JH Blog 02
(Checkpoint hard tag-5, EAS tag-3)
The Checkpoint Hard Tag: Transcending Visual Deterrence
Deterring theft is critical for any retailer to maximize profits in the current market, and visual deterrence is certainly the most common and effective form. Seeing Electronic Article Surveillance (EAS) alarms, and the tags that trip them attached to merchandise, is a fantastic way to deter your average shoplifter. Unfortunately, not every shoplifter is easily swayed from stealing your merchandise, and some shoplifters are seasoned criminals. Prolific shoplifters will break the norm in a number of ways. Most commonly they will target merchandise that is not usually tagged as well as bring tools along to remove EAS tags on the merchandise they are after. This is where the Checkpoint hard Tag comes in.
Many retailers carry more than just clothing, and losses can be staggering in areas ranging anywhere from sports equipment to high-end luggage to designer handbags. Much of this merchandise is impossible to attach a standard EAS tag to and it can be a hassle to do so. The Checkpoint hard tag solves numerous problems, including the struggle of application. The sleek design and multiple variations of the tags allow for easy attachment to a wide array of merchandise, while not compromising the look of the product to your customers.
The next hurdle created for the would-be prolific shoplifter is the difficulty of removal. I have caught many shoplifters with incredibly lengthy records, and the vast majority of the “career shoplifters”, as we call them, were carrying tools on them, and the vast majority of the tools were specifically geared towards removing the common clothing article EAS tag. Just recently my team caught a woman who said she simply ordered an EAS magnetic tag remover on Amazon and decided to try her luck. Uncommon as they may be, the fact is, even big-time shoplifters are unprepared for the quality of the Checkpoint hard tag. Even when performing theft with the help of tools, it is very hard to remove, and this creates another strong barrier of protection for your merchandise: physical deterrence. Shoplifters are not taking their sweet time to steal from you. This is especially true in regards to experienced, career shoplifters. They know the best way to avoid getting caught is to be fast and to know what they want before coming in. An experienced criminal will not risk being caught and charged with theft by futilely attempting to remove a tag for a prolonged period of time, especially when they realize they brought the wrong tools for the job.
In the Loss Prevention world it is not uncommon to hear about Organized Retail Crime (ORC) groups, some going so far as to travel across the country hitting multiple locations of the same store that they know is vulnerable to their tactic, whatever it may be. The item that has recently received the most attention of the ORC groups that I have to deal with is the designer handbag, and it is an ideal item for a Checkpoint hard tag. Many ORC groups operate as tactfully as they possibly can, minimizing any risk of being apprehended and charged. After all, they make a living off of your losses. This is not to say that there aren’t ORC groups who throw caution to the wind with “grab and run” tactics, because that also happens, but why not be prepared for the group that is highly opportunistic? It is possible to deter some ORC groups before they even commit to hitting your store. If you and your merchandise are scoped out will you look like an easy target? Or will you be bypassed in favor of the less-prepared retailer?
There is no downside to adding an extra layer of protection to your merchandise.
For more information about Checkpoint Hard tags, contact us or call 1.770.426.0547
Deterring theft is critical for any retailer to maximize profits in the current market, and visual deterrence is certainly the most common and effective form. Seeing Electronic Article Surveillance (EAS) alarms, and the tags that trip them attached to merchandise, is a fantastic way to deter your average shoplifter. Unfortunately, not every shoplifter is easily swayed from stealing your merchandise, and some shoplifters are seasoned criminals. Prolific shoplifters will break the norm in a number of ways. Most commonly they will target merchandise that is not usually tagged as well as bring tools along to remove EAS tags on the merchandise they are after. This is where the Checkpoint hard Tag comes in.
Many retailers carry more than just clothing, and losses can be staggering in areas ranging anywhere from sports equipment to high-end luggage to designer handbags. Much of this merchandise is impossible to attach a standard EAS tag to and it can be a hassle to do so. The Checkpoint hard tag solves numerous problems, including the struggle of application. The sleek design and multiple variations of the tags allow for easy attachment to a wide array of merchandise, while not compromising the look of the product to your customers.
The next hurdle created for the would-be prolific shoplifter is the difficulty of removal. I have caught many shoplifters with incredibly lengthy records, and the vast majority of the “career shoplifters”, as we call them, were carrying tools on them, and the vast majority of the tools were specifically geared towards removing the common clothing article EAS tag. Just recently my team caught a woman who said she simply ordered an EAS magnetic tag remover on Amazon and decided to try her luck. Uncommon as they may be, the fact is, even big-time shoplifters are unprepared for the quality of the Checkpoint hard tag. Even when performing theft with the help of tools, it is very hard to remove, and this creates another strong barrier of protection for your merchandise: physical deterrence. Shoplifters are not taking their sweet time to steal from you. This is especially true in regards to experienced, career shoplifters. They know the best way to avoid getting caught is to be fast and to know what they want before coming in. An experienced criminal will not risk being caught and charged with theft by futilely attempting to remove a tag for a prolonged period of time, especially when they realize they brought the wrong tools for the job.
In the Loss Prevention world it is not uncommon to hear about Organized Retail Crime (ORC) groups, some going so far as to travel across the country hitting multiple locations of the same store that they know is vulnerable to their tactic, whatever it may be. The item that has recently received the most attention of the ORC groups that I have to deal with is the designer handbag, and it is an ideal item for a Checkpoint hard tag. Many ORC groups operate as tactfully as they possibly can, minimizing any risk of being apprehended and charged. After all, they make a living off of your losses. This is not to say that there aren’t ORC groups who throw caution to the wind with “grab and run” tactics, because that also happens, but why not be prepared for the group that is highly opportunistic? It is possible to deter some ORC groups before they even commit to hitting your store. If you and your merchandise are scoped out will you look like an easy target? Or will you be bypassed in favor of the less-prepared retailer?
There is no downside to adding an extra layer of protection to your merchandise.
For more information about Checkpoint Hard tags, contact us or call 1.770.426.0547
GETTING BACK TO THE BASICS –CLOTHING SECURITY
It seems to me that more and more retailers are investing heavily in state of the art security measures. The world’s largest retailer is going through a major shift in the way they combat theft and they are investing millions to aid in that effort. Just look at one of those stores. The most noticeable difference to the average consumer is the new cameras and different placements in and around the buildings. They aren’t the only retailer to do this, either. Across the country, even small retailers are investing significant capital in high tech solutions to stop the proverbial bleeding in the shops. What if I told you that you didn’t need to spend thousands to accomplish the same goal? What if your solution is as simple as Checkpoint Tags?
Let’s go back to the basics for a minute with a story. A colleague that I previously worked with left our company to run the LP department of a very small clothing retailer (5 stores). We had a chance to catch up a few weeks back and he was explaining how he was bringing his current company into the 21st century with security tech. He went on about the new HD camera systems, an updated POS, the addition of exception based reporting software and new training programs for the managers to be more familiar with LP procedures. He told me that his stores were still having shrink issues even with all those new pieces of tech in place. I had a simple question for him. How’s the clothing security program?
He stared at me, blankly for a minute. What do you mean, clothing security program? He quipped back after realizing he was staring out in space for a minute. I asked what EAS system the stores using, and what type of Checkpoint Tags were being used on the store’s product. He looked at me very pointedly and said that he had not realized until this very moment that his company and the department he was hired to lead was not using one of the most basic practices in retail to combat theft and shrink.
So we circle back around to getting back to the basics. EAS should not be a good thing to have. It shouldn’t be on your wish-list of nice things to have, nor should it be seen as un-necessary. If you operate a retail store, especially a clothing store, it is in your business’s best interest to install a descent system, even if it is one of the entry level models. Next, identify what product is being stolen and use the heck out of those Checkpoint Tags to secure them. I will bet that you will see a dramatic decrease in theft incidents and an overall increase in profitability.
Operating a clothing boutique will always present a unique challenge to the retailer. Not only do you have to contend with small margins and an every changing fashion scene, you will always have to deal with theft, both internal and external. Clothing security should be just as important to you as anything else in your store. By taking a small measure to secure your inventory, you are ensuring that it remains in stock for your customer to purchase. If that legitimate customer purchases it, your sales increase, as does your profitability, payroll…etc. Being in stock is one of the most vital parts of running a business. To think, you can accomplish all of this with a simple Checkpoint Tag.
For more information Clothing Security, contact us or call 1.770.426.0547
It seems to me that more and more retailers are investing heavily in state of the art security measures. The world’s largest retailer is going through a major shift in the way they combat theft and they are investing millions to aid in that effort. Just look at one of those stores. The most noticeable difference to the average consumer is the new cameras and different placements in and around the buildings. They aren’t the only retailer to do this, either. Across the country, even small retailers are investing significant capital in high tech solutions to stop the proverbial bleeding in the shops. What if I told you that you didn’t need to spend thousands to accomplish the same goal? What if your solution is as simple as Checkpoint Tags?
Let’s go back to the basics for a minute with a story. A colleague that I previously worked with left our company to run the LP department of a very small clothing retailer (5 stores). We had a chance to catch up a few weeks back and he was explaining how he was bringing his current company into the 21st century with security tech. He went on about the new HD camera systems, an updated POS, the addition of exception based reporting software and new training programs for the managers to be more familiar with LP procedures. He told me that his stores were still having shrink issues even with all those new pieces of tech in place. I had a simple question for him. How’s the clothing security program?
He stared at me, blankly for a minute. What do you mean, clothing security program? He quipped back after realizing he was staring out in space for a minute. I asked what EAS system the stores using, and what type of Checkpoint Tags were being used on the store’s product. He looked at me very pointedly and said that he had not realized until this very moment that his company and the department he was hired to lead was not using one of the most basic practices in retail to combat theft and shrink.
So we circle back around to getting back to the basics. EAS should not be a good thing to have. It shouldn’t be on your wish-list of nice things to have, nor should it be seen as un-necessary. If you operate a retail store, especially a clothing store, it is in your business’s best interest to install a descent system, even if it is one of the entry level models. Next, identify what product is being stolen and use the heck out of those Checkpoint Tags to secure them. I will bet that you will see a dramatic decrease in theft incidents and an overall increase in profitability.
Operating a clothing boutique will always present a unique challenge to the retailer. Not only do you have to contend with small margins and an every changing fashion scene, you will always have to deal with theft, both internal and external. Clothing security should be just as important to you as anything else in your store. By taking a small measure to secure your inventory, you are ensuring that it remains in stock for your customer to purchase. If that legitimate customer purchases it, your sales increase, as does your profitability, payroll…etc. Being in stock is one of the most vital parts of running a business. To think, you can accomplish all of this with a simple Checkpoint Tag.
For more information Clothing Security, contact us or call 1.770.426.0547
Library Security-3 , N10 Antenna-3
Who Actually Steals Library Books?
There are many reasons people come up with to justify the theft of library books. Some will steal books simply for the challenge of the act. They just want to see if they can get away with it. That token of their theft is a constant reminder of their success and they feed off of it. Some people will steal books in protest. They feel they have been wronged by the government, or perhaps the university that runs the library and that is one way they can “get back at them.” Students may even steal books from their school’s collection due to academic pressure to keep their peers from getting the research information for an important assignment. Others may actually steal books for their own personal collections. Library security has become a serious issue and it doesn’t look like it’s going to be declining any time soon. There are valuable resources kept in libraries and even some out of print editions that people have actually tried to steal so they can sell them on an online auction site.
Seventy percent of all public libraries surveyed recently report theft as their biggest problem. That’s a big surprise considering all the usual talk about budget cuts. One of the newest issues regarding library security is specifically in the genealogy room. These are the books that are kept to record the births and deaths of the people in the county, property records, and much more about the people of the town. These books are priceless for family research. Many generations will come to look at them and use them to find out about their own bloodlines and possibly even medical history. Sadly, these books can also be used by identity thieves. Remember, these books hold a lot of valuable information, like names and birthdays, that could be very helpful in filling out bogus credit card applications.
Many major institutions have had to resort to adding security guards, limiting the building exits, and electronic devices. Security guards cost a lot of money over time, and many older buildings were built with multiple exits in case of fire. An investment in an electronic detection system can be a saving grace for a public library to protect its valuable inventory. One example of an excellent system is the Checkpoint N10 Antenna. This system is very similar to the classic Checkpoint pedestals you see in department stores and grocers. The N10 Antenna has the same detection capabilities as its larger retail counterparts, but it is smaller and more compact so it does not detract from the professional look and atmosphere of a library. This system provides the library security by monitoring the books coming and going. If the Checkpoint tag inside a book has not been deactivated at the checkout desk, the N10 Antenna will alert the staff if a patron attempts to go out the door. The addition of this system is not to deter people from using the library; it is just meant to deter dishonest people from removing resources that are meant to be available for everyone. From the genealogy room, with its priceless records, to even the simple first books for children, the library should be able to keep a clear inventory of its possessions, and the N10 Antenna system is a new option for them to consider.
For more information about Library Protection, contact us or call: 1.770.426.0547
There are many reasons people come up with to justify the theft of library books. Some will steal books simply for the challenge of the act. They just want to see if they can get away with it. That token of their theft is a constant reminder of their success and they feed off of it. Some people will steal books in protest. They feel they have been wronged by the government, or perhaps the university that runs the library and that is one way they can “get back at them.” Students may even steal books from their school’s collection due to academic pressure to keep their peers from getting the research information for an important assignment. Others may actually steal books for their own personal collections. Library security has become a serious issue and it doesn’t look like it’s going to be declining any time soon. There are valuable resources kept in libraries and even some out of print editions that people have actually tried to steal so they can sell them on an online auction site.
Seventy percent of all public libraries surveyed recently report theft as their biggest problem. That’s a big surprise considering all the usual talk about budget cuts. One of the newest issues regarding library security is specifically in the genealogy room. These are the books that are kept to record the births and deaths of the people in the county, property records, and much more about the people of the town. These books are priceless for family research. Many generations will come to look at them and use them to find out about their own bloodlines and possibly even medical history. Sadly, these books can also be used by identity thieves. Remember, these books hold a lot of valuable information, like names and birthdays, that could be very helpful in filling out bogus credit card applications.
Many major institutions have had to resort to adding security guards, limiting the building exits, and electronic devices. Security guards cost a lot of money over time, and many older buildings were built with multiple exits in case of fire. An investment in an electronic detection system can be a saving grace for a public library to protect its valuable inventory. One example of an excellent system is the Checkpoint N10 Antenna. This system is very similar to the classic Checkpoint pedestals you see in department stores and grocers. The N10 Antenna has the same detection capabilities as its larger retail counterparts, but it is smaller and more compact so it does not detract from the professional look and atmosphere of a library. This system provides the library security by monitoring the books coming and going. If the Checkpoint tag inside a book has not been deactivated at the checkout desk, the N10 Antenna will alert the staff if a patron attempts to go out the door. The addition of this system is not to deter people from using the library; it is just meant to deter dishonest people from removing resources that are meant to be available for everyone. From the genealogy room, with its priceless records, to even the simple first books for children, the library should be able to keep a clear inventory of its possessions, and the N10 Antenna system is a new option for them to consider.
For more information about Library Protection, contact us or call: 1.770.426.0547