bowbridge SAP Cybersecurity Blog
bowbridge-banner-1

bowbridge SAP Cybersecurity Blog

fiori-security-for-managers

Mar 12, '19 by Joerg Schneider-Simon

Managers tasked with SAP cybersecurity used to have a (slightly) easier time with threat management. The primary reason? Every SAP end user was contained within the company’s four walls. All endpoints were known, and the SAP system was a closed loop.

security-notes-on-SAP

Feb 25, '19 by Joerg Schneider-Simon

Keeping your SAP system safe from cyberattack takes time, effort, and manpower. Busy cybersecurity teams are no strangers to effort, but time and manpower? Those are in short supply nowadays.

Shorthanded and short-on-time teams are faced with...

AI-and-FIORI

Jan 31, '19 by Joerg Schneider-Simon

Another year, another listing of the top 25 most popular passwords, with the top two spots being taken, yet again, by “123456” and “password.”

People are notoriously terrible at choosing secure passwords. That is why when biometric-based credentials...

2019-cybersecurity-predictions.webp

Jan 17, '19 by Joerg Schneider-Simon

During this time of year, it’s natural to look to the year ahead and predict what it will bring. Cybersecurity experts have been doing this for decades, analyzing trends and developments to estimate a forthcoming landscape and alerting organizations...

unstructured-data

Dec 17, '18 by Joerg Schneider-Simon

Quick: When you think of data breaches, what comes to mind?

If you’re like most people, you think of cyberattacks that target structured, secured databases. These cyberattackers steal reams of sensitive data, often selling the data to the highest...

gdpr-and-cybersecurity

Nov 26, '18 by Joerg Schneider-Simon

It may be hard to believe, but six months have passed since the GDPR deadline. During that time, companies (including bowbridge) contacted their lists, seeking active consent to continue sending them information. GDPR opt-in emails were so...

cybersecurity-and-staff

Nov 14, '18 by Joerg Schneider-Simon

“I have read and understood the company’s IT policy.”

Employees check the box, but are they adhering to the policy? The evidence suggests otherwise: In a survey of IT professionals, employees leaving laptops and phones unsecured in vulnerable places...

CI-App-report-banner

Nov 1, '18 by Joerg Schneider-Simon

Our friends at Cybersecurity Insiders recently released their 2018 Application Security Report, which contains some eyebrow-raising results. For example, only 62 percent of respondents feel (at best) moderately confident in their organization’s...

biometrics-and-SAP

Oct 26, '18 by Joerg Schneider-Simon

Passwords are out, prints are in.

Biometric security features have been added to door locks, banking applications, smart phones and beyond. Instead of memorizing pin numbers, authenticating our identity is now as simple as looking into a camera or...