USE AUTO PEG TAGS TO PREVENT SWEEPING THEFT!

 

BF015
Stop shoplifting- 3
Auto peg tag- 3
Checkpoint hard tags-3
USE AUTO PEG TAGS TO PREVENT SWEEPING THEFT!
One of the most important means of recognizing ways to stop shoplifting in your store is to identify the types of shoplifters you have matriculating throughout your stores. I personally have come across many different faces in my days of Loss Prevention service. I’ve caught heart surgeons stealing sandwich bags. I’ve caught store managers tapping the store safes and tills. I’ve even apprehended a group of four ladies straight off of a church bus. All of them were seemingly mundane and harmless cases of opportunistic shoplifters. 
However there is a different waive of shoplifters that you must know about. The kind who are crafty, desperate and in the know. These are the kind of thieves that don’t really care about loss prevention personnel in the store or the fact that you have cameras all over the ceiling. They’re in it to get ‘bang’ for their ‘buck’ (or lack thereof since they’re stealing) by grabbing as much stuff as possible in one fell swoop. These are the kinds of shoplifters that will go mad when they encounter the Auto peg tag by Checkpoint systems! See, these particular types of Checkpoint hard tags deny the benefit of allowing the thief from ‘sweeping’ your peg displays clean of product. What I mean by ‘sweeping’ is by removing the entire contents of product from a single peg hook display, in order to conceal them for imminent theft.
Shoplifters can certainly still ‘sweep’ the peg hooks with the Auto peg tags affixed to the products in question but there is no doubt that getting that volume of secured product past the EAS (Electronic Article Surveillance) systems and out of your store, will prove to be utterly difficult. These wonderful little tags work by affixing to the tops of your smaller blister pack and peg hook products and providing the trigger needed to set off your EAS alarm system. More professional thieves will take arm loads (not just handfuls) of smaller expensive product. If they ‘sweep’ up an arm load of product with these clever Checkpoint hard tags on them, they will certainly find difficulty in moving enough of the tags to circumvent detection by the EAS pedestals at the front of the store.  A thief would have to quite literally take the time to remove every single last Checkpoint hard tag from each product swept from the peg hook. A major inconvenience and deterrent! If you want to stop shoplifting and keep product on your displays and into the hands of paying customers, these are the way to go.
The types of product these tags help secure are some of the most commonly targeted products by shoplifters. These include but are not limited to batteries, cosmetics, razor blades, condoms, ink cartridges, allergy medicines, diabetic testing strips, weight loss supplements, electronic toothbrushes and some cell phones. All of these items (and more) are often ‘swept’ from peg hooks by the arms loads and stolen from stores every day. At this very moment even, someone is cleaning off a peg full of batteries from a display and dumping them into bag or the bottom of an infant stroller. The benefit to thief is the ability to take a mass quantity of the same product at one time, then turn around and sell them on the black market for half price. All of the above named items command a decent retail price and beneficial targets for shoplifters looking to make a clean sweep and maximize their ‘take’.  Imagine what someone who ‘sweeps’ two dozen packs of batteries from a single peg hook would make? At an average of $6.00 per pack, the crook could make just shy of $75 (street price) for a half dozen. Pop a Checkpoint brand Auto peg tag on these items and that easy money dream is all over for the shoplifter. The thief would literally have to destroy the visual appeal of the product in order to remove the tags from them, rendering them virtually useless on the black market for resale!
For more information about the Auto peg tag, contact us or call 1-770-426-0547.

One of the most important means of recognizing ways to stop shoplifting in your store is to identify the types of shoplifters you have matriculating throughout your stores. I personally have come across many different faces in my days of Loss Prevention service. I’ve caught heart surgeons stealing sandwich bags. I’ve caught store managers tapping the store safes and tills. I’ve even apprehended a group of four ladies straight off of a church bus. All of them were seemingly mundane and harmless cases of opportunistic shoplifters. 

However there is a different waive of shoplifters that you must know about. The kind who are crafty, desperate and in the know. These are the kind of thieves that don’t really care about loss prevention personnel in the store or the fact that you have cameras all over the ceiling. They’re in it to get ‘bang’ for their ‘buck’ (or lack thereof since they’re stealing) by grabbing as much stuff as possible in one fell swoop. These are the kinds of shoplifters that will go mad when they encounter the Auto peg tag by Checkpoint systems! See, these particular types of Checkpoint hard tags deny the benefit of allowing the thief from ‘sweeping’ your peg displays clean of product. What I mean by ‘sweeping’ is by removing the entire contents of product from a single peg hook display, in order to conceal them for imminent theft.

Shoplifters can certainly still ‘sweep’ the peg hooks with the Auto peg tags affixed to the products in question but there is no doubt that getting that volume of secured product past the EAS (Electronic Article Surveillance) systems and out of your store, will prove to be utterly difficult. These wonderful little tags work by affixing to the tops of your smaller blister pack and peg hook products and providing the trigger needed to set off your EAS alarm system. More professional thieves will take arm loads (not just handfuls) of smaller expensive product. If they ‘sweep’ up an arm load of product with these clever Checkpoint hard tags on them, they will certainly find difficulty in moving enough of the tags to circumvent detection by the EAS pedestals at the front of the store.  A thief would have to quite literally take the time to remove every single last Checkpoint hard tag from each product swept from the peg hook. A major inconvenience and deterrent! If you want to stop shoplifting and keep product on your displays and into the hands of paying customers, these are the way to go.

The types of product these tags help secure are some of the most commonly targeted products by shoplifters. These include but are not limited to batteries, cosmetics, razor blades, condoms, ink cartridges, allergy medicines, diabetic testing strips, weight loss supplements, electronic toothbrushes and some cell phones. All of these items (and more) are often ‘swept’ from peg hooks by the arms loads and stolen from stores every day. At this very moment even, someone is cleaning off a peg full of batteries from a display and dumping them into a bag or the bottom of an infant stroller. The benefit to thief is the ability to take a mass quantity of the same product at one time, then turn around and sell them on the black market for half price. All of the above named items command a decent retail price and beneficial targets for shoplifters looking to make a clean sweep and maximize their ‘take’.  Imagine what someone who ‘sweeps’ two dozen packs of batteries from a single peg hook would make? At an average of $6.00 per pack, the crook could make just shy of $75 (street price) for a half dozen. Pop a Checkpoint brand Auto peg tag on these items and that easy money dream is all over for the shoplifter. The thief would literally have to destroy the visual appeal of the product in order to remove the tags from them, rendering them virtually useless on the black market for resale!

For more information about the Auto peg tag, contact us or call 1-770-426-0547.

 

 

Alpha Thunder Tags Terminate Medical Tablet Theft Temptations

 

Alpha Thunder Tag-4                                                                                                                           WC blog 37
Tablet Theft-3
ipad Theft-3
Alpha Thunder Tags Terminate Medical Tablet Theft Temptations
     Working in a medical facility or hospital, staff regularly handle confidential information.  Most data and personal information is now digitalized and accessed through computers, laptops and now handheld devices.  With this increased use of mobile technology, information security is increasingly at risk.  According to Kevin Page and Phillip Hampton consultants for the American Bar Association,   “On October 21, 2013, Alhambra, California-based AHMC Healthcare Inc. reported the theft of two unencrypted laptops containing the protected health information (“PHI”) of approximately 729,000 patients.” ( ABA Health eSource, Protecting PHI on Mobile Devices
Vol. 10 No. 3 Kevin Page, Waller, Nashville, TN, Phillip Hampton, LogicForce Consulting, LLC, Nashville, TN.)   As healthcare providers are moving away from paper records and increasing the use of portable devices to care for patients, it is important for data as well as the devices to be protected.   These devices include laptops, i-pads, tablets and even smartphones.  Technology has made it possible for medical professionals to access patient records with a few key strokes or a swipe of the finger.  Trying to find methods to protect devices can be difficult, but the Alpha Thunder Tag can provide the security you need.  Healthcare professionals have an obligation to protect the information of their patients and the tools they use to store and access that information.
     The Alpha Thunder Tag has electronic article surveillance built into it and if it passes through an EAS antenna, the antenna alarm will sound and alert staff to a possible theft or a forgotten device.  If someone attempts to remove a device there is a tamper alarm that will sound, again alerting staff to a possible theft of the unit.  The Thunder Tag does come in a 3 alarm version that sounds not only the antenna alarm if someone tried to exit with it, the alarm built into the device will also sound an alert.      
     I decided to do a little investigating of my own to see what information was available on data breaches in the healthcare industry.  I went to the U.S. Department of HHS to seek information.  The Department of Health and Human Services Office for Civil Rights website has a report titled “Breaches Affecting 500 or More Individuals”;  (https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf  In order to get the most accurate information available for this article, I applied the following filters: Dates from 1/1/2015 – 11/1/2015, for “Types of Breach” I included ” Hacking IT Incidents”, “Theft”,” Loss” and “Unknown”, for “Location” I only included “ Laptop” and  “Other Portable Devices”.)  For “The Type of Covered Entity” I used “Health Provider”.  With these filters I received a list of 39 reported incidents with a total of 464,166 “Individuals Affected”.  Bear in mind, this report only included breaches where 500 or more individuals were affected.  499 individuals affected or less are not included in the report from the DHHS.  If you don’t think that tablet theft or i-pad theft is a problem, it is my hope that these numbers may change your mind.  Security of these devices cannot be taken lightly. The Alpha Thunder Tag used with an Electronic Article Surveillance System can help you protect your portable laptops and mobile devices. 
     Thieves do not necessarily consider whether a tablet theft will result in gaining useful information.  The opportunist may take a laptop or i-pad simply because it is accessible. If a device is stolen and information is encrypted, sometimes the challenge to some criminals is to see if they can access information.  If successful they then have to decide what type of information they have and if they can use any of it.  Some hackers do what they do to see if it can be done and that’s all.  Unfortunately, if your office or practice is the victim of a tablet theft or i-pad theft, you can’t know what is being done with the information lost.  The liability risk for your practice is minimized when the Alpha Thunder Tag is used to protect against laptop, tablet, and i-pad theft.
     Don’t allow your mobile devices to go unprotected.  Limit the risk of losing your mobile devices and with them, patient information.  Look into the protection afforded you by investing in Alpha Thunder Tags.
For more information on the Alpha Thunder Tag, contact us or call 1.770.426.0547
     
     
     

Working in a medical facility or hospital, staff regularly handle confidential information. Most data and personal information is now digitalized and accessed through computers, laptops and now handheld devices. With this increased use of mobile technology, information security is increasingly at risk. According to Kevin Page and Phillip Hampton consultants for the American Bar Association, “On October 21, 2013, Alhambra, California-based AHMC Healthcare Inc. reported the theft of two unencrypted laptops containing the protected health information (“PHI”) of approximately 729,000 patients.” ( ABA Health eSource, Protecting PHI on Mobile DevicesVol. 10 No. 3 Kevin Page, Waller, Nashville, TN, Phillip Hampton, LogicForce Consulting, LLC, Nashville, TN.)  As healthcare providers are moving away from paper records and increasing the use of portable devices to care for patients, it is important for data as well as the devices to be protected.  These devices include laptops, i-pads, tablets and even smartphones. Technology has made it possible for medical professionals to access patient records with a few key strokes or a swipe of the finger. Trying to find methods to protect devices can be difficult, but the Alpha Thunder Tag can provide the security you need. Healthcare professionals have an obligation to protect the information of their patients and the tools they use to store and access that information.

The Alpha Thunder Tag has electronic article surveillance built into it and if it passes through an EAS antenna, the antenna alarm will sound and alert staff to a possible theft or a forgotten device. If someone attempts to remove a device there is a tamper alarm that will sound, again alerting staff to a possible theft of the unit. The Thunder Tag does come in a 3 alarm version that sounds not only the antenna alarm if someone tried to exit with it, the alarm built into the device will also sound an alert.      

