text.skipToContent text.skipToNavigation

Information & Technology

Applied® recognizes the importance of information and technology. With established practices and policies around systems and cybersecurity, Applied adopts enterprise class systems to ensure the continuity of business and delivery of information to optimal points of use. We actively monitor technology trends to weigh risk and identify issues that drive continuous improvement efforts or provide necessary enhancements of our technology defenses. We employ a “see something, say something” approach to cybersecurity where all associates carry the responsibility to help protect and ensure the security and accuracy of our information. Cybersecurity courses – available through our internal online learning tool – outline e-mail safety measures and heighten our awareness of unusual requests, fraudulent phone solicitations and other questionable matters.

Through technology, Applied enables transparency and control to better manage operations and improve process efficiency. In addition, through our digital applications – like the Applied.com website, external and internal portals, and mobile applications – Applied provides customers, suppliers and associates access to information that deepens our business relationships, provides a more transparent engagement and enhances our ability to serve.

Data Protection

Applied® takes data protection seriously and strives to constantly use best practices to protect our associates’, customers’, and vendors’ confidential information. Our Privacy Policy addressing how we collect personal information through our websites, and how we use and disclose that personal information, is available at Applied.com.

Additional protective measures throughout Applied include:

• Hardening our network – continuing to fortify systems and applications in our network infrastructure

• Increasing security requirements – including two-factor authentication and more complexity in passwords

• Improving laptop / desktop tools – rolling out additional tools on our computers designed to “quarantine and control” malware

• Reducing risky technology – following industry best practices, including tighter controls over scripts run on company networks, among other measures

Did you Know?

User awareness and education are the keys to effective cybersecurity. Applied® adheres to plans and processes that keep us vigilant and help to safeguard our business.