{"id":9925,"date":"2021-07-08T08:58:27","date_gmt":"2021-07-08T06:58:27","guid":{"rendered":"https:\/\/ca.syspro.com\/blog\/?p=9925"},"modified":"2021-07-27T11:42:43","modified_gmt":"2021-07-27T09:42:43","slug":"steps-to-guard-your-erp-system-against-possible-risks","status":"publish","type":"post","link":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/","title":{"rendered":"Steps to guard your ERP system against possible risks"},"content":{"rendered":"<p>The digital pandemic is upon us. Over the past few months, a number of critical businesses have faced cyber-attacks. Earlier this year, hackers infiltrated the Colonial Pipeline and demanded $4 million in ransom. While the ransom was paid on the same day, the pipeline was only able to function again after six days. \u00a0A class action lawsuit is now seeking damages for costs and lost profits incurred by gas stations, that suffered losses in excess of $5 million.<\/p>\n<p>Another sophisticated ransomware attack recently targeted the world\u2019s largest meat processor. The business-system breach led to the shutdown of multiple plants in the US and Australia. Several truck drivers who specialize in hauling livestock also had no choice but to drive hundreds of miles to pick up cattle from an alternative supplier. For the end-consumer, the long-term impact of the cyber-attack could mean inflated meat prices.<\/p>\n<p>With increased reliance on digital tools, businesses are now understanding the importance of company-wide cybersecurity strategies that take into consideration all IT systems. For manufacturers and distributors, this includes your Enterprise Resource Planning (ERP) solution, as it integrates internal systems and integrates with external third-party systems.<\/p>\n<p>ERP systems contain sensitive information ranging from supplier information on the creditor side and customer information on the debtor side. From a compliance perspective, this information needs to be\u00a0 carefully protected. There is no doubt that ERP is at the heart of the business and needs to be an integral part of the cybersecurity strategy of the organization.<\/p>\n<p>Here are the steps a business should take to safeguard your ERP system.<\/p>\n<p><strong>Step 1: Recognize the usual suspects<\/strong><\/p>\n<p>It is vital for businesses to watch out for specific \u2018social engineered\u2019 scams. The most common attack on ERP systems are Distributed denial-of-service (DDoS) attacks. Here cybercriminals target a public-facing endpoint, where a network resource is rendered unavailable to intended users. One of the most infamous DDoS attacks was launched back in 2000.\u00a0 The culprit? A 15-year-old ,with \u2018Mafiaboy\u2019 as his online alias. The teenager carried out the attack by hacking into the computer networks of a number of universities and used their servers to crash a number of high-profile websites including CNN, E-Trade and Yahoo.<\/p>\n<p>Broadly speaking, phishing is another example where criminals can exploit systems by sending emails that seem to be from trusted sources or companies. For example, an ERP customer would receive an email from their ERP vendor, often promising a reward or refund, to deceitfully obtain personal information, including passwords, identity number, banking login details.<\/p>\n<p>Another example is pharming. Pharming is a cyber-attack intended to redirect a website&#8217;s traffic to another, a fake site that aims to steal your information. In a pharming attack, the criminal hacks into the website you have opened and redirects you to an imposter site. Much like a phishing scam, many of us won&#8217;t notice any difference in the rogue site and will enter your username and password, or credit information as usual. The attacker then intercepts the captured information.<\/p>\n<p>All of these attacks lead to one common denominator \u2013 the human factor. Your staff need to be reminded not to open suspect emails, be wary of unexpected messages, and be reminded to change their passwords often.<\/p>\n<p><strong>Step 2: Always update your software<\/strong><\/p>\n<p>Software is continuously evolving \u2013 and this includes your security software. It is reported that 87 percent of business computers have outdated software, including ERP systems which are not up-to-date. \u00a0If your version is currently unsupported, it can make it difficult to rectify any security weaknesses. Businesses therefore need to always install the latest versions of any software to remove any vulnerabilities.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Step 3: Access rights and correct role allocation are key<\/strong><\/p>\n<p>How often are all employees given full access rights to all data within the organization? \u00a0Full access rights shouldn\u2019t come as default; instead, it\u2019s important to look at who has access to what data. This default access rights is a scenario that is ideal for cybercriminals as they seek sensitive information! You should instead ensure that employees are provided with specific roles and form part of groups with associated security and clearance authorizations.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Step 4: Always use a multi-factor authentication approach<\/strong><\/p>\n<p>Back in the day, one-factor authentication was enough, but it is now archaic.<\/p>\n<p>Instead,\u00a0 businesses today need to have an extra layer of security with two-factor or multi-factor authentication.<\/p>\n<p>Cybercrime threats has definitely become more prevalent as the world made a shift to remote work. Because the human factor can place your business at risk, a rinse and repeat approach should be taken around cybersecurity education.<\/p>\n<p>It\u2019s now up to businesses to remain vigilant and take the necessary steps to protect their ERP solutions from malicious intent<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>The digital pandemic is upon us. Over the past few months, a number of critical businesses have faced cyber-attacks. Earlier this year, hackers infiltrated the Colonial Pipeline and demanded $4 million in ransom. While the ransom was paid on the same day, the pipeline was only able to function again after six days. \u00a0A class &#8230; <a title=\"Steps to guard your ERP system against possible risks\" class=\"read-more\" href=\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\" aria-label=\"Read more about Steps to guard your ERP system against possible risks\">Read more<\/a><\/p>\n","protected":false},"author":147,"featured_media":9926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[269],"tags":[30,81],"class_list":["post-9925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-owning-or-running-erp","tag-erp-systems","tag-maintaining-upgrading-erp"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Steps to guard your ERP system against possible risks | SYSPRO Blog<\/title>\n<meta name=\"description\" content=\"4 Steps to safeguard your ERP system against compliance issues, sensitive information hacking etc. Read the SYSPRO Blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Steps to guard your ERP system against possible risks | SYSPRO Blog\" \/>\n<meta property=\"og:description\" content=\"4 Steps to safeguard your ERP system against compliance issues, sensitive information hacking etc. Read the SYSPRO Blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-08T06:58:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-27T09:42:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"JP van Loggerenberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"JP van Loggerenberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\"},\"author\":{\"name\":\"JP van Loggerenberg\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/11a5f4e353951bb6a5798f0c43ff3783\"},\"headline\":\"Steps to guard your ERP system against possible risks\",\"datePublished\":\"2021-07-08T06:58:27+00:00\",\"dateModified\":\"2021-07-27T09:42:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\"},\"wordCount\":787,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg\",\"keywords\":[\"ERP systems\",\"Maintaining\/Upgrading ERP\"],\"articleSection\":[\"Managing-Operating ERP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\",\"name\":\"Steps to guard your ERP system against possible risks | SYSPRO Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg\",\"datePublished\":\"2021-07-08T06:58:27+00:00\",\"dateModified\":\"2021-07-27T09:42:43+00:00\",\"description\":\"4 Steps to safeguard your ERP system against compliance issues, sensitive information hacking etc. Read the SYSPRO Blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg\",\"width\":900,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ca.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Steps to guard your ERP system against possible risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/11a5f4e353951bb6a5798f0c43ff3783\",\"name\":\"JP van Loggerenberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/JP-van-L-150x150.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/JP-van-L-150x150.jpg\",\"caption\":\"JP van Loggerenberg\"},\"description\":\"Within his role as the Chief Services and Technology Officer at SYSPRO, JP believes in leveraging innovation to promote an enjoyable user experience, and has been instrumental in standardizing and rationalizing the processes and systems within SYSPRO. JP\u2019s extensive exposure to strategic planning, business process re-engineering, and in Information Technology infrastructure has allowed him to construct a Services Practice within the SYSPRO business with a focus on several key areas, namely Information Technology, Consulting and Support. Through the provision of unified systems, the adoption of best Information Technology practices, governance and the continual driving of service excellence, JP has empowered both SYSPRO and its partners.