Have you read the recent article by Warwick Ashford (Security Editor, ComputerWeekly.com) on the settlement that US retail giant Target paid for the 2013 data breach? Well, on records, it summed up to $220 million including legal fees and other associated costs. Maybe more. But what is key is – how did the data get out?
Many organizations recognize that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into everyday business activities. However, many companies fail to identify the sensitive of data they are trying to protect.
“[…] If you’re not thinking holistically, not looking at a system-wide approach to SAP cybersecurity, you’re just not doing enough.” says Josh Greenbaum in his article ‘SAP, Cybersecurity and You’. That is the key – holistic thinking when it comes to SAP Data security. Unfortunately, not many security practitioners do so.
Data within the confines of SAP are secure. But it becomes exposed when users extract them from SAP systems for reporting and sharing. Everyday, vast volumes of data are extracted from a SAP system, increasing the risk of loss and theft. Securing such data, unfortunately, does not seem a priority for companies.