Critical Care Of Mobile Medical Devices with Thunder Tag

Alpha Thunder Tag-4                                                                                                                     WC Blog 36
tablet theft-3
Critical Care Of Mobile Medical Devices with Thunder Tag
     I am going to start out by saying, “I am not a doctor and I don’t play one on tv”.  There is my dose of humor for the day, much better than having to take two aspirins and calling me in the morning.  Ok, I think I’m done for now.  Now for the real topic I wanted to discuss today, mobile devices and the increasing use of them in the medical field.  As the growth and use of mobile devices has exploded around the U.S. and the world, so it has also in the medical field.  More and more nurses and doctors are accessing medical records electronically, rather than having the older paper charts and clip boards.  Part of this stems from the federal government mandating the use of electronic health records (E.H.R.) in the health industry.  While the benefits include faster access to medical records, the ability to share medical history more quickly, improved accuracy and less risk of losing papers, there is an increased risk of losing devices.  The Alpha Thunder Tag can protect against tablet theft and ipad theft and the associated cost of losing them, be it the actual hardware or the potential for liability risk.
     The Alpha Thunder Tag is secured to a handheld device with an adhesive backing that attaches the Anti-Theft device to the back of the tablet or ipad.  The tag has a plunger built into it that presses against the back of the device and if the device is tampered with, the security device has a built in alarm that will sound.  Further protection is afforded if the building where the devices are being used has an electronic article surveillance system in place.  Should someone attempt to leave the building with a tablet that is protected by the tag the EAS antenna will sound alerting staff of the event.  If the 3 Alarm version of the Thunder Tag is used, not only will the antenna alarm, but the device itself will alarm as well.  
        Medical information is secure in electronic format, but like any other technology if a device were lost or stolen, there are no guarantees that information cannot be accessed by someone with the knowhow or ability to breach encryption or other safeguards.  What are the implications if patient medical records were to be accessed by unauthorized persons?  What could someone do if they had such private medical information?  Consideration must also be given to what other information is tied to a patient’s records?  Billing information?   A patient’s address? HIPAA laws were created to protect patient’s rights and privacy, so it seems to me that protecting the way the data is carried and shared is as important as the information itself.  The Alpha Thunder Tag can be used to prevent tablet theft by keeping the devices where they belong, in the confines of the medical building.
     Tablet theft isn’t the only issue, the size of tablets makes them easy to misplace.  In the hustle and activity of a busy hospital, a medical provider could easily place a tablet or ipad in a medical jacket pocket.  Once the work day is over, if it is forgotten about, the jacket may be worn home and with it the device in the pocket.  The Alpha Thunder Tag will set off an EAS antenna and alert the person who has forgotten about the device, reminding them to return it to charging station or desk where they are kept.
     Technology advances for hospitals and medical offices is improving the ability of medical providers to give care faster and more accurately with the use mobile devices.  This mobility also means increased opportunity for the loss or theft of tablets or ipads.  Alpha Technology Thunder Tags can provide the protection necessary to prevent these devices from leaving the building and creating potential liability issues.
For more information on Alpha Thunder Tags contact us or call 1.770.426.0547
      

I am going to start out by saying, “I am not a doctor and I don’t play one on tv”. There is my dose of humor for the day, much better than having to take two aspirins and calling me in the morning. Ok, I think I’m done for now. Now for the real topic I wanted to discuss today, mobile devices and the increasing use of them in the medical field. As the growth and use of mobile devices has exploded around the U.S. and the world, so it has also in the medical field. More and more nurses and doctors are accessing medical records electronically, rather than having the older paper charts and clip boards. Part of this stems from the federal government mandating the use of electronic health records (E.H.R.) in the health industry. While the benefits include faster access to medical records, the ability to share medical history more quickly, improved accuracy and less risk of losing papers, there is an increased risk of losing devices. The Alpha Thunder Tag can protect against tablet theft and ipad theft and the associated cost of losing them, be it the actual hardware or the potential for liability risk.

