Only Eight Miles Away

 

Alpha Keepers-6, Protect Health and Beauty Products-1, Prevent Shoplifting-1
Only Eight Miles Away
I work for a small retail pharmacy and I have recently been transferred to a different location.  It’s only about eight miles from my previous store.  I have a long list of stuff to correct in this store, but one of my blue chips is utilizing Alpha Keepers.  I don’t know if it’s good or bad, but they have plenty of them already.  In fact, this store has a multitude of sealed boxes of Alpha Keepers upstairs in their loft.  I could build a small fort with them if I had the time.  Instead, I’ve been bringing them downstairs and installing them in many areas I used at my previous store.  I was in an inner city setting and now my store is out in the middle of nowhere.  The store setting is completely different, but considering boosters are our primary problem, the targets will still be the same.  
In our business, we must use Alpha Keepers to protect health and beauty products.  It’s what we specialize in selling other than the prescription drugs we dispense, so it’s imperative to be in stock on the additional items our customers and patients may be in need of.  We sell a lot of high retail stomach remedies and allergy medications that are very popular in the flea market setting.  The boosters are hired by the flea market vendors to come in and steal specific items they want for their booths.  They come in and wipe out entire sections of merchandise.  Sometimes we are fortunate enough to recognize their huge shoplifter bags they carry, or we realize what they are up to before they are able to escape.  More often, however, they come in and help themselves and create losses for the store.  The boosters get away many more times than they are caught, and they are paid pennies on the dollar for the actual value of the stolen items.  Yet, they keep coming back and keep stealing, taking the chances and hoping we don’t catch on.  None of our stores are immune to boosters, so I was really stunned to see that this store was not using the tools, like the Alpha Keepers, that were so readily available to them.
The staff is not new and they all act as though they want to prevent shoplifting.  I even found a note in the office that was written to the previous manager just a few weeks ago.  The assistant had noticed that a certain cold medication was being stolen on a regular basis.  She had a small stack of papers stapled together that were the records of what had been stolen in the last months.  A box or two was listed on each sheet.  But, other than the note, she had not acted on the issue she had discovered.  So when we received a truck a couple days ago, when I got those items out of the delivery boxes, I immediately encased them in Alpha Keepers before displaying them on the shelves in the cough and cold section.  I actually had to add them to that exact same item in my previous store.   That specific medicine is popular among teens for abuse.  Apparently, if you take enough of them the cough suppressant makes you high.  I’ll never understand how someone decided to try to take enough cold medicine to get a buzz, but I’m nobody’s judge.  I do know how to stop the theft of these particular boxes, and the answer is not hiding them behind the checkout counter.  All I need to do is lock them into Alpha Keepers and they will remain on the shelf until sold to an honest customer.  
For more information on what Alpha Keepers can do for you, contact us or call 1.770.426.0547 or Preventshopliftingloss.net

I work for a small retail pharmacy and I have recently been transferred to a different location. It’s only about eight miles from my previous store. I have a long list of stuff to correct in this store, but one of my blue chips is utilizing Alpha Keepers. I don’t know if it’s good or bad, but they have plenty of them already. In fact, this store has a multitude of sealed boxes of Alpha Keepers upstairs in their loft. I could build a small fort with them if I had the time. Instead, I’ve been bringing them downstairs and installing them in many areas I used at my previous store. I was in an inner city setting and now my store is out in the middle of nowhere. The store setting is completely different, but considering boosters are our primary problem, the targets will still be the same.  

In our business, we must use Alpha Keepers to protect health and beauty products. It’s what we specialize in selling other than the prescription drugs we dispense, so it’s imperative to be in stock on the additional items our customers and patients may be in need of. We sell a lot of high retail stomach remedies and allergy medications that are very popular in the flea market setting. The boosters are hired by the flea market vendors to come in and steal specific items they want for their booths. They come in and wipe out entire sections of merchandise. Sometimes we are fortunate enough to recognize their huge shoplifter bags they carry, or we realize what they are up to before they are able to escape. More often, however, they come in and help themselves and create losses for the store. The boosters get away many more times than they are caught, and they are paid pennies on the dollar for the actual value of the stolen items. Yet, they keep coming back and keep stealing, taking the chances and hoping we don’t catch on. None of our stores are immune to boosters, so I was really stunned to see that this store was not using the tools, like the Alpha Keepers, that were so readily available to them.

The staff is not new and they all act as though they want to prevent shoplifting. I even found a note in the office that was written to the previous manager just a few weeks ago. The assistant had noticed that a certain cold medication was being stolen on a regular basis. She had a small stack of papers stapled together that were the records of what had been stolen in the last months. A box or two was listed on each sheet.  But, other than the note, she had not acted on the issue she had discovered. So when we received a truck a couple days ago, when I got those items out of the delivery boxes, I immediately encased them in Alpha Keepers before displaying them on the shelves in the cough and cold section. I actually had to add them to that exact same item in my previous store. That specific medicine is popular among teens for abuse.  Apparently, if you take enough of them the cough suppressant makes you high. I’ll never understand how someone decided to try to take enough cold medicine to get a buzz, but I’m nobody’s judge. I do know how to stop the theft of these particular boxes, and the answer is not hiding them behind the checkout counter. All I need to do is lock them into Alpha Keepers and they will remain on the shelf until sold to an honest customer.  

For more information on what Alpha Keepers can do for you, contact us or call 1.770.426.0547 or Preventshopliftingloss.net

 

 

The Hidden Costs Of Not Conducting Employee Background Checks

Employee Background Checks – 3                                                                                       WC blog 07
pre-employment screening -4
The Hidden Costs Of Not Conducting Employee Background Checks
     Have you ever had to let an employee go after they have been caught stealing, or lying about something they had omitted on an application?  If you have had to let an employee go, have you ever asked yourself afterwards if there was something you should have caught on their application or during the interview process that could have prevented the hire in the first place?  Even an experienced hiring manager can overlook information on an application that might have raised a red flag about an applicant.  Employee Background Checks can be invaluable in making the right hiring decisions.
     There are many reasons businesses have to fill positions, sometimes it is due to growth, which is the best of all reasons.  Positions also open up because employees leave to seek opportunities elsewhere for personal reasons.  Unfortunately, positions frequently open up due to an employee who has been caught stealing, violating company policy or for falsifying an application.  Many times the employees in the last category could have been weeded out with a pre- employment screening.  Thorough employee background checks can include such things as criminal background checks, employment credit checks, motor vehicle records and even sex offender registries.  When a check confirms a problem exists, the hiring process can stop for that applicant and save a lot of problems for an employer down the road.
     One of the commonly overlooked expenses of running a business is the hiring process.  When an employer has to fill a position there is the expense of advertising, whether it is posted online or in a newspaper.  Someone’s time is required to review applications and schedule interviews, using time that might be better spent elsewhere in a business.  Larger companies have Human Resource personnel that may handle most of this, but I can tell you from experience, other store managers assist in the interview process.  Small businesses may have to rely on an office manager or even the owner/operator to handle all of the hiring functions.  If managers are focused on staffing, who is overseeing the operations critical to running the business?  Hiring is always going to take place, but how much hiring could be avoided if a strong pre-employment screening program was being utilized?
     Consider also that the hiring process does not end when the employee is hired and has accepted a position.  The new employee has to be properly trained for the new position they were hired to fill.  What costs are expended by businesses in training and development?  It doesn’t matter whether someone is hired to bag groceries or supervise a shift, that employee must be properly trained.  Failure on the part of an owner or manager to properly train a new employee has its own consequences.  So how much time and effort will be expended training that new employee?  That may depend on the job, the trainee and the quality of the trainer.  The bottom line is that it is still time and money that perhaps could be better spent elsewhere.
     If a company is filling a vacancy because an employee was caught stealing or committing fraud, what is THAT cost?  What did the employee take?  Was it cash, merchandise, or company property that was stolen? Even when the dishonest employee is caught and admits to theft, it can be difficult to be certain ALL theft was accounted for in the termination process.  Can an employer be certain the former employee will pay restitution? Did the employee defraud a customer?  Can that even be quantified in terms of loss of prestige for the business and the negative experience of the customer?  A pre-employment screening might be enough for a business to avoid that nightmare.   
     The process of hiring and staffing a business can be a drain on a business’s resources.  It requires time and money to recruit and train new employees.  If the wrong person is hired it can cost a business a lot more than time and money, it can result in lost merchandise, money and even reputation.  Using pre-employment screening and employee background checks can assist businesses in avoiding hiring pitfalls and protect the investment spent in the hiring process.  
For more information about employee background checks contact us or call 1.770.426.0547

Have you ever had to let an employee go after they have been caught stealing, or lying about something they had omitted on an application? If you have had to let an employee go, have you ever asked yourself afterwards if there was something you should have caught on their application or during the interview process that could have prevented the hire in the first place? Even an experienced hiring manager can overlook information on an application that might have raised a red flag about an applicant. Employee Background Checks can be invaluable in making the right hiring decisions.

There are many reasons businesses have to fill positions, sometimes it is due to growth, which is the best of all reasons. Positions also open up because employees leave to seek opportunities elsewhere for personal reasons. Unfortunately, positions frequently open up due to an employee who has been caught stealing, violating company policy or for falsifying an application. Many times the employees in the last category could have been weeded out with a pre- employment screening. Thorough employee background checks can include such things as criminal background checks, employment credit checks, motor vehicle records and even sex offender registries. When a check confirms a problem exists, the hiring process can stop for that applicant and save a lot of problems for an employer down the road.

One of the commonly overlooked expenses of running a business is the hiring process. When an employer has to fill a position there is the expense of advertising, whether it is posted online or in a newspaper. Someone’s time is required to review applications and schedule interviews, using time that might be better spent elsewhere in a business. Larger companies have Human Resource personnel that may handle most of this, but I can tell you from experience, other store managers assist in the interview process. Small businesses may have to rely on an office manager or even the owner/operator to handle all of the hiring functions. If managers are focused on staffing, who is overseeing the operations critical to running the business? Hiring is always going to take place, but how much hiring could be avoided if a strong pre-employment screening program was being utilized?

Consider also that the hiring process does not end when the employee is hired and has accepted a position. The new employee has to be properly trained for the new position they were hired to fill. What costs are expended by businesses in training and development? It doesn’t matter whether someone is hired to bag groceries or supervise a shift, that employee must be properly trained. Failure on the part of an owner or manager to properly train a new employee has its own consequences. So how much time and effort will be expended training that new employee? That may depend on the job, the trainee and the quality of the trainer. The bottom line is that it is still time and money that perhaps could be better spent elsewhere.

If a company is filling a vacancy because an employee was caught stealing or committing fraud, what is THAT cost? What did the employee take? Was it cash, merchandise, or company property that was stolen? Even when the dishonest employee is caught and admits to theft, it can be difficult to be certain ALL theft was accounted for in the termination process. Can an employer be certain the former employee will pay restitution? Did the employee defraud a customer? Can that even be quantified in terms of loss of prestige for the business and the negative experience of the customer? A pre-employment screening might be enough for a business to avoid that nightmare.   

The process of hiring and staffing a business can be a drain on a business’s resources. It requires time and money to recruit and train new employees. If the wrong person is hired it can cost a business a lot more than time and money, it can result in lost merchandise, money and even reputation. Using pre-employment screening and employee background checks can assist businesses in avoiding hiring pitfalls and protect the investment spent in the hiring process.  

