Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

The Top 8 Shrink Activities Your LP Team May be Missing

By Derek Rodner
Web Exclusive Logo
February 22, 2011

 

According to the Global Retail Theft Barometer, retail shrink accounted for $107.284 billion in 2010.  As retailers begin to determine their goals and initiatives for 2011, they need to consider how to identify and prevent the margin-robbing activities that are cutting into their bottom lines.  Here are a few commonly missed fraudulent activities and operational errors, along with some tips on how to combat them.

  1. Gift Card Fraud

    Gift card fraud has become increasingly significant with the rise in popularity of gift cards.  When a credit card is stolen, the perpetrator only has a short amount of time to act until the incident is reported.  In a race against the clock, the thief will immediately purchase gift cards.  This essentially converts the stolen card to cash and makes the money virtually untraceable.  Educate your cashiers on this issue and make it a best practice to request identification on gift card purchases and all credit card transactions.
     
  2. Sweethearting

    Sweethearting is one of the most common types of employee theft and is as old as retail itself.  Traditionally, when the customer—typically a friend or relative of the employee—went through the checkout line with an expensive item, the cashier would bypass the scanner to avoid ringing up the item.  Although this is still a common practice, sweethearting techniques have evolved.  Today, it is not uncommon to find a cashier placing his thumb over the barcode on a filet mignon and instead scanning the barcode on a pack of gum, taped to his hand.  The result: the friend of the cashier just purchased $15 in meat for 25 cents.  When you suspect an employee of sweethearting, look for a repeat customer frequenting the same cashier, particularly during slow hours when lines are short.
     
  3. Packaging Errors

    Packaging errors often go undetected but can result in significant losses at the POS.  In one instance, a packaging issue was causing numerous scanning errors across a retail chain.  Here’s how: bottled water cases have barcodes on each individual bottle as well as on the bottom of the case.  Because this retailer’s cases were packaged in a clear plastic wrap that was transparent, the scanner was routinely picking up the UPC on the individual bottle rather than the correct UPC on the bottom of the case.  As a result, customers were purchasing cases of water bottles costing $5.49 for $0.69, a $4.80 loss that often went unnoticed in medium to large transactions.  By quickly identifying the scanning error, the retailer was able to avoid the widespread error that could have cost the chain over $80,000 annually.  Train cashiers to identify the correct UPC code when scanning packages that contain separate units, such as water bottle cases.
     
  4. Building a Bank in the Register

    Crooked cashiers often pull off this technique by identifying items that are priced at an even dollar amount, which seldom requires giving change to the customer.  Currently, cigarettes are being sold for approximately $9.99 in New York City.  For many, this item is a quick purchase that doesn’t warrant waiting for the penny or receipt, so they lay down ten dollars and walk out the door.  The employee then voids the order and puts the money in the cashier drawer.  This trick allows for large sums of money to be stolen because it appears the employee has completed the transaction.  At the end of his shift, he then takes the stolen money from the register and pockets the cash.  Be sure to watch for cashiers keeping money next to the register.  In many cases, they will use this cash for change and then void the transaction.
     
  5. Return Fraud

    According to the NRF, return fraud costs the retail industry an estimated $10 to $15 billion per year.  A significant percentage of these losses are due to repeat offenders.  To put this in perspective, consider the damage one person can do: in one case of customer return fraud, a woman repeatedly walked into 27 of a chain’s 133 stores, picked up an item from the shelves and “returned” it without a receipt.  She admitted to over $10,000 in return theft over the course of 90 days.  Pay close attention to return patterns and educate employees on company procedures and policies for refunds.
     
  6. Counterfeit Coupons

    The prevalence of online coupons is becoming increasingly evident to retailers, as consumers trek in with printouts from their favorite money-saver blog or website.  However, this popularity has also spawned an explosion of counterfeit coupons.  Although the loss of a few cents doesn’t sound very pressing, counterfeit coupons are extremely detrimental to retailers—especially grocers—who operate under tight profit margins of about one to two percent.  To understand the impact that one coupon can have on a store, consider this: one fraudulent coupon can costs a retailer hundreds of thousands of dollars over the course of one week.  Stay up-to-date on counterfeit coupons by monitoring websites such as centsoff.com.
     
  7. Hidden Items in the Cart

    Implementing two quick and easy procedures at the point-of-sale will reduce losses due to hidden products:  requesting sales circulars and checking for items on the bottom of the cart.  Sales circulars may seem harmless, but they can easily conceal costly items such as DVDs, make-up and over-the-counter medications.  Similarly, checking the bottom of a customer’s cart may seem excessive, but missing these products can result in substantial revenue loss.  Making these procedures habits ensures that all items are properly entered into the order and the customer cannot complete the transaction without paying for all of the products. 
     
  8. Poor Promotion Execution

    Promotions that are not properly established in the POS system can account for a significant amount of shrink.  When a retailer holds a promotion they pay for the product upfront and bill the vendor back for the items sold under the deal.  If the retailer cannot provide proper documentation to prove items were sold under the promotion, they will not receive the manufacturer’s refund.  For example, imagine that a retailer is hosting a Buy-One-Get-One (BOGO) deal, but the promotion is not entered correctly in the system.  When the employee scans the item, the promotion will not register, which often leads to the cashier bypassing the system and providing the customer with their item for free.  Without the POS data to prove that the item was sold under the promotion, the retailer has no way of receiving the manufacturer’s refund.  As a result, the chain will lose money for every item that was given to the customer for free.  To reduce these losses, hold a weekly meeting to walk the cashiers through the promotions.  This will ensure that they fully understand each deal and can explain it to the customer if it is unclear.  Give special attention to cross promotion items, such as Buy One A, Get One B for free.  Many customers and cashiers misread these offerings to be Buy One A, Get One A for free.
KEYWORDS: loss prevention retail theft theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek Rodner is VP of product strategy for Agilence

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • holiday

    May your digital payments be secure & your APIs be merry and bright

    See More
  • Old Newswire Feature Image

    Chicago Courtrooms may be Shut During NATO, G-8 Summits

    See More
  • Cybersecurity with username and password

    It May be Time to Review Your Cyber Hygiene

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!