![]() The following applies to any software: the more complex, the more error-prone. For example, where are the weak points and what can companies do to arm themselves? First answers to these questions are given in the following article, which is based on an expert survey by ERP News. ![]() This drastic scenario raises some questions for many companies. What can happen if protection is lacking here was already demonstrated at the end of 2015 at the Black Hat Europe conference: Experts have attacked ERP applications of an oil company in order to manipulate pipeline pressure. An often underestimated and neglected Achilles heel is the ERP system. No wonder, since there are enough weak points that hackers can use. ![]() 74 percent of the nearly 800 IT and IT security managers surveyed rate the extent of the threat as high or very high. According to this study, German companies see cyber attacks as the greatest risk for their own IT. This is also shown by the current CISO study. Despite this great importance, the security of such solutions hardly plays a role.Ĭyber security is a central issue for company decision-makers. Because it collects and analyzes data that is indispensable for business progress. The ERP system is becoming more and more like a technological node. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |