{"id":10547,"date":"2023-03-21T08:16:00","date_gmt":"2023-03-21T06:16:00","guid":{"rendered":"https:\/\/ca.syspro.com\/blog\/?p=10547"},"modified":"2023-05-30T12:25:39","modified_gmt":"2023-05-30T10:25:39","slug":"how-to-secure-your-erp-system","status":"publish","type":"post","link":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/","title":{"rendered":"How to secure your ERP system"},"content":{"rendered":"<p>Manufacturers depend on their ERP system to optimize business processes, unify their different functions and platforms, and provide them with information to make decisions. But with ransomware and cyberattacks on the rise, securing the <a href=\"\/product\/erp-system\/\" target=\"_blank\" rel=\"noopener\">ERP system<\/a> is now becoming a top priority.<\/p>\n<h2>Why are ERP systems attacked?<\/h2>\n<p><strong>ERP systems contain very important and confidential information. Successful exploitation could lead to:<\/strong><\/p>\n<ul>\n<li>Theft of personally identifiable information about employees, customers, and suppliers<\/li>\n<li>Access to or loss of financial records<\/li>\n<li>Disruption of critical business operations by corrupting data, or shutting processes down<\/li>\n<li>Loss or changes to traces, logs, and other files<\/li>\n<\/ul>\n<p><strong>For many companies, the consequences of a cyber-attack would be devastating.<\/strong><\/p>\n<h2>The challenge of securing an ERP system<\/h2>\n<p>Companies may not secure their ERP systems as thoroughly as they should because of the size and complexity of the task. An ERP application consists of a wide range of elements, including processes and workflow, master data, and hardware and network infrastructure. There are also many integration points with other IT applications inside and outside of the organization.<br \/>\nFor their on-premise <a href=\"\/product\/erp-system\/\" target=\"_blank\" rel=\"noopener\">ERP system<\/a>, few businesses have the IT resources and skills to provide the high level of security. That is why the <a href=\"\/product\/business-digitalization\/syspro-cloud-erp\/\" target=\"_blank\" rel=\"noopener\">cloud<\/a> is a better security solution.<\/p>\n<ul>\n<li>Physical security \u2014 A server in an office or a factory can be accessed, damaged or even stolen. Cloud vendors comply with many of the strictest IT security standards.<\/li>\n<li>Software security \u2014 No manufacturer could afford to have the number of IT staff that cloud vendors employ to ensure systems and networks are thoroughly analyzed and protected.<\/li>\n<\/ul>\n<p>On-premise legacy systems are also open to attack because they don\u2019t have the level of security nor staff with the required depth of skill to protect them from attacks.<\/p>\n<h2>Potential vulnerabilities<\/h2>\n<p><strong>There are many routes that cyber attackers can use to target a company\u2019s ERP system:<\/strong><\/p>\n<ul>\n<li>Network \u2014 inception and modification of network traffic<\/li>\n<li>Operating system \u2014 unpatched vulnerabilities can be used to gain access to applications<\/li>\n<li>Passwords \u2014 weak passwords are commonly an opening for a cyber-attack<\/li>\n<li>File access rights \u2014 poor standards for protecting access to files<\/li>\n<li>Integration protocols \u2014 APIs that don\u2019t have adequate security or encryption<\/li>\n<li>ERP authentication \u2014 inadequate logins such as weak passwords, shared accounts and a lack of multifactor authentication<\/li>\n<\/ul>\n<p><strong>There are also organizational aspects that contribute to making an ERP system vulnerable:<\/strong><\/p>\n<ul>\n<li>Lack of response planning \u2014 there is no set procedure to report and escalate a security problem<\/li>\n<li>Lack of testing \u2014 no regular vulnerability scans and penetration testing that would highlight potential problems<\/li>\n<\/ul>\n<h2>How to protect your ERP system<\/h2>\n<p>The standard for modern digital security is the Zero Trust architecture, as defined in <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-207\/final\">NIST SP 800-207<\/a>. This framework assumes there is no traditional network edge \u2014 networks can be local, in the cloud, or a combination \u2014 and resources and workers can be located anywhere.<\/p>\n<p><strong>The following key principles form Zero Trust:<\/strong><\/p>\n<ul>\n<li>Continuous verification \u2014 always verify access, all the time, for all resources; there is no implicit trust granted to assets or user accounts<\/li>\n<li>Resource protection \u2014 the focus is on protecting assets, services, workflows, network accounts, etc.,<\/li>\n<li>Limit the impact \u2014 minimize the impact if an external or insider breach does occur<\/li>\n<\/ul>\n<p>To protect an <a href=\"\/product\/erp-system\/\" target=\"_blank\" rel=\"noopener\">ERP system<\/a> from internal threats, role-based access and separation of duties should be standard access controls. With role-based access, a user is granted access based on their function or role. Separation of duties means a user cannot make a transaction without other users authorizing it. An electronic signature enhances governance and traceability by providing an audit trail of who performed a transaction and when it occurred.<br \/>\nPassword hygiene and protection is obviously a key area that companies should address to ensure ERP security. Access to the ERP system should be restricted to users with multifactor authentication. An additional protection layer would be to only allow access through a virtual private network.<br \/>\nA standard IT practice should be to update software regularly and implement security patches when they are released. Too often, the potential that an update might take the system offline for a while cancels the plan for the update.<br \/>\nManufacturers should identify their most important information. Customer data is often identified as critical so strong security standards should be applied to file integrity and access to the information.<br \/>\nSince attackers can get through using an external integration to the <a href=\"\/product\/erp-system\/\" target=\"_blank\" rel=\"noopener\">ERP system<\/a>, all interfaces with the system should be identified and mapped. In addition, for manufacturers adopting the Industrial Internet of Things (IIoT), access to devices and sensors needs to be secured, as well as the data transmission to services that collect and consolidate the information.<br \/>\nThe Information Systems Audit and Control Association (ISACA) recommends a regular assessment of ERP system security, checking ERP servers for software vulnerabilities, configuration errors, segregation of duties conflicts, compliance with relevant standards, and recommendations from vendors.<br \/>\nSince intrusions occur as much as through psychological trickery as brute force hacking, it is imperative that everyone who has access to the ERP system attends regular briefings and is kept informed about the latest security techniques. The IT team responsible for the ERP application should also be an integral part of practice exercises for cyberattack response.<\/p>\n<h2>ERP security is everyone\u2019s responsibility<\/h2>\n<p>Protecting an <a href=\"\/product\/erp-system\/\" target=\"_blank\" rel=\"noopener\">ERP system<\/a> from an external threat or a malicious internal attack should be regarded as the responsibility of everyone who uses the system. This is because any kind of intrusion can have a crippling effect on the system, which in turn could impact the business in a highly negative way \u2014 not just financially but also reputationally. There are obviously IT-related issues and principles that need to be continually used and applied. However, organizational practices also need to be put in place to ensure everyone is aware, knowledgeable, and committed to the security of the ERP system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Manufacturers depend on their ERP system to optimize business processes, unify their different functions and platforms, and provide them with information to make decisions. But with ransomware and cyberattacks on the rise, securing the ERP system is now becoming a top priority. Why are ERP systems attacked? ERP systems contain very important and confidential information. &#8230; <a title=\"How to secure your ERP system\" class=\"read-more\" href=\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\" aria-label=\"Read more about How to secure your ERP system\">Read more<\/a><\/p>\n","protected":false},"author":215,"featured_media":10549,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[269],"tags":[81,88],"class_list":["post-10547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-owning-or-running-erp","tag-maintaining-upgrading-erp","tag-selecting-erp"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to secure your ERP system | SYSPRO Blog<\/title>\n<meta name=\"description\" content=\"SYSPRO ERP Blog - To protect an ERP system from internal threats, role-based access &amp; separation of duties should be standard access controls\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to secure your ERP system | SYSPRO Blog\" \/>\n<meta property=\"og:description\" content=\"SYSPRO ERP Blog - To protect an ERP system from internal threats, role-based access &amp; separation of duties should be standard access controls\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-21T06:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-30T10:25:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chris Lloyd\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Lloyd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\"},\"author\":{\"name\":\"Chris Lloyd\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/19552f93b8cdefe01821fc9cd470c822\"},\"headline\":\"How to secure your ERP system\",\"datePublished\":\"2023-03-21T06:16:00+00:00\",\"dateModified\":\"2023-05-30T10:25:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\"},\"wordCount\":965,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg\",\"keywords\":[\"Maintaining\/Upgrading ERP\",\"Selecting ERP\"],\"articleSection\":[\"Managing-Operating ERP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\",\"url\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\",\"name\":\"How to secure your ERP system | SYSPRO Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg\",\"datePublished\":\"2023-03-21T06:16:00+00:00\",\"dateModified\":\"2023-05-30T10:25:39+00:00\",\"description\":\"SYSPRO ERP Blog - To protect an ERP system from internal threats, role-based access & separation of duties should be standard access controls\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg\",\"width\":900,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ca.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to secure your ERP system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/19552f93b8cdefe01821fc9cd470c822\",\"name\":\"Chris Lloyd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/10\/chris_lloyd_blog-150x150.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/10\/chris_lloyd_blog-150x150.jpg\",\"caption\":\"Chris Lloyd\"},\"description\":\"As the Chief Product Engineering Officer (CPEO) at SYSPRO, Chris oversees the organization\u2019s development teams and is responsible for ensuring the realization of the product vision as well as the accelerated development of the product. He is passionate about driving new ways of working, innovation and building trust within organizations. With a proven track record in technology-based leadership roles, he has enabled digital transformation, connected experiences and elevated technology design and testing. Prior to joining SYSPRO, he spent just over 5 years with Alex Forbes Johannesburg with increasing roles of responsibility, including Head of Digital Disruption and Enablement and Head of Technology Development and Testing. Chris leads with a people-first approach and enjoys mentoring people and continuously growing relationships. He holds a BSc (Engineering) Mechatronics from the University of Cape Town.