Auto Theft Prevention Tips

The Pennsylvania Auto Theft Prevention Authority offers auto theft prevention tips.

1. Lock your vehicle, close all windows and sun roof, and take your keys.

2. Never hide a second set of keys in or on your vehicle. Thieves know all the hiding places.

3. Don’t leave valuables in plain view. Items left in the open attract thieves.

4. Don’t leave important documents such as bank statements, credit card bills/statements or other personal information in your vehicle. Thieves can use this information to steal your identity and access your bank and credit card accounts.

5. Never leave the registration or title in your car. If stolen, this makes it easier for the thief to dispose of your vehicle. Keep it with your drivers license or on your person.

6. Park in well lit areas with plenty of pedestrian traffic, or when possible, in attendant lots. If you have to leave your key with an attendant, leave only the ignition and door key.

7. Never leave your vehicle running unattended. Vehicles are commonly stolen at ATMs, convenience stores, etc.

8. Always use your emergency brake and leave your transmission in park (standard transmissions should be left in gear) when parked. Also, turn the wheels toward the curb. This makes towing your vehicle more difficult. Thieves use tow trucks to steal vehicles.

9. If your vehicle is rear-wheel drive, back into your driveway. Conversely, if your vehicle is front-wheel drive, pull forward into your driveway. Always use your emergency brake. This makes towing difficult.

10. If you have a garage, use it. When parked in a garage, lock the garage as well as your vehicle and close the windows.

11. Remove the electronic ignition fuse, coil wire, rotor, distributor, or otherwise disable your vehicle if you are leaving it unattended for an extended period.

12. Don’t become complacent because you drive an older vehicle. Parts from older vehicles are in great demand. In older vehicles, replace “T-shaped” door locks with straight locks.

13. Engrave expensive accessories and major parts with your VIN or personal identification number. This aids police in tracing stolen items.

14. If your vehicle has an alarm or other anti-theft device, use it.

15. Drop your business card, address label or other information inside your vehicle doors. This will identify you and where your vehicle was titled and registered.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities