling outcome of enhanced surveillance is the measurable reduction in retail shrinkage. Retailers that integrate advanced analytics into their camera ecosystems have reported significant decreases in losses — in some cases cutting shrinkage by 30% or more shortly after implementation. These smart systems also improve employee accountability and provide actionable insights for future planning, making them a core part of modern loss prevention strategies.

In today’s retail environment, more eyes truly mean smarter oversight — and when those “eyes” include AI-assisted real-time monitoring, the impact extends beyond loss prevention to create safer, more efficient stores that protect both people and profits.

References (APA 7th ed.)
Oosto. (2024). Retail loss prevention and shrinkage reduction with real-time video surveillance. https://oosto.com/use-case/loss-prevention/
Facit Analytics. (2024). CCTV video analytics retail shrinkage. https://facitanalytics.ai/insights/cctv-analytics-retail-shrinkage

#RetailSecurity #LossPrevention #Shrinkage #Surveillance #AI #RetailInnovation #RiskManagement #OperationalExcellence

 

Workplace Violence

Workplace Violence Is Rising — And Leaders Must Act Now

By Frank Costa, President, Nexgen Protection Services

Recent workplace safety research shows a clear upward trend in violence on the job that impacts employees across industries — from hospitality to healthcare and beyond. According to the 2025 Employee Survey Report on Workplace Violence and Safety, 30% of U.S. workers reported witnessing violence against coworkers (up from 25% in 2024), and 15% said they were directly targeted themselves — both figures showing a year-over-year increase. This trend underscores the reality that workplace violence is not only more common, it’s impacting employee wellbeing and organizational culture.

Violence at work can take many forms: physical assaults, threats, harassment, and aggressive behavior — whether between coworkers, with clients/customers, or even from outside actors. High-exposure sectors like hospitality and healthcare report particularly elevated rates of incidents.

So, what can leaders do?

  • Prioritize Prevention over Reaction
    Invest in comprehensive training that helps employees recognize, de-escalate, and report potential threats. Prevention must be part of the culture — not just a compliance checklist.
  • Improve Reporting Systems
    Ensure reporting is anonymous, accessible, and non-retaliatory so employees feel safe speaking up.
  • Tailor Strategies to Your Workplace
    Different environments pose different risks. In customer-facing roles, equip staff with conflict de-escalation training; in healthcare, integrate safety teams and early threat assessments.
  • Support Employee Wellbeing
    Violence at work affects mental health and retention. Offer support resources and foster psychological safety alongside physical safety.

Workplace safety isn’t just HR policy — it’s a business imperative. Proactive leadership can make all the difference in keeping employees safe, respected, and able to thrive.

Reference (APA 7th ed.)
Traliant. (2025). 2025 Employee Survey Report on Workplace Violence and Safety. https://www.traliant.com/resources/2025-workplace-violence-report/

#WorkplaceSafety #EmployeeWellbeing #Leadership #HR #ViolencePrevention #OrganizationalCulture #SafetyFirst #RiskManagement

 

When a child goes missing, every second counts—and understanding how they were taken can shape how we respond.

When a child goes missing, every second counts—

When a child goes missing, every second counts—and understanding how they were taken can shape how we respond.

Frank Costa, President, Nexgen Protection Services

In “Understanding the Three Types of Abductions” published by Pursuit Magazine, abductions are categorized into three primary types:

  1. Family Abductions – Often tied to custody disputes, these cases may appear less urgent but can escalate quickly, especially when there is a history of domestic violence.
  2. Acquaintance Abductions – The child knows the offender (coach, neighbor, online contact). These cases require rapid relational mapping and digital footprint analysis.
  3. Stranger Abductions – Statistically rare but high-risk. These demand immediate multi-agency coordination, media activation, and geographic profiling.

Understanding these distinctions is not academic—it’s operational.

Strategic Support for Law Enforcement (LE):

  • Family Abductions: Prioritize custody documentation, prior threats, financial tracing, and border alerts. Early court coordination is key.
    Acquaintance Abductions: Deploy victimology analysis, social network mapping, and device forensics immediately. Time-sensitive digital evidence often breaks these cases.
    Stranger Abductions: Launch rapid response protocols—AMBER Alerts, surveillance canvassing, vehicle data analysis, and behavioral profiling.

Cross-sector collaboration (NGOs, digital platforms, advocacy groups) enhances speed and intelligence flow in all three categories.

The takeaway? Categorization drives strategy. Strategy drives recovery.

The more precisely we understand the type of abduction, the more effectively we can align investigative resources—and bring someone home.

Reference (APA 7th ed.)
Pursuit Magazine. (n.d.). Understanding the three types of abductions. https://www.pursuitmag.com/

#MissingPersons #ChildSafety #LawEnforcement #PublicSafety #Investigations #AMBERAlert #CrisisResponse #ForensicLeadership

 

Inventory Protection

Auto Dealership Inventory Protection

Frank Costa, President, Nexgen Protection Services

A large auto dealership managing millions of dollars in vehicle inventory identified a growing concern around after-hours security risks. Late one evening, security personnel monitoring surveillance systems observed irregular movement within a restricted area of the lot outside normal business hours.

