<img src="//bat.bing.com/action/0?ti=5222936&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

B2B integration: Don't engage in risky business

By Lightwell | Thu, Oct 16, 2014

B2B integration projects come with risks - that's unavoidable. There are far too many variables in play to plan for everything to go off without a hitch if the company's never before engaged with a project of this magnitude. Therefore, it's important to go into the process armed with a support system that can identify variables, alleviate pressures and set B2B integration up for long-term success. Because this is easier said than done, many companies have found that investing in B2B managed services for B2B integration can help enterprises effectively develop and maintain robust practices for partner onboarding, collaboration networks and IT approaches. This ensures that organizations aren't engaged in risky business.

Continue reading

Answering today's challenges to supply chain integration

By Lightwell | Wed, Apr 09, 2014

Supply chain integration is more critical than ever in a highly transparent, globalized business world. Traditionally, supply chains, especially in large enterprises, operate in silos. Coordinating far-flung activities in different locales into a dedicated, centralized management framework was either outside the purview of most companies or difficult to implement. However, the hands-off mentality that once prevailed in the supply chain has come under fire in recent years.

Continue reading

Business managers: Who's overseeing your data security IT services?

By Lightwell | Tue, Jul 16, 2013

Few business or IT leaders would question the importance of protecting data if asked directly, and the threat of a privacy or security breach has been made a real prospect in light of recent events. Whether the risk stems from the organization's own system administrators (as it did in the case of Edward Snowden) or from cybercriminals, such incidents can be costly for companies and their customers. In fact, even a single incident may leave a trail of billions of dollars in expenses if data such as payment card numbers is compromised. Most companies are likely aware of the risk, but the problem is that many do not have appropriate oversight of their own data security practices.

Continue reading

Success in Big Data Reliant Upon B2B Integration Capabilities

By Lightwell | Tue, Jul 16, 2013

Most businesses these days are collecting and generating data. While not all of them are investing in big data analytics solutions, most would agree that there is some value buried in the vast volumes of information that exist within modern IT ecosystems. As Business 2 Community contributor and marketing expert Heidi Anspaugh recently noted, this has several implications for customer intelligence, particularly within the B2B arena.

Continue reading

Companies must learn risk management in e-commerce

By Lori Angalich | Wed, Jul 11, 2012

Selling through the internet is the rising form of commerce. Customers are drawn to the convenience of purchasing an object on the internet and are increasingly taking that convenience with them everywhere through mobile devices. Assuming that beginning e-commerce initiatives will immediately cure a company's ills, however, is an unsafe proposition.

Continue reading

Hackers stay active, data remains threatened

By Lori Angalich | Tue, Mar 27, 2012

Data loss prevention is a constantly evolving field. Companies that believe their systems are capable of stopping intrusions despite going years between updates could be in for a rude awakening, as hackers change over time, growing more resourceful and developing stronger tools to access confidential information.

Continue reading

Insurance is important to supply chain risk management

By Lori Angalich | Thu, Mar 08, 2012

After witnessing the damage natural disasters and economic turmoil recently caused supply chains around the world, more businesses are demanding that insurance organizations develop new strategies to assist with risk management practices.

Continue reading

Changing times require new supply chain risk management policies

By Lori Angalich | Mon, Mar 05, 2012

Preparation and planning is essential to the success of any business process, and supply chains are no exception. While traditional risk management policies can help decision-makers feel more secure about their operations, supply chain managers need to take a more innovative approach to tackle threats and meet increasing demands, according to an Inside Supply Management report by industry expert Jin Leong.

Continue reading

Study: Businesses need to ensure they securely erase files on storage devices

By Lori Angalich | Thu, Mar 01, 2012

Many organizations use portable storage devices to securely share information with outside resources, rather than sending the data over the internet. However, many people don't understand the complexities that are associated with safely erasing records that were once stored on these devices.

Continue reading

Businesses need to identify, improve IT security weaknesses

By Lori Angalich | Wed, Feb 29, 2012

In today's fast-paced, technologically-led business world, companies need to ensure they follow strict IT risk management guidelines in order to keep sensitive information secure and out of the wrong hands. As a result, more organizations are relying on a wide range of security tools, including firewalls, anti-malware solutions and access control software.

Continue reading