Access and Feeds

ERP Security: Two-Thirds of ERP Systems Leaky or Breached

By Dick Weisinger

Two-thirds of ERP apps have been breached within the last two years, according to a study by IDC/Onapsis.

Frank Dickson, Vice President at IDC, said that “ERP applications can be foundational for businesses. A breach of such critical ERP applications can lead to unexpected downtime, increased compliance risk, diminished brand confidence and project delays.”

What is the root of the security problems? ERP security issues are often caused by the following:

  • Delayed updates. 87 percent of ERP systems are not running with the most recent patches and updates.
  • Improper Access Rights. Properly setting access rights, who has permission to see which data, can be complex and can lead to security issues.
  • Training. Security training specific to the ERP software may be lacking, resulting in unintended system security lapses.
  • Leaky Integrations. Often ERP systems are integrated with other software applications or downloaded for use in spreadsheets. The other systems may not have security in place to protect the data.
  • Lax Passwords. Single factor authentication passwords can often be easy to hack.

The compromise of ERP data should be troubling. Larry Harrington, former Chairman of the Global Board of the Institute of Internal Auditors (IIA), said that “most concerning is the popularity of sales, financial data and PII, all of which should raise flags about the possibility of insider trading, collusion and fraud.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on DotNetKicks.com
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)
4 comments on “ERP Security: Two-Thirds of ERP Systems Leaky or Breached
  1. peopleux says:

    Great work. this was very helpful. new to this field

  2. Appsian says:

    Rightly Explained!! There are plethora of challenges a business owner has to face out of which these are the common ones. Keep sharing your knowledge.

  3. Appsian says:

    Thank you for sharing your blog, seems to be useful information can’t wait to dig deep!

  4. Khalid Mohammad says:

    Thank you for this blog.

Leave a Reply

Your email address will not be published. Required fields are marked *

*