Sorry, but your login has failed. Please recheck your login information and resubmit. If your subscription has expired, renew here.
July-August 2019
If you’re a long-time reader of Supply Chain Management Review, you’re familiar with Larry Lapide’s “Insights” column. Typically, Larry is writing about the many facets of planning, but occasionally, he takes on a provocative topic. One year, he questioned whether it was necessary to be a Top 25 supply chain leader, especially if in your industry, good enough gets the job done. Browse this issue archive.Need Help? Contact customer service 847-559-7581 More options
It’s 8:00 a.m. Your receptionist receives a phone call from a vendor asking for details on the next shipment of goods. The receptionist doesn’t recognize the voice and asks to which location the goods are going. The caller doesn’t have specific information, but explains that his organization is one of your company’s third-party logistics (3PL) providers and they’d like to start receiving electronic updates on upcoming shipments so that they can better track inbound goods.
The day has just started and the receptionist knows that if she doesn’t figure this out quickly, there will be more phone calls and her work will pile up. At this point, the receptionist has two options: She can send the details to the 3PL or ask for the caller’s contact information and get back to him later. In today’s operating environment, we might praise the receptionist for quickly and efficiently providing answers to the caller’s questions, including access to information on cloud services, a supplier portal or e-mail list-serve, without interrupting her co-workers or higher-level managers. That’s because above all else, we value speed in the supply chain; that relies on the sharing of information on an as-needed basis, at all times, including to our trading partners and service providers. She may even wonder: What’s the worst that could happen if I give this 3PL information on deliveries and add them to the company’s direct notification process? After all, they’re a supplier right?
The simple answer is: Plenty. Opening the doors into supply chain systems to the wrong people can lead to further intrusions into the company’s operating processes, schedules and key personnel. With that access, bad actors can degrade the supply chain in the long run. Luckily for the company, the receptionist says she’ll have to get back to the caller later. That’s because she received training on the “non-cyber” ways that outside entities try to gain access to a company’s supply chain systems, and now her antenna is on full alert. Those intrusions can happen directly, by hacking into a company’s systems; or indirectly, through an employee who inadvertently provides access with the best of intentions, or, by gaining access to the company’s systems via a supplier’s or customer’s connected systems that are inadequately protected. In this instance, the receptionist knows that she needs to conduct more research before sharing proprietary information that could expose one link in the larger supply chain.
This complete article is available to subscribers only.
Log in now for full access or start your PLUS+ subscription for instant access.
SC
MR
Sorry, but your login has failed. Please recheck your login information and resubmit. If your subscription has expired, renew here.
July-August 2019
If you’re a long-time reader of Supply Chain Management Review, you’re familiar with Larry Lapide’s “Insights” column. Typically, Larry is writing about the many facets of planning, but occasionally, he… Browse this issue archive. Access your online digital edition. Download a PDF file of the July-August 2019 issue.It's 8:00 a.m. Your receptionist receives a phone call from a vendor asking for details on the next shipment of goods. The receptionist doesn't recognize the voice and asks to which location the goods are going. The caller doesn't have specific information, but explains that his organization is one of your company's third-party logistics (3PL) providers and they'd like to start receiving electronic updates on upcoming shipments so that they can better track inbound goods.
The day has just started and the receptionist knows that if she doesn't figure this out quickly, there will be more phone calls and her work will pile up. At this point, the receptionist has two options: She can send the details to the 3PL or ask for the caller's contact information and get back to him later. In today's operating environment, we might praise the receptionist for quickly and efficiently providing answers to the caller's questions, including access to information on cloud services, a supplier portal or e-mail list-serve, without interrupting her co-workers or higher-level managers. That's because above all else, we value speed in the supply chain; that relies on the sharing of information on an as-needed basis, at all times, including to our trading partners and service providers. She may even wonder: What's the worst that could happen if I give this 3PL information on deliveries and add them to the company's direct notification process? After all, they're a supplier right?
The simple answer is: Plenty. Opening the doors into supply chain systems to the wrong people can lead to further intrusions into the company's operating processes, schedules and key personnel. With that access, bad actors can degrade the supply chain in the long run. Luckily for the company, the receptionist says she'll have to get back to the caller later. That's because she received training on the “non-cyber” ways that outside entities try to gain access to a company's supply chain systems, and now her antenna is on full alert. Those intrusions can happen directly, by hacking into a company's systems; or indirectly, through an employee who inadvertently provides access with the best of intentions, or, by gaining access to the company's systems via a supplier's or customer's connected systems that are inadequately protected. In this instance, the receptionist knows that she needs to conduct more research before sharing proprietary information that could expose one link in the larger supply chain.
SC
MR
Latest Supply Chain News
- Supplier diversification, AI readiness, and circularity top supply chain priorities for 2025
- First-half 2025 dry van truckload outlook: Improving conditions ahead
- Subscribe to Straight Talk
- Mentorship insights: Empowering women leaders in supply chain management
- Importing from China is about to get very expensive
- More News
Latest Resources
Explore
Software & Technology News
- Supplier diversification, AI readiness, and circularity top supply chain priorities for 2025
- Subscribe to Straight Talk
- Increased semiconductor M&A presents challenges for supply chain professionals
- Supply chain network design for success
- Harnessing generative AI for smarter supplier negotiations
- Next-Gen SupplyChains: Underpinning your ability to manage complexity and drive innovation
- More Software & Technology