Keep Regular with Security Audits

Keep Regular with Security Audits Routine Security Audits can help things stay routine. Security audits are one of the most important things you can do to protect your network. Security breaches happen all the time, and it’s up to you to stay ahead of these breaches with regular security audits. Security auditing is not just about checking logs – it’s

Read More »

Passwords: The Ultimate Guide!

Password complexity changes as recommended by NIST What does your password say about you? If it says “password” or is simply a string of letters, numbers and symbols, then you might want to consider changing it. Passwords are important for personal security, but not all of them are of equal quality. It turns out that what makes for a good password is a complex question of probability and human factors. This question was put to a mid-level manager, Bill Burr, at the National Institute of Standards and Technology (NIST) back in 2003.​1 The password advice from NIST became influential not just within the federal government but on corporate networks, websites and mobile devices as well. NIST SP 800-63B Special Publication – 2003 The initial recommendation included these simple rules: lowercase letters uppercase letters numbers special characters (@, !, $, etc.) changed regularly That last rule became an issue for IT departments and led to weaker passwords as people would make minor modifications that were easy to guess. Which is more secure?  “password123” or “P@ssW0rd123!”? The latter follows the NIST rules above but is actually not an improvement.  The requirement to change passwords regularly lead people to add memorable characters like 1, 2, 3 as iterations which were predictable and not more secure. This requirement and others often led to passwords being scribbled on Post-It notes adhered to the computer screen as they were beyond the recollection capabilities of most users.  Humans naturally began substituting numbers for similarly shaped letters or vowels (as in our password transformation example above). They also used easily remembered numbers like birthdays and words like, “friends” or a sequence of numbers like, “12345”—the famed password of planet Druidia’s defense shield in Space Balls the Movie. 2 NIST SP 800-63B Special Publication – 2017 This NIST SP offers stronger password requirements than the NIST Password Guidance published in 2003. NIST’s Special Publication 800-63B provides federal agencies with more stringent password requirements for authentication of federal systems and identities. NIST SP 800-63B includes technical changes and clarifications to NIST SP 800-63A. NIST Special Publication 800-63B3 requires the use of at least three character types from at least two of the following four categories: lowercase letters uppercase letters numbers special characters (@, !, $, etc.) In addition, NIST Special Publication 800-63B mandates a minimum length of eight characters. The number of special characters required has also been increased from one to two.   These updates are important because they make it more difficult for hackers to guess passwords. NIST’s Special Publication 800-63B also requires that passwords be at least 8 characters in length. Increasing the number of special characters required and mandating a minimum length make it more difficult for hackers to crack passwords through brute force attacks. Link for The Wall Street Journal Here “In a widely circulated piece, cartoonist Randall Munroe calculated it would take 550 years to crack the

Read More »

Don’t Let Your SAP Environment be the Next Headline

Why cybersecurity is important in today’s digital world Today’s digital world is reliant on SAP for business-critical tasks, including financial processes that can mean the difference between life or death for certain industries. SAP customers are increasingly aware of the security risks facing their SAP landscape and are looking to SAP for integrated solutions to these challenges. With the increasing

Read More »

SecurityBridge and 1st Basis Partnership

SECURITYBRIDGE BROADENS U.S. REACH WITH NEW 1st BASIS GROUP PARTNERSHIP Press Release Ingolstadt, Germany, February 22, 2022 – SAP security provider SecurityBridge—now operating in the U.S.,—today announced a partnership with Wisconsin-based 1st Basis SAP Services Group, (1st Basis). The partnership enables 1st Basis to provide SecurityBridge’s integrated SAP Security platform and services—the most advanced cybersecurity to SAP managed services, and S4HANA migration

Read More »

Video Conferencing in the COVID-19 ‘New Normal’

In the case of videoconferencing during the time of COVID, necessity is the mother of adoption as much as invention. Video Conferencing platforms have been around for awhile, and they’ve been used in business quite a lot, but the pressure to continue day-to-day operations as much as possible while preventing the spread of the Coronavirus and protecting the health of

Read More »

Security Concerns with Zoom and SAP

Background This is a companion piece to our other post on TikTok and potential security concerns with SAP. The geopolitical background issues are the same. China has a history of corporate and other espionage and a history of inserting its interests into the affairs of corporate entities, even technically private ones, at home. It is also the world’s most developed

Read More »

TikTok Security Concerns and SAP

Geo-Political Background Recently, the Trump administration has kicked around the possibility of banning the use of TikTok in the United States. This comes against a backdrop of increasing tensions between the United States and China due to China’s emergence as a military and economic rival superpower, and exacerbated by what some in the West view as China’s military and economic

Read More »

Data Migration in SAP: 3 Essential Tools for the Job

Just as important as any products you make or any services you deliver, your data is a byproduct of your business activities. Without precise inventory, accurate customer information, impeccable accounting, and other data driven information, you would be hard pressed to compete in today’s marketplace. So when you need to upgrade your systems, data migration must be done properly as

Read More »

What is SLA in SAP?

All About Service Level Agreements SLA stands for Service Level Agreement and it defines the parameters of service and behavior between the provider and the customer. As more and more businesses turn to SAP solutions and SAP utilizes Cloud technologies more and more, the various SLAs gain importance. You chose SAP because you wanted to concentrate on your actual business,

Read More »

How COVID-19 Is Affecting Tech

The coronavirus pandemic has dramatically changed the lives of almost every American. With stay-at-home orders in place, and nonessential businesses closed, the internet has become the place where we work, shop, learn, worship, bank, communicate, and socialize. The demands of the COVID-19 crisis also translate into greater mechanization in laboratory testing, hospital settings, logistics and delivery. The need to secure

Read More »

Online SAP Courses Offered Amidst Coronavirus Outbreak

SAP systems provide the highest quality integrated management system keeping your databases, financials, inventory, logistics, and other resources working smoothly and securely together. In order to optimize your use of the SAP systems, it’s wise to have your people expanding and refining their education in SAP offerings. With most of the country in lockdown and working from home, this is

Read More »

SAP Dispatcher: Structure, Functions, and Caveats

Architecture and Functions Think of the SAP dispatcher as the gatekeeper of a gated community. He makes sure that authorized personnel enter and directs them to the appropriate place. The SAP dispatcher lies between the Internet and your SAP system. It is the entry point for HTTP(s) requests into your system, which consists of one or more NetWeaver application servers.

Read More »

Recent Posts

Categories