Articles
Security
Looking Beyond Your Desktop
The latest Ransomware attack lays bare hidden risks in your manufacturing, logistics, and supply chain network. You can protect against the ever-evolving threat of Bitcoin pirates by looking deeper into your operations. The attack is introduced into networks with Spear Fishing emails. Once activated, the malware locks and ecrypts your files, and files across all […]
Read More5 Steps to Protect Your Supply Chain From Cyber Threats
With cyber threats affecting organizations worldwide, warding off cyber attacks and protecting against cyber espionage is becoming a top priority across industries. Manufacturers, distributors, and organizations, however, are not doing enough to make supply chains more resilient and prepared. Whether your business is large or small, a startup or 40-year veteran, major security issues stem […]
Read More5 Ways to Cut the Risk of Cargo Theft
Risk models provide a key advantage to firms operating globally, and are the first step in identifying key trade lanes, business partners, and the areas most likely to cause harm. The more you know, the easier it is to manage the risk. While risk modeling is an important part of the Customs-Trade Partnership Against Terrorism […]
Read MoreDefending Your Supply Chain Against Hackers
As organizations continue to outsource, form partnerships, and share data with third parties, a strong vendor risk management (VRM) program that stays ahead of risks in the information supply chain has to be a top priority. Hackers stole confidential data from tens of millions of Target customers during the height of the holiday shopping season. […]
Read MoreTrends—December 2016
Happy New Year! Time for Your Annual Supply Chain Health Check Throughout the course of 2016, your supply chain was plugging away, receiving and handling new product lines, efficiently fulfilling e-commerce orders during slow times and peak periods, dealing with returns, and processing shipments to your stores and/or retail customers to ensure timely and accurate […]
Read MoreExport Control Reform Strikes Again
The U.S. Bureau of Industry and Security revised almost every section of the U.S. Export Administration Regulations (EAR) on Sept. 20, 2016. The fairly significant changes impact most U.S. companies. Here’s what you need to know. Although you may not sell product that would be defined as hardware, software, or technology under the EAR, you […]
Read MoreHow Secure Is Your Air and Ocean Cargo?
Air and ocean cargo security remains a high priority for supply chain managers across the globe. While cargo theft has been a concern for years, organizations also contend with the risk of terrorist groups uncovering vulnerabilities in global supply chains to carry out illicit cross-border operations. While the United States introduced the C-TPAT program in […]
Read MoreHow to Handle DOT and GHS Regulations
The Globally Harmonized System of Classification and Labeling of Chemicals (GHS) deadlines that went into effect on June 1 and December 1, 2015, respectively, have significantly impacted U.S. chemical manufacturers and distributors. By now, all chemicals being shipped by manufacturers and distributors should meet the Occupational Safety and Health Administration (OSHA) Hazard Communication Standard (HCS) […]
Read MorePerfect Security by 2025?
Our annual technology issue highlights evolving approaches that drive supply chain performance. New technology will also bring advances to security. Here’s a look at what I envision for security in 2025: Wi-Fi umbrellas cover entire areas, making any movement or off-baseline measurement (such as heat or sound) cause for alarm once the facility is locked […]
Read MoreProtect Your Cargo With Vehicle Tracking
Transit cargo is one of the most vulnerable parts of the supply chain and the level of theft sophistication is on the rise. According to TT Club, a leading international transport, freight, and logistics insurance provider, theft is a top reason for claims. The total value of TT Club claims over a five-year period starting […]
Read More