I decided to do a little investigating of my own to see what information was available on data breaches in the healthcare industry. I went to the U.S. Department of HHS to seek information. The Department of Health and Human Services Office for Civil Rights website has a report titled “Breaches Affecting 500 or More Individuals” (https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf  In order to get the most accurate information available for this article, I applied the following filters: Dates from 1/1/2015 – 11/1/2015, for “Types of Breach” I included ” Hacking IT Incidents”, “Theft”,” Loss” and “Unknown”, for “Location” I only included “ Laptop” and  “Other Portable Devices”.)  For “The Type of Covered Entity” I used “Health Provider”.  With these filters I received a list of 39 reported incidents with a total of 464,166 “Individuals Affected”. Bear in mind, this report only included breaches where 500 or more individuals were affected. 499 individuals affected or less are not included in the report from the DHHS. If you don’t think that tablet theft or i-pad theft is a problem, it is my hope that these numbers may change your mind. Security of these devices cannot be taken lightly. The Alpha Thunder Tag used with an Electronic Article Surveillance System can help you protect your portable laptops and mobile devices. 

Thieves do not necessarily consider whether a tablet theft will result in gaining useful information. The opportunist may take a laptop or i-pad simply because it is accessible. If a device is stolen and information is encrypted, sometimes the challenge to some criminals is to see if they can access information. If successful they then have to decide what type of information they have and if they can use any of it. Some hackers do what they do to see if it can be done and that’s all. Unfortunately, if your office or practice is the victim of a tablet theft or i-pad theft, you can’t know what is being done with the information lost. The liability risk for your practice is minimized when the Alpha Thunder Tag is used to protect against laptop, tablet, and i-pad theft.

Don’t allow your mobile devices to go unprotected. Limit the risk of losing your mobile devices and with them, patient information. Look into the protection afforded you by investing in Alpha Thunder Tags.

For more information on the Alpha Thunder Tag, contact us or call 1.770.426.0547
     
     
     

 

Alpha Shark Tags Can Help You Avoid Holiday Return Fraud

 

Return Fraud-5                                                                                                                           WC blog 29
Alpha Shark tags-4
Alpha Shark Tags Can Help You Avoid Holiday Return Fraud
     Well, the holidays are coming to a close and a New Year is fast approaching.  Did you receive the gifts you were hoping for this Christmas?  Perhaps you celebrate another holiday with the exchange of gifts. Did you like everything you were given? We all hope that we make the right selections, especially when it comes to clothing.  We want to make family and friends happy, but clothing is one of those things that can be tricky to purchase.  In any case, not everyone will be happy with all of the gifts they receive and the return rush is going to happen.  You as the retailer are going to have mostly legitimate returns, but what about the attempts at return fraud that people are going to attempt to slip by on you?  In all those returns how do you pick the good from the bad?  It isn’t easy, but if you are using Alpha Shark Tags you will make it a little less difficult for your employees and managers to make those determinations.
     When applied to merchandise, primarily clothing, Alpha Shark Tags provide protection to the retailer against return fraud.  The tag is secured to clothing and unlike electronic article surveillance hard tags, it is not alarmed.  This tag works because it is NOT removed at the point of sale when purchased. Alpha Shark Tags remain on the article of clothing and is removed when the buyer gets the item home.   Stores should make clear to customers that if the tag is removed they will not be able to return the merchandise.  The customer can always try on the clothing in the store or at home with the tag on the garment to be sure it fits.  If the article of clothing does not fit, the store can allow a full credit return on the condition the tag is still intact.  
     There are several methods that those committing return fraud will use to try to make a fast buck.  One to be concerned with during the holidays is the attempt to return merchandise that doesn’t even come from that particular store.  In many instances this is an innocent attempt at returning merchandise but associates that take these items back cause shortage because the item cannot be resold.  If the store uses Shark tags and requires the tag to be on the clothing in order to return it, the cashier will have a good indicator that the item does belong to the store because the bright orange tag will stand out.  The shark tag will also serve to alert the cashier to check manufacturer tags to verify the item did not possibly come from another retailer who also uses the same tag but carries different brands.
     Another form of return fraud that is often seen around Christmas and New Year’s Eve is wardrobing fraud.  These fraudsters will purchase your party clothes, suits, dresses, ties and wear them to their parties and return the clothes afterwards.  The clothing tags are discreetly hidden or removed so the partier appears to have on a new outfit.  Alpha Shark Tags stand out with their color and have to be cut off in order to not be visible.  Properly placed so they can’t be hidden, the wardrober won’t be able to wear the garment without removing the tag.  You can save significant dollars by not taking back worn clothing that may have to be reduced in price or marked out of stock entirely.
   Alpha Shark tags won’t stop ALL attempts at return fraud but what they will stop is those who try to bring in merchandise that doesn’t belong to your business.  They will help you enforce your return policies by requiring the tags to be in place in order to return the items, just be sure to clearly state your return policies to your customers at your points of sale.
For more information on return fraud contact us or call 1.770.426.0547

Well, the holidays are coming to a close and a New Year is fast approaching. Did you receive the gifts you were hoping for this Christmas? Perhaps you celebrate another holiday with the exchange of gifts. Did you like everything you were given? We all hope that we make the right selections, especially when it comes to clothing. We want to make family and friends happy, but clothing is one of those things that can be tricky to purchase. In any case, not everyone will be happy with all of the gifts they receie and the return rush is going to happen. You as the retailer are going to have mostly legitimate returns, but what about the attempts at return fraud that people are going to attempt to slip by on you?  In all those returns how do you pick the good from the bad?  It isn’t easy, but if you are using Alpha Shark Tags you will make it a little less difficult for your employees and managers to make those determinations.

When applied to merchandise, primarily clothing, Alpha Shark Tags provide protection to the retailer against return fraud.  The tag is secured to clothing and unlike electronic article surveillance hard tags, it is not alarmed.  This tag works because it is NOT removed at the point of sale when purchased. Alpha Shark Tags remain on the article of clothing and is removed when the buyer gets the item home.   Stores should make clear to customers that if the tag is removed they will not be able to return the merchandise.  The customer can always try on the clothing in the store or at home with the tag on the garment to be sure it fits.  If the article of clothing does not fit, the store can allow a full credit return on the condition the tag is still intact.  

There are several methods that those committing return fraud will use to try to make a fast buck.  One to be concerned with during the holidays is the attempt to return merchandise that doesn’t even come from that particular store.  In many instances this is an innocent attempt at returning merchandise but associates that take these items back cause shortage because the item cannot be resold.  If the store uses Shark tags and requires the tag to be on the clothing in order to return it, the cashier will have a good indicator that the item does belong to the store because the bright orange tag will stand out.  The shark tag will also serve to alert the cashier to check manufacturer tags to verify the item did not possibly come from another retailer who also uses the same tag but carries different brands.

Another form of return fraud that is often seen around Christmas and New Year’s Eve is wardrobing fraud.  These fraudsters will purchase your party clothes, suits, dresses, ties and wear them to their parties and return the clothes afterwards.  The clothing tags are discreetly hidden or removed so the partier appears to have on a new outfit.  Alpha Shark Tags stand out with their color and have to be cut off in order to not be visible.  Properly placed so they can’t be hidden, the wardrober won’t be able to wear the garment without removing the tag.  You can save significant dollars by not taking back worn clothing that may have to be reduced in price or marked out of stock entirely.

Alpha Shark tags won’t stop ALL attempts at return fraud but what they will stop is those who try to bring in merchandise that doesn’t belong to your business.  They will help you enforce your return policies by requiring the tags to be in place in order to return the items, just be sure to clearly state your return policies to your customers at your points of sale.

For more information on return fraud contact us or call 1.770.426.0547