Search
How To Detect Insider Threats In Your ERP System
Insider Threats Are Becoming More Frequent and More Costly to Organizations. Especially Those Using Legacy ERP Systems. Here’s How You Can Proactively Prevent the Risk of Insiders Compromising Data While data breaches caused by hacking/phishing/ransomware tend to grab the most headlines, most data security incidents are from trusted insiders with access to sensitive data and…
Using Advanced Analytics To Improve ERP System Performance
Improve ERP System Performance with Real-Time Data Access & Usage Visibility Your ERP system is a complex ecosystem with multiple deployments, serving hundreds to thousands of users. All of which are processing batch jobs, completing transactions, and performing daily functions that are the lifeblood for operations. Sitting at the center of this ecosystem is your…
How IT Can Use ERP Data To Become A Hero To Their Business Stakeholders
When business stakeholders come to you looking for answers, having visibility and context around ERP data access and usage gives you the actionable insight necessary to provide value. As a leader of Enterprise Applications, customizing legacy ERP applications like PeopleSoft, SAP ECC, Oracle EBS, etc., to meet your business’ exact process specifications can leave you…
Are Advanced Persistent Threats (APT) Haunting Your ERP Applications?
Halloween 2020 (the day, not another movie) is right around the corner. Usually, I’m thinking about spirits and haunted houses and candy. Now that I’m working for a company that helps organizations defend their ERP data, my mind wanders to a more sinister “spirit” that might be haunting the halls of your legacy ERP system:…
Data Breaches Are Going Up, While Cybersecurity Training Is… Going Down?
According to a recent Shred-It survey, both senior leaders and employees indicated data breaches doubling in frequency in the last few years. Consequently, these same groups also reported modest but still peculiar decreases in cybersecurity training commonly used to identify tactics like phishing, ransomware, or other malicious software. Senior leaders saw a 6% drop, and…
SAP Access Control: A Beginner’s Guide To SAP Dynamic Authorization
As your company’s digital footprint grows, you can enhance your security posture by complementing your existing SAP Role-Based Access Controls (RBAC) with dynamic, Attribute-Based Access Controls (ABAC) to strengthen authentication and authorization. Both RBAC and ABAC are ways that organizations can control authentication and authorization, but they perform different functions across an enterprise IT stack….
5 Years for Creating Vendors and Paying Them
Do you know what applications your employees have access to and what they’re actually doing with that access? NJ Transit is yet another organization that found out the hard way what can happen if you don’t. An NJ Transit supervisor just pleaded guilty to stealing $2.1M by creating vendors and then paying them. These vendors…
Material Weaknesses in the Second Quarter
As part of FERF’s and Pathlock Technologies’ ongoing research into ICFR, we have created a program to automatically review all quarterly public filings and highlight those companies that have reported a material weakness. We are aggregating that information into meaningful data to show trends for you to review. Material weaknesses continued a cyclical pattern of…
Monitoring High Privileged User Activity In PeopleSoft And SAP Using Appsian360
We are in the midst of a perfect storm of ERP security calamity: the greatest work from home experiment colliding with historic levels of employee churn and unemployment. Hackers are exploiting the situation by launching phishing, spear-phishing, and other social engineering attacks at remote workers to gain access to privileged user accounts and email passwords….