Cyber Security: Identifying technologies to cover vulnerabilities
Jan27

Cyber Security: Identifying technologies to cover vulnerabilities

Companies collect and store mass amounts of data on their users including personal information, credit cards, user habits, preferences, and patterns. Personal data is collected and stored with almost every activity we engage in, whether it be participating in a transaction, visiting a location, sending a message online or, in some cases, even just walking in or around a...

Read More
Why taking care of your smallest suppliers is important
Nov22

Why taking care of your smallest suppliers is important

When I was running a manufacturing business and responsible for delivering final goods to an end user in the defence sector, our team had become very comfortable with our supply chain and since we didn’t have any issues for so many years, there never seemed to be a huge urgency to fix anything. After all why to fix it...

Read More
Boosting procurement opportunities for Aboriginal businesses
Jun03

Boosting procurement opportunities for Aboriginal businesses

Despite growing up in a small town in rural Canada, I didn’t have a lot of exposure to our Aboriginal communities. I knew about them. I had taken history in university after all and was often horrified when I read of our nation’s past and current treatment of this community. My uncle, who served in the RCMP, was involved...

Read More