Inventory Protection Pays —

Following established protocols, officers immediately responded to the location while maintaining remote visual monitoring. Their rapid presence disrupted the activity and prevented vehicle theft and potential vandalism before any loss occurred. Local law enforcement was notified, and the situation was resolved without damage to inventory or facilities.

After the incident, protection services conducted a post-incident security assessment in partnership with dealership leadership. Based on findings, the team enhanced overnight patrol routines, adjusted camera coverage, and improved access controls at key entry points. Officers also worked with management to reinforce lighting in vulnerable areas and refine alarm response procedures.

Within weeks, the dealership reported no further after-hours incidents. Leadership noted improved confidence in asset protection, smoother operations, and reduced exposure to financial and insurance-related risks. Employees expressed greater peace of mind knowing high-value inventory was actively monitored and protected beyond business hours.

 

Results:

  • High-value vehicles protected from theft and damage
  • No operational downtime or loss of sales
  • Reduced insurance risk and improved compliance
  • Stronger overall security posture

 

Key takeaway:
Proactive monitoring, rapid response, and continuous improvement are critical to protecting high-value commercial assets. Effective protection services not only stop incidents in progress—they help strengthen long-term risk prevention strategies.

 

#AutoDealershipSecurity #AssetProtection #LossPrevention #CommercialSecurity #RiskManagement #SecurityProfessionals #InventoryProtection #ProtectiveServices

 

High-Stress Security

Protecting Critical Care During a High-Stress Incident

A regional hospital faced a high-stress incident, when a distressed family member attempted to force entry into a restricted Intensive Care Unit (ICU) during visiting hours. Emotions were elevated, and clinical staff were focused on providing critical, life-saving care. Protection services were immediately requested to support the care team and maintain a safe environment.

Frank Costa, President, Nexgen Protection Services

Upon arrival, officers prioritized calm communication, empathy, and clear boundary setting. Rather than escalating the situation, they actively listened to the family member’s concerns, acknowledged the emotional stress involved, and clearly explained hospital policies designed to protect patient safety and privacy. Officers positioned themselves to control access without appearing confrontational, maintaining a respectful and professional presence.

Protection services coordinated closely with nursing leadership and hospital administration, ensuring messaging was consistent and that clinical staff remained focused on patient care. When appropriate, officers facilitated communication between the family member and hospital representatives, helping redirect frustration into a productive conversation.

The incident was resolved peacefully, with no physical confrontation and no interruption to ICU operations. Critically ill patients continued receiving uninterrupted care, and staff reported feeling supported and reassured by the protection team’s response.

Results:

  • Restricted ICU access maintained
  • Patient privacy and safety protected
  • Staff stress and disruption minimized
  • Situation resolved without use of force

Key takeaway:
Effective hospital protection services play a vital role beyond access control. Through empathy, professionalism, and collaboration, security teams help preserve safe, healing environments—especially during emotionally charged moments.

#HealthcareSecurity #HospitalSafety #ProtectiveServices #PatientPrivacy #CrisisDeEscalation #PublicSafety #SecurityLeadership #HealthcareProfessionals

 

Nexgen Protection Services on technology safety strategies.

Technology Supporting Safer Campuses

A large university sought to improve campus safety while maintaining an open, welcoming environment for students, faculty, and visitors. Protection services partnered with campus leadership to implement a technology-driven safety strategy focused on prevention, rapid communication, and community engagement.

Frank Costa, President, Nexgen Protection Services on technology safety strategies —

The initiative included launching a campus safety mobile app, upgrading the emergency mass-notification system, and expanding enhanced lighting and camera coverage in high-traffic and low-visibility areas. The safety app allowed users to quickly report suspicious activity, request escorts, and receive real-time alerts. Emergency notifications were redesigned for clarity and speed, ensuring critical information reached the campus community within seconds.

Protection services conducted outreach sessions to educate students and staff on how to use the new technology effectively. This proactive engagement increased adoption rates and encouraged shared responsibility for campus safety.

Within one academic year, the university recorded significantly faster alert dissemination during incidents, enabling quicker response and coordination by protection services. Reports of suspicious activity increased—not due to higher crime, but because students felt empowered and confident in reporting concerns early. Surveys also showed a measurable improvement in students’ perception of safety, particularly during evening hours.

Results of Security Technology:

  • Faster incident awareness and response times
  • Increased reporting and early threat identification
  • Improved student confidence and sense of security
  • Stronger connection between protection services and the campus community

 

Key takeaway:
When technology is paired with trained protection services and clear communication, it becomes a powerful tool for prevention, trust-building, and safer learning environments.

#CampusSafety #SecurityTechnology #StudentSafety #PublicSafety #RiskPrevention #SecurityLeadership #HigherEducation #ProtectiveServices