ASUG Blog

ASUG Research Recap: 7 Truths About SAP Security
Adam Page
Adam Page in Cybersecurity October 11, 2018

ASUG Research Recap: 7 Truths About SAP Security

In our research recap covering 10 things to know about the cloud, we touched on a couple of insights related to security. While security may not be a topic with the buzz of cloud, artificial intelligence, or modern ERP, it will always relevant because it relates to all technologies. Even the most advanced innovations can have vulnerabilities or weaknesses. It’s the responsibility of every organization to stay ahead of these to protect their most valuable assets, whether it’s their data, customer information, or intellectual property.

Read more...
5 Common Cybersecurity Risks and 10 Areas to Fix
Paul Kurchina
Paul Kurchina in Cybersecurity, Best Practices, Cybersecurity Week, Security March 31, 2018

5 Common Cybersecurity Risks and 10 Areas to Fix

I guess mom is always right: We should never trust a stranger. Unfortunately, most of us don’t heed this advice when exchanging sensitive personal data and interacting freely across wireless and digital communication channels. From stolen intellectual property and customer data to operation shutdowns that leave people vulnerable, news headlines are giving us every reason to reconsider our false sense of security in the digital technology we use.

Read more...
Securing Your SAP Business One Deployment with Technical and People-Based Best Practices
Richard Duffy
Richard Duffy in GDPR, Cybersecurity, Security, SAP Business One March 16, 2018

Securing Your SAP Business One Deployment with Technical and People-Based Best Practices

Our most recent blog on GDPR was one of our most popular to date. In the post, we explored what these impending changes mean and unpacked the business implications of these updated rules and requirements for protecting the data of your customers from the European Union.

The next logical question for SAP Business One customers is, "How do I make sure that my SAP Business One deployment is protected against unauthorized access, both benign and malicious?" The answer to that question is not only technical, but also tied to your business processes..

Read more...
GDPR-Compliant Data Protection: For Consumers, It’s Personal
Paul Kurchina
Paul Kurchina in Security, Cybersecurity November 14, 2017

GDPR-Compliant Data Protection: For Consumers, It’s Personal

Operational disruptions, damaged reputations, data theft, financial loss, and regulatory fines — headlines worldwide have covered every possible downfall of a growing number of successful cyber attacks. Thanks to the media, awareness of the importance of personal data and its value is opening up the eyes of executives, as well as their employees and customers.

Read more...
5 Ignored Practices That Can Disarm Your Cybersecurity Time Bomb
Paul Kurchina
Paul Kurchina in Digital Transformation, Cybersecurity November 13, 2017

5 Ignored Practices That Can Disarm Your Cybersecurity Time Bomb

Year after year, data breaches become messier, bigger, and more dangerous — and no business or person is immune from cybersecurity attacks. In fact, any form of cyber crime can impact over half of the world’s population. That’s roughly 3.8 billion people, up from 2 billion in 2015 — and that attack population will grow to 75 percent as another 2.2 billion people gain access to the internet by 2022.

Read more...
Find the SAP Help You Need
Subscribe to First Five Newsletter
Learn About Joining ASUG
*