Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

4 reasons ERP data security and privacy should factor into your 2021 security budget

By Piyush Pandey
cyber
February 15, 2021

The COVID-19 crisis uncovered many data security and privacy gaps that organizations have spent the better part of 2020 trying to fill — largely exposed by the quick and drastic shift to remote workforces. Now many organizations are considering how 2021 objectives will impact their current cybersecurity budget.

As organizations look to strengthen their enterprise data security and privacy programs, they must consider the new risks that remote work has uncovered. More specifically, how legacy business applications and ERP systems may be exposing organizations to new levels of risk because these applications were not designed for user access from unmanaged networks and devices.

 

ERP Data Privacy and Data Governance Must be Top Priorities

2020 has seen a parallel emphasis on cybersecurity, data privacy, and data governance. On top of hackers looking to exploit applications and steal data, remote workforces have brought data privacy and data governance into the spotlight. An organization's ability to continue with normal business operations in a remote environment without seeing a significant increase in fraud and data exploitation has been an overlooked challenge of 2020. One that has forced many leaders to quickly establish privacy and compliance frameworks.

As it relates to business data, organizations must establish strict policies to support data privacy and governance, as well as establish the technical controls required to enforce those policies. The latter being a significant challenge for organizations using legacy business applications with remote workforces. With risk being defined mainly by the context of a user's access, dynamically enforcing governance is a crucial objective that requires additional investment.

An investment in solutions like GRC, data masking, attribute-based access controls, stepped-up authentication, and visibility into data access & usage all support an organization's objective to minimize risk, enable data security and data privacy. 

 

Go Beyond a VPN With Defense in Depth

When organizations rapidly shifted to remote workforces, many rushed to purchase virtual private networks (VPNs) to help protect data. VPNs act as a data "tunnel" by creating a secure connection with another network over the internet, usually using encryption to reduce the impact of a cyberattack. However, VPNs do not protect data once a user is authenticated – especially if authentication results from a compromised credential from a phishing attack. Once a user's credentials are authenticated, risks like data exfiltration, overexposure of data, and fraud committed inside financial transactions remain significant challenges for organizations to manage.

Although VPNs provide value, assuming a VPN enables data security is a common misconception. Without taking the context of access into account, the risk remains high. For example, where is a user coming from? What data are they trying to access? What device are they using? Is that device being used by the right person? 

Without a doubt, VPNs provide an essential service. However, as organizations continue remote work, they need to put additional protections around sensitive data - not just the ability to authenticate into applications. As part of your 2021 budget plans, you need to consider investing in solutions that help you bolster your VPN services with a layered data security strategy that goes beyond authentication. 

 

Dynamic Workforces Require Dynamic Authorization Strategies

Most organizations recognize the value of authentication as a primary identity control. However, authentication alone only addresses half of an organization's security requirements. While authentication seeks to validate that the user is who they say they are, user authorization establishes policies that govern specific access privileges. In short, ERP data security and governance hinge on user authorization just as much as user authentication. If not more.

Implementing authorization strategies that are dynamic and risk-aware becomes critical when access is coming from unmanaged networks and devices. This is because the risk derived from a user's access is based mainly on the context of that access. For example, high privilege activity taking place overseas, during non-work hours, or on personal devices all present high levels of risk – solely because of the context of what that user is doing and how they are doing it.

Legacy ERP applications, especially on-premise applications, lack the ability to authorize user privilege dynamically, leading to a user being over-privileged based on what they are currently trying to do. To mitigate this risk, organizations should invest in attribute-based access controls and having the ability to dynamically manage access based on various contextual situations specific to a user.
 

 

Invest in Advanced Analytics to Gain Visibility into User Behavior

Detecting anomalous activity or behavior indicative of risk is especially challenging because separating the bad from the good (or the authorized) requires granular visibility. This is especially challenging when moving your workforce out of the office and away from managed networks and devices. 

Companies lose approximately 7% of their annual revenue to fraud. In a year that will likely have slim revenue margins, 7% of revenue is a larger number than before. With a remote workforce, visibility into user behavior becomes more critical than ever, as workers no longer have people around them who might see fraudulent actions. 

Tracking user behavior within mission-critical ERP solutions enables organizations to detect potentially fraudulent behavior faster. Internal fraud poses a different problem than credential theft. With credential theft, detecting outlier access with contextual controls can mitigate the risk (for example, Blacklisting IPs from hostile countries). However, internal malicious actors use their legitimate access during their regular working hours. Moreover, with employees working from home, they might have more opportunities to misuse their access.

Ultimately, organizations need to invest in solutions that provide real-time data analytics that captures access usage and establishes the appropriate audit trails to use if they need to engage in forensic analysis. 

 

Investing in a Remote Workforce Means Investing in ERP Data Privacy and Governance

From a business standpoint, COVID-19's impact will endure long beyond the development and dissemination of a successful vaccine. According to IBM's "COVID-19 and the Future of Business" report, 64% of respondents shifted to more cloud-based business activities, and 55% made permanent changes to organizational strategy. Additionally, a survey conducted by Twilio noted that COVID-19 accelerated companies' digital transformation strategy by an average of six years. Combining these statistics, 2020's business story is that companies took only 10 months to accelerate their operations strategies that were originally scoped to take 6 years. 

Ultimately, the bulk of an organization's 2021 budget should continue to enable modernization strategies. Especially those that seek to evolve and secure the core business applications that are so influential on business operations and long-term strategic goals.

KEYWORDS: cyber security data privacy information security risk management security budgets

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Piyushheadshot copy

Piyush Pandey, CEO at Appsian, is a technology executive with 18 years of global experience in strategy, sales, mergers & acquisitions, and operations within software companies. Over the last 10 years, he has worked with enterprise software companies including Oracle, Epicor, Concur, Citrix and Microsoft on various transactions. He has held various leadership positions at Procera, Deutsche Bank, Stifel, Wipro Technologies and a wireless startup.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • boonedam-entrance2

    Four Reasons Why Your Active Shooter Plan Should Include Security Entrances

    See More
  • cyber freepik

    Strengthening your security culture: Does the “fear factor” approach really work?

    See More
  • dataminr-gsoc6

    3 key reasons why SOCs should implement policies over security standards

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!