COVID-19: How United VARs Members are Responding
COVID-19 has affected businesses throughout the world and while work didn’t stop, many workplaces did - with employees having to adapt to new ways and methods of working. We were interested to know how United VARs members have been responding to these challenges to support customers, colleagues and communities. It is apparent technology is playing an important role in building the world’s business confidence back up again and we would like to share a snapshot of some examples of what members are doing and saying during the pandemic.read more
COVID-19 and Beyond - How to manage risk in your supply chain and prepare for future disruptions
At the beginning of this year, organizations had no idea what was going to happen and how unready their supply chains were for facing the Covid-19 pandemic. In his recent video presentation, Mr. Tomas Fertig, CEO and president of Seidor USA, gives some tips on how companies can adapt to the current changes and also how to compose risk mitigation plans for future disruptions.
What the future looks like for businesses after Covid-19
There is much more to the future Post Covid-19 than just pulling off the "dust sheets" and restarting business operations as they were before. Companies will be working out new ways to get their employees back in the offices and working safely. Supplies will need re-ordering and everyday processes re-booting. Sectors, like hospitality, may have to stay mothballed for a bit longer before it’s wise to re-open and demand picks up, but even if it's not happening at the moment– there is a feeling that now is a right time for preparations to be made.
Cybersecurity in times of Coronavirus
The hasty implementation of remote working exposes companies to cyber attacks
As a result of the coronavirus, many companies have taken preventive remote working for their employees as a protective measure. Which, in many cases, is a hasty and impromptu move that has forced employees to make use of their own computers and technology to access corporate resources. Thus, exposing data and resources of the companies to possible cyber attacks.
stronger than one