ASUG Blog

5 Common Cybersecurity Risks and 10 Areas to Fix
Paul Kurchina
Paul Kurchina in Security, Cybersecurity Week, Best Practices, Cybersecurity March 31, 2018

5 Common Cybersecurity Risks and 10 Areas to Fix

I guess mom is always right: We should never trust a stranger. Unfortunately, most of us don’t heed this advice when exchanging sensitive personal data and interacting freely across wireless and digital communication channels. From stolen intellectual property and customer data to operation shutdowns that leave people vulnerable, news headlines are giving us every reason to reconsider our false sense of security in the digital technology we use.

Read more...
Securing Your SAP Business One Deployment with Technical and People-Based Best Practices
Richard Duffy
Richard Duffy in SAP Business One, Security, Cybersecurity, GDPR March 16, 2018

Securing Your SAP Business One Deployment with Technical and People-Based Best Practices

Our most recent blog on GDPR was one of our most popular to date. In the post, we explored what these impending changes mean and unpacked the business implications of these updated rules and requirements for protecting the data of your customers from the European Union.

The next logical question for SAP Business One customers is, "How do I make sure that my SAP Business One deployment is protected against unauthorized access, both benign and malicious?" The answer to that question is not only technical, but also tied to your business processes..

Read more...
GDPR-Compliant Data Protection: For Consumers, It’s Personal
Paul Kurchina
Paul Kurchina in Security, Cybersecurity November 14, 2017

GDPR-Compliant Data Protection: For Consumers, It’s Personal

Operational disruptions, damaged reputations, data theft, financial loss, and regulatory fines — headlines worldwide have covered every possible downfall of a growing number of successful cyber attacks. Thanks to the media, awareness of the importance of personal data and its value is opening up the eyes of executives, as well as their employees and customers.

Read more...
5 Ignored Practices That Can Disarm Your Cybersecurity Time Bomb
Paul Kurchina
Paul Kurchina in Digital Transformation, Cybersecurity November 13, 2017

5 Ignored Practices That Can Disarm Your Cybersecurity Time Bomb

Year after year, data breaches become messier, bigger, and more dangerous — and no business or person is immune from cybersecurity attacks. In fact, any form of cyber crime can impact over half of the world’s population. That’s roughly 3.8 billion people, up from 2 billion in 2015 — and that attack population will grow to 75 percent as another 2.2 billion people gain access to the internet by 2022.

Read more...
2018_Talent_Hub_300 (002).jpg
First-Five-Internal-Ad.jpg
Membership-Internal-Ad.jpg
*