Technology Blogs by Members
Explore a vibrant mix of technical expertise, industry insights, and tech buzz in member blogs covering SAP products, technology, and events. Get in the mix!
cancel
Showing results for 
Search instead for 
Did you mean: 
Reza
Participant

According to a study by Cybersecurity Ventures, cybercrimes will cost the world almost $6 trillion a year by 2021. In the last few years, cybercrimes have been in the news a lot with tech giants like Facebook becoming a victim of data and security breaches. This is why when it comes to cybercrimes, it’s not a question of ‘if’, it’s a question of ‘when’ it will happen.


Five key cyber threats that enterprises need to take seriously and should watch out for in 2020.




  1. Social Engineering Attacks

  2. IoT-Based Attacks

  3. Ransomware Attacks

  4. Internal Threats

  5. State-sponsored Attacks


For all the 5 Key Cybersecurity Threats there are solutions for your SAP system and application.




  1. Start by building your Management Dashboard on your company’s security policy in order to ensure the confidentiality of your business data & the authenticity of your users .

  2. Review monthly your SAP® Security overall health report and SAP® Security vulnerability report.

  3. Decrease the risk of a SAP® system intrusion by activating SAP® tools. GO HERE FOR MORE INFORMATION.

    • System Security Parameters Activation

    • Configuring and setting up UCON

    • Guide to configure UI Masking and UI Logging for SAP User Interface (UIs)

    • Protection for SAP® password hashes

    • Secure your SAP® Cloud Connector® or SAP® Connect



  4. Activate CCLM DASHBOARD to identify vulnerable code before going to production and retire codes that no longer being maintain.

  5. Identify suspected Attack (Forensics) in real time using SAP® Enterprise Threat Detection. GO HERE FOR MORE INFORMATION.


I hope that the above high level information help you to kick start your journey in securing your SAP system and application. Don't forget the key is to detect threats in real time or head of time before it is too late.
5 Comments
Labels in this area