• Advertise
  • Contact Us
  • About Us
  • Supplier Directory
  • SCB YouTube
  • Login
  • Subscribe
  • Logout
  • My Profile
  • LOGISTICS
    • Air Cargo
    • All Logistics
    • Express/Small Shipments
    • Facility Location Planning
    • Freight Forwarding/Customs Brokerage
    • Global Gateways
    • Global Logistics
    • Last Mile Delivery
    • Logistics Outsourcing
    • LTL/Truckload Services
    • Ocean Transportation
    • Rail & Intermodal
    • Reverse Logistics
    • Service Parts Management
    • Transportation & Distribution
  • TECHNOLOGY
    • All Technology
    • Artificial Intelligence
    • Cloud & On-Demand Systems
    • Data Management (Big Data/IoT/Blockchain)
    • ERP & Enterprise Systems
    • Forecasting & Demand Planning
    • Global Trade Management
    • Inventory Planning/ Optimization
    • Product Lifecycle Management
    • Sales & Operations Planning
    • SC Finance & Revenue Management
    • SC Planning & Optimization
    • Sourcing/Procurement/SRM
    • Supply Chain Visibility
    • Transportation Management
  • GENERAL SCM
    • Business Strategy Alignment
    • Education & Professional Development
    • Global Supply Chain Management
    • Global Trade & Economics
    • HR & Labor Management
    • Quality & Metrics
    • Regulation & Compliance
    • SC Security & Risk Mgmt
    • Supply Chains in Crisis
    • Sustainability & Corporate Social Responsibility
  • WAREHOUSING
    • All Warehouse Services
    • Conveyors & Sortation
    • Lift Trucks & AGVs
    • Order Fulfillment
    • Packaging
    • RFID, Barcode, Mobility & Voice
    • Robotics
    • Warehouse Management Systems
  • INDUSTRIES
    • Aerospace & Defense
    • Apparel
    • Automotive
    • Chemicals & Energy
    • Consumer Packaged Goods
    • E-Commerce/Omni-Channel
    • Food & Beverage
    • Healthcare
    • High-Tech/Electronics
    • Industrial Manufacturing
    • Pharmaceutical/Biotech
    • Retail
  • THINK TANK
  • WEBINARS
    • On-Demand Webinars
    • Upcoming Webinars
    • Webinar Library
  • PODCASTS
  • VIDEOS
  • WHITEPAPERS
Home » Blogs » Think Tank » A Manufacturer’s Guide to Business Application Security

Think Tank
Think Tank RSS FeedRSS

A Manufacturer’s Guide to Business Application Security

A GLOWING RED SCREEN SHOWSCOMPUTER  BITS AND BYTES, WITH THE WORD RANSOMWARE AT THE CENTER

Photo: iStock.com/kaptnali

February 24, 2023
Sadik Al-Abdulla, SCB Contributor

Today’s supply chains have become highly volatile and unpredictable. Yet, while issues caused by severe weather and port closures might not be preventable, there are other disasters that can be avoided, such as severe damages caused by a cyberattack.

IBM reports that 23% of ransomware reports tie back to the manufacturing sector, making it the most attacked industry. These incidents not only disrupted operations but also caused millions of dollars in damages. In fact, each manufacturing data breach costs roughly $5 million on average, while taking over 200 days to discover and almost four months to remediate. It’s evident that manufacturing companies still have a long way to go to secure their operations.

As the manufacturing sector continues to rapidly accelerate its digital transformation, it’s critical that these organizations are also prioritizing the security of their enterprise resource planning (ERP) applications amid the unprecedented threat landscape. Otherwise, their digitization efforts are put to waste. Manufacturing companies must invest in cybersecurity tools that can detect and mitigate any critical vulnerabilities or suspicious activity within the ERP. Yet many don’t know where to start when it comes to their business application security strategy. Following are some steps that manufacturers should take to strengthen their cybersecurity defenses.

Understand the current threat landscape. Manufacturers rely on ERP applications to manage their facility processes and operations, such as inventory management, payroll and production scheduling. Given its importance to the organization, an ERP that isn’t well-protected can present countless security issues and leave the business highly vulnerable. Unfortunately, many companies delay in applying necessary patches, or often don’t even realize a vulnerability exists within their application ecosystem.

The three high-severity vulnerabilities found in SAP Internet Communication Manager, a crucial part of SAP business systems, in early 2022 were perhaps one of the most daunting examples of ERP system flaws. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) even added one of the flaws to its Known Exploited Vulnerabilities Catalog (KEV), urging companies to apply the necessary fixes before it’s too late. Despite the push to patch these flaws, many organizations have yet to apply the recommended remediations, leaving themselves vulnerable to threats like data exfiltration and financial damage.

Cybercriminals are well aware of business applications’ profitability and are evolving their tactics to directly target them. For instance, the cybercrime group Elephant Beetle was caught sitting within company networks for months while silently siphoning off millions of dollars. The threat group remained undetected for months on end by blending in and acquainting itself with each company’s financials prior to carrying out fraudulent transactions. Organizations must be prepared to face the new wave of threats, but this can only be done with full visibility into the IT ecosystem.

Obtain deep visibility into ERP applications. Threats like ransomware have traditionally been prioritized by security teams, who spend considerable time and money on defense-in-depth tools that provide layered network protection. Yet, as we witnessed with Elephant Beetle, a direct attack on an ERP can wipe out an organization’s financials, resulting in an incident that’s far more disastrous than a ransomware attack on a printer or desktop. Thus, while network security, intrusion detection and other defense-in-depth cybersecurity technologies are critical investments, they aren’t enough to protect the business application layer.

Security teams must take a deeper look at their cybersecurity strategy to ensure it includes ERP defense. To prevent threats like misconfigurations and unauthorized access, end-to-end visibility into the business application landscape is absolutely critical. This, coupled with strong security controls, will enable teams to keep a close eye on suspicious activity and take a proactive approach to risk management.

Deploy the right security defenses. Data from the Ponemon Institute shows that a majority of security experts understand that defending applications should be a priority, yet nearly two-thirds still struggle to reduce risks and contain attacks on business applications due to a lack of resources. While budget and time restrictions can certainly be a challenge, investing in the right cybersecurity tools can help security teams defend their operations. Application security tools catered to ERP, for instance, are strategic assets to any cybersecurity program. These technologies can alleviate overburdened security teams by continuously monitoring for vulnerabilities and misconfigurations. If an issue is identified, they proactively alert the team and automatically provide recommended steps for corrective action. From there, security teams can understand the severity of each vulnerability and prioritize those that need immediate attention.

Tackle ERP application security threats head-on. The above steps can help manufacturers make more strategic cybersecurity investments and prevent a potential supply chain security crisis. By becoming well-acquainted with new threats and risks, achieving visibility into their business application landscape, and implementing application security tools, companies can confidently ensure they have a strong cybersecurity strategy. ERP applications are facing a new level of risk in 2023, and manufacturers must be equipped to take on any cybersecurity challenge that comes their way.

Sadik Al-Abdulla is chief product officer of Onapsis.

ERP & Enterprise Systems Supply Chain Visibility Regulation & Compliance Supply Chain Security & Risk Mgmt

RELATED CONTENT

RELATED VIDEOS

Subscribe to our Daily Newsletter!

Timely, incisive articles delivered directly to your inbox.

Popular Stories

  • TWO HANDS IN SHIRT CUFFS SHAKE AGAINST A BACKGROUND OF A US FLAG

    Podcast | Leaving China: Is ‘Friend-Shoring’ the Answer?

    Sourcing/Procurement/SRM
  • A SEATED PERSON HOLDS A SMARTPHONE, SHOPPING

    Retail Consumer Data: The Key to Personalization, or Privacy Violation?

    Regulation & Compliance
  • TWO MEN IN SUITS ENGAGE IN CONVERSATION ACROSS A COFFEE TABLE HOLDING AN OPEN LAPTOPIN AN OFFICE

    For Shippers, Disruption Means Opportunity to Rethink Carrier Strategy

    LTL/Truckload Services
  • karen-jones.jpg

    Watch: Four Industry Disrupters Impacting Logistics

    Data Management (Big Data/IoT/Blockchain)
  • A BLUE AND WHITE JET BLUE PLANE FLIES ABOVE A YELLOW SPIRIT PLANE ON THE TARMAC OF AN AIRPORT

    Biden’s Antitrust Push Across Agencies Is Working to Block Deals

    Air Cargo

Digital Edition

Scb q1 2023 cover

2023 Supply Chain Management Resource Guide: Packing for a Difficult Year

VIEW THE LATEST ISSUE

Case Studies

  • New Revenue for Cloud-Based TMS that Embeds Orderful’s Modern EDI Platform

  • Convenience Store Client Maximizes Profit and Improves Customer Service

  • A Digitally Native Footwear Brand Finds Rapid Fulfillment

  • Expanding Apparel Brand Scales Seamlessly with E-Commerce Technology

  • How a Global LSP Scaled its Security Program and Won More Business

Visit Our Sponsors

Orderful Yang Ming Alithya
Barcoding Blue Yonder BNSF Logistics
CoEnterprise Data Capture Deposco
E2open GAINSystems Generix
Geodis GEP GreyOrange
Here Holman Logistics Honeywell Intelligrated
IFM Infor Inmar
Keelvar Kinaxis Korber
Lean Solutions Group 2H Liberty SBF Locus Robotics
Logility LogistiVIEW Lucas Systems
MCA Connect MPO Nvidia
Old Dominion OpenText ORTEC
Overhaul Parsyl PMMI
QIMA Redwood Logistics Ryder E-commerce by Whiplash
Saddle Creek Logistics Schneider Dedicated Setlog Holding AG
Ship4WD Shipwell Shyft
Sourcemap Tecsys TGW Systems
Thomson Reuters Tive Trailer Bridge
Vecna Robotics Verity
Verusen
  • More From SCB
    • Featured Content
    • Video Library
    • Think Tank Blog
    • SupplyChainBrain Podcast
    • Whitepapers
    • On-Demand Webinars
    • Upcoming Webinars
  • Digital Offerings
    • Digital Issue
    • Subscribe
    • Manage Your Subscription
    • Newsletters
  • Resources
    • Events Calendar
    • SCB's Great Supply Chain Partners
    • Supplier Directory
    • Case Study Showcase
    • Supply Chain Innovation Awards
    • 100 Great Partners Form
  • SCB Corporate
    • Advertise on SCB.COM
    • About Us
    • Privacy Policy
    • Contact Us
    • Data Sharing Opt-Out

All content copyright ©2023 Keller International Publishing Corp All rights reserved. No reproduction, transmission or display is permitted without the written permissions of Keller International Publishing Corp

Design, CMS, Hosting & Web Development :: ePublishing