Demand and Supply Planning for Efficient Business Operations

Businesses are constantly challenged to provide a seamless flow of products from manufacturing to the consumer. To meet this challenge, companies use Demand and Supply Planning, two disciplines that involve a complex study of the supply chain and consumer behavior to ensure that a sufficient supply of products is on hand to meet consumer demand,… Continue reading Demand and Supply Planning for Efficient Business Operations

How to Remain Competitive with Effective Resource Management and Capacity Planning

I transitioned recently to a Resource Coordinator role in Professional Services. For the last several years, I have been focused on allocating consulting and development resources in the Customer Service department to break/fix tickets (break/fix issues are generally urgent requests) for our clients’ ERP systems. Rather than dealing with issues our consultants and developers could… Continue reading How to Remain Competitive with Effective Resource Management and Capacity Planning

Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Password Security and Protection Has Never Been More Important

How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important

Remaining Vigilant: External threat detection with OSINT

For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT

Phishing, Quishing, Vishing, and Smishing

Just when you thought it was safe to go back in the water… Most people are familiar with the term “phishing,” which describes emails sent by malicious hackers to coax the email recipient (the victim) into clicking on a link that asks them to divulge personal information or login credentials. Sometimes, the victim’s computer is… Continue reading Phishing, Quishing, Vishing, and Smishing

Key Performance Indicators that Help You Assess Company Health

Key Performance Indicators (KPIs) are metrics used by managers and financial professionals to assess the health of a company. Think of KPIs as the vital signs to check on the health of a company. When a person goes for a medical checkup, the doctor will take his or her vital signs and, based on those… Continue reading Key Performance Indicators that Help You Assess Company Health

Comparing Available to Promise and Capable to Promise: Which is best for me?

Companies, particularly B2C retailers, hate it when they run out of inventory. Stockouts not only cost businesses potential sales, but they also adversely impact customer satisfaction, positive reviews, and future repeat business. But keeping too much inventory on hand “just in case” can also be a dangerous strategy. Unsold inventory represents a significant cost, particularly… Continue reading Comparing Available to Promise and Capable to Promise: Which is best for me?

Understanding the Potential Risks of Google’s New Domains

In May 2023, Google introduced two new top-level domains (TLDs), .zip and .mov. While the introduction of new domains and unique branding opportunities can be exciting, it’s essential to understand the potential dangers that may arise from the use of Google’s new domains. New opportunities, new threats One of the primary concerns with Google’s new… Continue reading Understanding the Potential Risks of Google’s New Domains

Dynamics 365 Business Central Service Management Module

Have you looked at the Service Management functionality in Dynamics 365 Business Central lately? It’s included in the Premium edition of Business Central. BC has evolved, and so has Service Management. What is Service Management in Business Central? The Service Management functions in Business Central can help companies exceed customer expectations and improve brand loyalty… Continue reading Dynamics 365 Business Central Service Management Module