insecurityOne of the first things to do when a computer system is implemented is to make a backup. This probably seems like a simple statement, and one that any enterprise serious about keeping their business alive has accounted for and has put on auto-pilot. But that's exactly the point. Every business has dedicated staff that is fully engaged with the business of their business, and that includes keeping the business functions running despite system failures. But what if those failures take place outside your own walls.

With the consistent movement toward moving computing resources outside the physical walls of the company, it's easy to lose track of just who is backing up what, and what connections are being used or not used. It's also easy to assume that every connection to your cloud based system is secure and legitimate. And because of this remote control we now practice we are left to rely on our systems providers to assure that all is well. 

When the last connection in your supply chain is your ERP hosted on servers within your company then you're doubly vulnerable because of the confidence you've developed with your cloud systems hosts. Your confidence may well be deserved, but it's still possible for rogue connections to infiltrate the chain of interconnects that make up the supply chain beyond the confines of your own connections.

The steps needed to maintain a secure environment within your firewalls remain the same as they have been, the difference is in the will and direction needed to monitor and enforce what used to be strict procedures for security and validation.