Articles

Security

Guarding Your Business Against Data Loss

Data loss is every company’s nightmare. In fact, most companies that do experience a mass disappearance of vital, computer-kept information never turn their lights on again. It comes down to the idea that how you protect and treat your data is commensurate with how important you think it is, says Penny Garbus, co-founder of Soaring […]

Read More
10 Ways To Play IT Safe

10 Ways To Play IT Safe

State-sponsored and individual bad actors will escalate supply chain cybersecurity risks. Here are 10 threats and trends to look out for across business, governmental, and personal arenas: 1. Software updates—the new Trojan Horse. Criminals use the normal software update process to get companies to infect all their clients, which then affects everyone down their software […]

Read More
Fraud Goes Broad

Fraud Goes Broad

The use of analytics to mitigate third-party supply chain fraud, waste, and abuse risk jumped to 35 percent in 2017 from 25.2 percent in 2014,according to a Deloitte poll. Between 2014 and 2017, an average of 30.8 percent of poll respondents report at least one instance of supply chain fraud, waste, and abuse in the […]

Read More
IBM: Working on the Blockchain Gang

IBM: Working on the Blockchain Gang

Security. Transparency. Efficiency. These buzzwords have circled the supply chain for years as consumers demand more responsible supply chains, forcing shippers and providers to explore new ways to make these terms reality. Alongside these buzzwords, another word surfaces as a potential solution to many major concerns: blockchain. IBM aims to make this solution tangible for […]

Read More

Is Ransomware Holding Global Trade Hostage? Here’s How to Safeguard Your Supply Chain

In June 2017, another major cyberattack targeted several large multinational corporations. The malware Petya (or NotPetya or Nyetya) was able to breach dozens of Russian and Ukrainian companies, including Russian oil and gas giant Rosneft, as well as leading global businesses across multiple industries. This time, two giants in the logistics industry, Maersk and FedEx, […]

Read More

Commentary: Supply Chain System Security Starts in the Cloud

The May 2017 ‘WannaCry’ ransomware cyberattack swept 150 countries, crippling hospitals, paralyzing government entities, and completely halting businesses by exploiting vulnerabilities in outdated operating systems. By infiltrating systems, locking down digital assets, and making all files and folders inaccessible, the attackers effectively shut down entire organizations. No fulfillment. No new client acquisition. No checking inventory. […]

Read More

Four Tips for Cargo Theft Prevention

Although Memorial Day can mean a three-day weekend for most, it’s also the perfect time for thieves to steal cargo. Memorial Day weekend is one of the most popular times for cargo theft with 98 cargo thefts reported in the past 4 years, according to CargoNet. In contrast to non-holiday weekends, Memorial Day weekend has […]

Read More

Looking Beyond Your Desktop

The latest Ransomware attack lays bare hidden risks in your manufacturing, logistics, and supply chain network. You can protect against the ever-evolving threat of Bitcoin pirates by looking deeper into your operations. The attack is introduced into networks with Spear Fishing emails. Once activated, the malware locks and ecrypts your files, and files across all […]

Read More

5 Steps to Protect Your Supply Chain From Cyber Threats

With cyber threats affecting organizations worldwide, warding off cyber attacks and protecting against cyber espionage is becoming a top priority across industries. Manufacturers, distributors, and organizations, however, are not doing enough to make supply chains more resilient and prepared. Whether your business is large or small, a startup or 40-year veteran, major security issues stem […]

Read More
Jacob Olcott

Defending Your Supply Chain Against Hackers

As organizations continue to outsource, form partnerships, and share data with third parties, a strong vendor risk management (VRM) program that stays ahead of risks in the information supply chain has to be a top priority. Hackers stole confidential data from tens of millions of Target customers during the height of the holiday shopping season. […]

Read More
Trends—December 2016

Trends—December 2016

Happy New Year! Time for Your Annual Supply Chain Health Check Throughout the course of 2016, your supply chain was plugging away, receiving and handling new product lines, efficiently fulfilling e-commerce orders during slow times and peak periods, dealing with returns, and processing shipments to your stores and/or retail customers to ensure timely and accurate […]

Read More
Renee Roe

Export Control Reform Strikes Again

The U.S. Bureau of Industry and Security revised almost every section of the U.S. Export Administration Regulations (EAR) on Sept. 20, 2016. The fairly significant changes impact most U.S. companies. Here’s what you need to know. Although you may not sell product that would be defined as hardware, software, or technology under the EAR, you […]

Read More
Gary Barraco

How Secure Is Your Air and Ocean Cargo?

Air and ocean cargo security remains a high priority for supply chain managers across the globe. While cargo theft has been a concern for years, organizations also contend with the risk of terrorist groups uncovering vulnerabilities in global supply chains to carry out illicit cross-border operations. While the United States introduced the C-TPAT program in […]

Read More
Brian Beetz

How to Handle DOT and GHS Regulations

The Globally Harmonized System of Classification and Labeling of Chemicals (GHS) deadlines that went into effect on June 1 and December 1, 2015, respectively, have significantly impacted U.S. chemical manufacturers and distributors. By now, all chemicals being shipped by manufacturers and distributors should meet the Occupational Safety and Health Administration (OSHA) Hazard Communication Standard (HCS) […]

Read More
Keith Biondo

Perfect Security by 2025?

Our annual technology issue highlights evolving approaches that drive supply chain performance. New technology will also bring advances to security. Here’s a look at what I envision for security in 2025: Wi-Fi umbrellas cover entire areas, making any movement or off-baseline measurement (such as heat or sound) cause for alarm once the facility is locked […]

Read More