Articles and News
Is Your Security Strategy as Old as Your Building?November 03, 2024 (0 comments)
|Gunter, TX--Large jewelry heists are becoming more common. It seems every week a news article is written about a jewelry store robbery where a half a million dollars of jewelry (or more) has been stolen. From the outside looking in it appears as though the criminals have the upper hand, as if they know basic security measures and how to win against them. This begs the question, is your security strategy as old as your building?
As a Police Detective I have responded to multiple jewelry store robberies and burglaries. While collecting evidence and interviewing witnesses, I often hear the phrase “I can’t believe this happened” or “I thought we were safe”. Statements like this expose how an incident fractures trust and store reputation in the minds of customers and staff. When fractured, it is very hard to repair and can be the difference between a current customer and a former customer. Knowing so much is on the line, what are some proven solutions to keep a jewelry store safe? Throughout my experience I have identified a pathway that leads to security success. Let’s dive into it.
Steps to Security Success
First step is to implement a strong security strategy. A security strategy is a written comprehensive plan that outlines how an organization will protect its assets from threats and vulnerabilities. This takes shape through defining what security success means to your organization and striving for it.
The next step is to conduct a security audit, or better known as a threat assessment. A threat assessment is a deep dive into the security measures already in place. A good threat assessment includes function testing equipment, identifying areas of improvement, and auditing staff members about safety and security measures. Often, security audits fall low on a corporate priority list because of cost and the assumption that equipment is always functioning properly. Having an independent company conduct the threat assessment of your jewelry store is valuable because it provides an unbiased review. The security professional will also be current on crime trends and solutions to defeat them. Most companies find themselves in the unfortunate position of sustaining a large loss before identifying the need for a threat assessment.
After defining success in your organization and conducting a security audit, it is time to develop a plan for security success. A strong updated security strategy includes incorporating new technology and employee trainings. Let’s take a moment to break those two down further.
New technology is designed to slow criminal attempts, resulting in product protection. Security film over glass is an example of a technology designed to frustrate criminals by slowing and in some cases stopping penetration. Criminals strike glass jewelry cases with a sledgehammer for 20-30 seconds just to make a baseball sized hole. This often results in suspects leaving behind valuable DNA evidence like blood or sweat when reaching into cases.
Integration of artificial intelligence into a physical security strategy offers an early detection system. An example of this would be incorporating facial recognition technology into your current security camera system. When done correctly, real time notifications can be sent to onsite security officers and management when a known jewelry thief steps on location. Having this knowledge provides security officers and staff the opportunity to take appropriate measures in preventing an incident.
Proper security training in the jewelry industry includes teaching skills proven to combat common scams like distraction theft and educates red flag situations to be aware of. An example of a common red flag casing technique would be when a “customer” comes into a jewelry store and immediately asks to see the most expensive item on the showroom floor.
A strong updated security strategy provides the best chance for preventing and surviving an incident at your jewelry store. Although criminals are becoming more sophisticated, refreshing your corporate security strategy places your organization in the strongest position for a safe and secure work environment. Don’t wait until you are standing on a pile of glass wishing you had taken security more seriously.
Aaron Steensma is the President of Fortified Castle Consulting and a retired Police Detective in the North Dallas/Fort Worth area who specialized in residential and commercial burglary, theft, and robbery investigations. Fortified Castle Consulting is a company dedicated to supporting individuals and organizations through the development and implementation of robust security strategies aimed at crime prevention and threat mitigation. Fortified Castle Consulting owns The Castle Vault, a 256 bit encrypted, SOC 2cybersecurity compliant Software-as-a-Service (SaaS) platform that allows users to safely store high-definition images and appraisals of valuable assets in a centralized online system. In the event of theft, natural disaster, or fire, users can easily download their stored data in PDF format and share it as needed. To reach Aaron, call (888) 344-2879 or email him at aaron@fortifiedcastleconsulting.com. For more information about Fortified Castle Consulting, please visit the website at www.fortifiedcastleconsulting.com.