Protect Popular Mobile Medical Devices With Alpha Thunder Tags

 

Alpha Thunder Tags-3                                                                                                                  WC blog 92
i-pad theft-4
Tablet theft-4
Protect Popular Mobile Medical Devices With Alpha Thunder Tags
     Why are mobile medical devices so popular?   Why does there seem to be such a proliferation of them in the medical profession?  What kind of devices are being used for medical purposes and are there any risks associated with their use?  Let me address the last question first.  Mobile medical devices that I am referring to are tablets, i-pads, i-phones, etc.  These devices are small, portable and easy for medical staff to carry with them while seeing patients. A far cry from the days of clipboards and file folders with patient information, these devices provide access to the same information but with the added benefit of being easier to navigate through information. Since the devices do carry patient data there is risk associated with them, but tablet theft and i-pad theft risk can be minimized with the use of Alpha Thunder Tags.  
     Alpha Thunder Tags are anti-theft devices attached directly to the item(s) that needs to be protected.  They work with an electronic article surveillance system antenna that emits a loud alarm if someone tries to leave a building with a device.  Flashing LED lights of an antenna also alert staff of a security breach.  If someone attempts an i-pad theft by removing the anti-theft device, the tag has an internal tamper alarm that activates and alerts personnel of an incident as it happens. 
       Why the proliferation of mobile medical devices?  There a couple of reasons for it, the first being a push by the federal government for medical providers to move to electronic medical records (EMR).  The idea being, that digitalizing data and patient information would drive down health care costs.  Medical providers are attempting to meet government requirements and therefore the use of mobile devices has increased.  While there are medical professionals who are both pro and con on the program, the fact is there are more devices being used and any time there is an increase in something of value, there is always someone out there who would like to steal it.  The reason may be simply to get hands on something of value and try to resell it or more concerning, steal it and try to hack information contained on it.  In either situation a tablet theft or i-pad theft can be an expensive loss to a medical provider.
     Another reason for the proliferation of the devices is that medical providers are finding there are many benefits to using mobile medical i-pads,  i-phones and tablets.  Patient information is easy to access.  Doctors can consult with other physicians on patient diagnosis, medical history can show medications a patient may be on and help a doctor avoid prescribing a medication that may negatively interfere with a drug the patient is already taking.  There are also a growing number of medical apps that are available to medical professionals.  Some of the top apps available for medical i-phones according to the web site “Healthcare IT News” include:
1. Epocrates – The user can view continually updated clinical data
2. Skyscape Medical Resources – a collection of medical information and decision 
3. Eyechart – used to measure visual acuity.
4. Taber’s Medical Dictionary – contains over 60,000 terms, 1,000 photos and 600 patient care statements
5. MedCalc – a medical calculator that provides access to medical formulas and scores.
The list of available apps for doctors and nurses goes on, from Neurology toolkits to Veterinarian tools.  With so much information and information sharing available at the touch of a screen, it makes sense why transitioning to a mobile technology would be beneficial to hospitals, clinics and other healthcare providers.  It is also understandable how a tablet theft could have negative impacts on a practice if medical data is on a device.  The loss of access to these apps could also cause problems if a medical practitioner has come to rely on them for their day to day patient care.
     Medical mobile devices have immeasurable value in the health care industry.  The opportunities for reducing errors and improving care with new apps are boundless.  But, we must not lose sight of the risks associated with mobile devices.  They are small and can be easily misplaced or stolen and in the process, patient data may be at risk.  Using Alpha Thunder tags is the sensible solution to prevent i-pad theft and tablet theft.
For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547

Why are mobile medical devices so popular? Why does there seem to be such a proliferation of them in the medical profession? What kind of devices are being used for medical purposes and are there any risks associated with their use? Let me address the last question first. Mobile medical devices that I am referring to are tablets, i-pads, i-phones, etc. These devices are small, portable and easy for medical staff to carry with them while seeing patients. A far cry from the days of clipboards and file folders with patient information, these devices provide access to the same information but with the added benefit of being easier to navigate through information. Since the devices do carry patient data there is risk associated with them, but tablet theft and i-pad theft risk can be minimized with the use of Alpha Thunder Tags.

 

Alpha Thunder Tags are anti-theft devices attached directly to the item(s) that needs to be protected. They work with an electronic article surveillance system antenna that emits a loud alarm if someone tries to leave a building with a device. Flashing LED lights of an antenna also alert staff of a security breach. If someone attempts an i-pad theft by removing the anti-theft device, the tag has an internal tamper alarm that activates and alerts personnel of an incident as it happens.

 

Why the proliferation of mobile medical devices? There a couple of reasons for it, the first being a push by the federal government for medical providers to move to electronic medical records (EMR). The idea being, that digitalizing data and patient information would drive down health care costs. Medical providers are attempting to meet government requirements and therefore the use of mobile devices has increased. While there are medical professionals who are both pro and con on the program, the fact is there are more devices being used and any time there is an increase in something of value, there is always someone out there who would like to steal it. The reason may be simply to get hands on something of value and try to resell it or more concerning, steal it and try to hack information contained on it. In either situation a tablet theft or i-pad theft can be an expensive loss to a medical provider.     

 

Another reason for the proliferation of the devices is that medical providers are finding there are many benefits to using mobile medical i-pads,  i-phones and tablets. Patient information is easy to access. Doctors can consult with other physicians on patient diagnosis, medical history can show medications a patient may be on and help a doctor avoid prescribing a medication that may negatively interfere with a drug the patient is already taking. There are also a growing number of medical apps that are available to medical professionals. Some of the top apps available for medical i-phones according to the web site “Healthcare IT News” include:

1. Epocrates – The user can view continually updated clinical data

2. Skyscape Medical Resources – a collection of medical information and decision 

3. Eyechart – used to measure visual acuity

4. Taber’s Medical Dictionary – contains over 60,000 terms, 1,000 photos and 600 patient care statements

5. MedCalc – a medical calculator that provides access to medical formulas and scores.

The list of available apps for doctors and nurses goes on, from Neurology toolkits to Veterinarian tools. With so much information and information sharing available at the touch of a screen, it makes sense why transitioning to a mobile technology would be beneficial to hospitals, clinics and other healthcare providers. It is also understandable how a tablet theft could have negative impacts on a practice if medical data is on a device. The loss of access to these apps could also cause problems if a medical practitioner has come to rely on them for their day to day patient care.

Medical mobile devices have immeasurable value in the health care industry. The opportunities for reducing errors and improving care with new apps are boundless. But, we must not lose sight of the risks associated with mobile devices. They are small and can be easily misplaced or stolen and in the process, patient data may be at risk. Using Alpha Thunder tags is the sensible solution to prevent i-pad theft and tablet theft.

 

For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547

 

 

Building A Better Team Is Easier When You Use A Background Check Company

Background Check Company-5                                                                                                       WC blog 62
Background Checks-4
Building A Better Team Is Easier When You Use A Background Check Company
     You may not know this, but hiring the right people for your business is EASY!  That’s right, everyone who applies will always fill in application information honestly.  They never leave gaps in employment, they tell you their entire education background and obviously they will never lie about whether they are re-hirable for a previous job.  Would they omit facts about a criminal history?  Certainly not! They will tell you about that criminal record, because they know your business might do background checks and find out, right? While we are on the topic, resumes are just as trustworthy.  Why would anyone embellish a resume just to get a job?  Who is going to be creative about a job title, isn’t that kind of senseless?  Awards they have received?  Can’t you track down if they weren’t the school Valedictorian?   I am being sarcastic in all of this for a reason.  People DO lie on applications and on resumes in order to get a job.  How pervasive is the problem?  “According to a 2014 CareerBuilder survey, fifty-eight percent of hiring managers said they’ve caught a lie on an application; one-third (33 percent) of these employers have seen an increase in resume embellishments post-recession.” (Source; CareerBuilder.com)  A professional background check company can provide you with the information on an applicant that he or she may fail to “remember” when completing that job application.
A background check company can uncover information that an applicant may fail to let you know about when they apply for a job with you.  Do you require a certain type of degree or certification for a job?  A pre-employment screening can validate that someone graduated with that particular diploma.  Will the job require driving?  It could be helpful to know if the applicant has a clean driving record.  What about a credit history?  Is the person you are considering for a position financially stable?  It may be important for you to know that the person who is going to have access to client credit card information does not have potential credit problems himself. Conducting background checks will help to ensure you are hiring people who are honest in providing information you need to make intelligent hiring decisions. 
     Having experience in my previous position in retail as a Loss Prevention Manager and in my current position as a shift supervisor in a university library, I have combed through hundreds of applications.  I have first-hand experience in seeing “embellishments” and “employment gaps”.  I also know what it is to be in crunch time and you have to hire a new person, but you have to go through a lot of applications and resumes. It can be easy to give a benefit of a doubt to what may be an omission. This is especially true when you see an application or resume that at first glance looks very impressive.  A background check company can help protect you when you may have been lulled into a false sense of security over a candidate’s application.  As the saying goes, “Looks can be deceiving”.  I recognize that even those who have had a checkered past need an opportunity to turn their life around.  If someone is honest, even about their criminal history employee background checks can confirm a person’s honesty.  While I applaud employers who are willing to hire someone who may have experienced problems in their lives, I still think it is prudent to place these new hires in a position that will not put a company at risk.  I would not put someone with a prior DUI conviction in a position to drive a company vehicle, at least for a while. Someone that has been convicted of embezzlement would not work in my cash office or at a cash register.  I might consider them for a freight stocking position or as a cart attendant to start off.  
     Hiring the right person for the job should always be a priority.  Really knowing who that person is that you are considering for a job can be difficult.  A background check company will give you the confidence that your candidate would truly be a good fit for your team.  Let employee background checks help you hire the right people to staff your business,
For more information on a background check company, contact us or call 1.770.426.0547 
     
     

You may not know this, but hiring the right people for your business is EASY! That’s right, everyone who applies will always fill in application information honestly. They never leave gaps in employment, they tell you their entire education background and obviously they will never lie about whether they are re-hirable for a previous job. Would they omit facts about a criminal history? Certainly not! They will tell you about that criminal record, because they know your business might do background checks and find out, right? While we are on the topic, resumes are just as trustworthy. Why would anyone embellish a resume just to get a job? Who is going to be creative about a job title, isn’t that kind of senseless? Awards they have received? Can’t you track down if they weren’t the school Valedictorian? I am being sarcastic in all of this for a reason. People DO lie on applications and on resumes in order to get a job. How pervasive is the problem? “According to a 2014 CareerBuilder survey, fifty-eight percent of hiring managers said they’ve caught a lie on an application; one-third (33 percent) of these employers have seen an increase in resume embellishments post-recession.” (Source; CareerBuilder.com) A professional background check company can provide you with the information on an applicant that he or she may fail to “remember” when completing that job application.

 

A background check company can uncover information that an applicant may fail to let you know about when they apply for a job with you. Do you require a certain type of degree or certification for a job? A pre-employment screening can validate that someone graduated with that particular diploma. Will the job require driving? It could be helpful to know if the applicant has a clean driving record. What about a credit history? Is the person you are considering for a position financially stable? It may be important for you to know that the person who is going to have access to client credit card information does not have potential credit problems himself. Conducting background checks will help to ensure you are hiring people who are honest in providing information you need to make intelligent hiring decisions. 

 

Having experience in my previous position in retail as a Loss Prevention Manager and in my current position as a shift supervisor in a university library, I have combed through hundreds of applications. I have first-hand experience in seeing “embellishments” and “employment gaps”. I also know what it is to be in crunch time and you have to hire a new person, but you have to go through a lot of applications and resumes. It can be easy to give a benefit of a doubt to what may be an omission. This is especially true when you see an application or resume that at first glance looks very impressive. A background check company can help protect you when you may have been lulled into a false sense of security over a candidate’s application. As the saying goes, “Looks can be deceiving”. I recognize that even those who have had a checkered past need an opportunity to turn their life around.  If someone is honest, even about their criminal history employee background checks can confirm a person’s honesty. While I applaud employers who are willing to hire someone who may have experienced problems in their lives, I still think it is prudent to place these new hires in a position that will not put a company at risk.  I would not put someone with a prior DUI conviction in a position to drive a company vehicle, at least for a while. Someone that has been convicted of embezzlement would not work in my cash office or at a cash register. I might consider them for a freight stocking position or as a cart attendant to start off.  

 

Hiring the right person for the job should always be a priority. Really knowing who that person is that you are considering for a job can be difficult.  A background check company will give you the confidence that your candidate would truly be a good fit for your team. Let employee background checks help you hire the right people to staff your business.

For more information on a background check company, contact us or call 1.770.426.0547 
     

     

Clothing Shortage Climbs When Stores Fail To Use Clothing Security Tags

 

Checkpoint Tags-5                                                                                                                            WC blog 72
Clothing Security Tags-4
Clothing Shortage Climbs When Stores Fail To Use Clothing Security Tags 
    Do you run or own a clothing store or sell clothing as part of your product line?  When you complete your inventories, do you have shortage for which you can’t account?  You may not be familiar with all the clever ways thieves are stealing from you.  There are obvious methods of clothing theft such as wearing items out of the store or hiding them in purses and not paying.  But there are other methods you may not be as familiar with when it comes to shortage and theft.  Shortage may be the result of employee’s passing merchandise to friends, failing to ring it through the register.  It may be theft by the employees themselves.  It can be unintentional shortage as a result of not carefully looking at a shopping cart for stray items before the customer leaves the store.  The merchandise is overlooked and once the customer is out the door, they may or may not realize the merchandise was not scanned at the register and so they simply take it with them.  However it may happen, when merchandise is not paid for, it becomes shortage.  Many small business owners do not feel clothing security tags are necessary for their stores.  I would like to suggest that even small business owners can benefit by using Checkpoint tags on the products they sell.  
     How do I know that using Checkpoint tags on clothing make a difference for a store?  According to the 2015 Global Retail Theft Barometer shrinkage rates for apparel specialist retailers (in North America) that spent 0.15 percentage points less on loss prevention strategies from 2014 to 2015 saw an increase of 1.68 percentage points in year on year shrinkage rates.  Clothing security tags make up a significant part of apparel protection, in addition to other strategies.  Checkpoint tags are the hard tags that are pinned to clothing and will activate electronic article surveillance (EAS) antennas at the store entrance or exit when someone attempts to leave the store with merchandise that is still tagged.  The tags are reusable so they don’t have to be ordered over and over again.  They are also large enough that they provide a visual deterrent to would-be thieves.  
     By using Checkpoint tags, even if a piece of clothing is put on under another garment, such as a swim suit worn under street clothes or a shirt being worn under a customer’s coat, the clothing security tag will still activate the store EAS antennas.  Other methods I have seen shoplifters use to steal clothes are hiding them in a baby stroller, under the baby, under the baby blanket and I have even seen baby strollers brought in with only a doll and blanket.  I have dealt with shoplifters who have taken items out of large boxes and stuffed them with hundreds of dollars of clothing.  It makes no difference if the items are concealed, if protected with Checkpoint tags, the alarm will sound and alert store staff that something is going through the antenna that is activating the alarm.  If an employee is attempting to leave with unpaid merchandise that has security tags on them, they too will trigger the alarm.   Having the tags on clothing is often enough to discourage employees from even attempting to steal from their employer.  In a situation where a customer forgets merchandise left in a buggy, or it may have fallen on the bottom of a shopping cart, the EAS alarm will still sound when the clothing is about to leave the store. A responding employee can verify it has not been paid for and either, return the item to the sales floor or the customer can choose to purchase the garment.  
     Don’t allow your store shrinkage rate to climb because you think you can do without protection.  Remember that shortage has been shown to increase in stores that have cut back on clothing security expenditures. Reduce your shortage and increase profits with clothing security tags.
 For more information on Checkpoint Tags, contact us or call 1.770.426.0547  

Do you run or own a clothing store or sell clothing as part of your product line? When you complete your inventories, do you have shortage for which you can’t account? You may not be familiar with all the clever ways thieves are stealing from you. There are obvious methods of clothing theft such as wearing items out of the store or hiding them in purses and not paying. But there are other methods you may not be as familiar with when it comes to shortage and theft. Shortage may be the result of employee’s passing merchandise to friends, failing to ring it through the register. It may be theft by the employees themselves. It can be unintentional shortage as a result of not carefully looking at a shopping cart for stray items before the customer leaves the store. The merchandise is overlooked and once the customer is out the door, they may or may not realize the merchandise was not scanned at the register and so they simply take it with them. However it may happen, when merchandise is not paid for, it becomes shortage. Many small business owners do not feel clothing security tags are necessary for their stores. I would like to suggest that even small business owners can benefit by using Checkpoint tags on the products they sell.  

 

How do I know that using Checkpoint tags on clothing make a difference for a store? According to the 2015 Global Retail Theft Barometer shrinkage rates for apparel specialist retailers (in North America) that spent 0.15 percentage points less on loss prevention strategies from 2014 to 2015 saw an increase of 1.68 percentage points in year on year shrinkage rates. Clothing security tags make up a significant part of apparel protection, in addition to other strategies. Checkpoint tags are the hard tags that are pinned to clothing and will activate electronic article surveillance (EAS) antennas at the store entrance or exit when someone attempts to leave the store with merchandise that is still tagged. The tags are reusable so they don’t have to be ordered over and over again. They are also large enough that they provide a visual deterrent to would-be thieves.  

 

By using Checkpoint tags, even if a piece of clothing is put on under another garment, such as a swim suit worn under street clothes or a shirt being worn under a customer’s coat, the clothing security tag will still activate the store EAS antennas. Other methods I have seen shoplifters use to steal clothes are hiding them in a baby stroller, under the baby, under the baby blanket and I have even seen baby strollers brought in with only a doll and blanket. I have dealt with shoplifters who have taken items out of large boxes and stuffed them with hundreds of dollars of clothing.  t makes no difference if the items are concealed, if protected with Checkpoint tags, the alarm will sound and alert store staff that something is going through the antenna that is activating the alarm. If an employee is attempting to leave with unpaid merchandise that has security tags on them, they too will trigger the alarm. Having the tags on clothing is often enough to discourage employees from even attempting to steal from their employer. In a situation where a customer forgets merchandise left in a buggy, or it may have fallen on the bottom of a shopping cart, the EAS alarm will still sound when the clothing is about to leave the store. A responding employee can verify it has not been paid for and either, return the item to the sales floor or the customer can choose to purchase the garment.  

Don’t allow your store shrinkage rate to climb because you think you can do without protection. Remember that shortage has been shown to increase in stores that have cut back on clothing security expenditures. Reduce your shortage and increase profits with clothing security tags. 

 

For more information on Checkpoint Tags, contact us or call 1.770.426.0547