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/chrislloyd84\/?originalSubdomain=za\"],\"url\":\"https:\/\/ca.syspro.com\/blog\/author\/chris-lloyd\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to secure your ERP system | SYSPRO Blog","description":"SYSPRO ERP Blog - To protect an ERP system from internal threats, role-based access & separation of duties should be standard access controls","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/","og_locale":"en_US","og_type":"article","og_title":"How to secure your ERP system | SYSPRO Blog","og_description":"SYSPRO ERP Blog - To protect an ERP system from internal threats, role-based access & separation of duties should be standard access controls","og_url":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/","og_site_name":"SYSPRO Blog","article_published_time":"2023-03-21T06:16:00+00:00","article_modified_time":"2023-05-30T10:25:39+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg","type":"image\/jpeg"}],"author":"Chris Lloyd","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chris Lloyd","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#article","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/"},"author":{"name":"Chris Lloyd","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/19552f93b8cdefe01821fc9cd470c822"},"headline":"How to secure your ERP system","datePublished":"2023-03-21T06:16:00+00:00","dateModified":"2023-05-30T10:25:39+00:00","mainEntityOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/"},"wordCount":965,"commentCount":0,"publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg","keywords":["Maintaining\/Upgrading ERP","Selecting ERP"],"articleSection":["Managing-Operating ERP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/","url":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/","name":"How to secure your ERP system | SYSPRO Blog","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage"},"image":{"@id":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg","datePublished":"2023-03-21T06:16:00+00:00","dateModified":"2023-05-30T10:25:39+00:00","description":"SYSPRO ERP Blog - To protect an ERP system from internal threats, role-based access & separation of duties should be standard access controls","breadcrumb":{"@id":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#primaryimage","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2023\/05\/Chris-Lloyd_How-to-secure-your-ERP-system_900x410.jpg","width":900,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ca.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to secure your ERP system"}]},{"@type":"WebSite","@id":"https:\/\/ca.syspro.com\/blog\/#website","url":"https:\/\/ca.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ca.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/ca.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/19552f93b8cdefe01821fc9cd470c822","name":"Chris Lloyd","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/10\/chris_lloyd_blog-150x150.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/10\/chris_lloyd_blog-150x150.jpg","caption":"Chris Lloyd"},"description":"As the Chief Product Engineering Officer (CPEO) at SYSPRO, Chris oversees the organization\u2019s development teams and is responsible for ensuring the realization of the product vision as well as the accelerated development of the product. He is passionate about driving new ways of working, innovation and building trust within organizations. With a proven track record in technology-based leadership roles, he has enabled digital transformation, connected experiences and elevated technology design and testing. Prior to joining SYSPRO, he spent just over 5 years with Alex Forbes Johannesburg with increasing roles of responsibility, including Head of Digital Disruption and Enablement and Head of Technology Development and Testing. Chris leads with a people-first approach and enjoys mentoring people and continuously growing relationships. He holds a BSc (Engineering) Mechatronics from the University of Cape Town.","sameAs":["https:\/\/www.linkedin.com\/in\/chrislloyd84\/?originalSubdomain=za"],"url":"https:\/\/ca.syspro.com\/blog\/author\/chris-lloyd\/"}]}},"metadata":{"_edit_lock":["1685442319:2"],"_edit_last":["2"],"_wp_page_template":["default"],"_yoast_wpseo_focuskw":["ERP System"],"_yoast_wpseo_metadesc":["SYSPRO ERP Blog - To protect an ERP system from internal threats, role-based access & separation of duties should be standard access controls"],"_yoast_wpseo_linkdex":["78"],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_estimated-reading-time-minutes":[""],"_yoast_wpseo_wordproof_timestamp":[""],"_webdados_fb_open_graph_specific_image":[""],"_yoast_wpseo_primary_category":["269"],"_yoast_wpseo_title":["%%title%% %%page%% | %%sitename%%"],"_yoast_wpseo_is_cornerstone":["1"],"_thumbnail_id":["10549"],"_yoast_wpseo_canonical":["https:\/\/www.syspro.com\/blog\/owning-or-running-erp\/how-to-secure-your-erp-system\/"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/10547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/users\/215"}],"replies":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=10547"}],"version-history":[{"count":1,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/10547\/revisions"}],"predecessor-version":[{"id":10548,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/10547\/revisions\/10548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media\/10549"}],"wp:attachment":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=10547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=10547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=10547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}