\",\"sameAs\":[\"http:\/\/www.syspro.com\",\"https:\/\/www.linkedin.com\/in\/jp-van-loggerenberg-382b3125\/\"],\"url\":\"https:\/\/ca.syspro.com\/blog\/author\/jp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Steps to guard your ERP system against possible risks | SYSPRO Blog","description":"4 Steps to safeguard your ERP system against compliance issues, sensitive information hacking etc. Read the SYSPRO Blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/","og_locale":"en_US","og_type":"article","og_title":"Steps to guard your ERP system against possible risks | SYSPRO Blog","og_description":"4 Steps to safeguard your ERP system against compliance issues, sensitive information hacking etc. Read the SYSPRO Blog.","og_url":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/","og_site_name":"SYSPRO Blog","article_published_time":"2021-07-08T06:58:27+00:00","article_modified_time":"2021-07-27T09:42:43+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg","type":"image\/jpeg"}],"author":"JP van Loggerenberg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"JP van Loggerenberg","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#article","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/"},"author":{"name":"JP van Loggerenberg","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/11a5f4e353951bb6a5798f0c43ff3783"},"headline":"Steps to guard your ERP system against possible risks","datePublished":"2021-07-08T06:58:27+00:00","dateModified":"2021-07-27T09:42:43+00:00","mainEntityOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/"},"wordCount":787,"commentCount":0,"publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg","keywords":["ERP systems","Maintaining\/Upgrading ERP"],"articleSection":["Managing-Operating ERP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/","url":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/","name":"Steps to guard your ERP system against possible risks | SYSPRO Blog","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg","datePublished":"2021-07-08T06:58:27+00:00","dateModified":"2021-07-27T09:42:43+00:00","description":"4 Steps to safeguard your ERP system against compliance issues, sensitive information hacking etc. Read the SYSPRO Blog.","breadcrumb":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#primaryimage","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/07\/safeguard-erp.jpg","width":900,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/steps-to-guard-your-erp-system-against-possible-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ca.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Steps to guard your ERP system against possible risks"}]},{"@type":"WebSite","@id":"https:\/\/ca.syspro.com\/blog\/#website","url":"https:\/\/ca.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ca.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/ca.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/11a5f4e353951bb6a5798f0c43ff3783","name":"JP van Loggerenberg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/JP-van-L-150x150.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/JP-van-L-150x150.jpg","caption":"JP van Loggerenberg"},"description":"Within his role as the Chief Services and Technology Officer at SYSPRO, JP believes in leveraging innovation to promote an enjoyable user experience, and has been instrumental in standardizing and rationalizing the processes and systems within SYSPRO. JP\u2019s extensive exposure to strategic planning, business process re-engineering, and in Information Technology infrastructure has allowed him to construct a Services Practice within the SYSPRO business with a focus on several key areas, namely Information Technology, Consulting and Support. Through the provision of unified systems, the adoption of best Information Technology practices, governance and the continual driving of service excellence, JP has empowered both SYSPRO and its partners.","sameAs":["http:\/\/www.syspro.com","https:\/\/www.linkedin.com\/in\/jp-van-loggerenberg-382b3125\/"],"url":"https:\/\/ca.syspro.com\/blog\/author\/jp\/"}]}},"metadata":{"_edit_lock":["1627378953:2"],"_edit_last":["2"],"_yoast_wpseo_primary_category":["269"],"_thumbnail_id":["9926"],"_wp_page_template":["default"],"_webdados_fb_open_graph_specific_image":[""],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_estimated-reading-time-minutes":["4"],"_yoast_wpseo_focuskw":["Steps to guard your ERP system"],"_yoast_wpseo_title":["Steps to guard your ERP system against possible risks | SYSPRO Blog"],"_yoast_wpseo_metadesc":["4 Steps to safeguard your ERP system against compliance issues, sensitive information hacking etc. Read the SYSPRO Blog."],"_yoast_wpseo_linkdex":["57"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=9925"}],"version-history":[{"count":0,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9925\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media\/9926"}],"wp:attachment":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=9925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=9925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=9925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}