2019: ERP In the Crosshairs
ERP systems typically hold the keys to the kingdom for an organization. Names, national identifiers, bank account info and proprietary company financial data are just... 1 min
ERP systems typically hold the keys to the kingdom for an organization. Names, national identifiers, bank account info and proprietary company financial data are just... 1 min
We are in the midst of a perfect storm of ERP security calamity: the greatest work from home experiment colliding with historic levels of employee... 1 min
In the recent past, there has been quite an upsurge in data breaches. These high-profile breaches have highlighted the issue of data security. Organizations worldwide... 1 min
As regular readers of this blog know, I frequently talk about my experiences performing security assessments. These assessments typically cover an organization’s network infrastructure and... 1 min
The first step toward building a realistic multi-factor authentication strategy is to integrate MFA into business practices and monitor vendors. Ultimately, make sur 1 min
Zero Trust security is based on the principle of ‘never trust, always verify’. First introduced by Forrester Research, a Zero Trust approach requires all users... 1 min
The news is flooded with stories about cybercriminals successfully engaging in phishing and social engineering aimed at exploiting people’s COVID-19 fears, all in order to... 1 min
Working from home can, at times, feel like a prison. If you’re one of the lucky ones, you have video conferencing and it isn’t overloaded... 1 min
ERP data, being a treasure trove of vital enterprise information, truly reflects your business. All relevant information related to an organization is included in the... 1 min
Sensitive data is typically managed and stored in applications. In our new connected world, users are connecting to those applications from a variety of devices... 1 min