Get Our Email Newsletter

Technology

Latest

How to Establish an Effective Information Security Policy

There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This will only happen if the policy reflects core business objectives.

What it’s Like to Find and Buy EAS Detachers Online as a Shoplifter

Upon placing an order for a 16,000GS detacher on Alibaba, within 24 hours I received email correspondence from six different suppliers offering to fulfill my order.

Electronic Article Surveillance (EAS) Source Tagging: 20+ Years of Innovation

Every so often, a simple idea catches the imagination, fervor, and engagement of a group of people and is developed into a successful practice that revolutionizes a business. Electronic article surveillance (EAS) source tagging is definitely one of those.

The Rite Aid Asset Protection Team Reveals Details about Its Valuable Investigation Tool

One day in October of 2017, a man of medium build entered a Rite Aid in one of the nation’s largest cities, approached the register, and demanded cash. As the drawer was being opened, the subject flung himself over the counter, grabbing whatever cash he could.

How ORC Fuels Human Trafficking

What comes to mind when you think of organized retail crime? High-shrink items with high-resell values, such as razors and baby formula - not human trafficking.

Walmart Asset Protection in 2018: Transforming with Technology

LPM Media Group is on site at Walmart's Asset Protection National Meeting this week in Rogers, AR, where the theme of the event centers around embracing change to enable the transformation of the business while reducing losses and accidents.
- Partners -

Retailers Now Need to Watch for These Social Engineering Techniques

So what exactly is social engineering? It is the manipulation of people into performing actions or divulging confidential information. It is a confidence (con, for short) trick for information gathering, fraud, or system access.

3 Ways Modern Retailers Can Minimize Enterprise Mobility Risks

In an effort to give employees access to corporate resources from anytime and anywhere, an increasing number of retailers are introducing Bring Your Own Device (BYOD) programs.

9 Tips for Developing Your Document Retention Guidelines

The retention of an infinite number of documents may become both expensive and impractical. But the premature destruction of certain documents may lead to the loss of valuable information. Where's the happy medium?

Loss Prevention Magazine updates delivered to your inbox

Get the free daily newsletter read by thousands of loss prevention professionals, security, and retail management from the store level to the c-suite.

Digital Partners

Become a Digital Partner

Violence in the Workplace

Download this 34-page special report from Loss Prevention Magazine about types and frequency of violent incidents, impacts on employees and customers, effectiveness of tools and training, and much more.

Webinars

View All | Sponsor a Webinar

Whitepapers

View All | Submit a Whitepaper

LP Solutions

View All | Submit Your Content

Loss Prevention Media Logo

Stay up-to-date with our free email newsletter

The trusted newsletter for loss prevention professionals, security and retail management. Get the latest news, best practices, technology updates, management tips, career opportunities and more.

No, thank you.

View our privacy policy.