Posts

Security Protection

Executive Security Protection: Risks, Extremist Influencers, Shifting Tactics

Frank Costa, President of NEXGEN Protection Services on Security Protection:

Concerns about executive safety remain high. Not only was UnitedHealthcare CEO Brian Thompson tragically killed in December 2024, but there have also been multiple other incidents involving threats against business executives. Additionally, social media influencers and other sources have incited calls for similar attacks.

High-level executives without an executive security protection (EP) team are increasingly vulnerable to becoming targets.

The heightened emotional climate surrounding politics and public figures has made executive protection more challenging—and more essential. Politically motivated threats were notably higher in 2024. More than 50 members of Congress were victims of swatting attacks, and 700 members had faced threats the previous month. (Many threats were not publicly reported, so they are not included in TorchStone’s official threat count.)

Tactics are also evolving. Threat incidents are now categorized as verbal or written threats, harassment, stalking, physical attacks, and other crimes, which may include financially motivated offenses such as robberies, home invasions, and property crimes.

Source:
Gates, M. (February 5, 2025). EP Trends: Residential Risks, Extremist Influencers, Shifting Tactics. Security Management Magazine.



Fraud-Detection-with-Video-Surveillance-Analytics.

Ways to Boost Fraud Detection with Video Surveillance & Analytics

Frank Costa, President of NEXGEN Protections Services on Fraud Detection:

Fraud costs the financial sector billions of dollars each year. It’s a persistent challenge for banks globally, made more complex by increasingly sophisticated fraud tactics and methods.

To stay ahead of fraud, financial institutions must leverage every available tool to protect their customers and assets. One such tool is video surveillance and analytics. By integrating video technology with fraud detection systems, banks can gain real-time insights, spot patterns, and take a proactive approach to security. This not only helps detect fraud but also prevents it from escalating.

  1. Real-Time Fraud Alerts
    Fraud detection systems generate a massive amount of data, but not every alert indicates a genuine threat. Video surveillance adds a critical visual layer, helping differentiate between legitimate fraud and false alarms.
  2. License Plate Recognition
    Drive-up ATMs and tellers face unique security challenges, especially in suburban and rural areas. License Plate Recognition (LPR) technology, integrated with video systems, offers a powerful way to identify vehicles linked to fraudulent activities. This information can be used to flag repeat offenders or known fraudsters.
  3. Behavioral Analytics
    ATM skimming is one of the most persistent threats to banks. Video surveillance equipped with behavioral analytics can identify suspicious patterns, such as individuals loitering near ATMs without conducting transactions or using multiple cards in quick succession.
  4. Integrated Surveillance
    ATM jackpotting—where criminals manipulate ATMs to dispense large amounts of cash—is a growing global issue. Combining video surveillance with physical sensors offers an effective defense. Cameras can detect unusual activity, like tampering, suspicious vehicles parked near ATMs, or vehicles with no license plates, and trigger real-time alerts.
  5. Loitering Detection
    Ensuring customer safety, especially at ATMs after hours, is a top priority for banks. Video surveillance with loitering detection analytics can identify individuals lingering near ATMs for extended periods, enabling timely intervention.
  6. Video Storage with Hybrid Solutions
    Storing surveillance footage for extended periods can be expensive. Hybrid storage solutions, which combine on-premises and cloud-based video storage, offer a practical alternative. Banks can securely store critical footage without the need for large-scale on-site infrastructure.
  7. Camera-to-Cloud Solutions for Remote Monitoring
    In some areas, installing on-site recorders can be impractical due to space or connectivity issues. Camera-to-cloud solutions address this by streaming video directly to the cloud. This eliminates the need for on-site hardware while maintaining full surveillance capabilities.
  8. Disaster Preparedness for Video Data
    Natural disasters pose a significant challenge to video surveillance systems. To mitigate this risk, banks should ensure that critical footage is preserved, even when on-site systems are compromised. Centralized evidence archiving allows banks to offload important video data to secure locations before a disaster strikes.

Transforming Fraud Prevention with Video Analytics

Video surveillance and analytics are revolutionizing fraud prevention, equipping banks with powerful tools to detect threats in real-time, enhance customer safety, and streamline security operations. From preventing ATM skimming and jackpotting to addressing loitering and improving evidence management, integrating video technology with existing systems strengthens banks’ ability to combat financial crime.

Source:
Corral, J. (February 5, 2025). 8 Ways to Boost Fraud Detection with Video Surveillance and Analytics. Security Management Magazine.



To-Increase-Security-Invest-in-Inclusion

To Increase Security, Invest in Inclusion

Frank Costa, President NEXGEN Protection Services —

A core principle of buy-in strategies is simple: when people feel personally invested in an activity, they are more likely to want to see it succeed. However, many organizations fail to make frontline employees feel that their involvement is vital to the success or failure of the company. One effective way to foster this sense of ownership is by creating an inclusive workplace.

“When people feel cared for in the workplace, that sense of care often extends to their attitudes toward coworkers, customers, and leadership.”

From a security standpoint, this means involving employees in shaping security policies, procedures, and changes. It’s essential to gather input directly from those on the frontlines to ensure that security measures align with the needs of both employees and customers. Addressing their concerns and questions helps strengthen overall security efforts.

Building connections, trust, and inclusivity can yield substantial benefits for security. “It doesn’t take much to lose trust, but if leaders can foster it and create an environment of psychological safety, that trust can spread throughout the organization.”

Source:
Meyer, C. (July 3, 2025). To Increase Security, Invest in Inclusion. Security Management Magazine.



Incident Report

Well-Written Incident Reports: An Essential Element of Effective Public-Private Partnerships

Frank Costa, President NEXGEN Protection Services —

Receiving well-written, complete, and timely incident reports from private security partners is a critical aspect of any case. While verbal witness statements can be helpful, they do not provide the level of detail that investigators need to understand the full scope of a case.

In recent years, there has been growing emphasis on the importance of effective partnerships between private security and public law enforcement. As the demands on law enforcement increase alongside recruiting challenges and shrinking budgets, private security will inevitably take on more responsibilities traditionally handled by public agencies.

With law enforcement struggling to meet the rising demand for their services and facing a shortage of new officers, the burden of safety and security falls increasingly on private security personnel. This shift means that private security must excel in all aspects of their role. One core requirement is proficiency in writing comprehensive and factual Case Incident Reports (CIRs).

Furthermore, the ability of private security officers to write clear and effective reports becomes especially crucial when facing legal challenges. In the eyes of the court, if an event isn’t documented, it essentially didn’t happen.

 

Source:
Conley, T. (January 20, 2025). Well-Written Incident Reports Are an Essential Element of Effective Public-Private Partnerships. Security Management Magazine.

Workplace Violence Poses Significant Risks to the Well-Being of Workers

Workplace Violence Poses Significant Risks to the Well-Being of Workers

Frank Costa, President, Nexgen Protection Services

Workplace violence poses serious risks to both employee well-being and business health, leading to decreased employee engagement and significant losses in productivity, profit, and retention. As workplace tensions rise, employees are feeling the strain. With political polarization at an all-time high, fostering respectful dialogue and creating inclusive work environments will be essential for maintaining business continuity in the coming year.

Leaders must confront workplace incivility head-on and actively promote a culture of respect and inclusion to safeguard both their employees’ well-being and their organization’s long-term success.

 

Source:
Popera, A. (2024, Dec 18). The Cost of Incivility: Addressing Workplace Challenges into 2025. SHRM.org.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


Security Protection: Conflict, Confusion & Chaos

Security Protection: Conflict, Confusion & Chaos

Frank Costa, President, Nexgen Protection Services

By 2025, emerging “rogue actors” will operate with increasing impunity as countries fragment—geographically, ethnically, and ideologically. Established political parties, both left and right, are in systemic decline, steadily losing primary vote shares to insurgent candidates and parties across the political spectrum.

For security professionals, the message is clear: the landscape is becoming more complex. However, with the right tools and strategies, it’s still possible to manage risks and seize opportunities. Technology will play a crucial role in identifying incidents, delivering personalized risk information, and supporting the fieldwork, local knowledge, and analysis provided by risk professionals.

The most resilient organizations in this fragmenting world will combine advanced technology with “human-in-the-loop” strategies, enabling better decision-making in an increasingly unpredictable environment.

Source:
(2025, Jan 06). An Era of Conflict: Navigating a ‘Fragmenting World’ in 2025. Security & Business Resilience.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


Why Does the Public Feel Unsafe and Have No Privacy?

Why Does the Public Feel Unsafe and Have No Rights?

Frank Costa, President, Nexgen Protection Services

People want to feel safe without the discomfort of being constantly monitored, which presents a challenge for security leaders who must continue prioritizing safety while respecting privacy.

Privacy Concerns:

Modern individuals place a high value on privacy and often feel uneasy when security measures appear overly focused on surveillance, such as excessive camera monitoring or intrusive personal checks.

Subtle Security:

Security leaders must focus on methods that provide protection without being overtly noticeable. By doing so, they can create a more comfortable experience for individuals while still ensuring safety.

Creative Solutions:

This can involve the use of technology such as smart sensors that activate only when necessary, discreet security personnel, or designing spaces in a way that naturally promotes safety without feeling oppressive or invasive.

Source:
(2025, Jan 09). Navigating Surveillance: Balancing Security and Privacy. Security Magazine.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


Security Protection to Ensure the Safety and Well-Being of Students

Security Protection to Ensure the Safety and Well-Being of Students

Frank Costa, President, Nexgen Protection Services

To ensure the safety and well-being of students, security protection should encompass both physical measures—such as secured perimeters, surveillance systems, and controlled access points—and proactive approaches, including anti-bullying policies, mental health support, positive student-teacher relationships, and comprehensive emergency response plans. All of this should be implemented while fostering a safe and inclusive school environment.

Source:
Intelligent Security for Safer Schools. Security InfoWatch (January 2, 2025).

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



The Rise of Physical Security De-escalation Tactics

The Rise of Physical Security De-escalation Tactics

Frank Costa, President, Nexgen Protection Services

In recent years, one of the most pressing issues at the center of national conversations has been the use of excessive and unnecessary police force. This topic will continue to be a focal point, and one major shift in the security industry will be the increased emphasis on de-escalation tactics and training for safety officers, with a focus on making this a first resort.

De-escalation training equips security personnel with the tools they need to resolve emergencies without the use of force. It empowers officers to slow down, assess situations more effectively, and communicate clearly with both the individual involved and their team. Just as importantly, it helps mitigate the risk of liability and reduce the potential for injuries to security personnel.

While having a physical security or human guarding team on-site is crucial and can prevent further escalation, hybrid security strategies that incorporate technology are becoming increasingly important. The remote work revolution is well underway, and many companies have adopted a hybrid office model, allowing employees to spend time both on- and off-site.

SOURCE: 

Weingot, D. Guard trends to watch in 2022. Security InforWatch, 02/14/2022.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Frank Costa, President, Nexgen Protection Services

The cybersecurity landscape continues to evolve at an unprecedented pace. With the rise of sophisticated attack methods, the integration of new technologies, and increasing connectivity across sectors, businesses are facing more complex cybersecurity threats than ever before. Staying informed and prepared is critical to protecting data, maintaining trust, and ensuring business continuity.

Supply Chain Attacks

As businesses increasingly rely on external vendors and partners, supply chain attacks have become a significant cybersecurity concern. In these attacks, threat actors infiltrate a company’s system by compromising a third-party provider, gaining access to multiple organizations through a single vulnerability.

How to Prepare:

  • Vendor Risk Assessments: Conduct thorough security assessments for all vendors and partners to identify potential vulnerabilities.
  • Contractual Security Requirements: Include cybersecurity clauses in vendor contracts to ensure security standards are upheld.
  • Network Segmentation: Isolate critical systems from external partners to prevent attackers from moving freely within your network.
  • Continuous Monitoring: Use real-time monitoring to track vendor activity and detect any unusual behavior early.

 

SOURCE: 

Top Cybersecurity Threats to Watch in 2025: How Businesses Can Prepare, Boston Institute of Analytics, 11/14/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats