Posts

How Security Is Shaping the Cannabis Industry

How Security Is Shaping the Cannabis Industry

Frank Costa, President, Nexgen Protection Services

A surveillance system can help protect your business from theft, particularly employee theft, which is a widespread issue in the cannabis industry. For large outdoor growing operations, having a monitoring system in place provides peace of mind by securing your property from all angles at all times.

Source:
Baxter, K. (2025, January 13). How security is shaping the cannabis industry. Security InfoWatch.

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



Mitigate Losses to the Supply Chain with Robust Security Protection

Mitigate Losses to the Supply Chain with Robust Security Protection

Frank Costa, President, Nexgen Protection Services

Companies lose billions of dollars annually due to cargo theft. Many manufacturers don’t realize their shipments have been stolen until it’s too late, often discovering the issue only when the shipment fails to arrive on the expected date.

To mitigate losses in the supply chain caused by security threats, key protection measures include:

  • Thorough vendor vetting
  • Robust access controls
  • Data encryption
  • Continuous monitoring
  • Incident response planning
  • Supply chain visibility through technology
  • Diversifying suppliers
  • Implementing strong cybersecurity practices across all tiers of the supply chain, ensuring all partners adhere to the same security standards.

Source:
Fryer, N. (2025, January 18). How transportation management systems mitigate supply chain risks for manufacturers. Security InfoWatch.

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



Remote Video Monitoring: The Future of Security for Businesses

Remote Video Monitoring: The Future of Security for Businesses

Frank Costa, President, Nexgen Protection Services

The future of security isn’t just on our doorstep — it’s breaking down the front door.
The security industry has experienced unprecedented advancements in technology and public policy, reshaping the way we approach safety and protection. And this rapid pace of change shows no signs of slowing.

Remote video monitoring (RVM) is poised to become a non-negotiable security tool for businesses — and soon, for homes.

2025 is not just about better security; it’s about smarter, proactive protection. RVM will be at the center of this shift.

This innovative approach addresses the limitations of on-site security guards and traditional surveillance systems. By integrating AI into RVM, businesses can mitigate human error, significantly reduce costs, and set new industry standards. Those who harness the power of AI for RVM will be well-positioned to thrive in this new era.

 

SOURCE: 

Selinger, D. 2025 will mark a turning point in physical security tech. Here’s why. Deep Sentinel, 12/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Frank Costa, President, Nexgen Protection Services

The cybersecurity landscape continues to evolve at an unprecedented pace. With the rise of sophisticated attack methods, the integration of new technologies, and increasing connectivity across sectors, businesses are facing more complex cybersecurity threats than ever before. Staying informed and prepared is critical to protecting data, maintaining trust, and ensuring business continuity.

Supply Chain Attacks

As businesses increasingly rely on external vendors and partners, supply chain attacks have become a significant cybersecurity concern. In these attacks, threat actors infiltrate a company’s system by compromising a third-party provider, gaining access to multiple organizations through a single vulnerability.

How to Prepare:

  • Vendor Risk Assessments: Conduct thorough security assessments for all vendors and partners to identify potential vulnerabilities.
  • Contractual Security Requirements: Include cybersecurity clauses in vendor contracts to ensure security standards are upheld.
  • Network Segmentation: Isolate critical systems from external partners to prevent attackers from moving freely within your network.
  • Continuous Monitoring: Use real-time monitoring to track vendor activity and detect any unusual behavior early.

 

SOURCE: 

Top Cybersecurity Threats to Watch in 2025: How Businesses Can Prepare, Boston Institute of Analytics, 11/14/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

The Importance of Parking Lot Security During the Holiday Season

The Importance of Parking Lot Security During the Holiday Season

Frank Costa, President, Nexgen Protection Services

The holiday season brings increased activity to shopping centers, office complexes, and other public spaces, making parking lots prime targets for various security threats. Understanding these risks and implementing effective countermeasures can help reduce threats to both individuals and property.

With large crowds and busy lots, personal safety risks such as assaults, robberies, and carjackings become more prevalent. Criminals often target individuals carrying cash, credit cards, or valuable items. To counteract these threats, mobile security cameras equipped with motion sensors and two-way communication can provide an added layer of safety. These cameras enable security personnel to monitor isolated areas more closely. The ability to relocate cameras based on real-time data and activity trends ensures that security coverage can adapt to shifting risks, providing a more comprehensive safety strategy.

To mitigate these security threats, parking lot owners should invest in enhanced lighting, permanent and mobile surveillance systems, increased security patrols, and emergency call stations. Mobile security cameras, in particular, offer a versatile and dynamic solution for monitoring parking lots. These cameras can be repositioned as needed, provide real-time surveillance, and serve both as a deterrent and a responsive tool for addressing security issues.

Additionally, patrons should practice personal safety measures, such as parking in well-lit areas, staying vigilant, and securing their belongings. By combining strategic security technologies like mobile cameras with proactive safety practices, property owners, managers, and patrons can work together to create a safer and more secure environment during the busy holiday season.

 

SOURCE: 

Survey: Parking lot safety influences holiday shopping habits, Security Magazine, 2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Retailers Must Leverage Technology That Goes Beyond Thwarting Theft to Predicting It

Retailers Must Leverage Technology That Goes Beyond Thwarting Theft to Predicting It

Frank Costa, President, Nexgen Protection Services

Violence remains a major concern for the retail industry. Retailers and solution providers must collaborate to develop and implement technology that goes beyond simply thwarting theft. Efforts must focus on predicting and preventing theft. By doing so will proactively reduce the risk of violence and mitigate crime.

Retailers have reported an increase in both the average number of shoplifting incidents and the amount of dollars lost due to shoplifting over the past year (National Retail Federation, The Impact of Retail Theft & Violence 2024).

Protecting store associates and customers, while reducing today’s levels of violence and retail crime, requires a whole-community approach and collaboration across all stakeholders.

SOURCE: 

Wolfe, C. New Study Shows Shoplifting Is Up 93% Since Before the COVID-19 Pandemic, Loss Prevention Magazine, 12/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Creating a Loss Prevention Culture: A Thoughtful, Strategic Approach

Creating a Loss Prevention Culture: A Thoughtful, Strategic Approach

Frank Costa, President, Nexgen Protection Services

Set Up a Loss Prevention/Asset Protection Team

Creating a loss prevention culture requires a thoughtful, strategic approach. Here are four key steps to establish a cohesive and proactive loss prevention framework:

1. Define Your Mission and Scope

The first step in fostering an effective loss prevention culture is to clarify its focus, goals, and priorities. This involves defining the specific areas your company’s loss prevention efforts will address, such as waste management, operational inefficiencies, and workplace safety.

Equally important is determining how the success of your loss prevention culture will be measured. Beyond traditional metrics like shrink reduction, consider tracking waste, gross margin, accident frequency rate (AFR), safety compliance, and other indicators that align with your business objectives.

Establishing these foundational elements helps shape the structure of your loss prevention efforts, guiding leadership, field management, and store-level teams.

2. Assemble a Dynamic Team

A successful loss prevention culture thrives on a team with diverse skill sets. You need a mix of traditional loss prevention expertise and operational knowledge to effectively combat evolving tactics in organized retail crime and other complex loss events. This means having team members skilled in investigations as well as those with deep knowledge of business operations.

Building a robust loss prevention culture is about more than preventing theft; it’s about understanding how every facet of your business contributes to loss. A diverse team ensures you’re prepared to tackle challenges from multiple angles.

3. Foster a Unified Loss Prevention Environment

Building a true loss prevention culture requires teamwork and collaboration. Strong interdepartmental relationships and clear policies are essential for effective decision-making and risk mitigation. These policies provide employees with a framework to minimize errors, ensure proper data handling, and enforce compliance.

By collaborating with sales, operations, and other departments, loss prevention becomes seamlessly integrated into the business culture.

4. Leverage Technology for Scalable Growth

Investing in technology can significantly strengthen your loss prevention culture. While the initial costs may seem high, tools like incident management software and audit platforms with workflow automation can handle increased workloads without proportional increases in costs, making them ideal for scalable growth.

SOURCE: 

Wolfe, C. Why Human Resources and Loss Prevention Should Train Together, Loss Prevention Magazine, 12/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Building Agile Security Strategies Adaptable to the Rapidly Changing Landscape

Building Agile Security Strategies Adaptable to the Rapidly Changing Landscape

Frank Costa, President, Nexgen Protection Services

The future of network security is both exciting and challenging. Organizations must stay ahead of emerging trends by building agile security strategies that are adaptable to the rapidly evolving threat landscape.

Retailers, in particular, must demonstrate daily flexibility to protect their workers, meet sales goals, and attract customers—all while maintaining safe and efficient operations. Retail is a complex web of interconnected elements.

To stay competitive, organizations need technology that is “future-proof”—capable of meeting shifting consumer demands, ensuring operational efficiency, and safeguarding against potential security threats, both internally and externally.

Cybercriminals are increasingly leveraging a combination of tactics, techniques, and procedures (TTPs), targeting multiple areas at once to breach defenses. We can expect an increase in the sophistication and evasion tactics of web-based attacks, file-based attacks, DNS-based attacks, and ransomware, making it more difficult for traditional, siloed security tools to effectively defend against modern threats.

Preventing these attacks will require multiple security services working together as part of an integrated platform to stop every attack along the cyber kill chain.

 

SOURCE: 

Davidson, B. Cutting Retail Losses, Security Today, 11/13/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Do’s and Don’ts of GenAI for Security Metrics

Do’s and Don’ts of GenAI for Security Metrics

Frank Costa, President, Nexgen Protection Services

 

Security teams must get it right—there’s no room for error.

Do you use ChatGPT or other AI generators for your business security? Regardless of how you implement GenAI, what truly matters is what you do—and don’t do.

There’s no doubt that GenAI models are powerful tools. When adopted responsibly, they can help streamline security protocols, optimize time, and more. However, it’s crucial to remain fully aware of the limitations of GenAI models.

For starters, never underestimate the importance of keeping the human touch in your work. As smart as AI might seem, it cannot capture the intangibles that come from human intuition.

AI lacks a sense of bias and is unaware of what constitutes correct or incorrect facts. Therefore, it is vital to proofread any AI-generated content and verify all facts before acting on the data.

GenAI models are trained on vast amounts of data from multiple sources, meaning there is always a risk that AI-generated content could contain plagiarized text.

 

SOURCE: 

Shelmire, A. Liars in the wires: Getting the most from GenAI without getting duped, Security Magazine, 09/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Aligning your metrics to key security processes within the organization is what’s really important. The challenge is to measure the right things.

Understand What Security Processes Are Essential For The Business To Succeed

Frank Costa, President Nexgen Protection Services – 

Aligning your metrics to key security processes within the organization is what’s really important.  The challenge is to measure the right things.

Security managers need to speak to senior leaders in familiar business language, offering measurable results that correlate with investment. Without compelling metrics, security managers and their budgets rely largely on the intuition of company leadership.

Experts agree, saying what’s important isn’t just about the numbers used but how those measures highlight that business story while solving problems to further business goals.

 

SOURCE: 

Randolph, C. Metrics that matter: How security professionals can show value, Security Magazine, 11/05/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats