Tag: external theft
Retailers That Buy from Diverters Are Fueling External Theft
Sophisticated criminals involved in ORC know that to turn a profit, they must attempt to supply a demand in the marketplace. But did you...
ORC and Diverters
Organized retail crime (ORC) has been in the crosshairs of shrink reduction efforts for a long time now. But for many retailers, battling ORC...
Collaboration and Effective Loss Prevention Management
With limited resources necessitating efficiency and cost effectiveness, but standards still requiring responsiveness to customer needs, managers are asking questions about the best ways...
Pulling Our SOKS Up and Getting Over the Finnish Line
Much of Europe has been to the polls in general or presidential elections since January 2015, and the stakes have never been higher in...
Retail Theft Statistics: Staying Focused on What’s Really Most Important
There are many different ways that retail theft statistics can be applied in order to show how the many different ways that shoplifting, employee...
It Can’t Happen Here…Can It? Developing a Crisis Management Plan, Part 1
Most loss prevention professionals are relative experts in the kinds of routine risks we face daily in the form of internal theft, external theft,...
How Do Successful LP Leaders Lower Shrink? By Leading
Thieves are not the only ones who impact shrink. In fact, they may not even be the biggest factor in a store’s overall shrinkage....
Stored-Value Card Fraud—A House of Cards?
Okay, I know that there is stored-value card fraud in the world. I have read most every survey on dishonesty that ever finds its...
Everybody Wins: A Fresh Way to Manage the Scourge of Shoplifting (FULL VERSION)
Sponsored by Turning Point Justice
It is certainly provocative, but perhaps not completely untrue, to say shoplifting prevention in the US is a dismal failure....
How Sears Holdings Changed Its View on First Offenders and Earned ‘Gushing Praise’ from...
Sponsored by Turning Point Justice
The asset protection department at Sears Holdings faces a unique set of security challenges, but it’s similar to many others...