Posts

honeypot can give you equally good information about internal threats and show vulnerabilities in such areas as permissions that allow insiders to exploit the system.

Honeypot Techniques Expose Internal and External Threats

Frank Costa, President Nexgen Protection Services – 

One honeypot definition comes from the world of espionage, where Mata Hari-style spies who use a romantic relationship as a way to steal secrets are described as setting a ‘honey trap’ or ‘honeypot’. Often, an enemy spy is compromised by a honey trap and then forced to hand over everything he/she knows.

In computer security terms, a cyber honeypot works in a similar way, baiting a trap for hackers. It’s a sacrificial computer system that’s intended to attract cyberattacks, like a decoy. It mimics a target for hackers, and uses their intrusion attempts to gain information about cybercriminals and the way they are operating or to distract them from other targets.

Firewalls also won’t help against an internal threat – an employee who wants to steal files before quitting their job, for instance. A honeypot can give you equally good information about internal threats and show vulnerabilities in such areas as permissions that allow insiders to exploit the system.

Overall, the benefits of using honeypots far outweigh the risks. Hackers are often thought of as a distant, invisible threat – but using honeypots, you can see exactly what they’re doing, in real time, and use that information to stop them getting what they want.

 

SOURCE: 

Grant, D., New honeypot techniques for addressing targeted attacks, Security Today. 07.25.2024. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Holy places, shrines, cathedrals, synagogues, mosques, megachurches and schools are no longer safe. Nothing seems to be sacred.

Houses of worship are now targets of vandalism, theft and attacks.

Frank Costa, President Nexgen Protection Services – 

Holy places, shrines, cathedrals, synagogues, mosques, megachurches and schools are no longer safe. Nothing seems to be sacred.

Antisemitism has skyrocketed over the past few years. Bigotry continues toward followers of Islam. Conflicts between spiritual beliefs and mainstream culture have also created tension.

Many are assessing their security needs to ensure that the congregation has peace of mind. In doing so they can continue to learn, reflect, pray and celebrate in safety and comfort.

 

SOURCE: 

Omnert, D., In the Spirit of Security, Security Today. 07.31.2023. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

The-effectiveness-of-audio-security-surveillance-is-often-underestimated

The effectiveness of audio security surveillance is often underestimated.

Frank Costa, President Nexgen Protection Services – 

In the world of security and video surveillance, the value of audio is often underestimated. While audio plays a pivotal role in intercom systems, its significance in broader security and event management contexts is frequently overlooked.

Audio analytics can also enhance situational awareness in areas where video is not allowed. For example, restrooms are a no-go area for cameras, but an analytic that detects glass breaks and yells can prevent such an area from being a complete blind spot.

By effectively addressing privacy concerns, audio analytics allow for the responsible utilization of audio capabilities in security cameras. Pairing AI-enabled cameras with audio analytics is an effective strategy for success.

 

SOURCE: 

Barbosa, R., Enhanced Situation Awareness, 07.24.2024. Security Today. 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Situational Crime Prevention (SPC) is a Primary Prevention Measure

Situational Crime Prevention (SPC) is a Primary Prevention Measure

Frank Costa, President Nexgen Protection Services – 

Situational crime prevention (SCP) is a primary prevention strategy that aims to reduce the likelihood and severity of crime by making it more difficult for criminals to commit acts or by reducing the rewards. SCP focuses on changing the situation rather than the characteristics of criminals. 

SCP is based on two theoretical premises: opportunity theory, which states that opportunity makes the thief, and rational choice theory, which states that offenders make choices. SCP techniques can fall into five main categories:

Increasing risk – This can be done by reducing the number of suitable targets, adding guardians, or increasing surveillance. 

Reducing rewards – This can be done by making it harder for criminals to climb buildings or structures, or by using anti-theft paint to identify stolen items.

Reducing provocations – This can be done by removing excuses that offenders may use to justify their actions.

Removing excuses – This can be done by sloping seats at bus shelters to prevent people from sleeping on them.

Increasing effort – This can be done by improving street lighting.

 

SOURCE: 

Burton, B., Situational Crime Prevention: An Introduction, LPRC Research Center, 07.24.2024.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Protecting Precious Cargo Throughout the Supply Chain

Protecting Precious Cargo Throughout the Supply Chain

Frank Costa, President Nexgen Protection Services – 

Stolen cargo can cost suppliers thousands to upwards of millions of dollars. The consequences of not sufficiently protecting cargo can be devastating, ranging from financial loss and damaged reputation to long-term, intricate legal disputes. And, today’s thieves are now highly tech-savvy and constantly developing modern ways and strategies to steal cargo from shippers.

Most theft crimes are not investigated because of manpower issues, so it is imperative that carriers take the necessary measures to prevent theft. Provide security training to all personnel, because everyone should be involved with protecting customer freight and company assets.

 

SOURCE: 

Wolfe, C., Protecting Precious Cargo Throughout the Supply Chain, Loss Prevention Magazine, 04.22.2024.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Why-construction-sites-need-proactive-security

Why Construction Sites Need Proactive Security

Frank Costa, President Nexgen Protection Services – 

Construction sites are undoubtedly one of the most challenging environments to protect from a security perspective. Construction sites are a virtual free-for-all with multiple points of entry and exits with various contractors and subcontractors coming and going at different times throughout the day.

Without proactive security measures in place, construction sites are at risk from thieves attracted to goods. From materials, tools, equipment and even fuel, thieves can be enticed by open construction sites. These open sites are also at risk of vandalism.

SOURCE: 

Wilmas, J., Why construction sites need proactive security, Security Magazine, 09/30/2022.

 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Today’s Security Guards Leverage Technology Mitigating Potential Threats

Today’s Security Guards Leverage Technology Mitigating Potential Threats

Frank Costa, President Nexgen Protection Services – 

Technology can help to improve security by providing security guards with real-time information about potential threats, such as facial recognition software that can identify potential criminals and video surveillance that can monitor suspicious activity.

When considering a protection service firm ask:  

  • About what technologies are used.
  • The level of experience with using technology to improve security.
  • What training and expertise in using technology.

 

SOURCE: 

Smith, A., Integrate technology with security guard services for local businesses, Security Magazine, 02/24/2023.

 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats



Organizations-are-Increasing-Spending-on-Proactive-Security.

Organizations are Increasing Spending on Proactive Security

Frank Costa, President Nexgen Protection Services – 

Organizations are increasing spending on proactive security solutions. These solutions include attack surface management and risk-based vulnerability management.

A proactive defense strategy, when combined with reactive security, creates a high level of security to mitigate the overall risk to the organization.

 

SOURCE: 

More than 70% of companies increased spending on proactive security, Security Magazine, 06/25/2024.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats



Security Risk Assessment: Considerations for Public Venues

Security Risk Assessment: Considerations for Public Venues

Frank Costa, President Nexgen Protection Services – 

Negative fan behavior. Weather issues. Cyberattacks. Rogue drones. Security incidents at sporting events are impacting athletes, fans, and stadium staff, as well as making headlines in the media.

Other incidents, such as a crowd crush at a white-out game at Penn State and sustained injuries from a lightning strike at a UCF game, are also concerning. National news of active shooters, along with the constant threat of terrorism, accentuate the importance of preparedness.

Any public venue must consider event specific risk assessments to identify threats and vulnerabilities. Outcomes from this process will inform planning efforts, including the development of policies and procedures.

SOURCE: 

Allen, B., Hall, S., The Security Scorecard: Considerations for Sport Venue and Event Managers, Security Management, 06/01/2024.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats



Leveraging Generative AI to Mitigate Fraud, Disinformation, and Exploitation

Leveraging Generative AI to Mitigate Fraud, Disinformation, and Exploitation

Frank Costa, President Nexgen Protection Services – 

Fake news, manipulated media, deep-fakes—disinformation continues to evolve online, fueled by increasingly sophisticated generative artificial intelligence (gen AI) tools. Deepfakes in particular have been used to imitate individuals—whether in video or audio form—to achieve a number of criminal aims.

While intentional reputational damage toward organizations is certainly possible with deep-fakes, malicious actors more frequently aim to score more tangible and immediate profits or inflict damage on an individual.

Don’t trust the voice on the other end of the line. Scammers ask you to pay or send money in ways that make it hard to get your money back. If the caller says to wire money, send cryptocurrency, or buy gift cards and give them the card numbers and PINs, those could be signs of a scam.

 

SOURCE: 

Meyer, C., Putting Generative AI to Use for Crime: Fraud, Disinformation, Exploitation, and More, Security Management, 06/17/2024.

 

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats