DZone

According to Risk Based Security’s 2019 MidYear QuickView Data Breach Report, the first six months of 2019 saw more than 3,800 publicly disclosed cyberattacks exposing more than 4 billion compromised records, with 3.2 billion of those records exposed by just eight breaches. Making matters worse, an overwhelming percentage of the compromised personal or strategic data was considered highly sensitive, yet was stored on unsecured routers and gateways — an oversight that offered cyber attackers ready access and scores of opportunities to steal and misuse data. Just to provide scope and context, think about this: Some 700 message servers that hold highly sensitive data are currently open to the internet in the US, according to the Department of Homeland Security’s National Cyber Security Division.

With SAP systems containing very sensitive and confidential data, there is a critical need for organizations to perform a regular audit of these systems to check their security and data integrity and to identify system vulnerabilities before potential attackers do. Knowing the weaknesses and gaps in a system is the first step in empowering management to deal with those vulnerabilities in a proactive, concise, and effective way.

Source: DZone