8 Ways Employees May Be Stealing From You
According to the National Restaurant Association, employee theft accounts for a loss of approximately 3% of annual sales. You may be wondering how to spot employee theft. This short list below gives some of the ways employees may be stealing from you:
- Transferring self service items (those that don’t generate a kitchen chit, such as coffee or soda) off a check that has been paid for with cash and reusing the same item on another check.
- Giving away self service items, such as a drink or dessert, to a guest with the expectation of receiving a larger than normal tip.
- Short ring – ring up a lower priced item and pocket the cash difference
- Using lower priced liquor and charging for call brands
- Placing tip jars next to the cash register – easy to put cash into the jar and ring “no sale” on the register
- Comping checks after they have been closed. Manager finds a check closed to cash by an employee who has already checked out. The manager reopens the check, applies a comp, closes the check and pockets the cash.
- Comping checks after printing. Employee will print a check for the full amount and present it to the customer. After the customer pays with cash, the employee comps an item off the check and pockets the difference.
- Claiming phony walkouts – Employee presents the check and quickly collects the cash. Employee tells manager that it was a walkout, pockets the cash and asks the manager to void the check.
Employee theft is serious business. In addition to the above suggestions, it may also be wise to look to at a employee theft deterrence software such as Restaurant Guard to figure out the best way for your business to address the issue.
Shake Shack Becomes 5,500 Restaurant to Implement NCR Real-Time DULUTH, Ga., May 13, 2013 NCR Corporation (NYSE: NCR) today announced that Shake Shack has implemented the NCR Pulse Real-Time smartphone application, joining the 5500 others already using the app. Available for iOS® and Android® devices, NCR Pulse Real-Time is a SaaS-based mobile analytics engine that helps restaurant operators solve the everyday challenges of low visibility into current operational performance, lack of predictable data and inability to be in several places simultaneously. The application delivers up-to-the-second performance metrics and notifications directly to a user’s smartphone. Operational data is segmented for quick, easy review, such as voids and comps, net sales by hour, employee performance and overtime alerts. “NCR Pulse Real-Time is a great tool. It gives you information that you can use right now to improve your results for the rest of the day,” said Giancarlo Fiorarancio, Director of Information Systems, Shake Shack. His team leverages the tool to not only review real-time sales data but to manage labor costs in real-time. In addition, they monitor voids and comps, which could indicate an operational issue, such as cashiers potentially needing additional training. Integrated with NCR restaurant point-of-sale (POS) platforms, NCR Pulse Real-Time allows users to instantly see every important data element about their business regardless of where they are. This powerful application even allows the user to view the guest check of a customer that just sat down or paid their bill. Users will be able to take this data and make real time decisions that will directly impact their bottom line. “Restaurant operators work long hours and the last thing they want to do is sift through multiple reports and spreadsheets to try and manage their businesses,” said Kim Eaton, SVP and GM of NCR Hospitality. “NCR Pulse Real-time’s artificial intelligence engine analyzes operational data and gives operators details about their restaurant that can’t be found anywhere else.” About Shake Shack Shake Shack® is a modern day “roadside” burger stand known for its all-natural burgers, flat-top dogs, frozen custard, beer, wine and more. With its fresh and simple, high-quality food at a great value, Shake Shack is a fun and lively community-gathering place with widespread appeal. From its ingredients and employment practices to its environmental responsibility, design and community investment, Shake Shack’s mission is to continually Stand for Something Good®. Shake Shack is part of Danny Meyer’s Union Square Hospitality Group (USHG), which includes many of New York City’s most celebrated restaurants: Union Square Cafe, Gramercy Tavern, The Modern, among others. Since the original Shake Shack opened in 2004 in NYC’s Madison Square Park, it now has multiple locations in New York, Washington, DC, Connecticut, Pennsylvania, Florida, Massachusetts, and seven international locations, with London and Istanbul slated to open mid-2013. About NCR Corporation NCR Corporation (NYSE: NCR) is the global leader in consumer transaction technologies, turning everyday interactions with businesses into exceptional experiences. With its software, hardware, and portfolio of services, NCR enables more than 300 million transactions daily across the retail, financial, travel, hospitality, telecom and technology industries. NCR solutions run the everyday transactions that make your life easier. NCR is headquartered in Duluth, Georgia with over 26,000 employees and does business in 180 countries. NCR is a trademark of NCR Corporation in the United States and other countries. Android is a trademark of Google Inc. iOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license.
The Health Care Law: What You Need to Know Now http://healthcare.restaurant.org/
Top 5 Data and Network Threats for Restaurants The Internet can be a scary place, especially if you stay abreast of the data breaches that businesses large and small suffer on a daily basis. Where should you focus your attention, so you can address the network security threats most relevant to your business? Let’s look past the noise of media headlines and examine the most common ways which cyber-criminals compromise restaurant networks:
- Misconfigured remote access tools allow attackers to guess passwords and connect using compromised logon credentials. Don’t use default or easy-to-guess passwords for applications and systems that you access over the network. If you employ tools that provide remote access to PCs within your restaurant, be sure to enable two-factor authentication. This feature ensures that in addition to knowing the right password, the person needs to supply a second factor, such as a number displayed on a key fob or phone, to prove that he or she is not an impostor.
- Missing software security updates give attackers the opportunity to infect your PCs using booby-trapped websites and emails. As the result, malicious software might stealthily find its way on your computer as a side-effect of your normal web browsing and email-writing activities. Be sure to regularly update the software installed on your restaurant’s systems, paying particularly close attention to Microsoft Windows, Office, Adobe Reader, Flash Player and Java. Automate the installation of security updates using vendors’ own or third-party tools.
- Insecure Wi-Fi signal, used by guests or employees, could offer unauthorized access the restaurant’s internal networks. Cyber criminals can exploit Wi-Fi configuration weaknesses, such poor encryption or easy-to-guess passwords, even without entering the restaurant. This may allow them to access business applications and payment systems as if the intruders were sitting in front of your PCs. To address this risk, separate critical networks from other wireless networks. Also, be sure to enable WPA/WPA2 encryption, select strong passwords and, whenever practical, employ a wireless intrusion detection system.
- Malicious software can be inadvertently introduced into your network by plugging in an infected USB key or laptop. The USB key or laptop might have gotten infected earlier and may be acting as virus carriers. Avoid plugging untrusted devices into computers or networks used for sensitive business transactions. Also, employ security tools, such as a firewall, antivirus software and application whitelisting, so that they protect you not only from threats coming from the Internet, but also from your internal network.
- Intruders can stealthily pilfer business records and customer data if you don’t restrict access to the Internet from the internal network. Set up your security measures with the assumption some safeguards might fail without your knowledge. To make it harder for the intruder to steal sensitive information, such as credit card details, configure your firewall to restrict access to the Internet. Your sensitive networks, such as your POS environment, should only allow access to the websites needed for POS, payment-processing related business functions.
Cyber-criminals employ diverse and often creative tactics for obtaining unauthorized access to IT infrastructure. Their goals involve misusing the victim’s computer systems, stealing data, wreaking havoc on the network and compromising the company’s brand. Due to the many venues for intruders to compromise your environment, it’s easy to be overwhelmed if you’re new to the world of data and network security. The five areas above offer practical ways to get started with safeguarding your business from cyber-criminals. If you don’t have the resources on staff to handle data security, enlist the aid of a company that specializes in addressing restaurants’ network security concerns. Written by: Lenny Zeltser, Director, Product Management at NCR Corporation