SlideShare a Scribd company logo
1 of 20
BIS
Business Information
System
Vulnerability and
Protection of Business
Management Systems:
Threats and
Challenges
Presentor: Furqan Yasin
Authors: Ivan Stankov , Georgi Tsochev,
Published 2020
BIS
Business Information System
Introduction
W ith d evelop in g BIS n eed to
tac kle c y b er c rime is also
evolvin g .
Outline
• Major business Information System
• Most common vulnerabilities
• recommendations for stopping
different kind of threats against
them
Add a footer 3
FR
Introduction
• Significant portion of security vulnerabilities as new
products are continually introduced in the market.
• Business operations are carried out through technology.
• As businesses become more flexible, “computer
security” becomes “information security”.
Add a footer 4
FR
Review of enterprise systems
E nterp rise Resou rc e Plan n in g Systems
Enterprise Resource Planning Systems
ERP systems integrate information about different business units and processes
into one organization, providing a highly centralized and always up-to-date look
at key areas such as sales, manufacturing, finance/accounting, human resources
management and others ERP systems represent the business critical
infrastructure of the world.
Add a footer 5
FR
From a technical point of view, the system can
be divided into the following layers
1. Layer of the operating system
2. Database layer
3. Business infrastructure layer,
4. business logic layer
Add a footer 6
Source: https://www.omniaccounts.co.za/the-meaning-of-erp/
FR
Add a footer 7
Custom Relationship Management Systems
The purpose of customer relationship
management (CRM) is to identify,
acquire and retain clients.
CRM software or systems include sales,
customer service and support, call
centers, sales automation systems and
order management
Source: https://fitsmallbusiness.com/crm-process/
FR
Add a footer 8
Supply Chain Management Systems
SCM is the management of the flow of goods, data and finances related to a product or
service, from the purchase of raw materials to the delivery of the product to its final
destination.
Business Information System Type
Source: https://www.datalytics.it/supply-chain-management/
FR
Add a footer 9
Knowledge Management Systems
A knowledge management system is
defined as information systems designed
specifically to facilitate the classification,
collection, integration and dissemination
of organizational knowledge.
Source: https://monday.com/blog/project-management/knowledge-
management-system/
FR
E nterp rise Resou rc e Plan n in g ( E R P)
Vu ln erab ilities
Add a footer 10
Vulnerabilities of Enterprise Applications
1. Lack of competent specialists;
2. Lack of security audit tools;
3. Traffic Capture and Modification
4. Protocol vulnerabilities
5. Web application vulnerabilities
FR
Cu stom Relation sh ip Man agement Systems
Add a footer 11
CRM Vulnerabilities
1. Denial of service
2. Intrusion into sales automation
systems and customer database
3. Identity Theft
4. Malware attacks
FR
S u p p ly Ch ain Man agement Systems
Add a footer 12
SCM Vulnerabilities
1. Cybersecurity threats in the supply
chain
2. Improper management of cloud
access
3. Third party data trust
4. IoT compromise
5. Physical device tampering
FR
Kn owled ge Man agement Systems
Add a footer 13
KM Vulnerabilities
1. must take cyber-attacks
into account
2. accessibility and reliability
3. browser security
4. data security and privacy
issues
Security Measures for Enterprise Applications
FR
solu tion s
Add a footer 15
ERP Security
1. Double and triple check your system configurations
2. Update your ERP software regularly
3. Set up an ERP system administrator
4. Full access rights
5. Create strong protection against Ransomware/Malware
6. Reduce internal human errors
7. Failure to comply
FR
Cu stom Relation sh ip Man agement Systems
Add a footer 16
CRM Security
1. Counteracting DoS attacks
2. Protect your data
3. Choose a reliable CRM provider
4. Educate your employees
FR
S u p p ly Ch ain Man agement Systems
Add a footer 17
SCM Security
1. Cyber security compliance
requirements in the supply
chain
2. Supply Chains and Cloud
3. Monitoring for threats and new
technologies
FR
Kn owled ge Man agement Systems
Add a footer 18
KM Security
Businesses, every time they use the
services of cloud providers, must
implement the ISO/IEC 27002
framework, which consists of three
broad categories:
1. organizational infrastructure,
2. technical infrastructure and
3. information security,
BIS
Business
Information System
Conclusion
The complete security of corporate applications is a
multi-step procedure that businesses must consider.
And each stage is critical as creating a safe
environment is similar to constructing a wall: if a
component is lacking, it might topple with the slightest
movement.
FR
THANK YOU
Add a footer 20

More Related Content

Similar to BIS PPT A1.pptx

{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Gross, Mendelsohn & Associates
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docxmccormicknadine86
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2sparkeyrob
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20Jesse Wilkins
 
Evolution of erp systems
Evolution of erp systemsEvolution of erp systems
Evolution of erp systemsPrayukth K V
 
SCM CRP ERP Decision Support
SCM CRP ERP Decision SupportSCM CRP ERP Decision Support
SCM CRP ERP Decision Supportankit_sharma869
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWinfosec train
 

Similar to BIS PPT A1.pptx (12)

{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docxCOMMONALITY AND DIVERSITY OF OPERATING SYSTEMS                .docx
COMMONALITY AND DIVERSITY OF OPERATING SYSTEMS .docx
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
 
Evolution of erp systems
Evolution of erp systemsEvolution of erp systems
Evolution of erp systems
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
SCM CRP ERP Decision Support
SCM CRP ERP Decision SupportSCM CRP ERP Decision Support
SCM CRP ERP Decision Support
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
 

Recently uploaded

Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 

Recently uploaded (20)

Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 

BIS PPT A1.pptx

  • 1. BIS Business Information System Vulnerability and Protection of Business Management Systems: Threats and Challenges Presentor: Furqan Yasin Authors: Ivan Stankov , Georgi Tsochev, Published 2020
  • 2. BIS Business Information System Introduction W ith d evelop in g BIS n eed to tac kle c y b er c rime is also evolvin g .
  • 3. Outline • Major business Information System • Most common vulnerabilities • recommendations for stopping different kind of threats against them Add a footer 3
  • 4. FR Introduction • Significant portion of security vulnerabilities as new products are continually introduced in the market. • Business operations are carried out through technology. • As businesses become more flexible, “computer security” becomes “information security”. Add a footer 4
  • 5. FR Review of enterprise systems E nterp rise Resou rc e Plan n in g Systems Enterprise Resource Planning Systems ERP systems integrate information about different business units and processes into one organization, providing a highly centralized and always up-to-date look at key areas such as sales, manufacturing, finance/accounting, human resources management and others ERP systems represent the business critical infrastructure of the world. Add a footer 5
  • 6. FR From a technical point of view, the system can be divided into the following layers 1. Layer of the operating system 2. Database layer 3. Business infrastructure layer, 4. business logic layer Add a footer 6 Source: https://www.omniaccounts.co.za/the-meaning-of-erp/
  • 7. FR Add a footer 7 Custom Relationship Management Systems The purpose of customer relationship management (CRM) is to identify, acquire and retain clients. CRM software or systems include sales, customer service and support, call centers, sales automation systems and order management Source: https://fitsmallbusiness.com/crm-process/
  • 8. FR Add a footer 8 Supply Chain Management Systems SCM is the management of the flow of goods, data and finances related to a product or service, from the purchase of raw materials to the delivery of the product to its final destination. Business Information System Type Source: https://www.datalytics.it/supply-chain-management/
  • 9. FR Add a footer 9 Knowledge Management Systems A knowledge management system is defined as information systems designed specifically to facilitate the classification, collection, integration and dissemination of organizational knowledge. Source: https://monday.com/blog/project-management/knowledge- management-system/
  • 10. FR E nterp rise Resou rc e Plan n in g ( E R P) Vu ln erab ilities Add a footer 10 Vulnerabilities of Enterprise Applications 1. Lack of competent specialists; 2. Lack of security audit tools; 3. Traffic Capture and Modification 4. Protocol vulnerabilities 5. Web application vulnerabilities
  • 11. FR Cu stom Relation sh ip Man agement Systems Add a footer 11 CRM Vulnerabilities 1. Denial of service 2. Intrusion into sales automation systems and customer database 3. Identity Theft 4. Malware attacks
  • 12. FR S u p p ly Ch ain Man agement Systems Add a footer 12 SCM Vulnerabilities 1. Cybersecurity threats in the supply chain 2. Improper management of cloud access 3. Third party data trust 4. IoT compromise 5. Physical device tampering
  • 13. FR Kn owled ge Man agement Systems Add a footer 13 KM Vulnerabilities 1. must take cyber-attacks into account 2. accessibility and reliability 3. browser security 4. data security and privacy issues
  • 14. Security Measures for Enterprise Applications
  • 15. FR solu tion s Add a footer 15 ERP Security 1. Double and triple check your system configurations 2. Update your ERP software regularly 3. Set up an ERP system administrator 4. Full access rights 5. Create strong protection against Ransomware/Malware 6. Reduce internal human errors 7. Failure to comply
  • 16. FR Cu stom Relation sh ip Man agement Systems Add a footer 16 CRM Security 1. Counteracting DoS attacks 2. Protect your data 3. Choose a reliable CRM provider 4. Educate your employees
  • 17. FR S u p p ly Ch ain Man agement Systems Add a footer 17 SCM Security 1. Cyber security compliance requirements in the supply chain 2. Supply Chains and Cloud 3. Monitoring for threats and new technologies
  • 18. FR Kn owled ge Man agement Systems Add a footer 18 KM Security Businesses, every time they use the services of cloud providers, must implement the ISO/IEC 27002 framework, which consists of three broad categories: 1. organizational infrastructure, 2. technical infrastructure and 3. information security,
  • 19. BIS Business Information System Conclusion The complete security of corporate applications is a multi-step procedure that businesses must consider. And each stage is critical as creating a safe environment is similar to constructing a wall: if a component is lacking, it might topple with the slightest movement.
  • 20. FR THANK YOU Add a footer 20