{"id":142803,"date":"2024-06-07T07:00:00","date_gmt":"2024-06-07T05:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=142803"},"modified":"2024-06-20T11:13:13","modified_gmt":"2024-06-20T09:13:13","slug":"why-sap-systems-urgently-need-more-cyber-security","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/why-sap-systems-urgently-need-more-cyber-security\/","title":{"rendered":"Why SAP Systems Urgently Need More Cyber Security"},"content":{"rendered":"<p>Ransomware incidents alone have increased fivefold since 2021, and the increase in dark web chats about SAP vulnerabilities is similarly high. No wonder, with over 400,000 customers accounting for almost 90 percent of global trade volume, SAP landscapes are a profitable target for financially motivated exploits. This is where the \"crown jewels\" of corporate data are managed, including design plans and recipes, confidential financial results and pricing strategies, credit card data and personal HR data. SAP knows everything, and without SAP, usually nothing works. Regardless of whether the attackers are looking to steal know-how, manipulate finances, trade in stolen data or ransom money: Security leaks in SAP systems can hit companies to the core.\u00a0<\/p>\n\n\n\n<p>Yet SAP remains a blind spot on the IT security map for many companies. Why do companies so often massively underestimate ERP security risks?<\/p><div id=\"great-2503495844\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>Cyber-attacks only affect the big players. No. According to the \"Wirtschaftsschutz 2023\" study (Economic Security) published by the digital association Bitkom, around three-quarters of all German companies were victims of cybercrime last year. Attackers are forming alliances, expanding their \"services\" and systematically targeting small and medium-sized businesses\u2014all with a high degree of specialization and sophisticated methods. Criminal tactics are becoming increasingly professional, with the average incident taking six months to detect and resolve\u2014plenty of time for attackers to steal data, manipulate systems, and cover their tracks.<\/p>\n\n\n\n<p>Certificates and audits will do. No! Neither the auditor's certificate nor security audits can identify all vulnerabilities and anticipate future security gaps. New legislation, such as the forthcoming implementation of the NIS2 directive at the end of 2024, is helping to harmonize security levels across the EU at a high level. But even complying with all legal obligations should not lull companies into a false sense of security. ERP systems are complex and difficult to protect due to their integration into a networked IT landscape\u2014the number of potential gateways increases with each interface. Moving ERP workloads to the cloud also redefines security standards. The fact is that cyberattacks cannot be completely avoided. It is important to keep an eye on cybercrime trends, translate threats into individual security concepts, and ensure a fast response time in the event of an emergency.\u00a0<\/p>\n\n\n\n<p>According to the Data Breach Investigations Report, insiders are responsible for about one-fifth of all security incidents\u2014not always with criminal intent, but often due to negligence and lack of risk awareness. With the democratization of AI, this flank will become even more vulnerable in the coming years. Today, AI translation tools can localize phishing emails at native speaker level in seconds, and AI-powered voice generators create deceptively realistic deepfakes for CEO scam calls from voice snippets.&nbsp;<\/p>\n\n\n\n<p>According to a survey of the SAP community, 45 percent of German companies do not consider their SAP systems adequately protected, and only 10 percent feel very well prepared to remain operational in the event of an attack. About a quarter do not even have IT security on their agenda. However, solid baseline protection requires the consistent use of technology resources that have long been available.<\/p>\n\n\n\n<p>Timely patches and updates are a must. Reliable update management is essential for quickly closing security gaps in on-premises systems. SAP has invested in the usability of the system architecture to make it easier to deploy security patches for S\/4 Hana.<\/p>\n\n\n\n\n\n\n\n<p>Click here for the partner entry:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/e3mag.com\/en\/partners\/sivis-gmbh\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"430\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1.jpg\" alt=\"\" class=\"wp-image-142495\" style=\"width:250px\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-400x215.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-768x413.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-100x54.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-480x258.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-640x344.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-720x387.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-18x10.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/06\/SIVIS_pointsharp_Logo_oClaim_CMYK-1-600x323.jpg 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Evaluations of cybercrime set alarm bells ringing.<br \/>\nThe threat situation for ERP is intensifying. According to a study, the number of cyberattacks on SAP landscapes reached a new high in 2023.<\/p>","protected":false},"author":2126,"featured_media":135812,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[7,21,43962],"tags":[],"coauthors":[37982],"class_list":["post-142803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag-24-06","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2023\/12\/23-12-Schloss-shutterstock_373984270-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Auswertungen zur Cyberkriminalit\u00e4t lassen die Alarmglocken schrillen.<br \/>\nDie Bedrohungslage f\u00fcr ERP versch\u00e4rft sich. Im Jahr 2023 erreichte laut einer Studie die Zahl der Cyberattacken auf SAP-Landschaften einen neuen H\u00f6chststand.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-24-06\/\" rel=\"category tag\">MAG 24-06<\/a>","author_info_v2":{"name":"Philipp Latini, Pointsharp","url":"https:\/\/e3mag.com\/en\/author\/philipp-latini\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/142803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2126"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=142803"}],"version-history":[{"count":4,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/142803\/revisions"}],"predecessor-version":[{"id":143185,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/142803\/revisions\/143185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/135812"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=142803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=142803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=142803"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=142803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}