Save Money & Go Eco-friendly in 3 Easy Steps

August 24th, 2020


Put Pallet Bands to the Test
Save Money & Go Eco-friendly in 3 Easy Steps
1. Get a Personalized Consultation
Sales engineer answering a customer call

It all starts with a simple phone call. Our sales engineers are ready to answer all of your questions and explain the benefits of Aero rubber pallet bands. Learn about which formula works best in your environment, your cost savings from using pallet band over plastic wrap, and more.

Call Us: 224-423-1708
2. Test Pallet Bands in Your Facility
EPDM, standard, and freezer pallet bands side by side

We’ll send you samples to try out in your facility at no cost. Made of high-quality materials, our bands perform well, and we want you to see the difference for yourself. So, we give you a chance to feel the quality, try them out under your conditions and ensure the sizing is accurate. Once you’re satisfied, we can help you transform your warehouse.

3. Count on Our Team for Help
warehouse employees applying a pallet band to a pallet

Get a customized quote for your needs. No matter if you need standard bands, packaging, or custom options, our team is here to help. In no time, you can have pallet bands in hand to implement a new stabilization method and a more streamlined warehouse process.

Ready to get started?
Email Us:
Call Us: 224-423-1708


August 18th, 2020

How Hackers Leverage COVID-19 to Disrupt Supply Chain Operations

Supply chain professionals can work with supplier contacts to initiate specific measures to ensure that supply chain partners are adequately prepared to minimize exposures to cyber risks.

Latest News

By SCMR Staff · August 17, 2020

by: SupplyChain Management Review

The COVID-19 working environment has created new IT vulnerabilities and has accentuated known vulnerabilities for commercial enterprises. .

Once a commercial IT network has been compromised, hackers may be able to steal sensitive information in a data breach or shut down systems operations until a ransom is paid. One can expect exploitation of the pandemic in cyberspace to include, but not be limited to, phishing, exploits with refined lures to either exploit information or install malware, or to exploit vulnerabilities in minimally populated and/or remote workplaces.

Phishing exploits

The most common method utilized by hackers to compromise IT networks is phishing. Phishing involves the impersonation of legitimate governmental, business, or personal entities in order to “fish” for a victim that will enable access to a network. This is often facilitated by tricking the victim into clicking a dubious link with malicious software — malware — embedded. Hackers often include information of public or personal interest to increase open and click rates.

With the emergence of the COVID-19 pandemic, hackers have seized the opportunity to develop “phishing lures” designed to exploit strong public demand for updates on the constantly evolving global health situation, accentuating the risk of attack by this method. In an emerging trend illustrative of the ingenuity of methods, hackers have been utilizing seemingly legitimate email addresses with domains that include a COVID-19 related username preceding the “@” in order to falsely convey authenticity.

Separately, hackers may trick users into downloading malicious attachments which can be circulated unwittingly by legitimate actors (i.e. employees and managers). This method can be paired with a phishing email but may also be used in any other context where a user may download or access files. For example, the emotet trojan, which has successfully hacked several German targets, utilized infrastructure such as Frankfurt municipal IT systems to distribute ransomware. Moreover, hackers have impersonated popular COVID-19 webpages by legitimate entities, either as a means to extract personally-identifiable information (PII), financial information (FI), or other credentials.

While phishing incidents do not initially disturb production activities to the extent of data breaches and ransomware, it is of the utmost importance to be mindful of the danger such campaigns pose. According to the Kill Chain model of cyber threat analysis, phishing campaigns are often the first step toward more sophisticated attacks.

It is by means such as phishing that, if not properly mitigated, ransomware operators can gain access to the intimate details of a company’s corporate network. From there, they can gain access to sensitive supply chain information, including details pertaining to production facilities. Therefore, it is essential that supply chain managers, in conjunction with their IT and physical security teams, understand and apply mechanisms for threat mitigation.

Remote and office workstation security exploits

The rapid transition to remote, digital workstation solutions and the corresponding decrease in activity at office workstations have generated new vulnerabilities for commercial enterprises. In a physical sense, below-average volumes of workers on-site create new opportunities for security breaches. Absences from stationary workstations or server rooms, or even the open display of PII, FI, and credentials around an office, can create an untold number of opportunities for an intruder or unauthorized visitor to compromise business systems. These opportunities even eliminate the need for phishing emails to gain access to such systems. Alternatively, it allows hackers the opportunity to better tailor phishing emails making them more authentic and actionable by referencing veracious details under the guise of a believable party in order to solicit information that can be used either to damage the company in its own right or to gain access to system information. These are called spear phishing lures.

In the digital space, new trends in workplace behavior and tool utilization have also led to innovative hacking techniques. Taking advantage of increased dependence on remote working solutions such as Zoom and Microsoft Teams, hackers have crafted impersonation URLs of the two virtual meeting solutions to trigger malware implantations. These applications comprise two vulnerabilities: UNC path injections, which launch unintended applications, and privilege escalation, which allows hackers to gain permissions to alter systems. This imperils both solutions by allowing hackers to insert their malware anywhere they please on a target’s system.[ii] [iii] An additional risk comes from the collection of PII, FI, or credential information from home virtual assistants. This is due to a voice recording stop fault in many common assistants. If hacked, this could provide a continuous source of critical information if recording continues.[iv] Reports of a broader hack exploiting these vulnerabilities have not yet manifested. Nonetheless, a failure to address individual vulnerabilities can jeopardize broader supply chain networks.

Supply chain professionals can work with supplier contacts to initiate specific measures to ensure that supply chain partners are adequately prepared to minimize exposures to cyber risks. Resilience360 recommends that customers work with their suppliers on the following measures:

Maintain data backups: Supply chain managers can work with suppliers to verify or stipulate that they are maintaining system backups. Regular and thorough backups are the best mitigation against ransomware, regardless of inclination to pay. As a best practice, companies which maintain ongoing, comprehensive backup programs create an effective “mirror” of current operations, enabling them to quickly jump to a parallel system in the event of an attack.

Know your defenses: Mindful that customers will be challenged to assess cybersecurity across the entirety of an organization, firewall and vulnerability mitigation should be prioritized for those with not only the greatest access to the customer’s host network, but also for those with the greatest exposure to threats. This measure of exposure includes factors such as industrial control systems known to be vulnerable, or location or in an industry known to be a frequent target for attacks. Keeping abreast of the latest threats that target backups can further enhance an organization’s defense posture.

Enhance physical security: Verify that suppliers have adequate measures in place to protect office environments from compromise. While offices remain below normal occupancy, customers should ensure that supplier facilities have secured any physical documents with potentially compromising PII, FI, and credentials to reduce exposure.

Synchronize threat preparation and response: Ensure that suppliers have business continuity in place should a cyberattack occur. Such preparation to enhance coordination and minimize confusion in the event that a crisis strikes can allow all parties involved to save time and act in unison to maintain supply chain agility.

Know the systems of your suppliers: Awareness of technological tools, hardware, equipment, and operational systems of suppliers can empower those responsible for information security on your team to anticipate potential disruptions and take a proactive role in helping supply chain managers to mitigate threats amongst suppliers.

Ensure social engineering awareness: Collaborate with IT partners to conduct realistic, frequent, and varied phishing testing at the supplier level and across the supplier network in order to identify vulnerabilities and reduce to the greatest extent possible the threat field that a potential hacker can exploit. Maintain information-sharing relationships with appropriate law-enforcement bodies to further enhance awareness and protection and encourage suppliers to do the same. Supply chain managers must also collaborate with IT teams to determine impact to a disrupted business, obligations to maintain cybersecurity, and standards to maintain, such as ISO/IEC 20071/2.

Does Your Manufacturing Facility Have Questions?

August 17th, 2020

Does Your Manufacturing Facility Have Questions?

Helpline image - horizontal


Click on the link below for assistance!

IMEC Helpline

About IMEC

IMEC is a team of improvement specialists and technicians dedicated to providing organizations in Illinois with the tools and techniques to create sustainable competitive futures. The experienced hands-on team at IMEC works closely with its clients to plan critical business improvements in the areas of Leadership, Strategy, Customer Engagement, Operations, and Workforce.



Check out these Used Collapsible 56x48x34″ 2 Hatch  – Reusable Containers! 

August 17th, 2020
Check out these
Used Collapsible 56
x48x34″ 2 Hatch
Reusable Containers! 
(Also available  – 57x48x34″)


Used Plastic Bulk Containers

Used Plastic Bulk Containers

Used Plastic Bulk Containers

Used Plastic Bulk Containers


Limited Quantities – Call Today!

Contact Courtney Material Handling, Inc.!


Introducing  Vestil’s New Beam Mover!

August 17th, 2020

Introducing  Vestil’s New Beam Mover!


Beam Mover

Posted by Courtney Material Handling, Inc. on Wednesday, August 12, 2020

 Beam Mover

The weight and length of I-beams make them difficult to maneuver between work areas. The forklift beam mover makes that process much more efficient. The built in fork pocket ensures safe positioning onto the lifting fork. Once in position simply slide the open bottom of the beam mover over the flange of the I-beam. This secures the beam to be easily lifted or taken to different areas. Powder-coated finish for added baked in toughness.

  • Easily secured to a forklift fork
  • Design style fits a variety of beam sizes
  • Steel construction for added strength
  • Slim design for minimum storage space

Call Courtney Material Handling, Inc. Today

To Get Your Quote!


Custom-Sized Reusable Containers – Contact Courtney Material Handling, Inc. … When “Close Enough” Isn’t!

August 10th, 2020



Custom-Sized Reusable Containers

Contact Courtney Material Handling, Inc. …

When “Close Enough” Isn’t!


Courtney Material Handling, Inc.  will work closely with you to ensure that you have the right container for the job.

Our welds pass the test!

Testing conducted by an independent lab proved through both compression and dynamic tests that our welds exceed the manufactures specifications. Details available on request.

August 10th, 2020


The META modular shelving system provides endless possibilities for your custom project of any size.  META’s large selection of accessories allows a highly custom design.  With capacity to build up to four shelf supported levels, there is no limit to what can be done.

META Modular Shelving System

Size Options
Many custom sizes are available.  Depending on project size, shelf size options are nearly limitless.
Visit our website to learn more about META CLIP and other product options 
  • Finish
    • Galvanized Steel: META uses galvanized steel for all CLIP Shelving products.  There is no upcharge for this feature, unlike our competitors.
    • Powder Coated: This finish can be added as an additional layer over the galvanized finish for added protection.
  • Back Panel Options
    • Open with x-bracing
    • Open without x-bracing (pass-through)
    • Closed back panels
    • Mesh back panels
    • Pegboard panels
  • Frame Options
    • Open
    • Closed
    • Mesh
    • Pegboard
  • Extensive Accessory Catalog
    • Drawers & drawer bins or dividers
    • Cabinets – Multiple height options
    • Dividers – Mesh or solid at varying heights
    • Bins or Troughs
    • Many more

Call Today For Your Custom Shelving Needs!

Courtney Material Handling Inc. is proud to represent the Pucel Line of Products.

August 10th, 2020


Courtney Material Handling Inc. is proud to represent the Pucel Line of Products.
Pucel is available to quote modifications to our standard product line or custom design to your requirements & specifications.

Pucel Customization of Standard Products

Contact Courtney Material Handling, Inc. Today

For Your Consultation and Quote!

Level Loader with Turntable Can be Fed with a Hand Pallet Truck

August 7th, 2020


Level Loader with Turntable

Can be Fed with a Hand Pallet Truck

Courtney Material Handling, Inc. and Southworth presents the PalletPal Roll-On Level Loader with Turntable.

The PalletPal Roll-On™ Level Loader with Turntable features a platform that lowers to floor height, so pallets can be placed on or removed from them using a hand pallet truck.  A built-in turntable allows users to effortlessly rotate loads so that they are always loading or unloading pallets from the near side eliminating the need to reach across or walk around the pallet.

Watch the video now.

Need More Space? Add a Modular Room.

August 5th, 2020

Need More Space?

Add a Modular Room.

From Inplant Offices to Cleanrooms, we partner with Porta-King Building Systems to offer the modular rooms you need built to your specifications.


We believe in building affordable structures that last. This drive has made

Porta-King’s modular rooms and enclosures a long-term solution for many industries because they are equal parts adaptable, dependable, and cost-effective.


Contact CMH Today!