For more information about employee background checks contact us or call 1.770.426.0547

 

Critical Care Of Mobile Medical Devices with Thunder Tag

Alpha Thunder Tag-4                                                                                                                     WC Blog 36
tablet theft-3
Critical Care Of Mobile Medical Devices with Thunder Tag
     I am going to start out by saying, “I am not a doctor and I don’t play one on tv”.  There is my dose of humor for the day, much better than having to take two aspirins and calling me in the morning.  Ok, I think I’m done for now.  Now for the real topic I wanted to discuss today, mobile devices and the increasing use of them in the medical field.  As the growth and use of mobile devices has exploded around the U.S. and the world, so it has also in the medical field.  More and more nurses and doctors are accessing medical records electronically, rather than having the older paper charts and clip boards.  Part of this stems from the federal government mandating the use of electronic health records (E.H.R.) in the health industry.  While the benefits include faster access to medical records, the ability to share medical history more quickly, improved accuracy and less risk of losing papers, there is an increased risk of losing devices.  The Alpha Thunder Tag can protect against tablet theft and ipad theft and the associated cost of losing them, be it the actual hardware or the potential for liability risk.
     The Alpha Thunder Tag is secured to a handheld device with an adhesive backing that attaches the Anti-Theft device to the back of the tablet or ipad.  The tag has a plunger built into it that presses against the back of the device and if the device is tampered with, the security device has a built in alarm that will sound.  Further protection is afforded if the building where the devices are being used has an electronic article surveillance system in place.  Should someone attempt to leave the building with a tablet that is protected by the tag the EAS antenna will sound alerting staff of the event.  If the 3 Alarm version of the Thunder Tag is used, not only will the antenna alarm, but the device itself will alarm as well.  
        Medical information is secure in electronic format, but like any other technology if a device were lost or stolen, there are no guarantees that information cannot be accessed by someone with the knowhow or ability to breach encryption or other safeguards.  What are the implications if patient medical records were to be accessed by unauthorized persons?  What could someone do if they had such private medical information?  Consideration must also be given to what other information is tied to a patient’s records?  Billing information?   A patient’s address? HIPAA laws were created to protect patient’s rights and privacy, so it seems to me that protecting the way the data is carried and shared is as important as the information itself.  The Alpha Thunder Tag can be used to prevent tablet theft by keeping the devices where they belong, in the confines of the medical building.
     Tablet theft isn’t the only issue, the size of tablets makes them easy to misplace.  In the hustle and activity of a busy hospital, a medical provider could easily place a tablet or ipad in a medical jacket pocket.  Once the work day is over, if it is forgotten about, the jacket may be worn home and with it the device in the pocket.  The Alpha Thunder Tag will set off an EAS antenna and alert the person who has forgotten about the device, reminding them to return it to charging station or desk where they are kept.
     Technology advances for hospitals and medical offices is improving the ability of medical providers to give care faster and more accurately with the use mobile devices.  This mobility also means increased opportunity for the loss or theft of tablets or ipads.  Alpha Technology Thunder Tags can provide the protection necessary to prevent these devices from leaving the building and creating potential liability issues.
For more information on Alpha Thunder Tags contact us or call 1.770.426.0547
      

I am going to start out by saying, “I am not a doctor and I don’t play one on tv”. There is my dose of humor for the day, much better than having to take two aspirins and calling me in the morning. Ok, I think I’m done for now. Now for the real topic I wanted to discuss today, mobile devices and the increasing use of them in the medical field. As the growth and use of mobile devices has exploded around the U.S. and the world, so it has also in the medical field. More and more nurses and doctors are accessing medical records electronically, rather than having the older paper charts and clip boards. Part of this stems from the federal government mandating the use of electronic health records (E.H.R.) in the health industry. While the benefits include faster access to medical records, the ability to share medical history more quickly, improved accuracy and less risk of losing papers, there is an increased risk of losing devices. The Alpha Thunder Tag can protect against tablet theft and ipad theft and the associated cost of losing them, be it the actual hardware or the potential for liability risk.

 

The Alpha Thunder Tag is secured to a handheld device with an adhesive backing that attaches the Anti-Theft device to the back of the tablet or ipad. The tag has a plunger built into it that presses against the back of the device and if the device is tampered with, the security device has a built in alarm that will sound. Further protection is afforded if the building where the devices are being used has an electronic article surveillance system in place. Should someone attempt to leave the building with a tablet that is protected by the tag the EAS antenna will sound alerting staff of the event. If the 3 Alarm version of the Thunder Tag is used, not only will the antenna alarm, but the device itself will alarm as well.  

 

Medical information is secure in electronic format, but like any other technology if a device were lost or stolen, there are no guarantees that information cannot be accessed by someone with the knowhow or ability to breach encryption or other safeguards. What are the implications if patient medical records were to be accessed by unauthorized persons? What could someone do if they had such private medical information? Consideration must also be given to what other information is tied to a patient’s records?  Billing information? A patient’s address? HIPAA laws were created to protect patient’s rights and privacy, so it seems to me that protecting the way the data is carried and shared is as important as the information itself. The Alpha Thunder Tag can be used to prevent tablet theft by keeping the devices where they belong, in the confines of the medical building.

 

Tablet theft isn’t the only issue, the size of tablets makes them easy to misplace. In the hustle and activity of a busy hospital, a medical provider could easily place a tablet or ipad in a medical jacket pocket. Once the work day is over, if it is forgotten about, the jacket may be worn home and with it the device in the pocket. The Alpha Thunder Tag will set off an EAS antenna and alert the person who has forgotten about the device, reminding them to return it to charging station or desk where they are kept.

 

Technology advances for hospitals and medical offices is improving the ability of medical providers to give care faster and more accurately with the use mobile devices. This mobility also means increased opportunity for the loss or theft of tablets or ipads. Alpha Technology Thunder Tags can provide the protection necessary to prevent these devices from leaving the building and creating potential liability issues.

 

For more information on Alpha Thunder Tags contact us or call 1.770.426.0547

      

 

S.A.Q – CHECKPOINT HARD TAGS

 

S.A.Q – CHECKPOINT HARD TAGS
I’m going to continue on with my “should ask questions” series. I think there is some great benefit to addressing some common questions that retailers just don’t ask with respect to product security. These are important questions to ask before settling on a strategy to minimize shoplifting. I’ve complied 5 simple questions that you should ask about Checkpoint hard tags, but you may not have thought of. 
1. Are checkpoint hard tags used exclusively on softlines product?
While the vast majority of retailers use EAS tags for apparel merchandise, they have value on hundreds of other products that may be a target for thieves. I’ve personally used these tags to secure hardline items like baseball gloves, pocket knives, sleeping bags and even fishing rods and reels. They are versatile enough to use on a wide assortment of merchandise, so don’t limit your field of vision to just apparel. 
2. What is the most effective method of tagging?
That is dependent on what you are tagging! When it comes to clothing such as t-shirts, dresses and shirts, I’ve found it most effective to use the EAS tag in the back of the neck. Be cautious on placement, making sure it’s through a seam. This way, you avoid potentially damaging the garment. For pants and denim jeans, I’ve found that passing the tag through the back pocket area is also effective. Always go with a visible spot and always try to stay in the seam. This way the thief knows the product is protected and you aren’t unintentionally damaging the product. 
3. What is source tagging?
If you have a great relationship (or you buy a lot) from your manufacturer/vendor, you can most likely have them source tag certain products. What that means is that the product will come from the source with an EAS tag or label already attached. This means that you don’t have to spend the payroll cost to do it yourself.
4. Can checkpoint hard tags be defeated by criminals?
Every tag can be defeated. That’s a fact of life that we must all live with. Checkpoint hard tags are stronger than most, but a determined criminal with the right set of tools can defeat the tag. It will stop an opportunistic thief. Remember that product protection should be seen as layers. Physical tags should only be one layer of that strategy. Customer service, your floor plan, and camera placement are all other factors that go into minimizing shrink. 
5. Will they make a difference? 
If used properly and as part of a larger strategy to combat shrink, yes, they will make a difference in your store. I’ll reiterate my point above. If you strategize to combat thieves is to slap a few EAS tags on product, you’re not going to be very effective at eliminating the root cause of the problem. If shoplifters are constantly targeting your store, it’s because they see you as a soft target. You need to take a multi-pronged approach if you want to have the most effective. 
For more information about Checkpoint hard tags, contact us or call 1.770.426.0547

I’m going to continue on with my “should ask questions” series. I think there is some great benefit to addressing some common questions that retailers just don’t ask with respect to product security. These are important questions to ask before settling on a strategy to minimize shoplifting. I’ve complied 5 simple questions that you should ask about Checkpoint hard tags, but you may not have thought of. 

1. Are checkpoint hard tags used exclusively on softlines product?

While the vast majority of retailers use EAS tags for apparel merchandise, they have value on hundreds of other products that may be a target for thieves. I’ve personally used these tags to secure hardline items like baseball gloves, pocket knives, sleeping bags and even fishing rods and reels. They are versatile enough to use on a wide assortment of merchandise, so don’t limit your field of vision to just apparel. 

2. What is the most effective method of tagging?

That is dependent on what you are tagging! When it comes to clothing such as t-shirts, dresses and shirts, I’ve found it most effective to use the EAS tag in the back of the neck. Be cautious on placement, making sure it’s through a seam. This way, you avoid potentially damaging the garment. For pants and denim jeans, I’ve found that passing the tag through the back pocket area is also effective. Always go with a visible spot and always try to stay in the seam. This way the thief knows the product is protected and you aren’t unintentionally damaging the product. 

3. What is source tagging?

If you have a great relationship (or you buy a lot) from your manufacturer/vendor, you can most likely have them source tag certain products. What that means is that the product will come from the source with an EAS tag or label already attached. This means that you don’t have to spend the payroll cost to do it yourself.

4. Can checkpoint hard tags be defeated by criminals?

Every tag can be defeated. That’s a fact of life that we must all live with. Checkpoint hard tags are stronger than most, but a determined criminal with the right set of tools can defeat the tag. It will stop an opportunistic thief. Remember that product protection should be seen as layers. Physical tags should only be one layer of that strategy. Customer service, your floor plan, and camera placement are all other factors that go into minimizing shrink. 

5. Will they make a difference? 

If used properly and as part of a larger strategy to combat shrink, yes, they will make a difference in your store. I’ll reiterate my point above. If you strategize to combat thieves is to slap a few EAS tags on product, you’re not going to be very effective at eliminating the root cause of the problem. If shoplifters are constantly targeting your store, it’s because they see you as a soft target. You need to take a multi-pronged approach if you want to have the most effective. 

For more information about Checkpoint hard tags, contact us or call 1.770.426.0547

 

 

No Clothing Alarm Can Mean An Invitation To Theft Rings

 

