Posts

Security Firm Agents Identify Threats That AI Simply Cannot

Security Firm Agents Identify Threats That Artificial Intelligence (AI) Simply Cannot

Frank Costa, President Nexgen Protection Services – 

Artificial intelligence (AI) has become deeply integrated into both our personal and professional lives. From dynamic pricing to healthcare diagnostics, businesses across sectors leverage AI to improve efficiency and outcomes.

AI can efficiently sift through thousands of résumés, highlighting candidates with the right keywords for specific roles.  Human recruiters excel at evaluating soft skills, emotional intelligence, and adaptability—traits that are crucial to success in almost any role. These insights come through interviews, personal interactions, and even informal conversations that AI simply cannot replicate.

Combining AI’s strengths with human intuition, organizations can build diverse, talented teams that support long-term success.

SOURCE: 

Ruiz, V. Background Checks for Security Businesses, Security Info Watch Magazine, 11/7/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Conduct Vulnerability Assessments to Mitigate Violent Threats

Conduct Threat & Vulnerability Assessments to Mitigate Violent Acts

Frank Costa, President Nexgen Protection Services – 

UnitedHealthcare CEO Brian Thompson was fatally shot Wednesday morning in what authorities described as a ‘deliberate and targeted attack’ outside a Manhattan hotel hosting the health insurer’s investor conference.

The rise in violent incidents within the healthcare industry can often be traced back to personal frustrations with healthcare decisions, such as claim denials or unsuccessful procedures. These experiences can trigger strong emotional reactions, leading some individuals to express their anger through violent behavior. 

To mitigate these risks, healthcare organizations should conduct regular threat and vulnerability assessments using data-driven tools to identify exposures. Implementing layered security measures, such as access control systems, surveillance and secure office environments, can significantly enhance safety.

 

SOURCE: 

Bosch, R. Targeted killing of UnitedHealthcare CEO raises executive protection questions, Security Info Watch Magazine, 12/4/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Artificial intelligence and Machine Learning are Game Changers

Artificial intelligence and Machine Learning are Game Changers

Frank Costa, President Nexgen Protection Services – 

Artificial intelligence (AI) and machine learning (ML) are no longer just buzzwords; they’re reshaping the very fabric of how we protect our spaces, assets, and people. These smart systems are not just observing – they’re thinking, predicting and enabling security professionals to do more with less.

AI and ML allow security departments to extend their reach and effectiveness without necessarily expanding their workforce. 

  • Automated Monitoring: AI can continuously monitor multiple video feeds from one to dozens or many hundreds of cameras, flagging only the events that require human attention.
  • Intelligent Dispatching: ML algorithms can analyze incidents, learn from the patterns, and automatically dispatch the most appropriate response.
  • Predictive Maintenance: AI can monitor the health of security equipment, predicting failures before they occur, helping reduce downtime.

These capabilities don’t just save time; they fundamentally change how security teams operate, allowing them to be more strategic and proactive in their approach.

 

SOURCE: 

Carder, H. Smart systems usher in a new era of proactive physical security, Loss Prevention Magazine, 10/22/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Manage & Analyze Data To Safeguard Operations Against Threats

Manage & Analyze Data To Safeguard Operations Against Threats

Frank Costa, President Nexgen Protection Services – 

Effective data collection and management in the aftermath of violent incidents are key for preventing future occurrences. During violent incidents, chaos and stress can lead to critical details being overlooked. A standardized approach to data collection ensures that no pertinent information is missed.

Intelligence from mobile phones, tablets, computers, and hotlines, provides detailed information such as suspect identifiers, vehicle descriptions, targeted items, and much more.

Effective data management allows for the identification of patterns and characteristics shared among violent incidents. By analyzing data on vehicle information, physical descriptions, and targeted items, organizations can identify trends and take proactive measures.

 

SOURCE: 

How Proper Data Collection Prevents Future Violence Incidents, Loss Prevention Magazine, 10/10/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

Cargo theft involves the manipulation of data and identities to gain access to freight under false pretenses.

Cargo theft involves the manipulation of data and identities to gain access to freight under false pretenses.

Frank Costa, President Nexgen Protection Services – 

Organized retail crime (ORC) has been the buzzword in the retail loss prevention world for well over the past decade. During that time, the lack of support from the criminal justice system has certainly negated most of those efforts.

Criminals will establish fake trucking and brokerage companies with the sole intention of stealing cargo. They go through the same process as legitimate carrier information, registration, obtaining insurance, and operating authority. These companies then start completing legitimate jobs to establish a history of work performed. Once established, the thieves target high-value loads within their customer network to steal.

Insist on placing disposable GPS trackers inside your high-value loads. These cost-effective devices eliminate reverse logistics and device management while providing complete visibility of your freight, in real-time, from anywhere around the world. If and when a theft were to occur, you could follow the load in real-time from your phone to assist law enforcement in finding its exact location.

As of now, there is no silver bullet that will stop these thefts from occurring. But understanding the problem, training your staff, and installing protective measures will certainly act as a shield to help fend off these criminals.

SOURCE: 

Tabor, J. Strategic Cargo Theft: What It Is, How It Started, and What You Can Do to Stop It, Loss Prevention Magazine, 10/01/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Rising Workplace Violence Necessitates The Need For Implementing A Structured, Approach To Incident Response.

Rising Workplace Violence Necessitates The Need For Implementing A Structured, Approach To Incident Response.

Frank Costa, President Nexgen Protection Services – 

Every year, thousands of American workers report being victims of workplace violence, with assaults resulting in 57,610 injuries in 2021-22 alone, according to the National Safety Council. 

These alarming statistics underscore the urgent need for managers and safety professionals to implement a structured, approach to incident response. By adopting this proactive strategy, businesses can not only respond effectively to violent incidents but also mitigate future risks, ensuring a safer environment for all employees.

Most Common Challenges in Proper Incident Response

  • Information overload can occur in the chaos following an incident, making it difficult for staff to capture all relevant details accurately. As a result, important information may be missed or recorded inconsistently.
  • Communication breakdowns often arise when attempting to quickly alert nearby locations about potential threats, especially in the absence of a standardized communication system.
  • Connecting the dots between incidents can be challenging without a centralized system that allows for data comparison across different locations and time periods, making it difficult to determine if an incident is isolated or part of a larger trend.
  • Resource allocation becomes guesswork when there are no data-driven insights to guide decisions about where to deploy additional measures, particularly in high-risk areas or during specific time periods.
  • Learning from incidents is hampered when there isn’t a systematic way to analyze past events, leading to missed opportunities for implementing lessons that could prevent future incidents.
  • Balancing speed and thoroughness is a common challenge, as the urgency to respond quickly to violent incidents often conflicts with the need for thorough data collection and analysis.

 

These challenges require a thoughtful, systematic approach to incident response. By addressing these issues head-on, businesses can significantly improve their ability to respond to and prevent violent incidents, creating safer environments for employees and customers alike.

SOURCE: 

Workplace Violence Reporting: Proper Responses to Violent Incidents, Loss Prevention Magazine, 09/26/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

Shrink From Theft Significantly Impacts Small-To Medium-Sized Retailers

Shrink From Theft Significantly Impacts Small-To Medium-Sized Retailers

Frank Costa, President Nexgen Protection Services – 

SMB retailers operate on narrow profit margins, they typically don’t have the budget or resources to invest in the training, security systems, and personnel to combat theft like larger retailers do. Offenders might also be more familiar with SMB retailers’ store layouts and know they lack specific security measures. If smaller stores with weaker security are located near larger stores with more robust protection, there might be an issue of displacement in which offenders pass by the big box shop for the mom-and-pop.

A low cost solution to theft prevention for SMB retailers is partnerships. Many law enforcement organizations have community policing units, where officers are specially trained to interact with local businesses and citizens to help them solve problems. SMB retailers can connect with this unit or a liaison and invite them to the store to dispense free crime prevention advice.

 

SOURCE: 

Fritsky, L. For Small- to Medium-Sized Business Retailers, Thwarting Theft Needn’t Come with High Effort or Costs, Loss Prevention Magazine, 10/09/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

The Glendale Police Department Uses Tech to Expedite its 9-1-1 Response

The Glendale Police Department Uses Tech to Expedite its 9-1-1 Response

Frank Costa, President Nexgen Protection Services – 

The Glendale Arizona Police Department was alerted to a shooting by following a 9-1-1 call’s real-time transcript.  The real-time crime center (RTCC) analysts immediately pulled up the security camera at the intersection and saw the homicide suspect fleeing in the victim’s vehicle. The officer was able to react before a computer-aided dispatch (CAD) incident was entered and apprehended the suspect after a pursuit.

Motorola Solutions’ CommandCentral Aware unifies voice, video, and data feeds from public safety, private enterprise, and community-facing systems, leveraging AI to verify incident data and speed up response. Built to the highest security standards, the command center solution surfaces, on a single pane of glass in the RTCC, 9-1-1 call details, the location of resources in the field, data from license plate readers and footage from fixed video, mobile, and body cameras.

 

SOURCE: 

Arizona police department utilizes Motorola 9-1-1 intelligence to halt active shooter, Security Infowatch, 10/17/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

A Security Management Platform Must Manage Events In Real Time To Manage Crisis.

A Security Management Platform Must Manage Events In Real Time To Manage Crisis.

Frank Costa, President Nexgen Protection Services – 

The security sector has  adopted cloud-based artificial intelligence or machine learning resulting in revolutionary changes in access control, video surveillance and emerging areas like threat detection and drone identification.

A security management platform must provide clarity and control to act for greater efficiency and serve as the foundation for continuously improving security. It should optimize security operations, streamline services with real-time status updates, and manage events and team responses in real time to enable efficient management of sites, systems, events, users and data.

 

SOURCE: 

Byerly, T. Optimizing Security and Business Performance with Clarity and Control

The Essential Role of Digital Platforms in Security Management, Security Today, 09/10/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Artificial Intelligence Technology Delivers Proactive Security

Artificial Intelligence Technology Delivers Proactive Security and Efficient Crisis Response.

Frank Costa, President Nexgen Protection Services – 

The early days of artificial intelligence technology (AI) and facial recognition in video surveillance were often inaccurate and prone to false positives, limiting their effectiveness. Continuous advancements in AI algorithms and processing power have significantly improved the accuracy and reliability of these technologies.

Artificial intelligence and cloud technologies have become mainstream in the video surveillance industry.  Cloud-based solutions offer scalable, flexible storage and processing capabilities, reducing the need for on-prem infrastructure. 

True artificial intelligence will enable even more sophisticated analytics, predictive capabilities and autonomous decision-making. As technology continues to evolve, the possibilities for enhancing security and operational efficiency are limitless.

 

SOURCE: 

Hile, R. Teaching Old Dogs, New Tricks: 21st Century Video and Video Integration, Security Today, 09/16/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats