Tag: PeopleSoft Enterprise
PeopleSoft & Social Engineering Attacks: Common Techniques & How to Prevent Them
The most damaging breaches tend to be initiated by social engineering. Typically involving an email that invokes urgency, fear, or similar emotions - a victim is prompted to reveal sensitive information or click a malicious link. Given the human element is easy to exploit, these sophisticated tactics have proven to be extremely effective for cyber criminals. Considering the scope that an enterprise organizations (with potentially thousands of employees) can face – the assumption cannot be “if” a breach occurs in this manner, but “when”. And make no mistake, your ERP systems are unequivocally the most popular target for these attacks.
October is National Cyber Security Awareness Month, and in recognition Appsian would like to educate PeopleSoft users on how to better combat social engineering and prevent these attacks from successfully breaching your systems. In this insightful session, PeopleSoft security professionals Greg Wendt and JD Bell will demonstrate how to:
Apply heightened scrutiny for changes to bank information initiated by employees (seeking to update/change direct deposit credentials.)
Monitor employee logins that occur outside normal business hours.
Restrict access to systems handling sensitive information when access is requested outside your secure network
Embed two-factor authentication within PeopleSoft to restrict access to sensitive systems and information
Leverage data visualization to execute on-going risk management strategies
Greg Wendt & , Appsian
Duration: 53:35
-
- Recordings & Presentations
- 10/17/18
Learn about the University of Wisconsin-Platteville’s move to PeopleSoft Activity Guides, tips for what to watch out for, their plans for the future and more.
-
- Blogs
- 10/16/18
Learn about the University of Wisconsin-Platteville’s move to PeopleSoft Activity Guides, tips for what to watch out for, their plans for the future and more.
-
- Blogs
- 10/16/18
Learn about the University of Wisconsin-Platteville’s move to PeopleSoft Activity Guides, tips for what to watch out for, their plans for the future and more.
-
- Blogs
- 10/16/18
Oracle’s own Senthil Kumaran and Matthew Haavisto presented a session at RECONNECT 18 about the ability to cluster PeopleSoft applications. In their session, they covered the benefits and the features while giving a live demo of how it all works.
-
- Blogs
- 10/12/18
Oracle’s own Senthil Kumaran and Matthew Haavisto presented a session at RECONNECT 18 about the ability to cluster PeopleSoft applications. In their session, they covered the benefits and the features while giving a live demo of how it all works.
-
- Blogs
- 10/12/18
Oracle’s own Senthil Kumaran and Matthew Haavisto presented a session at RECONNECT 18 about the ability to cluster PeopleSoft applications. In their session, they covered the benefits and the features while giving a live demo of how it all works.
-
- Blogs
- 10/12/18
The PeopleSoft Payment Request feature puts the responsibility of low-value, high-volume invoices in the hands of end users by providing them with the self-service ability to request payment for non-Purchase Order invoices; thus empowering end users!
-
- Blogs
- 10/10/18
The PeopleSoft Payment Request feature puts the responsibility of low-value, high-volume invoices in the hands of end users by providing them with the self-service ability to request payment for non-Purchase Order invoices; thus empowering end users!
-
- Blogs
- 10/10/18
The PeopleSoft Payment Request feature puts the responsibility of low-value, high-volume invoices in the hands of end users by providing them with the self-service ability to request payment for non-Purchase Order invoices; thus empowering end users!
-
- Blogs
- 10/10/18