« Back to blog main page

Blog

CAN OLD ERPs BE FUNNY? FIND OUT HERE

Twitter Feed

Securing Your Data, Securing Your ERP: New White Paper

Security is a grave issue in today’s increasingly networked world. The best defense against an attack is to protect both your ERP and your data.

In this brand new white paper, prepared by David Lagacé, security expert and Syntax’s Senior Network Analyst, we’ve outlined the top 16 Security Pain Points and our exclusive 360 degree protection solutions.

 

 

 

  1. Inventory Your Software

Every business has poorly controlled machines that are more likely to be running unneeded, unpatched and unmonitored software, these can introduce security flaws.

  1. Secure Configurations on Workstations and Servers

Default accounts and passwords, open services, older protocols, etc. are all easily exploitable. Even strong configurations must be continuously monitored and managed to avoid security flaws.

  1. Vulnerability Assessments and Remediation

Organizations that fail to scan for vulnerabilities and proactively address any flaws put their systems at risk of attack. Gaps form between threat advisories and new patches with when their final application occurs. Be better informed of any security flaws with vulnerability assessments.

  1. Administrative Privileges

Misuse of and lack of control over administrative privileges is an easy method for attackers to infiltrate a target enterprise.

  1. ERP Security and Audit Logs

With loose or deficient security logging, hackers can attack with impunity without the system owners knowing what’s going on.

  1. Malware Protection

Malicious software is a dangerous aspect of online threats and can be designed to attack systems, devices and data.

  1. Control of Network Ports, Protocols and Services

Attackers comb the internet for network services that are vulnerable to exploitation in order to access a system and cause damage.

  1. Data Recovery Capability

When a system has been compromised it can extremely difficult for organizations without trustworthy data recovery capabilities to restore systems and remove all aspects of the attackers’ presence on the network.

  1. Configurations for Network Devices

Attackers search for vulnerabilities in firewalls, routers and switches to penetrate system defenses. They then exploit these flaws to gain access to networks, then sample traffic flows to attempt to discover sensitive, unencrypted information.

  1. Boundary Defenses

Increased interconnectivity within and between organizations, as well as the increased use of wireless technologies, has led to the diminishing of the boundaries between internal and external networks. These blurred lines can allow attackers access inside networks while bypassing protective systems.

  1. Data Protection

Data is everywhere. While some data is leaked or lost due to theft or espionage, the larger reason for these issues results from missing data practices, lack of effective policies and user error.

  1. User Accounts Monitoring

Attackers seek out and exploit inactive user accounts (such as those of contractors or terminated employees) to impersonate legitimate users and gain access to enterprise systems.

  1. Security Awareness and Training

People are the most common factor leading to information security failures. Make your personnel your first line of defense through security awareness training.

  1. Application Software

Attackers look to take advantage of coding or logic errors, incomplete requirements and failure to test for unusual conditions and use them for their own malicious purposes.

  1. Incident Response and Management

It is too late after an incident occurs to develop the right procedures that would allow a business to successfully recover from an attack. An incident response plan is the best proactive defense.

  1. External and Internal Penetration Testing

Attackers exploit gaps between current best security practices and their implementation or maintenance. The best way to prevent an attack is to know where it could be coming from.

Download the White Paper to learn more about each of these pain points and Syntax’s unique and unparalleled comprehensive Security Solution.

Contact David Lagacé 1-877-968-2948 / dlagace@syntax.com

 

« All Blog posts