Posts

What is a Loss Control Program, And Do I Need One

What is a Loss Control Program, And Do I Need One?

By Frank Costa, President, Nexgen Protection Services

A loss control program is a coordinated set of actions or practices that help locate and address potential risks for a business. The program could evaluate losses from employee theft, financial difficulties from claims or lawsuits, and other risks. A tailored loss control program reduces risk and mitigates the extent of economic losses when unexpected incidents occur. 

How Do I Know If I Need a Loss Control Program?

Most businesses can benefit from a loss control program. The first step is to review your business’s risks. You have risks unique to your enterprise, along with a range of standard risks. Some common potential losses that many companies share include:

  • Product theft
  • Damaged inventory
  • Workplace injuries
  • Property damage
  • Online security threats
  • Client claims

Most businesses find that having a safety manual for employees is a practical part of a loss prevention program. Educating your staff makes them more likely to respond to emergencies correctly and confidently.

 

What is a Loss Control Program, And Do I Need One? (February 04, 2025). InsuranceNeighbor.com.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Reducing the Imminent Risk of Lethality Through Sensible Gun Laws and a Culture of Safety

Reducing the Imminent Risk of Lethality Through Sensible Gun Laws and a Culture of Safety

By Frank Costa, President, Nexgen Protection Services

How Sensible Gun Laws Can Help:

  1. Gun Safety
    • Sensible gun laws can reduce easy access to dangerous weapons.
    • We must establish a culture of gun safety.
  2. Reducing Access
    • Firearm access should be restricted for youth and individuals at risk of harming themselves or others.
  3. Accountability
    • The gun industry must be held accountable. There should be adequate oversight regarding the marketing and sale of guns and ammunition.
  4. Engagement
    • We need to engage responsible gun dealers and owners in finding solutions.
  5. Mandatory Training and Licensing
    • Insist on mandatory training and licensing for gun owners.
  6. Safe Storage
    • Require safe and secure gun storage to prevent unauthorized access.

Addressing the Underlying Contributors to Gun Violence:
To reduce risks and build resilience in individuals, families, and communities, we must focus on these key areas:

  1. Public Health Solutions
    • Gun violence should be recognized as a critical and preventable public health issue.
  2. Comprehensive Solutions
    • Support the creation and implementation of community safety plans that prioritize prevention and intervention.
  3. Trauma, Connection, and Services
    • Expand access to high-quality, culturally competent, and coordinated social, emotional, and mental health services. These services should specifically address the impact of trauma.

Source:
Gun Violence Must Stop. Here’s What We Can Do to Prevent More Deaths. Prevention Institute.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Response Time Has a Significant Impact on Crisis Outcomes

Response Time Has a Significant Impact on Crisis Outcomes

Frank Costa, President, Nexgen Protection Services, on the Need for Crisis Management

A well-communicated and effectively executed crisis management plan significantly increases the likelihood of mitigating the effects of a crisis, regardless of the circumstances. The response component of a crisis plan must account for the unpredictable nature of emergencies while providing a structured approach to managing related activities. Developing a plan that enables swift, confident, and appropriate responses is essential for effective crisis resolution.

During a crisis, it is crucial to quickly assess the situation, determine its severity, identify the need for medical, police, or fire response, implement evacuation protocols, secure assets, and communicate efficiently with all relevant agencies through a structured system. A primary objective of crisis management planning is to establish standardized responses for these critical actions, ensuring they can be applied to a wide range of crisis scenarios.

In any crisis, delivering a fast, efficient, and appropriate response is vital. This process should be guided by a well-defined crisis response framework, reinforced by strong communication strategies and resources.

Source:
Brittain, J. (February 24, 2025). AP Fundamentals: Crisis Response. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

People Counting Technology Enhances Security and Provides Key Customer Insights

People Counting Technology Enhances Security and Provides Key Customer Insights

Frank Costa, President, Nexgen Protection Services, on the Need for Advanced Technology

Recent advancements in machine learning and deep learning have significantly enhanced the capabilities of video analytics, driving increased interest across industries. Along with improved accuracy and efficiency, these technologies have become more cost-effective and accessible. As a result, organizations are looking beyond traditional security applications to leverage video analytics for business optimization and operational efficiency.

People counting and crowd estimation tools initially gained traction among retailers for health and safety applications. Today, with continued technological advancements, these analytics have evolved into essential tools for a wide range of applications.

With people counting analytics, management can access actionable insights while eliminating the need for labor-intensive, manual foot traffic and occupancy tracking. Retail organizations use this data both for real-time responses and to inform strategic business decisions.

Retailers can analyze customer behavior, calculate conversion rates, and assess the ratio of visitors to actual buyers. Beyond sales and marketing insights, people counting tools also enhance store security. By analyzing historical data, management can determine peak hours and seasonal trends to optimize staffing levels.

Additionally, people counting technology enables real-time security alerts. The system can notify security teams of potential risks, such as individuals or groups spending prolonged periods unsupervised in high-value aisles. This allows management to assess whether increased monitoring or intervention is necessary.

Source:
Ebeid, N. (February 25, 2025). 3 Ways to Leverage People Counting for Operational Efficiencies. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


Loss Prevention Teams Seamlessly Integrate Tech, People, & Process to Mitigate Risk

Loss Prevention Teams Seamlessly Integrate Tech, People, & Process to Mitigate Risk

Frank Costa, President, Nexgen Protection Services, on the Need for Advanced Loss Prevention Strategies

Organizations today face increasing challenges related to loss prevention, operational efficiency, and data management. With the rise in organized crime, evolving compliance standards, and growing operational complexities, the need for a coordinated, comprehensive approach to loss prevention and risk management has never been more urgent.

Not only has the financial impact of organized retail crime surged in recent years, but safety concerns for both shoppers and employees have also intensified. In response, loss prevention teams are adopting a unified ecosystem that seamlessly integrates technology, personnel, and processes to mitigate risk and enhance security.

Source:
Skidmore, B. (November 14, 2024). WHITEPAPER: Holistic Loss Prevention: A People-Driven, Tech-Enabled Ecosystem. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Unforeseen Threats Necessitate Enhanced Security in Educational Institutions

Unforeseen Threats Necessitate Enhanced Security in Educational Institutions

Frank Costa, President, Nexgen Protection Services, on the Need for More Robust Security in Schools

In an era of evolving threats and unforeseen challenges, ensuring the safety of students, staff, and faculty in K-12 schools is of paramount importance. Security in educational institutions must go beyond traditional measures, adopting a multilayered, multifactor approach that integrates technology, personnel training, and emergency preparedness.

K-12 security professionals can reduce risk by implementing strategies grounded in the core principles of prevention, mitigation, preparedness, response, and recovery. 

Establishing strong partnerships with local law enforcement, fire departments, and emergency medical services—both during simulations and in real-world scenarios—is essential. Collaboration ensures a swift and coordinated response in emergencies, maximizing the effectiveness of preparedness plans.

Whether it’s students remembering not to prop open exterior doors, teachers understanding the appropriate steps to take during emergencies, or school administrators managing communication with parents and first responders—everyone plays a critical role in maintaining a safe school environment.

Source:
Hanson, B. (March 24, 2025). Ballistic-Resistant Solutions for Schools: Trends and Best Practices. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Trusted Sources, Such as the Federal Government, Are Scamming Americans

Trusted Sources, Such as the Federal Government, Are Scamming Americans

Frank Costa, President, Nexgen Protection Services, on how scammers impersonate trusted agencies:

Scamming is on the rise. Scammers are impersonating trusted government agencies to steal people’s personal information and money. Many Americans are being tricked into granting access to their financial information by fraudsters posing as reputable organizations such as the Internal Revenue Service (IRS), Amazon, and the United States Postal Service (USPS).

These scamming tactics send texts, phone messages, and emails with alarming phrases like “Your account has been locked” or “Due to unusual activity.” These scare tactics exploit victims’ judgment in moments of fear and panic, coercing them into revealing personally identifiable information and granting access to their financial accounts.

Source:
(March 26, 2025). Scammers Impersonated USPS More Than Other Organizations. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Ghost-Ransomeware-Attack

Ghost Ransomware Widespread Attacks on Organizations Internet-Facing Devices

Frank Costa, President, Nexgen Protection Services on Ghost Ransomware: 

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have issued a joint advisory on Ghost ransomware (also known as Cring).

The advisory, which is primarily aimed at network defenders, provides critical details on Ghost ransomware activities, including:

  • Indicators of compromise (IOCs)
  • Tactics, techniques, and procedures (TTPs)
  • Detection methods

The data used to compile the advisory comes from FBI investigations into Ghost ransomware incidents. It highlights how Ghost actors are launching widespread attacks by targeting organizations that use outdated software and firmware on internet-facing devices. These threat actors often exploit publicly available code linked to Common Vulnerabilities and Exposures (CVEs) to gain access to vulnerable systems.

The advisory urges network defenders to carefully assess the risks and take appropriate measures to mitigate them. CISA also recommends reviewing the advisory and implementing its suggested mitigations. For additional guidance on ransomware protection, detection, and response, refer to the #StopRansomware initiative and the associated guide. More information on CISA’s Cross-Sector Cybersecurity Performance Goals (CPGs), including recommended baseline protections, is available on their website.

Source:
Alger, J. (February 21, 2025). CISA and FBI Issue Warning for Ghost Ransomware Activity. Security Magazine.
Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats

 

Phishing Threats Are on the Rise: Organizations Must Assess Their Vulnerability

Frank Costa, President of NEXGEN Protection Services on Phishing Threats:

As AI-powered tools become more accessible, phishing threats are aon the rise. Attackers are increasingly targeting multiple channels to bypass security measures, beginning with phishing emails that contain links to video meetings featuring a deep fake.

Phishing attacks are becoming increasingly sophisticated, making it essential for organizations to assess their vulnerability. Hackers now have access to advanced AI-powered tools that enable them to craft email messages, create malicious payloads, and even generate deep fakes. These technologies—and the cyberattacks they facilitate—are more accessible than ever, particularly as cybercriminals tap into the growing “Crime as a Service” (CaaS) ecosystem. Providers now sell everything from attack tools to pre-packaged phishing kits designed to bypass native defenses and secure email gateways (SEGs).

Threat actors can leverage AI at every stage of a phishing attack, from speeding up the intelligence-gathering process on potential targets to automating the creation and distribution of highly personalized attacks. The use of AI accelerates and scales up attack creation, allowing even less-experienced cybercriminals to launch sophisticated campaigns. 

Impersonation attacks are another common tactic. The most frequent form involves attackers posing as the recipient’s company, accounting for 16% of phishing emails. The Human Resources (HR) department is often impersonated in these attacks. Cybercriminals also use platforms like LinkedIn, company websites, and news announcements to identify new hires at target organizations. These newly hired employees are then targeted in impersonation and social engineering attacks. New employees are frequently the victims of phishing emails impersonating VIPs, particularly in CEO fraud schemes.

To strengthen defenses, organizations can adopt best practices that help build a “human firewall.” The first step is to understand and communicate what constitutes normal behavior for brands and suppliers, which can aid in detecting impersonation. Organizations should also standardize and validate communication channels, especially for roles like HR and IT. Finally, companies should assess their vulnerability to supply chain and vendor-based compromises.

Source:
Alger, J. (February 20, 2025). Mobile Phishing Threats Are Evolving, According to New Research. Security Magazine.

 

Loss Prevention Strategies

Loss Prevention Strategies for Combating Organized Retail Theft

Frank Costa, President of NEXGEN Protections Services on Loss Preventions Strategies:

Organized retail theft (ORT) impacts more than just a retailer’s bottom line; it creates dangerous environments for both staff and shoppers. The increasing incidents of violence and aggression have pushed retailers to invest heavily in loss prevention strategies. In response, major retailers are partnering with technology innovators to strengthen their defenses. 

(ORT) involves coordinated efforts by professional thieves to steal large quantities of merchandise from retail stores. Unlike casual shoplifting, ORT is systematic, with stolen goods often resold through various channels, including online marketplaces. This form of theft has seen a significant rise in recent years, resulting in billions of dollars in annual losses for retailers.

Companies such as Walmart, Target, Lowe’s, Kroger, Macy’s, CVS, and others are at the forefront, using cutting-edge technology to deter and detect criminal activity. From advanced video surveillance systems to biometric cameras and autonomous security robots, retailers are deploying a formidable arsenal to combat the growing threat of ORT. Central to this technological revolution is the integration of artificial intelligence (AI), which enhances the sophistication and effectiveness of existing security measures.

Source:
Danielson, R. (February 20, 2025). Retail Resilience: Technology Strategies to Combat Organized Theft. Security Magazine.
Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats