Posts

Reducing the Imminent Risk of Lethality Through Sensible Gun Laws and a Culture of Safety

Reducing the Imminent Risk of Lethality Through Sensible Gun Laws and a Culture of Safety

By Frank Costa, President, Nexgen Protection Services

How Sensible Gun Laws Can Help:

  1. Gun Safety
    • Sensible gun laws can reduce easy access to dangerous weapons.
    • We must establish a culture of gun safety.
  2. Reducing Access
    • Firearm access should be restricted for youth and individuals at risk of harming themselves or others.
  3. Accountability
    • The gun industry must be held accountable. There should be adequate oversight regarding the marketing and sale of guns and ammunition.
  4. Engagement
    • We need to engage responsible gun dealers and owners in finding solutions.
  5. Mandatory Training and Licensing
    • Insist on mandatory training and licensing for gun owners.
  6. Safe Storage
    • Require safe and secure gun storage to prevent unauthorized access.

Addressing the Underlying Contributors to Gun Violence:
To reduce risks and build resilience in individuals, families, and communities, we must focus on these key areas:

  1. Public Health Solutions
    • Gun violence should be recognized as a critical and preventable public health issue.
  2. Comprehensive Solutions
    • Support the creation and implementation of community safety plans that prioritize prevention and intervention.
  3. Trauma, Connection, and Services
    • Expand access to high-quality, culturally competent, and coordinated social, emotional, and mental health services. These services should specifically address the impact of trauma.

Source:
Gun Violence Must Stop. Here’s What We Can Do to Prevent More Deaths. Prevention Institute.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Trusted Sources, Such as the Federal Government, Are Scamming Americans

Trusted Sources, Such as the Federal Government, Are Scamming Americans

Frank Costa, President, Nexgen Protection Services, on how scammers impersonate trusted agencies:

Scamming is on the rise. Scammers are impersonating trusted government agencies to steal people’s personal information and money. Many Americans are being tricked into granting access to their financial information by fraudsters posing as reputable organizations such as the Internal Revenue Service (IRS), Amazon, and the United States Postal Service (USPS).

These scamming tactics send texts, phone messages, and emails with alarming phrases like “Your account has been locked” or “Due to unusual activity.” These scare tactics exploit victims’ judgment in moments of fear and panic, coercing them into revealing personally identifiable information and granting access to their financial accounts.

Source:
(March 26, 2025). Scammers Impersonated USPS More Than Other Organizations. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats

 

Phishing Threats Are on the Rise: Organizations Must Assess Their Vulnerability

Frank Costa, President of NEXGEN Protection Services on Phishing Threats:

As AI-powered tools become more accessible, phishing threats are aon the rise. Attackers are increasingly targeting multiple channels to bypass security measures, beginning with phishing emails that contain links to video meetings featuring a deep fake.

Phishing attacks are becoming increasingly sophisticated, making it essential for organizations to assess their vulnerability. Hackers now have access to advanced AI-powered tools that enable them to craft email messages, create malicious payloads, and even generate deep fakes. These technologies—and the cyberattacks they facilitate—are more accessible than ever, particularly as cybercriminals tap into the growing “Crime as a Service” (CaaS) ecosystem. Providers now sell everything from attack tools to pre-packaged phishing kits designed to bypass native defenses and secure email gateways (SEGs).

Threat actors can leverage AI at every stage of a phishing attack, from speeding up the intelligence-gathering process on potential targets to automating the creation and distribution of highly personalized attacks. The use of AI accelerates and scales up attack creation, allowing even less-experienced cybercriminals to launch sophisticated campaigns. 

Impersonation attacks are another common tactic. The most frequent form involves attackers posing as the recipient’s company, accounting for 16% of phishing emails. The Human Resources (HR) department is often impersonated in these attacks. Cybercriminals also use platforms like LinkedIn, company websites, and news announcements to identify new hires at target organizations. These newly hired employees are then targeted in impersonation and social engineering attacks. New employees are frequently the victims of phishing emails impersonating VIPs, particularly in CEO fraud schemes.

To strengthen defenses, organizations can adopt best practices that help build a “human firewall.” The first step is to understand and communicate what constitutes normal behavior for brands and suppliers, which can aid in detecting impersonation. Organizations should also standardize and validate communication channels, especially for roles like HR and IT. Finally, companies should assess their vulnerability to supply chain and vendor-based compromises.

Source:
Alger, J. (February 20, 2025). Mobile Phishing Threats Are Evolving, According to New Research. Security Magazine.

 

Loss Prevention Strategies

Loss Prevention Strategies for Combating Organized Retail Theft

Frank Costa, President of NEXGEN Protections Services on Loss Preventions Strategies:

Organized retail theft (ORT) impacts more than just a retailer’s bottom line; it creates dangerous environments for both staff and shoppers. The increasing incidents of violence and aggression have pushed retailers to invest heavily in loss prevention strategies. In response, major retailers are partnering with technology innovators to strengthen their defenses. 

(ORT) involves coordinated efforts by professional thieves to steal large quantities of merchandise from retail stores. Unlike casual shoplifting, ORT is systematic, with stolen goods often resold through various channels, including online marketplaces. This form of theft has seen a significant rise in recent years, resulting in billions of dollars in annual losses for retailers.

Companies such as Walmart, Target, Lowe’s, Kroger, Macy’s, CVS, and others are at the forefront, using cutting-edge technology to deter and detect criminal activity. From advanced video surveillance systems to biometric cameras and autonomous security robots, retailers are deploying a formidable arsenal to combat the growing threat of ORT. Central to this technological revolution is the integration of artificial intelligence (AI), which enhances the sophistication and effectiveness of existing security measures.

Source:
Danielson, R. (February 20, 2025). Retail Resilience: Technology Strategies to Combat Organized Theft. Security Magazine.
Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



security threats

Security Threats: Keeping Convenience Stores Safe

Frank Costa, President of NEXGEN Protection Services on Security Threats:

Store owners and operators often face security threats. A difficult balancing act between maintaining profits and implementing security measures—especially when the costs of security are presented alongside traditional profit generators like marketing or product stocking.

Convenience stores come in many forms, from the mom-and-pop bodega in New York City to the sleek Speedway on the side of a cross-country highway. Despite their differences, all of these stores serve millions of U.S. customers looking for a quick drink, snack, or pack of cigarettes.

Given the transient nature of the convenience store industry, it’s a business where you never know who will walk through your door at any given time. While the convenience of these stores appeals to patrons, it also attracts criminals. Thieves frequently target these locations in hopes of stealing cash and merchandise. Organized criminal groups tend to focus on items that can be resold on the black or gray market, such as cigarettes, alcohol, lottery tickets, or other popular products.

Some owners might assume that enhancing store security requires the latest (and possibly most expensive) surveillance system or locks. However, it’s essential to first assess the overall environment and understand the specific threats a store faces.

Larger companies with multiple locations, whether regionally or nationwide, often have security departments that can conduct risk assessments. Relying on these resources can help identify local crime trends and determine what factors might impact a particular store.

Source:
Mosqueda, S. (February 10, 2025). Keeping Convenience Stores Safe from Physical Threats. Security Management Magazine.


Fraud-Schemes-Continue-to-Rise

Fraud Schemes Continue to Rise

Frank Costa, President of NEXGEN Protections Services on Fraud Schemes:

Fraud remains a persistent problem that organizations continue to struggle with, including the U.S. Federal Trade Commission (FTC), one of the federal agencies tasked with addressing fraud schemes.

Below are some of the top fraud scams that affected individuals and organizations in 2024 and are likely to continue being a problem in 2025.

  1. Investment Scams
    This scam tactic has been around for ages. Fraudsters often present themselves with seemingly lucrative business opportunities that promise regular returns—if you invest immediately.
  2. Business Email Compromise (BEC)
    BEC schemes have been around since email was first introduced and typically occur in one of two ways, according to Schlereth.
    Fraudsters either spoof a legitimate email address or domain name, often adding an extra letter so the sender appears authentic at a quick glance. Alternatively, they may use social engineering to obtain an employee’s credentials and then log into the victim’s work email. CFOs and CEOs are particularly lucrative targets.
  3. Check Fraud
    What’s old is new again. Check fraud surged last year, especially after individuals posted videos on social media showing themselves writing bad checks, depositing them at ATMs, withdrawing cash before the check bounced, and sharing their behavior.
    “Fraudulently altered checks can cause significant losses to financial institutions and disrupt bank operations,” the report states. “Due to the nationwide surge in check fraud targeting U.S. mail, the Financial Crimes Enforcement Network (FinCEN) issued an alert urging financial institutions to be vigilant in identifying and reporting such activity.”
  4. Impersonation Fraud
    In this scam, criminals claim victims are suspects in financial crimes and threaten arrest or violence unless they pay the criminals. Additionally, fraudsters are impersonating customer service and tech support providers, often targeting individuals over 60 by phone. They claim that the victim’s computer has been compromised and needs immediate repair.

Source:
Gates, M. (February 1, 2025). Trend Alert: 4 Fraud Schemes to Watch in 2025. Security Management Magazine.

 

To-Increase-Security-Invest-in-Inclusion

To Increase Security, Invest in Inclusion

Frank Costa, President NEXGEN Protection Services —

A core principle of buy-in strategies is simple: when people feel personally invested in an activity, they are more likely to want to see it succeed. However, many organizations fail to make frontline employees feel that their involvement is vital to the success or failure of the company. One effective way to foster this sense of ownership is by creating an inclusive workplace.

“When people feel cared for in the workplace, that sense of care often extends to their attitudes toward coworkers, customers, and leadership.”

From a security standpoint, this means involving employees in shaping security policies, procedures, and changes. It’s essential to gather input directly from those on the frontlines to ensure that security measures align with the needs of both employees and customers. Addressing their concerns and questions helps strengthen overall security efforts.

Building connections, trust, and inclusivity can yield substantial benefits for security. “It doesn’t take much to lose trust, but if leaders can foster it and create an environment of psychological safety, that trust can spread throughout the organization.”

Source:
Meyer, C. (July 3, 2025). To Increase Security, Invest in Inclusion. Security Management Magazine.



Security Protection: Conflict, Confusion & Chaos

Security Protection: Conflict, Confusion & Chaos

Frank Costa, President, Nexgen Protection Services

By 2025, emerging “rogue actors” will operate with increasing impunity as countries fragment—geographically, ethnically, and ideologically. Established political parties, both left and right, are in systemic decline, steadily losing primary vote shares to insurgent candidates and parties across the political spectrum.

For security professionals, the message is clear: the landscape is becoming more complex. However, with the right tools and strategies, it’s still possible to manage risks and seize opportunities. Technology will play a crucial role in identifying incidents, delivering personalized risk information, and supporting the fieldwork, local knowledge, and analysis provided by risk professionals.

The most resilient organizations in this fragmenting world will combine advanced technology with “human-in-the-loop” strategies, enabling better decision-making in an increasingly unpredictable environment.

Source:
(2025, Jan 06). An Era of Conflict: Navigating a ‘Fragmenting World’ in 2025. Security & Business Resilience.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


Artificial Intelligence: Challenges and Strengths Come Down to Human Error

Artificial Intelligence: Challenges and Strengths Come Down to Human Error

Frank Costa, President, Nexgen Protection Services

Automated threat detection and prevention, advanced intelligence, and AI-driven supply chain attacks—AI today has evolved significantly beyond the days of basic pattern matching.

While human error and uncertainty may initially amplify AI risks, it is ultimately the oversight of AI—the collaboration between humans and algorithms—that will enable us to safely innovate and explore this technology. AI itself is designed to be a positive force, unlocking value and improving efficiency.

However, AI cannot be left unchecked. The best way for organizations to mitigate AI risks is through increased education and employee training. People must know what to look for, and more broadly, you can never overemphasize the importance of cyber awareness training. Even beyond AI, there are countless ways to compromise an individual system or its information, and the digital landscape is constantly evolving.

The more we can educate employees and strengthen security measures across the board, the better prepared organizations will be to remain compliant, resilient, and scalable in this new era.

Source:
(2025, Jan 17). 3 Ways AI Will Transform Security in 2025. Security Education & Training.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats

 

Organized Retail Crime: Strategies for Mitigating Loss

Organized Retail Crime: Strategies for Mitigating Loss

Frank Costa, President, Nexgen Protection Services

To effectively combat organized retail crime, retailers must establish strong partnerships with industry associations, law enforcement agencies, and other relevant stakeholders. Such collaboration enables the exchange of intelligence, best practices, and emerging trends, allowing for a proactive response to the evolving nature of organized crime.

Partnership with Law Enforcement:
Close collaboration with law enforcement is critical. Retailers should establish direct communication channels with local police departments and develop protocols for promptly reporting organized crime incidents.

Training Store Associates:
Education and awareness are key to preventing organized crime. Retail employees must receive comprehensive training on identifying organized crime indicators, understanding theft patterns, and implementing effective prevention techniques.

Source:
Brittain, J. (2025, January 14). Retail’s Dangerous Triangle: Trafficking, Trucking, & Organized Theft. Loss Prevention Magazine.

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats