3 Billion Reasons To Do More Than Just Secure The Perimeter Most organizations have mature processes and controls related to preventing a breech on their internal systems – what we refer to as “securing the perimeter. August 23, 2024
Why Role Customization > Standard Roles in NetSuite Matters In NetSuite, standard roles present significant challenges related to sensitive access risks and segregation of duties (SoD) conflicts as they have many permissions that are not appropriate for that role. August 21, 2024
Auditors Are Talking about Segregation of Duties Too Much! Having been in the Security and Controls space for far too long, I have witnessed and am still witnessing a phenomenon that needs to be addressed. Auditors talk WAY too much about Segregation of Duties. Hear me out… In testing access controls, auditors spend way too much time assessing risks related to SoD and far […] July 31, 2024
Critical FedRamp Enhancements Needed by Oracle for ERP / HCM Cloud Oracle ERP / HCM Cloud is an evolving suite of applications. Most organizations that consider implementing an ERP/HCM Cloud likely believe the “foundation” of the applications are solid. Unfortunately, that is not the case. We currently track over 200 enhancement requests that we, and others, have submitted. However, there are some significant gaps for public […] July 9, 2024
Top 4 Reasons You Need THIS Cyber Security Approach From our Cyber Security technical expert, Connor Thompson, CIA CISA In the Software as a Service (SaaS) world, cyber security risks extend far beyond traditional perimeter defenses and malware protection. Today, a strong cyber security strategy for SaaS environments must encompass a multi-faceted approach. This includes strong authentication methods, user training against social engineering attacks, […] June 28, 2024
The Irony Related in Oracle’s Latest Article on Cybersecurity There’s a Lack of Native MFA in ERP/HCM Cloud. Oracle released this article in March highlighting the top cybersecurity threats and how to prevent them. In the article, they highlight the number one risk as “Business Email Compromise (BEC).” The article states “BEC is a type of phishing attack. Other phishing scams try to trick […] May 29, 2024
EBS System Administrator View-Only Creation I’ll keep my message short and simple: below is everything you need to know about creating a View-Only System Administrator responsibility in EBS. For assistance or clarification, please reach out to support@erpra.net PDF Download If you would like to share the following with your team, we have a free downloadable version here – PDF Download Step […] April 8, 2024
Top 3 Tips for Resovolutions: Setting the Right Objectives The Why Behind Our Tips In the following article, I make the case for why these top 3 tips are crucial action steps for your organization. We call it “turning resovolutions into action.” For 25+ years I have been watching ERP (Enterprise Resource Planning) implementations go live that are half-baked at best. This has created […] March 28, 2024
AZN Menus Pose Big Risks in EBS – And What to Do About It AZN Menus Background AZN menus were introduced by Oracle around 11.5.3 to help provide a more rapid implementation to the SMB business segment. They provide users with a graphical depiction of a process flow and the ability access the functions directly from the graphical navigation. When an AZN menu is contained in a menu, the […] March 15, 2024