 

The Alpha Thunder Tag is secured to a handheld device with an adhesive backing that attaches the Anti-Theft device to the back of the tablet or ipad. The tag has a plunger built into it that presses against the back of the device and if the device is tampered with, the security device has a built in alarm that will sound. Further protection is afforded if the building where the devices are being used has an electronic article surveillance system in place. Should someone attempt to leave the building with a tablet that is protected by the tag the EAS antenna will sound alerting staff of the event. If the 3 Alarm version of the Thunder Tag is used, not only will the antenna alarm, but the device itself will alarm as well.  

 

Medical information is secure in electronic format, but like any other technology if a device were lost or stolen, there are no guarantees that information cannot be accessed by someone with the knowhow or ability to breach encryption or other safeguards. What are the implications if patient medical records were to be accessed by unauthorized persons? What could someone do if they had such private medical information? Consideration must also be given to what other information is tied to a patient’s records?  Billing information? A patient’s address? HIPAA laws were created to protect patient’s rights and privacy, so it seems to me that protecting the way the data is carried and shared is as important as the information itself. The Alpha Thunder Tag can be used to prevent tablet theft by keeping the devices where they belong, in the confines of the medical building.

 

Tablet theft isn’t the only issue, the size of tablets makes them easy to misplace. In the hustle and activity of a busy hospital, a medical provider could easily place a tablet or ipad in a medical jacket pocket. Once the work day is over, if it is forgotten about, the jacket may be worn home and with it the device in the pocket. The Alpha Thunder Tag will set off an EAS antenna and alert the person who has forgotten about the device, reminding them to return it to charging station or desk where they are kept.

 

Technology advances for hospitals and medical offices is improving the ability of medical providers to give care faster and more accurately with the use mobile devices. This mobility also means increased opportunity for the loss or theft of tablets or ipads. Alpha Technology Thunder Tags can provide the protection necessary to prevent these devices from leaving the building and creating potential liability issues.

 

For more information on Alpha Thunder Tags contact us or call 1.770.426.0547

      

 

S.A.Q – CHECKPOINT HARD TAGS

 

S.A.Q – CHECKPOINT HARD TAGS
I’m going to continue on with my “should ask questions” series. I think there is some great benefit to addressing some common questions that retailers just don’t ask with respect to product security. These are important questions to ask before settling on a strategy to minimize shoplifting. I’ve complied 5 simple questions that you should ask about Checkpoint hard tags, but you may not have thought of. 
1. Are checkpoint hard tags used exclusively on softlines product?
While the vast majority of retailers use EAS tags for apparel merchandise, they have value on hundreds of other products that may be a target for thieves. I’ve personally used these tags to secure hardline items like baseball gloves, pocket knives, sleeping bags and even fishing rods and reels. They are versatile enough to use on a wide assortment of merchandise, so don’t limit your field of vision to just apparel. 
2. What is the most effective method of tagging?
That is dependent on what you are tagging! When it comes to clothing such as t-shirts, dresses and shirts, I’ve found it most effective to use the EAS tag in the back of the neck. Be cautious on placement, making sure it’s through a seam. This way, you avoid potentially damaging the garment. For pants and denim jeans, I’ve found that passing the tag through the back pocket area is also effective. Always go with a visible spot and always try to stay in the seam. This way the thief knows the product is protected and you aren’t unintentionally damaging the product. 
3. What is source tagging?
If you have a great relationship (or you buy a lot) from your manufacturer/vendor, you can most likely have them source tag certain products. What that means is that the product will come from the source with an EAS tag or label already attached. This means that you don’t have to spend the payroll cost to do it yourself.
4. Can checkpoint hard tags be defeated by criminals?
Every tag can be defeated. That’s a fact of life that we must all live with. Checkpoint hard tags are stronger than most, but a determined criminal with the right set of tools can defeat the tag. It will stop an opportunistic thief. Remember that product protection should be seen as layers. Physical tags should only be one layer of that strategy. Customer service, your floor plan, and camera placement are all other factors that go into minimizing shrink. 
5. Will they make a difference? 
If used properly and as part of a larger strategy to combat shrink, yes, they will make a difference in your store. I’ll reiterate my point above. If you strategize to combat thieves is to slap a few EAS tags on product, you’re not going to be very effective at eliminating the root cause of the problem. If shoplifters are constantly targeting your store, it’s because they see you as a soft target. You need to take a multi-pronged approach if you want to have the most effective. 
For more information about Checkpoint hard tags, contact us or call 1.770.426.0547

I’m going to continue on with my “should ask questions” series. I think there is some great benefit to addressing some common questions that retailers just don’t ask with respect to product security. These are important questions to ask before settling on a strategy to minimize shoplifting. I’ve complied 5 simple questions that you should ask about Checkpoint hard tags, but you may not have thought of. 

1. Are checkpoint hard tags used exclusively on softlines product?

While the vast majority of retailers use EAS tags for apparel merchandise, they have value on hundreds of other products that may be a target for thieves. I’ve personally used these tags to secure hardline items like baseball gloves, pocket knives, sleeping bags and even fishing rods and reels. They are versatile enough to use on a wide assortment of merchandise, so don’t limit your field of vision to just apparel. 

2. What is the most effective method of tagging?

That is dependent on what you are tagging! When it comes to clothing such as t-shirts, dresses and shirts, I’ve found it most effective to use the EAS tag in the back of the neck. Be cautious on placement, making sure it’s through a seam. This way, you avoid potentially damaging the garment. For pants and denim jeans, I’ve found that passing the tag through the back pocket area is also effective. Always go with a visible spot and always try to stay in the seam. This way the thief knows the product is protected and you aren’t unintentionally damaging the product. 

3. What is source tagging?

If you have a great relationship (or you buy a lot) from your manufacturer/vendor, you can most likely have them source tag certain products. What that means is that the product will come from the source with an EAS tag or label already attached. This means that you don’t have to spend the payroll cost to do it yourself.

4. Can checkpoint hard tags be defeated by criminals?

Every tag can be defeated. That’s a fact of life that we must all live with. Checkpoint hard tags are stronger than most, but a determined criminal with the right set of tools can defeat the tag. It will stop an opportunistic thief. Remember that product protection should be seen as layers. Physical tags should only be one layer of that strategy. Customer service, your floor plan, and camera placement are all other factors that go into minimizing shrink. 

5. Will they make a difference? 

If used properly and as part of a larger strategy to combat shrink, yes, they will make a difference in your store. I’ll reiterate my point above. If you strategize to combat thieves is to slap a few EAS tags on product, you’re not going to be very effective at eliminating the root cause of the problem. If shoplifters are constantly targeting your store, it’s because they see you as a soft target. You need to take a multi-pronged approach if you want to have the most effective. 

For more information about Checkpoint hard tags, contact us or call 1.770.426.0547

 

 

No Clothing Alarm Can Mean An Invitation To Theft Rings

 

Clothing Security-4 , Security Tags On Clothes-2  ,Clothing Alarm-3
No Clothing Alarm Can Mean An Invitation To Theft Rings
Clothing theft rings are on the rise.  These groups are figuring out the best ways to get in and get out with a lot of stuff that is worth a lot of money.  If your store is not putting security tags on clothes, you may be next on one of these group’s agenda.  I’ve looked into two of these groups and the details of their cases are astounding.  These people are organized; they have the all the plans and logistics worked out before they ever start.  One group only had five people and the other had as many as sixteen working for them.  They did the research and figured out which stores had a clothing alarm in place and which ones had no type of clothing security at all.  
One group was a family, and the members were a mother, three of her adult children, and a brother-in-law.  They primarily went to small stores and specialty boutiques.  They primarily stole lingerie and accessories.  They would drive around, find these stores in strip malls, go in as a harmless looking family, and wipe them out.  When they gathered up enough merchandise they would have neighborhood yard sales.  They became very popular where they lived because of all the great deals they had.  Finally someone caught on and turned them in, but not before they amassed thousands of dollars’ worth of stolen goods in a storage facility.  Sadly, with little to help identify where the items came from, most of the merchandise was not returned to the stores that it.  
Security tags on clothes can be a more valuable addition than simply just a theft deterrent.  They can also be stamped with your store information for easy identification in the event there is a recovery.  They can be placed in obvious places, like price tags, or even sewn into hidden seams and pockets.  Until the clothing security tags have been deactivated, they will cause the clothing alarm to sound!  This is a big deal when you deal with the following type of theft ring.
This was the group that employed sixteen people at times.  Each member that entered the stores played a part and had an assigned task for the thefts to be successful.  First were the ones stuffing the bags.  They were given shopping lists and their jobs were to gather those items.  They were warned to not pick up anything that had a clothing security tag attached.  Next came the ones responsible for distracting the staff.  Just in case the first group raised any suspicions, the second group was to keep the employees busy with questions and random conversations.  Lastly came folks that were to actually remove the bags from the store.  If the clothing alarm sounded, the second group was to act casual and continue browsing while the last group made a run for it.  Other members would come back and pick them up later in a different vehicle.  This ring of people actually got away with tens of thousands worth of merchandise from several different locations.  They picked their stores based on ease of escape routes, and lack of clothing security.  They knew where they could be most successful.  They had a truck they drove around that advertised “Name Brands At Great Prices!”.  That truck is the reason they finally got caught.  They had a stolen license plate on it.  Thank goodness for dumb crooks.
For more information on clothing security, contact us or call 1.770.426.0547 or Clothingsecurity.net

Clothing theft rings are on the rise. These groups are figuring out the best ways to get in and get out with a lot of stuff that is worth a lot of money. If your store is not putting security tags on clothes, you may be next on one of these group’s agenda. I’ve looked into two of these groups and the details of their cases are astounding. These people are organized; they have all the plans and logistics worked out before they ever start. One group only had five people and the other had as many as sixteen working for them. They did the research and figured out which stores had a clothing alarm in place and which ones had no type of clothing security at all.  

One group was a family, and the members were a mother, three of her adult children, and a brother-in-law. They primarily went to small stores and specialty boutiques. They primarily stole lingerie and accessories. They would drive around, find these stores in strip malls, go in as a harmless looking family, and wipe them out. When they gathered up enough merchandise they would have neighborhood yard sales. They became very popular where they lived because of all the great deals they had. Finally someone caught on and turned them in, but not before they amassed thousands of dollars’ worth of stolen goods in a storage facility. Sadly, with little help to identify where the items came from, most of the merchandise was not returned to the stores.  

Security tags on clothes can be a more valuable addition than simply just a theft deterrent. They can also be stamped with your store information for easy identification in the event there is a recovery. They can be placed in obvious places, like price tags, or even sewn into hidden seams and pockets. Until the clothing security tags have been deactivated, they will cause the clothing alarm to sound! This is a big deal when you deal with the following type of theft ring.

This was the group that employed sixteen people at times. Each member that entered the stores played a part and had an assigned task for the thefts to be successful. First were the ones stuffing the bags. They were given shopping lists and their jobs were to gather those items. They were warned to not pick up anything that had a clothing security tag attached. Next came the ones responsible for distracting the staff. Just in case the first group raised any suspicions, the second group was to keep the employees busy with questions and random conversations. Lastly came folks that were to actually remove the bags from the store. If the clothing alarm sounded, the second group was to act casual and continue browsing while the last group made a run for it.  Other members would come back and pick them up later in a different vehicle. This ring of people actually got away with tens of thousands worth of merchandise from several different locations. They picked their stores based on ease of escape routes, and lack of clothing security. They knew where they could be most successful. They had a truck they drove around that advertised “Name Brands At Great Prices!”. That truck is the reason they finally got caught. They had a stolen license plate on it. Thank goodness for dumb crooks.

For more information on clothing security, contact us or call 1.770.426.0547 or Clothingsecurity.net

 

 

ALPHA VERSALOC MAKES DAMAGE PRODUCTS A SHOPLIFTERS WORST NIGHTMARE!

When it comes to the professional shoplifter, nothing thwarts their plans like products that they cannot turn a profit from. Let’s face reality; Amateur shoplifters steal for the opportunity. However professionals steal to make money! When it comes to ways to prevent shoplifting in your retail store, forcing thieves to damage your products before they can thieve them is a great way to circumvent the entire issue of theft. See, thieves often can’t resell the merchandise that they steal if the packages are breached or damaged.

Third party ‘lift consumers’ (those who buy and possess stolen merchandise) are just like the rest of us. When they buy something for their money they want a new, intact, undamaged product. They don’t want to pay for stuff that is less than desirable, period. This is the same premise as to why retailers have difficulty in reselling returned items with ‘opened item’ status in their stores, even at a steep discount. Consumers don’t ‘trust’ that the product contents are whole or even functional. In the World of the lift consumer, it’s no different. Thieves have a heck of a time selling items that they damage during their attempt the steal them. This is where the Alpha VersaLok can help.

Any thief worth their weight in gold knows that breaching or attempting to dismantle any type of security device usually results in a lot of unwanted attention. With that said, these awesome products by Alpha High Theft Solutions are perfect in the sense that it completely makes theft of the product impossible without doing one of two things. The first, triggering the integrated 95dB alarm inside the Alpha VersaLok to sound wildly causing embarrassment and attention from staff. Or secondly, causing the shoplifter to completely destroy the visual resale integrity of the packaging after the item is removed from the store. The latter mentioning is what’s known as a ‘denial of benefit’ device, much like exploding ink tags ruin products rendering them useless to thieves that plan to resell them.

The Alpha VersaLok works by adhering to a products flat surface using a special adhesive backing. The special backing contains a rather fragile aluminum circuit that once ripped; the flow of internal voltage is disrupted causing the alarm to sound excitedly. No matter what, shoplifters want the security device gone from the product and they’re going to attempt removal. Once the pilferer tries to peel the adhesive back off in an attempt to remove the unit, the alarm will sound. If the bandit doesn’t care if the alarm sounds because they have already removed the item from the store, they will still cause some degree of ‘damage’ to the packaging that the VersaLok was attached too. Albeit not a terrible degree of damage but probably just enough to make the product look less than new. Some crooks may even try to take a box cutter and carve out the unit and surrounding backing altogether. No thief wants to do this to ‘their’ product because no one wants to buy merchandise with holes in it!

Another way to prevent shoplifting in this sense is to incorporate the use of the Alpha Spider Wrap. This crafty anti-shoplifting device secures your merchandise much in the same way as the VersaLok does except in a broader manner. The Spider Wrap uses aircraft grade cables to literally ‘wrap’ completely around larger products. By clutching tightly around the entire product, the Alpha Spider Wrap protects it, as the metal cables would need to be cut in order to remove the unit from the package. Once the cables are cut, a 95dB alarm will sound and guess what? Thieves don’t like 95dB alarms. They’re a tad bit loud. It is indeed a pesky proposition for any crook. Just like the VersaLok, a shoplifter would have to literally destroy the box or packaging in order to completely circumvent having to but the cables. Either way it goes, whether using the Alpha Spider Wrap or the VersaLok, even a professional shoplifter is going to be highly inconvenienced or just flat out of luck trying to resell a damaged product.

For more information on how to prevent shoplifting please contact us or call 1-770-426-0547.

 

Bottle Locks Can Assist Liquor Sellers

 

Bottle Locks-3  , Liquor Bottle Security-3 , Bottle Lock- 1 , Alpha Security-1
Bottle Locks Can Assist Liquor Sellers
Four young men walked into a grocery store that sells liquor and stuffed their pants with over $700 worth of top shelf vodka, cognac and other spirits.  Then they walked right out the door, completely undetected.  In a retail environment where there are more customers in the store than employees, it is imperative to employ tools like bottle locks.  Alpha security has designed these so that they make liquor bottle security quick and easy.  They deter theft by letting the customer know as soon as they arrive that this store takes loss prevention seriously.  If there is a successful snatch and grab, the bottle is still practically useless to the thief without the appropriate tool to remove the bottle lock.  The bottle will more likely shatter before they can ever get the cap off.  
Now that so many different types of stores sell liquor, thefts have risen exponentially.  A trio of women went into a store and loaded up shoulder bags right before they bolted out the door.  Another small group convinced the staff they worked for the distributor and told them they were there to perform a reset.  They loaded up several grocery carts of bottles, and when the few employees got distracted, walked out the door and loaded up their vehicle with the stolen goods.  As of this story, that group has not been caught.  Even a single bottle here and there can be very detrimental to any store’s bottom line.  Simple solutions, like bottle locks, could be implemented and the problem could be solved.  When a store looks at their profit line vs their loss line, they have to decide what the solution is if they are losing money from lack of liquor bottle security.  Many store managers and owners go with their first inclination to simply move the product.  Now, I am an avid opponent of merchandising expensive and highly targeted items anywhere near the exit doors.  Just look at high end jewelery stores.  They would never put the good stuff at the front.  The same should go for liquors and spirits.  The only difference is it’s probably not a good idea to even house the cheap stuff near any exit.  Those can start to add up as well.  I do see the benefits of displaying these products near a register, and the section should always be under some form of surveillance.  If possible, there should be an employee there monitoring the section at all times as well.  
If that is not an option in your location, then it may be time to take a look into what bottle locks can do for your operation and peace of mind.  If your store has not had a problem with liquor bottle security, your luck is sure to run out soon.  You cannot expect to be as lucky as a police officer that recently pulled over an SUV for a minor traffic offense.  As he approached the vehicle he could tell it was loaded down with boxes.  Those boxes turned out to be full of liquor bottles, and the folks inside the vehicle were wanted in three counties for stealing more than $20,000 worth of liquor from area grocers and package stores.  The group would conceal and remove ten or twelve bottles at a time, stride right out the door, and were never noticed by the store staff.  Of course, later in the shift when they were straightening shelves, the employees would finally realize they had been hit.  Thankfully, these guys are going to jail for a very long time and won’t be a problem anymore.  
For more information on Bottle Locks, contact us or call 1.770.426.0547 or Bottlelock.net
 

Four young men walked into a grocery store that sells liquor and stuffed their pants with over $700 worth of top shelf vodka, cognac and other spirits. Then they walked right out the door, completely undetected. In a retail environment where there are more customers in the store than employees, it is imperative to employ tools like bottle locks. Alpha security has designed these so that they make liquor bottle security quick and easy. They deter theft by letting the customer know as soon as they arrive that this store takes loss prevention seriously. If there is a successful snatch and grab, the bottle is still practically useless to the thief without the appropriate tool to remove the bottle lock. The bottle will more likely shatter before they can ever get the cap off.  

Now that so many different types of stores sell liquor, thefts have risen exponentially. A trio of women went into a store and loaded up shoulder bags right before they bolted out the door. Another small group convinced the staff they worked for the distributor and told them they were there to perform a reset. They loaded up several grocery carts of bottles, and when the few employees got distracted, walked out the door and loaded up their vehicle with the stolen goods. As of this story, that group has not been caught. Even a single bottle here and there can be very detrimental to any store’s bottom line. Simple solutions, like bottle locks, could be implemented and the problem could be solved. When a store looks at their profit line vs their loss line, they have to decide what the solution is if they are losing money from lack of liquor bottle security. Many store managers and owners go with their first inclination to simply move the product. Now, I am an avid opponent of merchandising expensive and highly targeted items anywhere near the exit doors. Just look at high end jewelery stores. They would never put the good stuff at the front. The same should go for liquors and spirits. The only difference is it’s probably not a good idea to even house the cheap stuff near any exit. Those can start to add up as well. I do see the benefits of displaying these products near a register, and the section should always be under some form of surveillance. If possible, there should be an employee there monitoring the section at all times as well.  

If that is not an option in your location, then it may be time to take a look into what bottle locks can do for your operation and peace of mind. If your store has not had a problem with liquor bottle security, your luck is sure to run out soon. You cannot expect to be as lucky as a police officer that recently pulled over an SUV for a minor traffic offense. As he approached the vehicle he could tell it was loaded down with boxes. Those boxes turned out to be full of liquor bottles, and the folks inside the vehicle were wanted in three counties for stealing more than $20,000 worth of liquor from area grocers and package stores. The group would conceal and remove ten or twelve bottles at a time, stride right out the door, and were never noticed by the store staff. Of course, later in the shift when they were straightening shelves, the employees would finally realize they had been hit. Thankfully, these guys are going to jail for a very long time and won’t be a problem anymore.  

For more information on Bottle Locks, contact us or call 1.770.426.0547 or Bottlelock.net