91 percent of cyber attacks exploit humans as weak points, only 9 percent target technological gaps. These surprising figures were presented by Reza Mehman, Chief Innovation Officer at Virtual Forge, in his webinar "Cybersecurity in Transition". The IT security expert cited the good faith of many IT users as the main cause - and advised greater caution when using online services and the Internet.Read more
Targeted Protective Measures Against Intruders
Digital transformation poses threats to companies’ IT security. Cloud computing, networking, and functional enhancements are the key trends that offer cybercriminals ever new points of attack – and that call for systematic protective measures.Read more
This is the headline for the press release published on September, 13 2018 from the German Domestic Security Agency. We have summarized the key messages of the press release for you. The complete article can be found here (German only).Read more
At this year's ASUG Conference in the USA, SAP’s CSO presented 10 topics that are highly relevant for the security of SAP® systems. These include areas such as network and database security, authorizations and code security. However, two very important areas were missing in this overview: the safeguarding of interfaces and the security of transports. In our opinion, the lack of these areas in many lists is a major omission.Read more
"If our economy is to thrive, our commitment to cyber-security must be consistent with our commitment to innovation." Justin Somaini, Chief Security Officer of SAP®, presents this sentence in a security lecture by the American SAP user group ASUG. We, the Virtual Forge, can only agree here.Read more
In times of increasingly linked IT systems and the growing relevance of systems and data in business processes, the business risk that IT carries on its shoulders is also increasing. 76% of all financial transactions worldwide pass through an SAP® system in at least one place!
IT security has many facets. Your SAP® systems are only one of them, but they are the most important ones. They contain personal data of your customers, employees and partners and depict the business processes that are vital for your survival. An attack on your SAP systems has serious consequences for your company. Not only considerable costs for detecting and correcting the attack, but also production downtime, high penalties and enormous damage to the image can be the result.Read more