EMPLOYEE BACKGROUND CHECKS ARE LIKE A WATER FILTER

 

EMPLOYEE BACKGROUND CHECKS ARE LIKE A WATER FILTER
So, I share an office with a General Manager at my home store. It’s a rather large office, tucked away in the rear of the store. He has a large desk. I have a large desk. We both face opposing corners and hardly see each other and he’s a pretty quiet guy. The bad part though, is that managers will often use the office to conduct interviews; even though there are two other offices in the store! Listening to how some managers conduct interviews makes me happy that we always conduct an employee background check on potential candidates. 
A pre-employment screening is absolutely a necessity. You can’t leave everything in the hands of managers who may, or may not possess the interview skills needed to weed through a host of candidates. 
Last week, I’m twiddling away on a case when a manager comes into my office with a potential hire for the store. I sit back quietly reviewing CCTV and typing my narrative and I can’t help but to be more interested in how this manager interviews a potential employee. For 25 minutes, this manager, a tenured manager who has been around for a decade or more, talks about his expectations. The manager talked for 25 minutes. I couldn’t tell you what this candidate sounded like because the manager did all the talking. The only time the candidate said anything was the resounding YES! When offered a position in the store. 
Befuddled, I asked this manager what he learned from the candidate during the interview. He didn’t quite know what to make of my question. In his mind, he was a great interviewer. Side note, this manager has the highest turnover rate in the store. I asked if he treated every candidate the same and he said he did. Boy, am I sure glad we run employee background checks as a safety net. 
Some managers just aren’t good interviewers. They don’t know what questions to ask, and they may even ask questions they shouldn’t. A solid pre-employment screening process can help filter out dead weight your managers may let slip by during the interview process. 
Think of an employee background check like a three step water filter. The water passes through an initial screen to take out any contaminants. Next, it goes through a process that removes the “hardness” and finally, a good system will pass the water through a UV light, killing any virus or bacteria that may have taken up residence. Your hiring practices should do the same. A good application is your first step. The right questions can weed out anyone not in line with your business. Second, an interview with a manager that knows how to ask questions and really gets to understand and feel out a person in a 30 minute time frame. Lastly, a pre-employment screening/background check is your UV light to the hiring process. 
From the great Doctor Gregory House, “everybody lies. Job interviews are not immune to fibbers. Don’t let the toxic bacteria filled water into your business. Kill the possibility by always conducting an employee background check!
Need information on Employee Background Check. Give us a call at 1.770.426.0547 now. 

So, I share an office with a General Manager at my home store. It’s a rather large office, tucked away in the rear of the store. He has a large desk. I have a large desk. We both face opposing corners and hardly see each other and he’s a pretty quiet guy. The bad part though, is that managers will often use the office to conduct interviews; even though there are two other offices in the store! Listening to how some managers conduct interviews makes me happy that we always conduct an employee background check on potential candidates. 

 

A pre-employment screening is absolutely a necessity. You can’t leave everything in the hands of managers who may, or may not possess the interview skills needed to weed through a host of candidates. 

 

Last week, I’m twiddling away on a case when a manager comes into my office with a potential hire for the store. I sit back quietly reviewing CCTV and typing my narrative and I can’t help but to be more interested in how this manager interviews a potential employee. For 25 minutes, this manager, a tenured manager who has been around for a decade or more, talks about his expectations. The manager talked for 25 minutes. I couldn’t tell you what this candidate sounded like because the manager did all the talking. The only time the candidate said anything was the resounding YES! When offered a position in the store. 

 

Befuddled, I asked this manager what he learned from the candidate during the interview. He didn’t quite know what to make of my question. In his mind, he was a great interviewer. Side note, this manager has the highest turnover rate in the store. I asked if he treated every candidate the same and he said he did. Boy, am I sure glad we run employee background checks as a safety net. 

 

Some managers just aren’t good interviewers. They don’t know what questions to ask, and they may even ask questions they shouldn’t. A solid pre-employment screening process can help filter out dead weight your managers may let slip by during the interview process. 

 

Think of an employee background check like a three step water filter. The water passes through an initial screen to take out any contaminants. Next, it goes through a process that removes the “hardness” and finally, a good system will pass the water through a UV light, killing any virus or bacteria that may have taken up residence. Your hiring practices should do the same. A good application is your first step. The right questions can weed out anyone not in line with your business. Second, an interview with a manager that knows how to ask questions and really gets to understand and feel out a person in a 30 minute time frame. Lastly, a pre-employment screening/background check is your UV light to the hiring process. 

 

From the great Doctor Gregory House, “everybody lies”. Job interviews are not immune to fibbers. Don’t let the toxic bacteria filled water into your business. Kill the possibility by always conducting an employee background check!

Need information on Employee Background Check. Give us a call at 1.770.426.0547 now. 

 

 

A Retail Theft Prevention Strategy Is Incomplete Without A Checkpoint Security System Included

 

Checkpoint security system-4                                                                                                   wc blog 235
Retail theft prevention-4
Stop shoplifting- 5
Checkpoint tags-4
A Retail Theft Prevention Strategy Is Incomplete Without A Checkpoint Security System Included
     My wife and I were out shopping the other day looking around one of her favorite clothing stores.  My wife was interested in the clothing, while I found myself interested in the sign on the door seeking applicants for a Loss Prevention Officer.  As I looked around the store I noticed quite a few closed circuit television cameras, or at least domes hanging from the ceiling. I already knew that this store staffs the fitting room with a fitting room attendant, and saw she was diligently counting clothes for patrons as they entered and left the fitting room.   But I was surprised that after all the times we have visited this store, I never noticed they do not use a Checkpoint security system to stop shoplifting.  In fact they don’t use any retail theft prevention devices on clothes, shoes, or any of the other items they sell.  It seems a little curious to me that a store would invest in Loss Prevention staff and CCTV systems, but not go the extra step to use Checkpoint tags or electronic article surveillance antennas.  While it is good to want to catch shoplifters, I have found that it is much better if you can deter them in the first place.
     How does a Checkpoint security system stop shoplifting?  Starting with the electronic article surveillance (EAS) antennas positioned at the doors, shoppers entering the store are aware that the store is using retail theft prevention equipment. Criminals also look for this when they are deciding whether or not to target a store.  Once in the store the use of Checkpoint tags on merchandise deters casual shoplifters, the people who may only steal for a quick thrill or on an impulse.  They don’t necessarily intend to steal before they come to the store, but make a decision based on impulse.  This particular group of shoplifters tends to avoid taking too many risks, especially the risk of setting off an EAS alarm at the front doors.  Professional shoplifters may also be deterred by Checkpoint tags because they too prefer not to attract unnecessary attention.  They desire to remain anonymous so that they can repeatedly return to a store and shoplift.  Alarms attract attention so professionals prefer to steal merchandise they do not think is protected with tags or they go to a different store altogether.  Store personnel trained to properly respond to EAS alarms also stop shoplifting.  They can recover merchandise when an attempted theft occurs.  Shoplifters recognize when a store takes alarm activations seriously and this is a retail theft prevention measure in itself.
     So returning to my original observation, why is this store not using a Checkpoint security system to stop shoplifting?  Is it the perception that it will cost a lot of money or the constant expense of purchasing new hard tags?  A Checkpoint system can actually pay for itself over time, eliminating the concern of expense. Reduced shortage due to theft will result in increased profits to the store.  Additionally, sales increase when product is available to be purchased by the honest clientele since shoplifters aren’t stealing it.  These two factors combine to offset the cost of a system.  The expense of hard tags is no excuse.  Hard tags from Checkpoint systems are reusable.  They are designed to be removed at the point of sale as an item is sold and stored until ready to be attached to new shipments of product. By recycling tags, there is not a constant need to buy more as merchandise is sold.
     Having security cameras and Loss Prevention personnel are important to stop shoplifting but they should not be the only tools a store has at its’ disposal.  A Retail theft prevention strategy should include a Checkpoint security system, training on the placement of Checkpoint tags, tag removal and employee training on alarm response.  Reap the rewards when you use Checkpoint systems.
Need information on a Checkpoint security system?  Give us a call at 1.770.426.0547 now.

My wife and I were out shopping the other day looking around one of her favorite clothing stores. My wife was interested in the clothing, while I found myself interested in the sign on the door seeking applicants for a Loss Prevention Officer. As I looked around the store I noticed quite a few closed circuit television cameras, or at least domes hanging from the ceiling. I already knew that this store staffs the fitting room with a fitting room attendant, and saw she was diligently counting clothes for patrons as they entered and left the fitting room. But I was surprised that after all the times we have visited this store, I never noticed they do not use a Checkpoint security system to stop shoplifting. In fact they don’t use any retail theft prevention devices on clothes, shoes, or any of the other items they sell. It seems a little curious to me that a store would invest in Loss Prevention staff and CCTV systems, but not go the extra step to use Checkpoint tags or electronic article surveillance antennas. While it is good to want to catch shoplifters, I have found that it is much better if you can deter them in the first place.

How does a Checkpoint security system stop shoplifting? Starting with the electronic article surveillance (EAS) antennas positioned at the doors, shoppers entering the store are aware that the store is using retail theft prevention equipment. Criminals also look for this when they are deciding whether or not to target a store. Once in the store the use of Checkpoint tags on merchandise deters casual shoplifters, the people who may only steal for a quick thrill or on an impulse. They don’t necessarily intend to steal before they come to the store, but make a decision based on impulse. This particular group of shoplifters tends to avoid taking too many risks, especially the risk of setting off an EAS alarm at the front doors. Professional shoplifters may also be deterred by Checkpoint tags because they too prefer not to attract unnecessary attention. They desire to remain anonymous so that they can repeatedly return to a store and shoplift. Alarms attract attention so professionals prefer to steal merchandise they do not think is protected with tags or they go to a different store altogether. Store personnel trained to properly respond to EAS alarms also stop shoplifting. They can recover merchandise when an attempted theft occurs. Shoplifters recognize when a store takes alarm activations seriously and this is a retail theft prevention measure in itself.

So returning to my original observation, why is this store not using a Checkpoint security system to stop shoplifting? Is it the perception that it will cost a lot of money or the constant expense of purchasing new hard tags? A Checkpoint system can actually pay for itself over time, eliminating the concern of expense. Reduced shortage due to theft will result in increased profits to the store. Additionally, sales increase when product is available to be purchased by the honest clientele since shoplifters aren’t stealing it. These two factors combine to offset the cost of a system. The expense of hard tags is no excuse. Hard tags from Checkpoint systems are reusable. They are designed to be removed at the point of sale as an item is sold and stored until ready to be attached to new shipments of product. By recycling tags, there is not a constant need to buy more as merchandise is sold.

Having security cameras and Loss Prevention personnel are important to stop shoplifting but they should not be the only tools a store has at its’ disposal. A Retail theft prevention strategy should include a Checkpoint security system, training on the placement of Checkpoint tags, tag removal and employee training on alarm response. Reap the rewards when you use Checkpoint systems.

 

Need information on a Checkpoint security system? Give us a call at 1.770.426.0547 now.

 

 

Mobile Medical Device Theft Can Lead To Damaged Reputation; Alpha Thunder Tags Provide Protection Part 1

 

Alpha Thunder Tags -3                                                                                                         WC blog 209 
Checkpoint Classic N10-3
i-pad theft-3
Tablet theft-3
Mobile Medical Device Theft Can Lead To Damaged Reputation; Alpha Thunder Tags Provide Protection Part 1
     In my retail job and my library job, I have to occassionally take online training modules reminding me of the importance of information security.  The trainings remind me that I need to be careful when creating passwords, because when they are too easy, hackers can figure them out.  I am also reminded that I should not open emails and especially the attachments if I don’t recognize the sender.  Viruses and malware may be slipped into my computer if I am careless.  One warning I recently came across in a training and I had not considered before is that when a company suffers a security breach, they risk damage to their brand and reputation.  I realized how true that statement is.  Think about the major retailers that have had data breaches and customer credit card information has been compromised.  Consumer confidence begins to wane and stock prices drop.  Customers start to question whether it is wise to shop at those locations.  A company’s reputation is tied to a lot of different factors, but trust is near the top of that list.  The same can be said for medical care facilities.  When a cyber attack takes place or patient information is mis-handled, it makes the news and patients become fearful that their information is vulnerable.  With the increased use of medical mobile devices,concerns over i-pad theft, tablet theft and medical laptop theft have become the source of government concern.  Medical providers are expected to protect patient information and Alpha Thunder Tags can help with that.
     Alpha Thunder Tags used with electronic article surveillance antennas (EAS) like the Checkpoint Classic N10, provide extreme protection against tablet theft, i-pad theft or theft of any other mobile medical device.  The tags are attached with an adhesive backing to a mobile device and once in place, can only be removed with a detachment tool.  Anyone else attempting to pull it off will activate a tamper alarm built into the tag.  The Alpha Thunder tag is designed to operate on a specific radio frequency and when it is carried into the receiving range of the Checkpoint Classic N10 antenna, the antenna senses the tag and sounds an alarm.  Along with the audible alarm, lights built into the antenna begin to flash when the protected i-pad or tablet is being carried out.  The commotion alerts nearby employees that a tagged device is being removed from the building.  They can then respond to the alarm and recover the item that the person had in their possession.
     Is all this security necessary for your facility?  Whether you have a small office or are in charge of a large hospital, the government is pushing for medical providers to transition to electronic health records (EHRs).  The idea is that the electronic records make it easier health care providers to keep accurate records on patients and to access information. The concern that healthcare providers must consider is the possibility of hacking or technology theft.  In the event it is believed patient information is at risk, it is the responsibility of the medical facility where the loss took place to report it to the United States Department of Health and Human Services.   According to the HHS.gov website http://www.hhs.gov/hipaa/for-professionals/breach-notification/ “Following a breach of unsecured protected health information, covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media.” (emphasis on media mine).   Once information on a breach is in the media what does that mean for your reputation?  In part two of this series we will take a closer look at what it can mean for any business when negative information gets in the media.
   Patient privacy and security are of paramount importance for health care professionals. Tablet theft or i-pad theft from a facility can have severe ramifications if someone was able to hack into patient information stored on a device.  Alpha Thunder Tags and Checkpoint Classic N10 antennas can give you the protection you need to help keep your company’s reputation in tact.
Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.

In my retail job and my library job, I have to occassionally take online training modules reminding me of the importance of information security. The trainings remind me that I need to be careful when creating passwords, because when they are too easy, hackers can figure them out. I am also reminded that I should not open emails and especially the attachments if I don’t recognize the sender. Viruses and malware may be slipped into my computer if I am careless. One warning I recently came across in a training and I had not considered before is that when a company suffers a security breach, they risk damage to their brand and reputation. I realized how true that statement is. Think about the major retailers that have had data breaches and customer credit card information has been compromised. Consumer confidence begins to wane and stock prices drop. Customers start to question whether it is wise to shop at those locations. A company’s reputation is tied to a lot of different factors, but trust is near the top of that list. The same can be said for medical care facilities. When a cyber attack takes place or patient information is mis-handled, it makes the news and patients become fearful that their information is vulnerable. With the increased use of medical mobile devices,concerns over i-pad theft, tablet theft and medical laptop theft have become the source of government concern. Medical providers are expected to protect patient information and Alpha Thunder Tags can help with that.

Alpha Thunder Tags used with electronic article surveillance antennas (EAS) like the Checkpoint Classic N10, provide extreme protection against tablet theft, i-pad theft or theft of any other mobile medical device. The tags are attached with an adhesive backing to a mobile device and once in place, can only be removed with a detachment tool. Anyone else attempting to pull it off will activate a tamper alarm built into the tag. The Alpha Thunder tag is designed to operate on a specific radio frequency and when it is carried into the receiving range of the Checkpoint Classic N10 antenna, the antenna senses the tag and sounds an alarm. Along with the audible alarm, lights built into the antenna begin to flash when the protected i-pad or tablet is being carried out. The commotion alerts nearby employees that a tagged device is being removed from the building. They can then respond to the alarm and recover the item that the person had in their possession.

Is all this security necessary for your facility? Whether you have a small office or are in charge of a large hospital, the government is pushing for medical providers to transition to electronic health records (EHRs). The idea is that the electronic records make it easier for health care providers to keep accurate records on patients and to access information. The concern that healthcare providers must consider is the possibility of hacking or technology theft. In the event it is believed patient information is at risk, it is the responsibility of the medical facility where the loss took place to report it to the United States Department of Health and Human Services. According to the HHS.gov website http://www.hhs.gov/hipaa/for-professionals/breach-notification/ “Following a breach of unsecured protected health information, covered entities must provide notification of the breach to affected individuals, the Secretary, and, in certain circumstances, to the media.” (emphasis on media mine). Once information on a breach is in the media what does that mean for your reputation? In part two of this series we will take a closer look at what it can mean for any business when negative information gets in the media.

Patient privacy and security are of paramount importance for health care professionals. Tablet theft or i-pad theft from a facility can have severe ramifications if someone was able to hack into patient information stored on a device. Alpha Thunder Tags and Checkpoint Classic N10 antennas can give you the protection you need to help keep your company’s reputation in tact.

 

Need information on Alpha Thunder Tags? Give us a call at 1.770.426.0547 now.