bowbridge Blog

4 Tech Trends That Could Impact Your SAP Cybersecurity in 2018

Feb 9, '18 / by Joerg Schneider-Simon

2017 opened everybody’s eyes to the rising threat of cyberattacks. Between the WannaCry ransomware attack and the massive Equifax data breach, companies around the globe realized that when it comes to cybersecurity, the status quo is no longer an option.

When it comes to SAP cybersecurity, however, are companies prepared? Or will they be caught flat-footed by the upcoming cybersecurity landscape of 2018?

Here are some of the upcoming cybersecurity trends and threats, how they could affect SAP, and what businesses can do to prepare.

Continue Reading

2017 in Review: SAP Security Notes

Jan 25, '18 / by Joerg Schneider-Simon

ERP security has long been focused on operational issues, such as permissions and segregation of duties. That may no longer be enough to keep organizations safe.

2017 was filled with headlines about major data breaches and cyberattacks, and it’s likely to get worse: 89% of security experts anticipate more cyberattacks against ERP systems in the coming years – and 30% expect the increase to be significant.

To understand whether your company’s SAP cybersecurity is at risk, it’s helpful to look back at the past year to understand what happened, which vulnerabilities are most concerning, and how SAP is addressing them.

Continue Reading

How PDF Files Can Endanger Your SAP Cybersecurity

Dec 20, '17 / by Joerg Schneider-Simon

Companies around the globe choose SAP to streamline and standardize their everyday activities like workflows, purchasing, and staffing, saving an enormous amount of time and effort.

However, SAP is also a preferred target for cyberattacks.

And one of the main vehicles? The innocuous-looking PDF file.

Continue Reading

Macros and Malware: Why Microsoft Office’s Latest Vulnerabilities Put SAP at Risk

Dec 12, '17 / by Joerg Schneider-Simon

For decades, businesses and individuals have turned to Microsoft Office to create documents, spreadsheets, databases, and more. And as new cybersecurity threats have arisen, Microsoft has issued updates and patches to address those threats.

Continue Reading

Ensuring SAP File Format Integrity: MIME Type Checks

Nov 23, '17 / by Joerg Schneider-Simon

Part of what makes SAP so convenient is the ability for external users, like suppliers or job applicants, to upload files. This feature, however, can be a double-edged sword: While legitimate users can upload purchase orders and resumes, cyberattackers can upload files laden with malware.

Continue Reading

How Much Could SAP Cybersecurity Breaches Cost Your Company?

Nov 13, '17 / by Joerg Schneider-Simon

We’ve all encountered instances of a malware attack on a friend’s or relative’s home computer — or even on our own. Personal cybersecurity breaches can be inconvenient and distressing, especially if they result in frustrating identity theft or ransomware.

Continue Reading

Cybersecurity Fail: How Not to Be the Next Equifax

Oct 30, '17 / by Joerg Schneider-Simon

October is cybersecurity awareness month. We look at Equifax’s cybersecurity nightmare and how your SAP system may put you at similar risk.

It has been only about a month since Equifax went public with news of a security breach that affected over half of the adults in the U.S., and no small number of people in Canada and the U.K.  If that wasn’t bad enough, however, now comes news that visitors to the site were directed to fake Flash update ads that downloaded malware.

Continue Reading

Announcement: bowbridge to Present at SAPinsider Events

Oct 19, '17 / by Joerg Schneider-Simon

Staying on top of SAP cybersecurity requires unceasing vigilance. This year’s SAPinsider Events offer an excellent opportunity to learn the latest news on the industry’s biggest threats and smartest best practices.

Continue Reading

Where Cybercrime Against SAP is Bought and Sold

Oct 17, '17 / by Joerg Schneider-Simon

October is Cybersecurity Awareness Month. We take a look at the explosive growth of cybercrime as a service and how it puts your SAP system at risk.

We live in an age where we can outsource just about anything. From virtual assistants to lawn care services, all it takes is a quick online search to find people willing to do the jobs we want to offload.

Even if that job is cybercrime.

Continue Reading

A Bad Cup of Java: Why Active Content Can Threaten SAP With XSS Attack

Oct 11, '17 / by Joerg Schneider-Simon

Technology security professionals see a staggering variety of cyberattacks and are constantly on guard for new threats on the horizon. But even the most weathered IT pro feels a rise in blood pressure when they hear this phrase: cross-site scripting.

Continue Reading

Don't miss the latest SAP security news