Robbery Prevention Tips/Checklist

Keep a Clear View from Outside

  • Make sure you and your cash register are clearly visible from outside. Create a "fishbowl" look. Limit use of window signs and floor displays. If you can see out easily, passer-bys and police can see in.

Keep Cash Register Money to a Minimum

  • Place large bills in a drop safe or other secure device as soon as you get them.
  • Ask customers if they have exact change or smaller bills. This will help you minimize the money in your register.
  • Record the serial number of several bills ("bait money") that are given out only in the event of a robbery.

Turn all Lighting on at Night

  • Be certain you have adequate inside and outside lighting. Eliminate any dark areas.
  • Utilize photo sensors to insure lights come on at night.
  • Replace burnt out bulbs promptly.

Keep your Business Looking Neat and Clean

  • A neat and clean environment is great for business but uncomfortable for most robbers.
  • When not making a sale, stay away from the register. Most robbers do not like to spend the extra time it takes to bring you back to the sales counter.

Keep Alert

  • Know what is happening outside as well as inside your business.
  • Watch for loiterers and ask them to leave.
  • Greet everyone who enters your business.
  • Don't be afraid to call police (911) when you see suspicious persons or activity.

If You Are Robbed

Cooperate with the Robber

  • Do exactly as you are told. If you don't understand what you are being told to do, ask.
  • Give the robber(s) what they want. Don't argue.
  • Don't move too quickly or reach for anything. Tell the robber(s) what you are doing.

Keep it Short and Smooth

  • The longer the robbery takes the more nervous the robber is.
  • The average robbery takes less than 2 minutes.

Don't Resist

  • Don't fight.
  • Don't use weapons.
  • Don't chase the robber(s).

Be Observant

  1. Observe the person(s) involved for the purpose of describing clothing and physical features.
  2. Observe the person or persons' means of escape, direction of travel and description of vehicle.

Call Police (9-1-1) After the Robbery is Over

  • Stay on the phone until police tell you to hang up.
  • Record the suspect(s) description on an "I.D." form or piece of paper.

Protect the Crime Scene

  • Don't touch anything. There may be suspect(s) finger prints or other physical evidence crucial to the investigation.

Checklist

Employee Training
1. Do you train employees in crime reduction procedures?
2. Do all your employees know how your security equipment functions?

Safe Procedures
1. Do you have an above ground safe?
2. Is your safe bolted to the floor?
3. Is your safe near the register and visible to customers?

Visibility
1. Are windows blocked by signs, displays or other materials?
2. Is the cashier clearly visible from outside the business?
3. Would the robber also be visible from outside?
4. Are proper trespassing/loitering/parking signed posted?

Cash Handling Procedures
1. Are there drawer limits for cashiers?
2. Is a drop safe available?
3. Is you change fund secured?
4. Do you hide money?
5. Do you perform random till checks or cash audits?

Bank Deposits
1. Do you use an armored car service?
2. Do you have a secure counting room?
3. Does your counting room have adequate locks, a phone and a door peephole?
4. Do you vary the times of your trips to the bank?
5. Do you vary your route to the bank?
6. Do you disguise your bank deposit bag?

Lighting
1. Do all exterior lights work properly?
2. Do all interior lights work properly?
3. Are lights turned off or on at appropriate times?
4. Is there adequate lighting inside your business?
5. Is there adequate lighting outside your business including the side and rear areas?

Security Equipment
1. Does your store use video surveillance equipment?
2. Does your equipment have a date/time generator?
3. Is there a video monitor placed where a potential robber can see it?
4. Are your VCR and video tapes secured?
5. Have you checked the position of your cameras?
6. Do you regularly clean your camera lenses and VCR head?
7. Is the resolution on your video system good?
8. Do you have a panic alarm?
9. Do you have a robbery alarm?
10. Can all exterior doors be easily locked?

Miscellaneous
1. Is the telephone readily accessible to the cashier?
2. Do you report all crimes to police?
3. Do you encourage police to visit your store?
4. How many times have you been robbed in the last 12 months?

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3