Print this page

Estimated reading time: 1 minute, 20 seconds

insecurityOne of the first things to do when a computer system is implemented is to make a backup. This probably seems like a simple statement, and one that any enterprise serious about keeping their business alive has accounted for and has put on auto-pilot. But that's exactly the point. Every business has dedicated staff that is fully engaged with the business of their business, and that includes keeping the business functions running despite system failures. But what if those failures take place outside your own walls.

With the consistent movement toward moving computing resources outside the physical walls of the company, it's easy to lose track of just who is backing up what, and what connections are being used or not used. It's also easy to assume that every connection to your cloud based system is secure and legitimate. And because of this remote control we now practice we are left to rely on our systems providers to assure that all is well. 

When the last connection in your supply chain is your ERP hosted on servers within your company then you're doubly vulnerable because of the confidence you've developed with your cloud systems hosts. Your confidence may well be deserved, but it's still possible for rogue connections to infiltrate the chain of interconnects that make up the supply chain beyond the confines of your own connections.

The steps needed to maintain a secure environment within your firewalls remain the same as they have been, the difference is in the will and direction needed to monitor and enforce what used to be strict procedures for security and validation. Last modified on Tuesday, 10 December 2013
Read 1981 times
Rate this item
(0 votes)
Tagged under
Scott Koegler

Scott Koegler is Executive Editor for PMG360. He is a technology writer and editor with 20+ years experience delivering high value content to readers and publishers. 

Find his portfolio here and his personal bio here

PMG360 is committed to protecting the privacy of the personal data we collect from our subscribers/agents/customers/exhibitors and sponsors. On May 25th, the European's GDPR policy will be enforced. Nothing is changing about your current settings or how your information is processed, however, we have made a few changes. We have updated our Privacy Policy and Cookie Policy to make it easier for you to understand what information we collect, how and why we collect it.
Ok Decline