SAP-Solution: Cyberattacken
August 2, 2023
Cyberattacks on SAP systems and operational technology (OT) can have devastating consequences for companies: from delays in operations to the shutdown of all processes. The following tricks help to ward off hackers.
July 4, 2023
The good news: The productive SAP systems survived all the auditors' checks and drove the penetration testers to despair. And then: An attacker hijacked the highly secure system.
28 March 2023
The security precautions that IT organizations have taken are not sufficient at the back and front. The measures taken so far simply do not lead to sufficient resilience
March 15, 2023
More and more public authorities and companies are taking the plunge into the cloud. However, successful and sustainable digitization with the help of cloud computing cannot work without a cloud strategy including GRC management.
21 December 2022
Defending against cyberattacks on SAP systems means more than just protecting the ERP system alone. The threat potential of networked companies and hybrid SAP landscapes requires a holistic approach.
November 9, 2022
Phishing attacks are among the greatest threats to IT security. A targeted reduction of the vulnerabilities that cybercriminals use to gain access to their victim's system is called for.
May 4, 2022
One realization these days is that security is a vulnerable commodity. Critical infrastructures such as nuclear power plants and hospitals are becoming targets of warlike aggression, and at the same time cyberattacks are increasing on an unprecedented scale.
January 16, 2020
IT security is to maintain control over complex networks and immense amounts of data. AI is making enormous progress due to technical development. Can AI solve the challenges of IT security?
July 1, 2016
The costs of cyberattacks on German companies amounted to more than 6.6 million euros per attack across all industries in 2015.
July 1, 2016
Despite the fact that CIOs are becoming more creative and their influence is increasing, nearly two-thirds (65 percent) believe that a skills shortage is preventing their company from keeping pace with developments.
July 3, 2015
Deceptive security: Eight out of ten Austrian companies have already experienced an IT incident.
June 22, 2015
A study has identified the most commonly used attack methods on SAP systems. A large proportion of the SAP systems examined have vulnerabilities that allow hackers to gain access to sensitive information and disrupt business-critical corporate processes.