Posts

Machine Learning Lends Transformative Advances in Physical Security

Machine Learning Lends Transformative Advances in Physical Security

Frank Costa, President Nexgen Protection Services – 

 

In physical security, machine learning can speed up investigations by assisting security teams in finding relevant information quickly. Machine learning helps analyze data that hasn’t been organized or labeled. By identifying patterns or possible relationships between data, such tools help security teams, law enforcement, and other staff gain a better understanding of an incident or important correlations between trends. 

On the operations side, machine learning helps organizations better leverage their physical security investments. Machine learning can help glean actionable insights from the system data to ramp up productivity. This often leads to improved operations.

 

SOURCE: 

Matusek, F. Transformative Advances. Security Today, 07/23/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Enhanced Surveillance with AI-Enabled Audio Cameras

Enhanced Surveillance with AI-Enabled Audio Cameras

Frank Costa, President Nexgen Protection Services – 

Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable.

 

SOURCE: 

Barbosa, R. Enhanced Situation Awareness. Security Today, 07/24/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Identity Threat Detection and Response Protocols

Identity Threat Detection and Response Protocols

Frank Costa, President Nexgen Protection Services – 

 

To effectively safeguard against identity attacks, organizations must address a range of use cases for both human and non-human identities, including but not limited to:

  1. Account Takeover Detection: Detect any of the numerous variants that indicate an identity has been compromised.

  2. Credential Compromise Detection: Identify and alert on the use of stolen or compromised credentials within the environment.

  3. Privilege Escalation Detection: Detect unauthorized attempts to escalate privileges within systems and applications.

  4. Anomalous Behavior Detection: Monitor for deviations from normal user behavior that may indicate malicious activity.

  5. Insider Threat Detection: Identify and respond to malicious or negligent actions by internal users.

 

SOURCE: 

Identity Threat Detection and Response Solution Guide. The Hacker News, 08/15/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Retailers-Must-Implement-Ironclad-Loss-Prevention-Strategies

Retailers Must Implement Ironclad Loss Prevention Strategies

Frank Costa, President Nexgen Protection Services – 

One of the biggest threats to retail profits is “shrink,” or preventable losses due to theft or human error. Retail shrink accounts for billions of dollars per year in lost revenue, so it’s in retailers’ best interests to have a comprehensive set of standards designed to avoid these losses. 

The rise of retail organized crime, cyberattacks, and new methods of theft have made reducing shrink harder than ever for retailers. In order to be prepared for these modern threats, retail store owners and managers must have ironclad loss prevention strategies in place, as well as the tools to enforce them.

SOURCE: 

Shein, M. Reassessing the role of loss prevention, Security Magazine, 04/04/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats


Security Guards Employ Body Cameras for Theft Prevention

Security Guards Employ Body Cameras for Theft Prevention

Frank Costa, President Nexgen Protection Services – 

Body cameras are just the latest in a slew of security measures retailers have taken, such as locking up products behind glass cases and removing self-checkout stations. 

When people know that their actions are being recorded they tend to behave differently. The advertisement of body worn cameras in use can deter members of the public from behaving antisocially, abusively or aggressively.

Retailers are also working more closely with law enforcement and devoting more internal resources to investigating theft.

 

SOURCE: 

Store security guards employ body cameras for theft prevention, KTV FOX 2, Jun 6, 2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats



Organizations-need-guidance-and-direction-from-a-strong-security-leader

Organizations need guidance and direction from strong security leadership.

Frank Costa, President Nexgen Protection Services – 

“The greatness of a leader is measured by the achievements of the led. This is the ultimate test of his effectiveness.” — Gen. Omar Bradley

Organizations need guidance and direction from a strong security leader. To mitigate threats the security team needs to prioritize the risks and threats that are of the utmost importance to the business and then devise a strategy to mitigate those risks and threats. 

Strategy should result in a number of initiatives designed to improve the security posture of the business. The security team should gear up to implement those initiatives, staying true to the strategy and plan along the way.

 

SOURCE: 

Altizer, A., Crowder, S. Leadership is more than a noun, Security Magazine, 07/01/2020.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats



Mitigate-Workplace-Violence-By-Promoting-A-Culture-Of-Safety

Mitigate Workplace Violence By Promoting A Culture Of Safety

Frank Costa, President Nexgen Protection Services – 

Workplace violence is an increasingly recognized safety issue. An act or threat occurring at the workplace that can include any of the following: verbal, nonverbal, written, or physical aggression; threatening, intimidating, harassing, or humiliating words or actions; bullying; sabotage; sexual harassment; physical assaults; or other behaviors.

Mitigate workplace violence by establishing support from human resources, staff, legal services, security, risk management and other areas of support. Promote a culture of safety to create a healthy work environment, which leads to improved job satisfaction, less absenteeism, reduced turnover and nurse retention.

 

SOURCE: 

Moro, J. Mitigating workplace violence through duty of care, Security Magazine, 06/07/2023.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats


Is-the-human-factor-in-security-breaches-over-blown

Is the human factor in security breaches over blown?

Frank Costa, President Nexgen Protection Services – 

Apart from revenue loss, companies who have a data breach also suffer damage to their brand reputation, lose intellectual property, lose sales, get unexpected expenses, legal penalties, etc. 

Setting up a fool-proof security system to prevent data breaches is almost impossible. Companies that do this end up hindering their productivity as employees have to deal with many security checks, access permissions, third-party security tools, etc. 

The best course of action is to create a balance between data protection and damage mitigation. Investing in employee security training and implementing the security strategies and tools mentioned above can prevent data breaches from harming your organization.

 

SOURCE: 

Starr, M. Is the “human factor” in security breaches over blown?, Security Magazine, 04/10/2023.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats


Drones-Can-Monitor-Scenes-Remotely-To-Assess-A-Security-Threat

Drones Can Monitor Scenes Remotely To Assess A Security Threat.

Frank Costa, President Nexgen Protection Services – 

From limited budgets to staffing shortages, public sector agencies are often challenged with performing more services in less time with fewer resources. 

Drones have a variety of applications across the public sector. Security agencies can monitor scenes remotely when conducting crowd control. This visibility is also helpful when coordinating responses, as they can determine the number of personnel needed to secure a threat. 

 

SOURCE: 

Galloway-Dawkins, R., How mobile technologies can transform emergency response, Security Magazine, 11/20/2023.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Tips to Stop Email Address Harvesting

Tips to Stop Email Address Harvesting

Frank Costa, President Nexgen Protection Services – 

Without a doubt chatbots or large language models lower the barrier for entry to cybercrime, making it possible to create well-written phishing campaigns and generate malware that less capable coders could not produce alone. 

When sharing your email address online, consider obfuscating it. For example, use “user [at] domain [dot] com” instead of the actual email format. This makes it harder for automated bots to recognize and harvest.

Be cautious about clicking on links in emails or on websites, especially those promising prizes, discounts, or freebies. These could be traps designed to harvest email addresses.

 

SOURCE: 

Kowski, J. S., Email obfuscation tactics elude security protections, Bloomberg.com, 6/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats