Posts

Why Protection Services Are Critical for Small Religious Schools

Why Protection Services Are Critical for Small Religious Schools

By Frank Costa, President, Nexgen Protection Services

As threats against religious institutions rise across the country, security is no longer optional—it’s essential. In New York City, small yeshivas and other religious schools are often left vulnerable due to limited funding, despite facing the same risks as larger institutions.

New legislation aims to change that by providing millions in taxpayer funding to help these schools hire professional security guards. And this expansion couldn’t come at a more important time.

Leveling the Playing Field for Safety

Under current laws, only non-public schools with more than 300 students qualify for government-funded security. But many religious schools fall below that threshold. The proposed bill, championed by a Brooklyn councilman, would remove that size restriction, giving smaller institutions access to the same critical safety resources.

“This program has already proven successful—but now it needs to be expanded to protect every student, not just those in larger schools.”

Security Guards Do More Than Stand Watch

At Nexgen Protection Services, we know that effective school security is about more than a uniformed presence. It’s about trained professionals who understand how to de-escalate conflict, respond to emergencies, and create a calming presence for students and staff.

Here’s what our trained school security personnel bring to the table:

  • Visible deterrence against hate crimes and unauthorized entry
  • Emergency response coordination in the event of threats or incidents
  • Controlled access management for safer drop-offs and pick-ups
  • Ongoing vigilance during school hours, events, and transitions
  • Trauma-informed interaction with children and educators

All Children Deserve Equal Protection

There’s no question: every child in every school deserves to feel safe—regardless of school size, religious affiliation, or neighborhood. When safety measures are unevenly distributed, we not only put certain communities at greater risk, but we also send the wrong message about who deserves protection.

Security should not be a privilege—it should be a basic right for every student in New York City.

The Role of Professional Protection Services

While funding is a major step forward, the implementation is equally important. Partnering with professional protection providers ensures that taxpayer dollars are being used to deploy trained, licensed, and vetted security personnel who understand the sensitive environments of religious and educational institutions.

At Nexgen, we take pride in supporting schools with custom-tailored protection services that address their specific vulnerabilities—from threat assessments to on-site security staffing.

Let’s protect all our children, not just some of them. Expanding funding is the first step. Partnering with the right security professionals is the next.

#SchoolSafety #ReligiousSchoolSecurity #PrivateSchoolProtection #NYCSecurity #ProtectionServices #SafeSchools #SecurityGuards #EquityInSafety #HateCrimePrevention #NexgenProtection

 

Source:
Campanile, C. (October 6, 2024).Small NYC yeshivas, other religious schools would receive millions in taxpayer funds for guards under new bill: ‘Grim new reality’ NY Post. 

 

Recognizing Cybersecurity as a Revenue Growth Strategy

Recognizing Cybersecurity as a Revenue Growth Strategy

By Frank Costa, President, Nexgen Protection Services

Revenue Growth

Walk into any department today—from procurement to production—and you’ll hear the same concerns: rising cyber risks, the need to protect proprietary information, and questions about system vulnerabilities. Sound familiar?

Despite cybersecurity’s growing relevance across the business, it too often remains siloed within IT, viewed as a purely technical function focused on firewalls, ransomware defense, or patching systems. What’s missing? A strategic mindset. One that sees cybersecurity not as a cost center, but as a critical driver of business continuity, trust, and revenue growth.

Breaking Out of the IT Silo

In many organizations, cybersecurity still lacks a clear, centralized home—let alone a champion to push for enterprise-wide integration. This outdated structure leads to a reactive posture:

  • “Are we safe from ransomware?”
  • “How fast can we fix vulnerabilities?”

These are valid concerns, but they’re inherently tactical. They address symptoms, not the strategic opportunity cybersecurity represents in today’s risk landscape.

Shift to Resiliency Thinking

To unlock cybersecurity’s full potential, businesses must shift from a remediation mindset to a resiliency perspective. This change must start at the top—with the CISO acting as a business leader, not just a tech steward, and with boards embracing cybersecurity as a strategic enterprise function.

This perspective shift means:

  • Viewing cybersecurity as essential to safeguarding not just data, but brand reputation and revenue streams
  • Allocating cybersecurity funding based on enterprise risk exposure, not just as a subset of the IT budget
  • Empowering cybersecurity teams to collaborate across business units, influencing product development, vendor selection, compliance, and even customer trust initiatives

Cybersecurity Is Revenue Protection

In the digital economy, trust is currency. Customers, partners, and investors expect companies to demonstrate resilience against cyber threats. A breach doesn’t just threaten data—it threatens customer loyalty, stock value, and long-term revenue. Conversely, strong cybersecurity can be a differentiator in highly competitive markets.

Positioning cybersecurity as a growth enabler rather than a back-office cost unlocks new possibilities for competitive advantage.

Final Thoughts

It’s time to reframe cybersecurity as foundational to the business, not just its infrastructure. The organizations that thrive in the face of escalating cyber threats will be those that elevate cybersecurity to a core pillar of their strategy—resourced appropriately, integrated deeply, and led with intention.

Cybersecurity isn’t just protecting your operations. It’s protecting your future.

 

Source:
Hochrieser, R. (April 16, 2025). Recognizing cybersecurity as a revenue growth strategy. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Behind the Signal Leak: Vulnerabilities in High-Security Communication

Behind the Signal Leak: Vulnerabilities in High-Security Communication

Behind the Signal Leak

By Frank Costa, President, Nexgen Protection Services

In the realm of digital communication, Signal has long held the crown for privacy. Launched in 2014 by tech visionary Moxie Marlinspike, the app promised what many believed impossible: end-to-end encrypted conversations so secure, not even the NSA could pry them open.

With over 40 million monthly users, Signal is far more than just another messaging platform. It has earned its reputation as a fortress of digital privacy, used and trusted by journalists, cybersecurity experts, whistleblowers, and privacy advocates worldwide.

The Leak That Shook the Corridors of Power

But even the strongest fortresses can be compromised—and the weakest link is often human.

In a startling national security blunder, Signal became the unlikely stage for one of the most significant government leaks in recent memory. Senior members of the Trump administration—including Defense Secretary Pete Hegseth and National Security Adviser Mike Waltz—used Signal to coordinate discussions about sensitive military operations.

Signal’s encryption didn’t fail. Its security architecture remained rock-solid. What failed was protocol—and basic operational discipline.

The breach occurred when an unauthorized participant was mistakenly added to a Signal group chat. That single error rendered the platform’s military-grade encryption irrelevant. Once inside the group, the participant had full access to the entire thread, including details of classified discussions.

The Real Lesson: Technology Alone Can’t Protect You

This incident highlights a critical truth: the most advanced encryption in the world can’t compensate for poor security practices. In fact, the more secure a system is perceived to be, the more catastrophic the fallout can be when users grow complacent.

The Signal leak is a textbook case of how human error can unravel even the most secure digital environments. It reinforces the need for ongoing training, strict access control, and real-time monitoring of secure communications—particularly in high-stakes contexts like national security, corporate strategy, or critical infrastructure operations.

Final Thoughts

Signal remains one of the most secure messaging platforms ever created—but it is not immune to misuse. True security demands more than encryption; it requires vigilance, policy, and accountability.

As organizations increasingly rely on digital tools for sensitive communications, this breach serves as a wake-up call: technology is only as secure as the people using it.

 

Source:
Torossian, R. (April 15, 2025). Behind the Signal leak: Vulnerabilities in high-security communication. Security Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Data Security

Why Every Business Needs a Data Security Strategy

By Frank Costa, President, Nexgen Protection Services

On the dark web, this kind of information is sold at a premium. Personally identifiable information (PII), credit card details, and healthcare records are particularly valuable. This is why every business, regardless of size or industry, must prioritize data security—the practice of protecting digital information throughout its lifecycle to prevent unauthorized access, manipulation, or loss.

Your sensitive data is under constant threat. Today’s cyber attackers use a variety of tactics—many of them covert and sophisticated—to gain unauthorized access to company networks. Once inside, they move laterally to identify and extract valuable information, including customer records, employee data, and proprietary business intelligence.

The Consequences of Poor Data Security

 

1. Financial Loss

When data breaches occur, the financial fallout can be devastating. While large corporations may face multi-million-pound recovery efforts, smaller businesses are not immune. Attackers don’t discriminate by company size—they’re after profit. According to IBM, UK companies spent an average of £3 million on breach recovery in 2020. Smaller businesses can expect to lose approximately £8,000 per incident—enough to cause significant operational disruption.

2. Reputation Damage

Beyond financial loss, a data breach can do long-term damage to your brand. Customers and business partners expect their data to be protected, and when trust is broken, it can be difficult to regain. Public perception is shaped not only by the breach itself but by how a company responds. Being transparent and proactive about your data security strategy builds trust—and that trust can be a competitive advantage.

Why a Data Security Strategy Is Essential

A robust data security strategy isn’t just a safeguard—it’s a business enabler. It gives stakeholders confidence, ensures regulatory compliance, and helps prevent costly disruptions. Key elements of a strong data security plan include:

  • Access control and credential management
  • Regular vulnerability assessments and penetration testing
  • Employee awareness training
  • Data encryption and backup protocols
  • Incident response planning

Ultimately, the goal is to ensure that your data—and by extension, your business—remains secure and resilient against both internal and external threats.

Final Thoughts

Cyber threats aren’t going away—they’re evolving. Every business must move beyond passive defense and adopt a proactive data security strategy. Whether you’re safeguarding sensitive customer data, internal records, or intellectual property, data protection should be treated as a foundational element of your overall business strategy.

Source:
Simister, A. (April 11, 2025). How to Succeed with Loss Prevention Analytics. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



For cargo loss prevention to be effective, it must be grounded in a comprehensive understanding of where losses originate.

Cargo Loss Prevention Starts with Business Unit Alignment

By Frank Costa, President, Nexgen Protection Services

Effective cargo loss prevention begins with a strategic, business-aligned approach. Before any control measures can be put in place, companies must conduct a shortage control sufficiency review—a structured process that starts by identifying all areas where the business is exposed to potential shrink.

Step One: Identify Shrink Exposure

The foundation of any loss prevention strategy is understanding where and how losses are likely to occur. In this context, exposure refers to any area, process, practice, or condition that either contributes to ongoing loss or presents a high likelihood of future loss. These exposures can’t be addressed until they are clearly identified.

Loss prevention professionals must begin by analyzing the unique risk landscape of the business. Only with a full understanding of where shrink occurs can appropriate shortage control measures be designed and deployed to mitigate or eliminate it.

The Three Categories of Exposure

Shrink exposure in cargo operations typically falls into three main categories:

  1. Operational Exposure
    These are losses tied to day-to-day business processes and procedures. Examples may include miscounts during loading or unloading, mislabeling, incorrect documentation, or delays that create vulnerability during transit.
  2. Administrative Exposure
    This category includes systemic issues such as poor recordkeeping, inadequate oversight, lack of accountability, or policy gaps. Administrative weaknesses can create loopholes that are easily exploited—either accidentally or intentionally.
  3. Physical Exposure
    This refers to the environmental or infrastructure-based conditions that can lead to loss. It might involve unsecured loading docks, lack of surveillance, or poor access control at warehouses and transit points.

The Interconnected Nature of Exposure

It’s important to recognize that these three exposure categories are interrelated. A change in one area—such as improving a physical control like gated access—can have a ripple effect on operational or administrative practices. This symbiotic relationship requires a holistic, cross-functional approach, where departments align to assess impact and adjust strategies accordingly.

Conclusion: Build on Alignment

For cargo loss prevention to be effective, it must be grounded in a comprehensive understanding of where losses originate. That understanding starts with alignment—among business units, departments, and leadership—around exposure identification and control priorities. Once these areas of vulnerability are known, meaningful and measurable control efforts can be deployed to reduce loss and strengthen supply chain integrity.

Source:
Seidler, K. (September 12, 2016). Cargo Loss Prevention Starts with Business Unit Alignment. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



Creating a Grocery Loss Prevention Strategy

Creating a Grocery Loss Prevention Strategy

By Frank Costa, President, Nexgen Protection Services

Effective loss prevention in the grocery sector goes beyond deterring theft—it requires a comprehensive, data-driven strategy that minimizes shrink across all areas of the business. As grocery stores face unique challenges such as perishable inventory, high transaction volume, and broad employee access, a tailored approach is essential. Below are nine key components of a successful grocery loss prevention strategy.

1. Minimize Perishable Food Waste

In grocery, loss prevention starts with managing perishables. Spoilage and product expiration account for a significant portion of shrink. Investing in better forecasting, rotation practices, and inventory controls can greatly reduce waste and improve margins.

2. Identify External Theft and Fraud

While spoilage leads shrink, external theft and fraud are still major concerns. From organized retail crime to small-scale shoplifting and fraudulent returns, grocers must implement physical deterrents, surveillance, and digital tools that help detect and respond to these losses in real time.

3. Detect Internal Theft and Fraud Early

Employee theft is an unfortunate reality in any retail environment—including grocery. Early detection through exception reporting, transaction monitoring, and access control systems can minimize financial impact and help protect store culture.

4. Adopt a Cross-Functional Mindset

Loss prevention cannot operate in a silo. LP leaders are uniquely positioned to partner with merchandising, store operations, supply chain, finance, marketing, and HR. Sharing insights across departments helps embed a loss prevention mindset throughout the organization, making loss reduction a shared responsibility.

5. Become a Hub for Operational Insights

By integrating multiple data feeds—POS transactions, video analytics, inventory tracking—LP teams gain a comprehensive view of customer behavior and operational vulnerabilities. Sharing these insights with peers in operations and finance builds credibility, encourages collaboration, and positions LP as a strategic business partner.

6. Balance Loss Prevention with Customer Experience

Security solutions should protect inventory without compromising the customer experience. While locked display cases may deter theft, they can frustrate shoppers and impact sales. The best strategies are those that strike a balance—designed in partnership with merchandising and operations to be effective yet minimally disruptive.

7. Refine Hiring, Training, and Awareness

A successful loss prevention program starts with people. Hire employees who align with company values, then train them well—not just on store operations, but on the importance of loss prevention. When staff understand the controls in place and their role in protecting the business, they are less likely to engage in fraud and more likely to actively support LP efforts.

8. Measure Success Holistically

To gain organizational support, LP must demonstrate value in both tangible and strategic terms. This includes identifying enterprise-wide issues, quantifying financial impact, setting goals, and tracking performance. From margin protection and shrink reduction to specific metrics like refunds, voids, or cash variances, success should be measured across the full spectrum of the P&L.

9. Continue to Refine

Loss prevention is an evolving discipline. As the grocery landscape shifts—due to new sales models, technology, or economic pressures—LP strategies must adapt. The most effective programs are agile, constantly testing new tools and refining techniques to stay ahead of emerging risks and protect profitability.

Final Thoughts

A modern grocery loss prevention program isn’t just about stopping theft—it’s about building a culture of awareness, leveraging data, and embedding security into every part of the operation. When done well, it not only protects the bottom line but enhances overall store performance and customer trust.

 

Source:
Seidler, K. (February 03, 2016). Walmart’s Neighborhood Market Loss Prevention and Safety Program Featured in the Latest Magazine Edition. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


Loss Prevention Duties Include Collaboration with IT

Loss Prevention Duties Include Collaboration with IT

By Frank Costa, President, Nexgen Protection Services

Today, effective loss prevention increasingly depends on a close, collaborative relationship with IT.

Traditionally, the loss prevention (LP) and information technology (IT) departments operated in separate spheres within the retail environment. But as security threats evolve and retail operations become more digitized, the line between these functions is rapidly disappearing. 

The Convergence of Security and Technology

Modern retail security solutions are far more sophisticated than in the past. From AI-powered video analytics to integrated access control and real-time inventory tracking, these tools require deep integration into a company’s network infrastructure. That means LP and Asset Protection (AP) teams must work hand-in-hand with IT to deploy, maintain, and maximize the effectiveness of these technologies.

This collaboration is especially critical when managing the data and analytics side of loss prevention. As systems generate more actionable insights—on everything from suspicious behavior to theft patterns—LP professionals need support from IT to ensure data is captured, secured, and translated into meaningful strategy.

Breaking Down Silos

As organizations face increasingly complex security challenges, integrated, data-driven approaches are no longer optional—they’re essential. This trend is pushing LP, AP, and IT teams to break down traditional silos and embrace a more collaborative culture.

Investing in the Future

Creating a truly integrated approach requires more than just technology. It also involves investing in cross-functional training, shared goals, and a culture that values collaboration. By aligning LP and IT efforts, businesses can build more agile, proactive security operations.

A Strategic Advantage

Retailers that successfully foster this collaboration will be better positioned to handle emerging threats, reduce shrink, and safeguard both assets and personnel. In today’s environment, long-term security isn’t just about cameras and locks—it’s about strategy, synergy, and smart use of data.

 

Source:
Seidler, K. (May 10, 2025). Loss Prevention Duties Include Collaboration with IT. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats



As Retail Theft Surges, Loss Prevention Becomes a Cornerstone of Store

As Retail Theft Surges, Loss Prevention Becomes a Cornerstone of Store Operations

By Frank Costa, President, Nexgen Protection Services

Retail theft is surging across the United States, forcing companies to reevaluate how they protect their assets, employees, and operations. As the scale and sophistication of retail crime grow, loss prevention has evolved from a behind-the-scenes function into a central pillar of store strategy.

Loss Prevention Moves to the Forefront

Loss prevention is no longer confined to surveillance cameras and backroom investigations—it has become a core part of strategic planning. Retailers are partnering with law enforcement, technology providers, and frontline staff to proactively address emerging threats. The goal is clear: stay ahead of crime before it disrupts the business.

Safety: The New Priority

It’s not just merchandise that’s at risk—employee safety is becoming a major concern. Sales associates and managers are increasingly exposed to potentially dangerous confrontations, especially when dealing with repeat offenders or organized retail crime groups.

To reduce risk, many retailers are training staff in de-escalation techniques and establishing clear protocols that discourage direct intervention. Employees are instructed to prioritize safety over apprehension and to alert management or law enforcement instead of attempting to stop theft themselves.

Advocacy and Legal Support

Beyond internal policy changes, some retailers are advocating for tougher legal penalties for retail theft and calling for improved cooperation with law enforcement. Organized retail crime rings often cross state lines and require more robust, coordinated responses from the justice system.

A Proactive Approach Yields Results

Despite the mounting challenges, industry experts agree: a proactive, well-resourced loss prevention strategy can make a measurable difference. From advanced surveillance technology to community partnerships and employee education, the most effective retailers are those that treat loss prevention as an investment—not just a cost center.

Final Thoughts

Retailers who prioritize loss prevention as a strategic function—not just a reactionary measure—are better equipped to navigate the evolving threat landscape. By investing in people, technology, and collaboration, they not only reduce shrinkage but also create a safer, more resilient environment for employees and customers alike.

Source:
As Retail Theft Surges, Loss Prevention Becomes a Cornerstone of Store Operations. (April 07, 2025). The D&D Daily.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


Employees who attempt to stop or detain suspected shoplifters without proper training expose themselves and the business to significant risks

The Cost of Untrained Store Employees Stopping Shoplifters

By Frank Costa, President, Nexgen Protection Services

In many states—including New Jersey—retailers are legally permitted to detain suspected shoplifters. However, this authority comes with serious responsibility. If you’re a store owner, manager, or loss prevention officer, and your store has a policy allowing detention of shoplifters, it is critical to establish clear guidelines and provide proper training for all involved staff.

Why Training Matters

Employees who attempt to stop or detain suspected shoplifters without proper training expose themselves and the business to significant risks—including injury, legal liability, and reputational damage. To minimize these risks, staff must be trained on the following:

  • Establishing Probable Cause: Employees must understand what qualifies as probable cause or reasonable suspicion. Detaining someone without it can lead to legal claims against the business.
  • Non-Confrontational Approach: Any interaction with a suspected shoplifter must be calm, non-accusatory, and non-threatening. Staff should maintain a safe distance—at least six feet—to avoid physical altercations, especially if the suspect becomes violent.
  • No Chases: If a suspected shoplifter attempts to flee, employees should never pursue them. Chases can lead to serious injury or legal liability for both the employee and the business.
  • Handling Non-Compliance: If a suspect refuses to comply, employees should disengage immediately, allow the individual to leave, and notify law enforcement.

The Safer, Smarter Approach

If your company maintains a zero-tolerance policy on shoplifting, the safest and most effective solution is to hire off-duty police officers or licensed professional security personnel. These individuals are trained to handle confrontations and detentions lawfully and safely.

Allowing untrained store employees—or even loss prevention officers—to act as security personnel and use force is both reckless and irresponsible. No employee should ever be placed in a situation where they’re expected to physically confront a shoplifter.

Conclusion

The cost of having untrained staff engage with shoplifters can far outweigh the loss from stolen merchandise. Protect your team, your customers, and your business by implementing clear policies, prioritizing safety, and leaving physical enforcement to professionals.

Source:
Blaettler, J. (2025, January 27). The Cost of Untrained Store Employees Stopping Shoplifters. Loss Prevention Magazine.

Hashtags:
#ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats


Enhancing Retail Security with a Holistic Loss Prevention Strategy

Enhancing Retail Security with a Holistic Loss Prevention Strategy

By Frank Costa, President, Nexgen Protection Services

A holistic loss prevention strategy combines cutting-edge technology with a strong culture of awareness and collaboration.

The Role of Technology in Proactive Loss Prevention

In today’s retail environment, adopting advanced technologies is essential to effective loss prevention. Modern tools such as AI-powered video monitoring systems do more than just record footage—they analyze live feeds in real time to detect suspicious behavior and potential security breaches. These intelligent systems can immediately alert loss prevention teams, allowing for rapid intervention before a theft occurs.

Radio Frequency Identification (RFID) technology is another key component, offering real-time visibility into inventory. By identifying discrepancies as they happen, RFID helps retailers respond quickly to potential losses, minimizing shrinkage and operational disruption.

Predictive analytics further strengthens this proactive approach. By analyzing historical data, retailers can forecast when and where theft is most likely to happen. This insight enables better resource allocation, allowing stores to bolster security during high-risk periods or in vulnerable areas. As a result, businesses not only reduce losses but also enhance overall store efficiency and the customer experience.

Engaging Staff and Strengthening Community Collaboration

A truly effective loss prevention strategy goes beyond technology—it involves people at every level. Engaging non-LP (Loss Prevention) staff is critical in creating a culture of security. Training employees to recognize and report suspicious behavior empowers them to play an active role in theft prevention.

Moreover, collaboration with other retailers, law enforcement, and community organizations can significantly enhance the effectiveness of loss prevention efforts. Sharing information about known offenders, common theft tactics, and emerging threats allows for a united, informed approach to combating retail crime.

Conclusion

By leveraging AI, RFID, and data analytics while actively engaging employees and the broader community, retailers can stay ahead of threats, reduce shrinkage, and create safer, more efficient retail environments.

 

Source:
Norton, S. (2025, September 09). Enhancing Retail Security with a Holistic Loss Prevention Strategy. Intersectgroup.net.

Hashtags:
#Metrics #ProtectionServices #SecurityStandards #PublicSafety #MobileSecurity #SecurityThreats