The Checkpoint Hard Tag: Transcending Visual Deterrence

 

JH Blog 02
(Checkpoint hard tag-5, EAS tag-3)
The Checkpoint Hard Tag: Transcending Visual Deterrence
Deterring theft is critical for any retailer to maximize profits in the current market, and visual deterrence is certainly the most common and effective form. Seeing Electronic Article Surveillance (EAS) alarms, and the tags that trip them attached to merchandise, is a fantastic way to deter your average shoplifter. Unfortunately, not every shoplifter is easily swayed from stealing your merchandise, and some shoplifters are seasoned criminals. Prolific shoplifters will break the norm in a number of ways. Most commonly they will target merchandise that is not usually tagged as well as bring tools along to remove EAS tags on the merchandise they are after. This is where the Checkpoint hard Tag comes in.
Many retailers carry more than just clothing, and losses can be staggering in areas ranging anywhere from sports equipment to high-end luggage to designer handbags. Much of this merchandise is impossible to attach a standard EAS tag to and it can be a hassle to do so. The Checkpoint hard tag solves numerous problems, including the struggle of application. The sleek design and multiple variations of the tags allow for easy attachment to a wide array of merchandise, while not compromising the look of the product to your customers.
 The next hurdle created for the would-be prolific shoplifter is the difficulty of removal. I have caught many shoplifters with incredibly lengthy records, and the vast majority of the “career shoplifters”, as we call them, were carrying tools on them, and the vast majority of the tools were specifically geared towards removing the common clothing article EAS tag. Just recently my team caught a woman who said she simply ordered an EAS magnetic tag remover on Amazon and decided to try her luck. Uncommon as they may be, the fact is, even big-time shoplifters are unprepared for the quality of the Checkpoint hard tag. Even when performing theft with the help of tools, it is very hard to remove, and this creates another strong barrier of protection for your merchandise: physical deterrence. Shoplifters are not taking their sweet time to steal from you. This is especially true in regards to experienced, career shoplifters. They know the best way to avoid getting caught is to be fast and to know what they want before coming in. An experienced criminal will not risk being caught and charged with theft by futilely attempting to remove a tag for a prolonged period of time, especially when they realize they brought the wrong tools for the job.
In the Loss Prevention world it is not uncommon to hear about Organized Retail Crime (ORC) groups, some going so far as to travel across the country hitting multiple locations of the same store that they know is vulnerable to their tactic, whatever it may be. The item that has recently received the most attention of the ORC groups that I have to deal with is the designer handbag, and it is an ideal item for a Checkpoint hard tag. Many ORC groups operate as tactfully as they possibly can, minimizing any risk of being apprehended and charged. After all, they make a living off of your losses. This is not to say that there aren’t ORC groups who throw caution to the wind with “grab and run” tactics, because that also happens, but why not be prepared for the group that is highly opportunistic? It is possible to deter some ORC groups before they even commit to hitting your store. If you and your merchandise are scoped out will you look like an easy target? Or will you be bypassed in favor of the less-prepared retailer?
There is no downside to adding an extra layer of protection to your merchandise.
For more information about Checkpoint Hard tags, contact us or call 1.770.426.0547

Deterring theft is critical for any retailer to maximize profits in the current market, and visual deterrence is certainly the most common and effective form. Seeing Electronic Article Surveillance (EAS) alarms, and the tags that trip them attached to merchandise, is a fantastic way to deter your average shoplifter. Unfortunately, not every shoplifter is easily swayed from stealing your merchandise, and some shoplifters are seasoned criminals. Prolific shoplifters will break the norm in a number of ways. Most commonly they will target merchandise that is not usually tagged as well as bring tools along to remove EAS tags on the merchandise they are after. This is where the Checkpoint hard Tag comes in.

 

Many retailers carry more than just clothing, and losses can be staggering in areas ranging anywhere from sports equipment to high-end luggage to designer handbags. Much of this merchandise is impossible to attach a standard EAS tag to and it can be a hassle to do so. The Checkpoint hard tag solves numerous problems, including the struggle of application. The sleek design and multiple variations of the tags allow for easy attachment to a wide array of merchandise, while not compromising the look of the product to your customers. 

 

The next hurdle created for the would-be prolific shoplifter is the difficulty of removal. I have caught many shoplifters with incredibly lengthy records, and the vast majority of the “career shoplifters”, as we call them, were carrying tools on them, and the vast majority of the tools were specifically geared towards removing the common clothing article EAS tag. Just recently my team caught a woman who said she simply ordered an EAS magnetic tag remover on Amazon and decided to try her luck. Uncommon as they may be, the fact is, even big-time shoplifters are unprepared for the quality of the Checkpoint hard tag. Even when performing theft with the help of tools, it is very hard to remove, and this creates another strong barrier of protection for your merchandise: physical deterrence. Shoplifters are not taking their sweet time to steal from you. This is especially true in regards to experienced, career shoplifters. They know the best way to avoid getting caught is to be fast and to know what they want before coming in. An experienced criminal will not risk being caught and charged with theft by futilely attempting to remove a tag for a prolonged period of time, especially when they realize they brought the wrong tools for the job.

 

In the Loss Prevention world it is not uncommon to hear about Organized Retail Crime (ORC) groups, some going so far as to travel across the country hitting multiple locations of the same store that they know is vulnerable to their tactic, whatever it may be. The item that has recently received the most attention of the ORC groups that I have to deal with is the designer handbag, and it is an ideal item for a Checkpoint hard tag. Many ORC groups operate as tactfully as they possibly can, minimizing any risk of being apprehended and charged. After all, they make a living off of your losses. This is not to say that there aren’t ORC groups who throw caution to the wind with “grab and run” tactics, because that also happens, but why not be prepared for the group that is highly opportunistic? It is possible to deter some ORC groups before they even commit to hitting your store. If you and your merchandise are scoped out will you look like an easy target? Or will you be bypassed in favor of the less-prepared retailer?

 

There is no downside to adding an extra layer of protection to your merchandise.

 

For more information about Checkpoint Hard tags, contact us or call 1.770.426.0547

 

 

GETTING BACK TO THE BASICS –CLOTHING SECURITY

 

GETTING BACK TO THE BASICS –CLOTHING SECURITY
It seems to me that more and more retailers are investing heavily in state of the art security measures. The world’s largest retailer is going through a major shift in the way they combat theft and they are investing millions to aid in that effort. Just look at one of those stores. The most noticeable difference to the average consumer is the new cameras and different placements in and around the buildings. They aren’t the only retailer to do this, either. Across the country, even small retailers are investing significant capital in high tech solutions to stop the proverbial bleeding in the shops. What if I told you that you didn’t need to spend thousands to accomplish the same goal? What if your solution is as simple as Checkpoint Tags? 
Let’s go back to the basics for a minute with a story. A colleague that I previously worked with left our company to run the LP department of a very small clothing retailer (5 stores). We had a chance to catch up a few weeks back and he was explaining how he was bringing his current company into the 21st century with security tech. He went on about the new HD camera systems, an updated POS, the addition of exception based reporting software and new training programs for the managers to be more familiar with LP procedures. He told me that his stores were still having shrink issues even with all those new pieces of tech in place. I had a simple question for him. How’s the clothing security program?
He stared at me, blankly for a minute. What do you mean, clothing security program? He quipped back after realizing he was staring out in space for a minute. I asked what EAS system the stores using, and what type of Checkpoint Tags were being used on the store’s product. He looked at me very pointedly and said that he had not realized until this very moment that his company and the department he was hired to lead was not using one of the most basic practices in retail to combat theft and shrink. 
So we circle back around to getting back to the basics. EAS should not be a good thing to have. It shouldn’t be on your wish-list of nice things to have, nor should it be seen as un-necessary. If you operate a retail store, especially a clothing store, it is in your business’s best interest to install a descent system, even if it is one of the entry level models. Next, identify what product is being stolen and use the heck out of those Checkpoint Tags to secure them. I will bet that you will see a dramatic decrease in theft incidents and an overall increase in profitability. 
Operating a clothing boutique will always present a unique challenge to the retailer. Not only do you have to contend with small margins and an every changing fashion scene, you will always have to deal with theft, both internal and external. Clothing security should be just as important to you as anything else in your store. By taking a small measure to secure your inventory, you are ensuring that it remains in stock for your customer to purchase. If that legitimate customer purchases it, your sales increase, as does your profitability, payroll…etc. Being in stock is one of the most vital parts of running a business. To think, you can accomplish all of this with a simple Checkpoint Tag. 
 
For more information Clothing Security, contact us or call 1.770.426.0547

It seems to me that more and more retailers are investing heavily in state of the art security measures. The world’s largest retailer is going through a major shift in the way they combat theft and they are investing millions to aid in that effort. Just look at one of those stores. The most noticeable difference to the average consumer is the new cameras and different placements in and around the buildings. They aren’t the only retailer to do this, either. Across the country, even small retailers are investing significant capital in high tech solutions to stop the proverbial bleeding in the shops. What if I told you that you didn’t need to spend thousands to accomplish the same goal? What if your solution is as simple as Checkpoint Tags

 

Let’s go back to the basics for a minute with a story. A colleague that I previously worked with left our company to run the LP department of a very small clothing retailer (5 stores). We had a chance to catch up a few weeks back and he was explaining how he was bringing his current company into the 21st century with security tech. He went on about the new HD camera systems, an updated POS, the addition of exception based reporting software and new training programs for the managers to be more familiar with LP procedures. He told me that his stores were still having shrink issues even with all those new pieces of tech in place. I had a simple question for him. How’s the clothing security program?

 

He stared at me, blankly for a minute. What do you mean, clothing security program? He quipped back after realizing he was staring out in space for a minute. I asked what EAS system the stores using, and what type of Checkpoint Tags were being used on the store’s product. He looked at me very pointedly and said that he had not realized until this very moment that his company and the department he was hired to lead was not using one of the most basic practices in retail to combat theft and shrink. 

 

So we circle back around to getting back to the basics. EAS should not be a good thing to have. It shouldn’t be on your wish-list of nice things to have, nor should it be seen as un-necessary. If you operate a retail store, especially a clothing store, it is in your business’s best interest to install a descent system, even if it is one of the entry level models. Next, identify what product is being stolen and use the heck out of those Checkpoint Tags to secure them. I will bet that you will see a dramatic decrease in theft incidents and an overall increase in profitability. 

 

Operating a clothing boutique will always present a unique challenge to the retailer. Not only do you have to contend with small margins and an every changing fashion scene, you will always have to deal with theft, both internal and external. Clothing security should be just as important to you as anything else in your store. By taking a small measure to secure your inventory, you are ensuring that it remains in stock for your customer to purchase. If that legitimate customer purchases it, your sales increase, as does your profitability, payroll…etc. Being in stock is one of the most vital parts of running a business. To think, you can accomplish all of this with a simple Checkpoint Tag.   

 

For more information Clothing Security, contact us or call 1.770.426.0547

 

 

Who Actually Steals Library Books?

 

Library Security-3 , N10 Antenna-3
Who Actually Steals Library Books?
There are many reasons people come up with to justify the theft of library books.  Some will steal books simply for the challenge of the act.  They just want to see if they can get away with it.  That token of their theft is a constant reminder of their success and they feed off of it.  Some people will steal books in protest.  They feel they have been wronged by the government, or perhaps the university that runs the library and that is one way they can “get back at them.”  Students may even steal books from their school’s collection due to academic pressure to keep their peers from getting the research information for an important assignment.  Others may actually steal books for their own personal collections.  Library security has become a serious issue and it doesn’t look like it’s going to be declining any time soon.  There are valuable resources kept in libraries and even some out of print editions that people have actually tried to steal so they can sell them on an online auction site.  
Seventy percent of all public libraries surveyed recently report theft as their biggest problem.  That’s a big surprise considering all the usual talk about budget cuts.  One of the newest issues regarding library security is specifically in the genealogy room.  These are the books that are kept to record the births and deaths of the people in the county, property records, and much more about the people of the town.  These books are priceless for family research.  Many generations will come to look at them and use them to find out about their own bloodlines and possibly even medical history.  Sadly, these books can also be used by identity thieves.  Remember, these books hold a lot of valuable information, like names and birthdays, that could be very helpful in filling out bogus credit card applications.  
Many major institutions have had to resort to adding security guards, limiting the building exits, and electronic devices.  Security guards cost a lot of money over time, and many older buildings were built with multiple exits in case of fire.  An investment in an electronic detection system can be a saving grace for a public library to protect its valuable inventory.  One example of an excellent system is the Checkpoint N10 Antenna.  This system is very similar to the classic Checkpoint pedestals you see in department stores and grocers.  The N10 Antenna has the same detection capabilities as its larger retail counterparts, but it is smaller and more compact so it does not detract from the professional look and atmosphere of a library.  This system provides the library security by monitoring the books coming and going.  If the Checkpoint tag inside a book has not been deactivated at the checkout desk, the N10 Antenna will alert the staff if a patron attempts to go out the door. The addition of this system is not to deter people from using the library; it is just meant to deter dishonest people from removing resources that are meant to be available for everyone.   From the genealogy room, with its priceless records, to even the simple first books for children, the library should be able to keep a clear inventory of its possessions, and the N10 Antenna system is a new option for them to consider.
For more information about Library Protection, contact us or call: 1.770.426.0547

There are many reasons people come up with to justify the theft of library books. Some will steal books simply for the challenge of the act. They just want to see if they can get away with it. That token of their theft is a constant reminder of their success and they feed off of it. Some people will steal books in protest. They feel they have been wronged by the government, or perhaps the university that runs the library and that is one way they can “get back at them.” Students may even steal books from their school’s collection due to academic pressure to keep their peers from getting the research information for an important assignment. Others may actually steal books for their own personal collections. Library security has become a serious issue and it doesn’t look like it’s going to be declining any time soon. There are valuable resources kept in libraries and even some out of print editions that people have actually tried to steal so they can sell them on an online auction site.  

Seventy percent of all public libraries surveyed recently report theft as their biggest problem. That’s a big surprise considering all the usual talk about budget cuts. One of the newest issues regarding library security is specifically in the genealogy room. These are the books that are kept to record the births and deaths of the people in the county, property records, and much more about the people of the town. These books are priceless for family research. Many generations will come to look at them and use them to find out about their own bloodlines and possibly even medical history. Sadly, these books can also be used by identity thieves. Remember, these books hold a lot of valuable information, like names and birthdays, that could be very helpful in filling out bogus credit card applications.  

Many major institutions have had to resort to adding security guards, limiting the building exits, and electronic devices. Security guards cost a lot of money over time, and many older buildings were built with multiple exits in case of fire. An investment in an electronic detection system can be a saving grace for a public library to protect its valuable inventory. One example of an excellent system is the Checkpoint N10 Antenna. This system is very similar to the classic Checkpoint pedestals you see in department stores and grocers. The N10 Antenna has the same detection capabilities as its larger retail counterparts, but it is smaller and more compact so it does not detract from the professional look and atmosphere of a library. This system provides the library security by monitoring the books coming and going. If the Checkpoint tag inside a book has not been deactivated at the checkout desk, the N10 Antenna will alert the staff if a patron attempts to go out the door. The addition of this system is not to deter people from using the library; it is just meant to deter dishonest people from removing resources that are meant to be available for everyone. From the genealogy room, with its priceless records, to even the simple first books for children, the library should be able to keep a clear inventory of its possessions, and the N10 Antenna system is a new option for them to consider.

For more information about Library Protection, contact us or call: 1.770.426.0547

 

 

“Prom”inent Placement Of Alpha Shark Tags Prevents Return Fraud

 

Alpha Shark Tags-5                                                                                                                     WC Blog 66
Return Fraud-3
Wardrobing-5
“Prom”inent Placement Of Alpha Shark Tags Prevents Return Fraud
     Not too long from now it will be Spring and with Spring comes prom time!  Young men and women will be out buying new dresses and suits or tuxedos.  New shoes will be in order as well, ensuring the entire ensemble is perfect for that big night.  I did some price checking and it seems if a young lady wants to purchase a prom dress, she will spend anywhere from $35.00 to over $500.00.  Renting a prom dress appears to start around $100.00 and goes up.  One web site advertised women’s prom shoes for sale ranging from $20.00 – $179.00.  Tuxedo prices varied with pieces starting around $30 for a vest and separate items such as jackets, slacks, and accessories being priced individually.  I got the impression I could put together a tuxedo on the low end for about $100.00, accounting for sales and discounts. Now if you are the retailer selling to the prom goers, you can already hear that cash register beeping as your merchandise flies off the shelf.  My question for you is, after the proms are over, will you be handing out refunds for the customers who have “changed their minds?” How can you prevent this from happening?  One sure method to prevent this type of return fraud, also known as wardrobing, is to start using Alpha Shark Tags on your merchandise.  
     The Alpha Shark Tags work because they are designed to be attached to clothing and removed only when the buyer is ready to wear the item to their function.  Once removed, this device cannot be reattached. The retailer can have their return policy clearly stipulate that merchandise that no longer has the Alpha Shark Tags attached cannot be returned or refunded.  What many who are involved in wardrobing like to do is to wear a new outfit after carefully removing tags or hiding them in the clothing.  When they have worn the outfit a time or two they return it for a refund.  It allows them to be seen out in their expensive new digs and they don’t have to pay a rental fee.  The person who is wardrobing gets all the reward with no cost. The Shark Tag is placed by the retailer on the clothing item where it is easily visible and cannot be covered or hidden.  It is brightly colored so it will be easily seen by the very people the wardrober is trying to impress.  Of course this makes it obvious the party guy or gal did not “buy” the clothing and they intend to return it later…party faux pas! Using the Alpha Shark Tags allows the store owner to make sure they are not in the business of “loaning” their merchandise out.  It also means that returned clothing will not be stained from food and drink spills causing the store owner to have to take a loss by marking the returns out of stock.
     Wardrobing tags don’t have to be limited to use strictly on slacks, jackets or dresses.  The tags can be pinned through a shoe eyelet, around an attached toe strap on a heel or through the hole that is used for a shoe clasp.  Being creative, the tags can be attached to belts, purses and other items that might accessorize that prom outfit. The keys to successfully stop return fraud are to ensure the tags are in a prominent location and that a no return policy without the tags is clearly stated and enforced.
     Return fraud can significantly hurt the profitability of your store.  Know that there are people who do not worry about the harm caused by their wardrobing.  Don’t let these people make you their victim during the prom season or any other time of the year.  Protect your business and profits by using Alpha Shark Tags.
For more information on Alpha Shark Tags, contact us or call 1.770.426.0547

Not too long from now it will be Spring and with Spring comes prom time! Young men and women will be out buying new dresses and suits or tuxedos. New shoes will be in order as well, ensuring the entire ensemble is perfect for that big night. I did some price checking and it seems if a young lady wants to purchase a prom dress, she will spend anywhere from $35.00 to over $500.00. Renting a prom dress appears to start around $100.00 and goes up. One web site advertised women’s prom shoes for sale ranging from $20.00 – $179.00. Tuxedo prices varied with pieces starting around $30 for a vest and separate items such as jackets, slacks, and accessories being priced individually. I got the impression I could put together a tuxedo on the low end for about $100.00, accounting for sales and discounts. Now if you are the retailer selling to the prom goers, you can already hear that cash register beeping as your merchandise flies off the shelf. My question for you is, after the proms are over, will you be handing out refunds for the customers who have “changed their minds?” How can you prevent this from happening? One sure method to prevent this type of return fraud, also known as wardrobing, is to start using Alpha Shark Tags on your merchandise.  

 

The Alpha Shark Tags work because they are designed to be attached to clothing and removed only when the buyer is ready to wear the item to their function. Once removed, this device cannot be reattached. The retailer can have their return policy clearly stipulate that merchandise that no longer has the Alpha Shark Tags attached cannot be returned or refunded. What many who are involved in wardrobing like to do is to wear a new outfit after carefully removing tags or hiding them in the clothing. When they have worn the outfit a time or two they return it for a refund. It allows them to be seen out in their expensive new digs and they don’t have to pay a rental fee.  The person who is wardrobing gets all the reward with no cost. The Shark Tag is placed by the retailer on the clothing item where it is easily visible and cannot be covered or hidden.  It is brightly colored so it will be easily seen by the very people the wardrober is trying to impress. Of course this makes it obvious the party guy or gal did not “buy” the clothing and they intend to return it later…party faux pas! Using the Alpha Shark Tags allows the store owner to make sure they are not in the business of “loaning” their merchandise out. It also means that returned clothing will not be stained from food and drink spills causing the store owner to have to take a loss by marking the returns out of stock.

 

Wardrobing tags don’t have to be limited to use strictly on slacks, jackets or dresses. The tags can be pinned through a shoe eyelet, around an attached toe strap on a heel or through the hole that is used for a shoe clasp. Being creative, the tags can be attached to belts, purses and other items that might accessorize that prom outfit. The keys to successfully stop return fraud are to ensure the tags are in a prominent location and that a no return policy without the tags is clearly stated and enforced.

 

Return fraud can significantly hurt the profitability of your store. Know that there are people who do not worry about the harm caused by their wardrobing. Don’t let these people make you their victim during the prom season or any other time of the year. Protect your business and profits by using Alpha Shark Tags.

For more information on Alpha Shark Tags, contact us or call 1.770.426.0547

 

 

50 PRODUCTS THAT SHOULD BE PROTECTED WITH CHECKPOINT LABELS – PT1

 

50 PRODUCTS THAT SHOULD BE PROTECTED WITH CHECKPOINT LABELS – PT1
Sometimes, as a retailer, it’s hard to keep up with what’s being stolen and how to prevent it, while you are trying to run your store. You’ve got customers to contend with, you have to haggle with vendors and suppliers to keep costs down and you have to ensure that your team is running in top shape, delivering exceptional service to your customers so your doors can remain open. Wouldn’t it be nice if someone put together a list of all the items in your store that are most susceptible to loss, AND listed way to help deter those losses? It must be your lucky day. I’ve scoured the globe in search of the most commonly stolen items and I present to you 100 different products that are stolen from your store, and the type of EAS Label you should be using to stop it!
1. Cheese
Did you know that cheese is the most commonly shoplifted item in the entire world? Cheese is readily available almost anywhere. There are also some variety of cheeses that are so exclusive, they can set you back a car payment, or two. Checkpoint Labels can make an ideal theft deterrent solution if your grocery store is being targeted by a cheese bandit. The super adhesive backing can attach, without harm to the product, and give superb protection to keep your profits in house. 
2. Steaks
Ah yes, another commonly stolen grocery item that is often overlooked. My local police department runs a “dumbest criminal” section pretty often, and it seems like more and more, the criminals are people who are stealing steaks. Think about it and you’ll understand. These are high priced cuts of meat. In any other retail store, an item priced that high will usually have some form of protection; but we don’t often see that in a grocery store. Steaks are easily concealable and a thief can net a pretty big haul in a short amount of time. It would only make sense to use Checkpoint Labels to protect your steaks. 
3. Berries
Think really hard about this question. When is the last time that you paid attention to the price you paid for a container or blueberries, or raspberries? Last Saturday, I bought a container of blueberries (6oz) and it ran me almost $7. That’s crazy. As I was pondering my life choices to eat healthier, while standing in line to give half my monthly salary away for berries, I wondered just how many people slip these in their purse, or backpack. I can’t ever recall seeing EAS labels attached to these items. I bet it happens more frequently that you would think. Yet, another perfect opportunity to use Checkpoint Labels. 
4. Mushrooms
When I say mushrooms, I’m not referring to the $1.99 pack of sliced mushrooms that are readily available. Any decent supermarket or specialty grocer should stock a hearty selection of premium mushrooms. I’ve seen some types go for upwards of $200/lb. I could not imagine needing that for a recipe. The price alone would open this item up to theft, which makes it another perfect candidate for a good quality EAS label.  
5. Fish
Fish is another piece of high priced protein that should always be protected with a Checkpoint Label. Depending on the species and of course the freshness, I’ve seen filets in my local grocery store sell upwards of $30. I’d much rather catch my own, but that’s for another time. When packaged individually, and open for anyone to grab, they can be easily concealed in a purse or even down the front of ones pants… Yes, I’ve seen it. You don’t want to, so be sure to use quality Checkpoint Labels to prevent your fish from swimming upstream without being purchased!
For more information about Checkpoint Labels, contact us or call 1.770.426.0547

Sometimes, as a retailer, it’s hard to keep up with what’s being stolen and how to prevent it, while you are trying to run your store. You’ve got customers to contend with, you have to haggle with vendors and suppliers to keep costs down and you have to ensure that your team is running in top shape, delivering exceptional service to your customers so your doors can remain open. Wouldn’t it be nice if someone put together a list of all the items in your store that are most susceptible to loss, AND listed way to help deter those losses? It must be your lucky day. I’ve scoured the globe in search of the most commonly stolen items and I present to you 100 different products that are stolen from your store, and the type of EAS Label you should be using to stop it!

 

1. Cheese

Did you know that cheese is the most commonly shoplifted item in the entire world? Cheese is readily available almost anywhere. There are also some variety of cheeses that are so exclusive, they can set you back a car payment, or two. Checkpoint Labels can make an ideal theft deterrent solution if your grocery store is being targeted by a cheese bandit. The super adhesive backing can attach, without harm to the product, and give superb protection to keep your profits in house. 

 

2. Steaks

Ah yes, another commonly stolen grocery item that is often overlooked. My local police department runs a “dumbest criminal” section pretty often, and it seems like more and more, the criminals are people who are stealing steaks. Think about it and you’ll understand. These are high priced cuts of meat. In any other retail store, an item priced that high will usually have some form of protection; but we don’t often see that in a grocery store. Steaks are easily concealable and a thief can net a pretty big haul in a short amount of time. It would only make sense to use Checkpoint Labels to protect your steaks. 

 

3. Berries

Think really hard about this question. When is the last time that you paid attention to the price you paid for a container or blueberries, or raspberries? Last Saturday, I bought a container of blueberries (6oz) and it ran me almost $7. That’s crazy. As I was pondering my life choices to eat healthier, while standing in line to give half my monthly salary away for berries, I wondered just how many people slip these in their purse, or backpack. I can’t ever recall seeing EAS labels attached to these items. I bet it happens more frequently that you would think. Yet, another perfect opportunity to use Checkpoint Labels. 

4. Mushrooms

When I say mushrooms, I’m not referring to the $1.99 pack of sliced mushrooms that are readily available. Any decent supermarket or specialty grocer should stock a hearty selection of premium mushrooms. I’ve seen some types go for upwards of $200/lb. I could not imagine needing that for a recipe. The price alone would open this item up to theft, which makes it another perfect candidate for a good quality EAS label.  

5. Fish

Fish is another piece of high priced protein that should always be protected with a Checkpoint Label. Depending on the species and of course the freshness, I’ve seen filets in my local grocery store sell upwards of $30. I’d much rather catch my own, but that’s for another time. When packaged individually, and open for anyone to grab, they can be easily concealed in a purse or even down the front of ones pants… Yes, I’ve seen it. You don’t want to, so be sure to use quality Checkpoint Labels to prevent your fish from swimming upstream without being purchased!

For more information about Checkpoint Labels, contact us or call 1.770.426.0547

 

 

OPPORTUNITIES FOR TABLET THEFT

OPPORTUNITIES FOR TABLET THEFT
There isn’t a place I go that I do not bring my tablet. Since these things hit the market, I have not found a better, more efficient way to get my work done. I have the power of the Internet, a camera, video camera, word processor and so much more, on one tiny, transportable device. It has truly revolutionized the way we use personal computers. It is also revolutionizing entire swaths of business and industries. Take the medical field for example. Just a few years ago, doctors and nurses were charting completely by hand. Doctors would take notes on a tape recorder. There were services that a doctor could call and dictate his charting to and a skilled typist would record them for him. With the prevalence of tablets, those things are but a distant memory. One thing that has also risen from this rush of new technology is the growing trend of tablet theft, and the use of Alpha Thunder Tags to stop this trend. 
Walk into any hospital today and you will see almost every doctor, nurse and support staff carrying a tablet. Patient records are becoming more and more centralized, which makes it easier to treat the patient and more efficient for the hospital. With all that technology in place, what types of risks are there when looking at this from a risk/loss perspective? Plenty.
Some people are opportunistic thieves, meaning that given the right set of circumstances and the idea that they will get away with the crime, they will commit it. Most shoplifters see theft as a victimless crime, although there is much to be said on that, but I’ll leave that for another time. So what if a shoplifter breaks their arm and has to go to the hospital? What if they see an unattended tablet, left in the hallways by a naive nurse? Chances are, they will steal it. That is, unless your equipment is protected with an Alpha Thunder Tag. 
When combined with an N10 Antenna system, Thunder Tags can be a simple, effective and cost efficient solution to what could be a costly problem. Not only can a thief get their hands on a tablet, think of the confidential patient data that it most likely contains, and the resulting lawsuits that could arise, should you fail to protect this data. 
What are Alpha Thunder Tags?
These tags are well known in the retail industry. In fact, they are the standard in companies that want to protect their assets. These small tags can be directly attached a tablet. Think of them as the same as those little tags you see in almost every store. You couple these tags with the N10 antenna and what you have is a system that will just about eliminate the potential of tablet theft. 
The N10 antenna is smaller version of the towers you see when you walk into any retail store. If the alpha thunder tag passes through this gateway, an audible and visual alert sounds; meaning someone can not simply walk out with a tablet without being caught, just as someone can’t walk out of a retail store with merchandise without being caught. This can almost eliminate the possibility of tablet theft in your hospital. 
The biggest difference here is that the N10 antenna is incredibly small. In fact, once it is deployed, it is almost impossible to see, unless you are looking for it. These were designed for small convenience type stores, with space constraints in mind. 
Are they other solutions?
Of course there are, but why spend thousands of dollars when you can literally spend a tiny fraction of that using Alpha Thunder Tags? If they are good enough for some of the world’s leading retailers, why wouldn’t they be good for you? Tablet theft is an ever growing concern for hospitals and doctor’s offices nationwide, and I’ve seen a plethora of tactics used to combat it. So far, I’ve not seen a system as user friendly, easy to set up and maintain, and as cost effective as this one. Even the largest firms have budgets to maintain, and this solution allows you to do just that, all while protecting your equipment and your patients’ peace of mind. 
For more information about Alpha Thunder Tags, contact us or call 1.770.426.0547

There isn’t a place I go that I do not bring my tablet. Since these things hit the market, I have not found a better, more efficient way to get my work done. I have the power of the Internet, a camera, video camera, word processor and so much more, on one tiny, transportable device. It has truly revolutionized the way we use personal computers. It is also revolutionizing entire swaths of business and industries. Take the medical field for example. Just a few years ago, doctors and nurses were charting completely by hand. Doctors would take notes on a tape recorder. There were services that a doctor could call and dictate his charting to and a skilled typist would record them for him. With the prevalence of tablets, those things are but a distant memory. One thing that has also risen from this rush of new technology is the growing trend of tablet theft, and the use of Alpha Thunder Tags to stop this trend. 

 

Walk into any hospital today and you will see almost every doctor, nurse and support staff carrying a tablet. Patient records are becoming more and more centralized, which makes it easier to treat the patient and more efficient for the hospital. With all that technology in place, what types of risks are there when looking at this from a risk/loss perspective? Plenty.

 

Some people are opportunistic thieves, meaning that given the right set of circumstances and the idea that they will get away with the crime, they will commit it. Most shoplifters see theft as a victimless crime, although there is much to be said on that, but I’ll leave that for another time. So what if a shoplifter breaks their arm and has to go to the hospital? What if they see an unattended tablet, left in the hallways by a naive nurse? Chances are, they will steal it. That is, unless your equipment is protected with an Alpha Thunder Tag. 

 

When combined with an N10 antenna, Thunder Tags can be a simple, effective and cost efficient solution to what could be a costly problem. Not only can a thief get their hands on a tablet, think of the confidential patient data that it most likely contains, and the resulting lawsuits that could arise, should you fail to protect this data. 

 

What are Alpha Thunder Tags?

These tags are well known in the retail industry. In fact, they are the standard in companies that want to protect their assets. These small tags can be directly attached a tablet. Think of them as the same as those little tags you see in almost every store. You couple these tags with the N10 antenna and what you have is a system that will just about eliminate the potential of tablet theft. 


The N10 antenna is smaller version of the towers you see when you walk into any retail store. If the Alpha Thunder Tag passes through this gateway, an audible and visual alert sounds; meaning someone can not simply walk out with a tablet without being caught, just as someone can’t walk out of a retail store with merchandise without being caught. This can almost eliminate the possibility of tablet theft in your hospital. 


The biggest difference here is that the N10 antenna is incredibly small. In fact, once it is deployed, it is almost impossible to see, unless you are looking for it. These were designed for small convenience type stores, with space constraints in mind. 


Are there other solutions?

Of course there are, but why spend thousands of dollars when you can literally spend a tiny fraction of that using Alpha Thunder Tags? If they are good enough for some of the world’s leading retailers, why wouldn’t they be good for you? Tablet theft is an ever growing concern for hospitals and doctor’s offices nationwide, and I’ve seen a plethora of tactics used to combat it. So far, I’ve not seen a system as user friendly, easy to set up and maintain, and as cost effective as this one. Even the largest firms have budgets to maintain, and this solution allows you to do just that, all while protecting your equipment and your patients’ peace of mind. 


For more information about Alpha Thunder Tags, contact us or call 1.770.426.0547