Clothing Security-4 , Security Tags On Clothes-2  ,Clothing Alarm-3
No Clothing Alarm Can Mean An Invitation To Theft Rings
Clothing theft rings are on the rise.  These groups are figuring out the best ways to get in and get out with a lot of stuff that is worth a lot of money.  If your store is not putting security tags on clothes, you may be next on one of these group’s agenda.  I’ve looked into two of these groups and the details of their cases are astounding.  These people are organized; they have the all the plans and logistics worked out before they ever start.  One group only had five people and the other had as many as sixteen working for them.  They did the research and figured out which stores had a clothing alarm in place and which ones had no type of clothing security at all.  
One group was a family, and the members were a mother, three of her adult children, and a brother-in-law.  They primarily went to small stores and specialty boutiques.  They primarily stole lingerie and accessories.  They would drive around, find these stores in strip malls, go in as a harmless looking family, and wipe them out.  When they gathered up enough merchandise they would have neighborhood yard sales.  They became very popular where they lived because of all the great deals they had.  Finally someone caught on and turned them in, but not before they amassed thousands of dollars’ worth of stolen goods in a storage facility.  Sadly, with little to help identify where the items came from, most of the merchandise was not returned to the stores that it.  
Security tags on clothes can be a more valuable addition than simply just a theft deterrent.  They can also be stamped with your store information for easy identification in the event there is a recovery.  They can be placed in obvious places, like price tags, or even sewn into hidden seams and pockets.  Until the clothing security tags have been deactivated, they will cause the clothing alarm to sound!  This is a big deal when you deal with the following type of theft ring.
This was the group that employed sixteen people at times.  Each member that entered the stores played a part and had an assigned task for the thefts to be successful.  First were the ones stuffing the bags.  They were given shopping lists and their jobs were to gather those items.  They were warned to not pick up anything that had a clothing security tag attached.  Next came the ones responsible for distracting the staff.  Just in case the first group raised any suspicions, the second group was to keep the employees busy with questions and random conversations.  Lastly came folks that were to actually remove the bags from the store.  If the clothing alarm sounded, the second group was to act casual and continue browsing while the last group made a run for it.  Other members would come back and pick them up later in a different vehicle.  This ring of people actually got away with tens of thousands worth of merchandise from several different locations.  They picked their stores based on ease of escape routes, and lack of clothing security.  They knew where they could be most successful.  They had a truck they drove around that advertised “Name Brands At Great Prices!”.  That truck is the reason they finally got caught.  They had a stolen license plate on it.  Thank goodness for dumb crooks.
For more information on clothing security, contact us or call 1.770.426.0547 or Clothingsecurity.net

Clothing theft rings are on the rise. These groups are figuring out the best ways to get in and get out with a lot of stuff that is worth a lot of money. If your store is not putting security tags on clothes, you may be next on one of these group’s agenda. I’ve looked into two of these groups and the details of their cases are astounding. These people are organized; they have all the plans and logistics worked out before they ever start. One group only had five people and the other had as many as sixteen working for them. They did the research and figured out which stores had a clothing alarm in place and which ones had no type of clothing security at all.  

One group was a family, and the members were a mother, three of her adult children, and a brother-in-law. They primarily went to small stores and specialty boutiques. They primarily stole lingerie and accessories. They would drive around, find these stores in strip malls, go in as a harmless looking family, and wipe them out. When they gathered up enough merchandise they would have neighborhood yard sales. They became very popular where they lived because of all the great deals they had. Finally someone caught on and turned them in, but not before they amassed thousands of dollars’ worth of stolen goods in a storage facility. Sadly, with little help to identify where the items came from, most of the merchandise was not returned to the stores.  

Security tags on clothes can be a more valuable addition than simply just a theft deterrent. They can also be stamped with your store information for easy identification in the event there is a recovery. They can be placed in obvious places, like price tags, or even sewn into hidden seams and pockets. Until the clothing security tags have been deactivated, they will cause the clothing alarm to sound! This is a big deal when you deal with the following type of theft ring.

This was the group that employed sixteen people at times. Each member that entered the stores played a part and had an assigned task for the thefts to be successful. First were the ones stuffing the bags. They were given shopping lists and their jobs were to gather those items. They were warned to not pick up anything that had a clothing security tag attached. Next came the ones responsible for distracting the staff. Just in case the first group raised any suspicions, the second group was to keep the employees busy with questions and random conversations. Lastly came folks that were to actually remove the bags from the store. If the clothing alarm sounded, the second group was to act casual and continue browsing while the last group made a run for it.  Other members would come back and pick them up later in a different vehicle. This ring of people actually got away with tens of thousands worth of merchandise from several different locations. They picked their stores based on ease of escape routes, and lack of clothing security. They knew where they could be most successful. They had a truck they drove around that advertised “Name Brands At Great Prices!”. That truck is the reason they finally got caught. They had a stolen license plate on it. Thank goodness for dumb crooks.

For more information on clothing security, contact us or call 1.770.426.0547 or Clothingsecurity.net

 

 

ALPHA VERSALOC MAKES DAMAGE PRODUCTS A SHOPLIFTERS WORST NIGHTMARE!

When it comes to the professional shoplifter, nothing thwarts their plans like products that they cannot turn a profit from. Let’s face reality; Amateur shoplifters steal for the opportunity. However professionals steal to make money! When it comes to ways to prevent shoplifting in your retail store, forcing thieves to damage your products before they can thieve them is a great way to circumvent the entire issue of theft. See, thieves often can’t resell the merchandise that they steal if the packages are breached or damaged.

Third party ‘lift consumers’ (those who buy and possess stolen merchandise) are just like the rest of us. When they buy something for their money they want a new, intact, undamaged product. They don’t want to pay for stuff that is less than desirable, period. This is the same premise as to why retailers have difficulty in reselling returned items with ‘opened item’ status in their stores, even at a steep discount. Consumers don’t ‘trust’ that the product contents are whole or even functional. In the World of the lift consumer, it’s no different. Thieves have a heck of a time selling items that they damage during their attempt the steal them. This is where the Alpha VersaLok can help.

Any thief worth their weight in gold knows that breaching or attempting to dismantle any type of security device usually results in a lot of unwanted attention. With that said, these awesome products by Alpha High Theft Solutions are perfect in the sense that it completely makes theft of the product impossible without doing one of two things. The first, triggering the integrated 95dB alarm inside the Alpha VersaLok to sound wildly causing embarrassment and attention from staff. Or secondly, causing the shoplifter to completely destroy the visual resale integrity of the packaging after the item is removed from the store. The latter mentioning is what’s known as a ‘denial of benefit’ device, much like exploding ink tags ruin products rendering them useless to thieves that plan to resell them.

The Alpha VersaLok works by adhering to a products flat surface using a special adhesive backing. The special backing contains a rather fragile aluminum circuit that once ripped; the flow of internal voltage is disrupted causing the alarm to sound excitedly. No matter what, shoplifters want the security device gone from the product and they’re going to attempt removal. Once the pilferer tries to peel the adhesive back off in an attempt to remove the unit, the alarm will sound. If the bandit doesn’t care if the alarm sounds because they have already removed the item from the store, they will still cause some degree of ‘damage’ to the packaging that the VersaLok was attached too. Albeit not a terrible degree of damage but probably just enough to make the product look less than new. Some crooks may even try to take a box cutter and carve out the unit and surrounding backing altogether. No thief wants to do this to ‘their’ product because no one wants to buy merchandise with holes in it!

Another way to prevent shoplifting in this sense is to incorporate the use of the Alpha Spider Wrap. This crafty anti-shoplifting device secures your merchandise much in the same way as the VersaLok does except in a broader manner. The Spider Wrap uses aircraft grade cables to literally ‘wrap’ completely around larger products. By clutching tightly around the entire product, the Alpha Spider Wrap protects it, as the metal cables would need to be cut in order to remove the unit from the package. Once the cables are cut, a 95dB alarm will sound and guess what? Thieves don’t like 95dB alarms. They’re a tad bit loud. It is indeed a pesky proposition for any crook. Just like the VersaLok, a shoplifter would have to literally destroy the box or packaging in order to completely circumvent having to but the cables. Either way it goes, whether using the Alpha Spider Wrap or the VersaLok, even a professional shoplifter is going to be highly inconvenienced or just flat out of luck trying to resell a damaged product.

For more information on how to prevent shoplifting please contact us or call 1-770-426-0547.