Mitigate Shrinkage with Automated Cash Handling

In today’s retail marketplace, brick-and-mortar businesses face many challenges when it comes to staying in the black. With the rise of online shopping and other competitive factors, retailers must take all necessary actions to maximize revenue, while at the same time reduce their exposure to loss from theft, error, and other factors. While retail shrinkage encompasses a wide range of variables, cash is certainly one factor that must be addressed to combat rising shrinkage rates.  Retailers that deal with large amounts of cash will face the risks and associated costs of doing so, many of which involve cash loss or theft. Unless addressed appropriately, these factors can negatively contribute to the store’s overall shrinkage rate.

What Is Shrinkage and what are the Statistics?

“Shrinkage” is often used to describe businesses losing inventory or cash due to factors such as theft, error, fraud, and accidental damage. Not only does shrinkage impact profits for a retailer, it can also cause businesses to spend more on security.  Unfortunately, such added costs are often passed on to consumers.

In 2016, shrinkage cost United States retailers $48.9 billion, or 1.44 percent of retail sales. Even yet, this number continues to rise. 56 percent of retailers reported that shrinkage is getting worse.

What Causes Shrinkage?

Nearly 43 percent of losses from shrinkage can be attributed to employee theft.  At over 37 percent, shoplifting takes the second-place spot. Coming in at third are administrative losses at nearly 11 percent of total shrinkage, while fraud from vendors and suppliers accounts for almost nine percent of reported shrinkage.

It’s clear from these statistics that an increased loss prevention budget may not be the optimal solution to address risking shrinkage rates. Furthermore, increased security may not decrease administrative and fraud shrinkage. For retailers that handle cash, an automated solution might be worth considering.

Read more at tidel.com

Follow us on social media for the latest updates in B2B!

Image

Latest

workforce in security
Where Security Meets People: Building a Better Industry Through Workforce and Inclusion
March 27, 2025

The security industry is facing a moment of transformation. Amid rapid technological shifts and workforce challenges, companies are realizing that talent — recruiting it, developing it, and retaining it — is now central to long-term success. At the same time, long-overdue conversations around inclusion, representation, and culture are gaining momentum across the sector. According to…

Read More
symmetry connect
The Hidden Power of Identity Management: How Symmetry Connect Is Reshaping Physical Security
March 27, 2025

As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and…

Read More
supply chain ownership
Why Total Supply Chain Ownership is the Future of Resilient Tech Manufacturing?
March 27, 2025

In a world where global supply chains are often fragile and reactive, AMAG Technology is taking a bold stance with a proactive, end-to-end approach. Total supply chain ownership—controlling everything from component sourcing to final product delivery—isn’t just a buzzword; it’s a lifeline in a volatile global market. With disruptions ranging from geopolitical tensions to material…

Read More
Security
Reimagining Security Integration in the Age of AI and Mobile Identity
March 26, 2025

As the physical security landscape continues to evolve, system integrators find themselves at the intersection of rapid technological innovation and ever-growing client demands. Artificial intelligence and machine learning are no longer distant concepts—they’re becoming standard components of modern security solutions, from predictive threat detection to real-time analytics. At the same time, the growing adoption of…

Read More