{"id":8858,"date":"2014-02-13T11:36:42","date_gmt":"2014-02-13T11:36:42","guid":{"rendered":"https:\/\/eu.syspro.com\/blog\/security-beyond-the-safety-of-erp\/"},"modified":"2025-03-25T11:23:21","modified_gmt":"2025-03-25T09:23:21","slug":"security-beyond-the-safety-of-erp","status":"publish","type":"post","link":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/","title":{"rendered":"Security beyond the safety of ERP"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><p>In a recent conversation we were discussing how secure our ERP system was, considering all the wonderful levels we had in place such as Role-based, Operator and Group Security; including restricted access at company, programs, feature and field level, not to mention electronic signatures, encrypted passwords and workflow controls.<\/p>\n<p><!--more--><\/p>\n<p>However, while an ERP system can provide all the necessary security controls to ensure that users are only able to access the areas that they are authorised for, the same cannot necessarily be said for the physical storage of the data generated by the ERP.<\/p>\n<p>There are a number of other areas around your ERP system, where security needs to be taken into consideration.<\/p>\n<ul>\n<li>Data Storage &#8211; one of the key areas is the access control that is placed on the location of the data. Permissions should only be granted to users that need it, as well as only to the areas that are needed by the individual.<\/li>\n<li>Data Access &#8211; the use of third party products needs to be looked at closely. What areas of the data does the application need access to, and what securities are built into the application in order to maintain the securities as setup in the ERP.<\/li>\n<li>Web-based applications &#8211; what are the risks involved if the site is compromised? How is the application protected? Is the communication between the client browser and the application secured?<\/li>\n<li>Password encryption &#8211; while passwords may be hashed out when being input into the ERP, are they stored in an encrypted format? Are the passwords sent from the client application to the server in an encrypted format? Has the requirement for <a title=\"Password strength\" href=\"http:\/\/en.wikipedia.org\/wiki\/Password_strength\" target=\"_blank\" rel=\"noopener\">strong password<\/a>, and regular password changes, been enforced?<\/li>\n<li>Data analysis and reporting &#8211; has the same level of security been put on accessing this data as you would be in place in the ERP?<\/li>\n<li>Network security &#8211; how is the organisation connected to the Internet? Is there enough security in place to stop unauthorised access from unknown external users to the network?<\/li>\n<\/ul>\n<p>While the above areas are all IT related there is also the human factor to consider. One of the single-biggest risks to this data is the company\u2019s very own staff. They have access to most of the information and data at a company. Yet, a concerning amount of companies do not have security procedures in place to remove user names, passwords, and network access when an employee resigns or is dismissed. The human factor is an important element in successfully securing a company. As far as possible, security policies need to be automated.<\/p>\n<p>Another aspect to this is how employees store data. They may use their local drives instead of network storage. They may even be using flash drives to share content. More recently, cloud-based solutions such as <a title=\"www.google.com\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener\">Google<\/a>, <a title=\"skydrive.live.com\" href=\"https:\/\/skydrive.live.com\/\" target=\"_blank\" rel=\"noopener\">SkyDrive<\/a>, and <a title=\"www.dropbox.com\" href=\"https:\/\/www.dropbox.com\/\" target=\"_blank\" rel=\"noopener\">DropBox<\/a> are being used to share sensitive information due to its convenience. People have to be educated about the risks inherent to using these devices and platforms.<\/p>\n<p>Then there is the case of ownership, responsibility and decisions. The IT department cannot be responsible for making the final decisions as they may not have a full understanding of the business strategy. In the past, IT owned the technology and the systems. Today, these responsibilities must reside with C-level executives. Security has become an important part of the strategy of a business.<\/p>\n<p>Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital. Businesses cannot just rely on the security of their ERP system; they need to take responsibility for their own data security and deciding to what extent they want to impose and enforce security policies and parameters to mitigate risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent conversation we were discussing how secure our ERP system was, considering all the wonderful levels we had in place such as Role-based, Operator and Group Security; including restricted access at company, programs, feature and field level, not to mention electronic signatures, encrypted passwords and workflow controls.<\/p>\n","protected":false},"author":133,"featured_media":5870,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[269],"tags":[45,30],"class_list":["post-8858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-owning-or-running-erp","tag-business-software","tag-erp-systems"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security beyond the safety of ERP<\/title>\n<meta name=\"description\" content=\"Security has become an important part of the strategy of a business. Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security beyond the safety of ERP\" \/>\n<meta property=\"og:description\" content=\"Security has become an important part of the strategy of a business. Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-13T11:36:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T09:23:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Louise Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Louise Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/\"},\"author\":{\"name\":\"Louise Thompson\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/#\/schema\/person\/0d0a60ced797ce88e0066ffb61e2abef\"},\"headline\":\"Security beyond the safety of ERP\",\"datePublished\":\"2014-02-13T11:36:42+00:00\",\"dateModified\":\"2025-03-25T09:23:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/\"},\"wordCount\":617,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png\",\"keywords\":[\"Business software\",\"ERP systems\"],\"articleSection\":[\"Managing-Operating ERP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/\",\"url\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/\",\"name\":\"Security beyond the safety of ERP\",\"isPartOf\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png\",\"datePublished\":\"2014-02-13T11:36:42+00:00\",\"dateModified\":\"2025-03-25T09:23:21+00:00\",\"description\":\"Security has become an important part of the strategy of a business. Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital.\",\"breadcrumb\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage\",\"url\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png\",\"contentUrl\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png\",\"width\":900,\"height\":410,\"caption\":\"erp data security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eu.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security beyond the safety of ERP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/#website\",\"url\":\"https:\/\/eu.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eu.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/eu.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/eu.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/#\/schema\/person\/0d0a60ced797ce88e0066ffb61e2abef\",\"name\":\"Louise Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/Louise-T-150x150.jpg\",\"url\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/Louise-T-150x150.jpg\",\"contentUrl\":\"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/Louise-T-150x150.jpg\",\"caption\":\"Louise Thompson\"},\"description\":\"As the Customer Relationship Executive at SYSPRO, Louise advocates the importance of proactive customer engagements and sustainable long-term customer connections. She is passionate about helping customers realize maximum business value from their SYSPRO investment through the adoption of technology.Within this role, she implements strategies to maintain customers, while ensuring a personalized experience with the brand. Louise also takes a hands-on approach to customer queries, where she aims to instill customer trust and loyalty. In support of our customer-first approach, part of Louise\u2019s role is to continually improve and add value to our customer experience journey by understanding and enhancing each customer touchpoint.\",\"sameAs\":[\"http:\/\/www.syspro.com\",\"https:\/\/www.linkedin.com\/in\/louise-thompson-51020b9\/\"],\"url\":\"https:\/\/eu.syspro.com\/blog\/author\/louise\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security beyond the safety of ERP","description":"Security has become an important part of the strategy of a business. Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/","og_locale":"en_US","og_type":"article","og_title":"Security beyond the safety of ERP","og_description":"Security has become an important part of the strategy of a business. Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital.","og_url":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/","og_site_name":"SYSPRO Blog","article_published_time":"2014-02-13T11:36:42+00:00","article_modified_time":"2025-03-25T09:23:21+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png","type":"image\/png"}],"author":"Louise Thompson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Louise Thompson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#article","isPartOf":{"@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/"},"author":{"name":"Louise Thompson","@id":"https:\/\/eu.syspro.com\/blog\/#\/schema\/person\/0d0a60ced797ce88e0066ffb61e2abef"},"headline":"Security beyond the safety of ERP","datePublished":"2014-02-13T11:36:42+00:00","dateModified":"2025-03-25T09:23:21+00:00","mainEntityOfPage":{"@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/"},"wordCount":617,"commentCount":0,"publisher":{"@id":"https:\/\/eu.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage"},"thumbnailUrl":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png","keywords":["Business software","ERP systems"],"articleSection":["Managing-Operating ERP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/","url":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/","name":"Security beyond the safety of ERP","isPartOf":{"@id":"https:\/\/eu.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage"},"image":{"@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage"},"thumbnailUrl":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png","datePublished":"2014-02-13T11:36:42+00:00","dateModified":"2025-03-25T09:23:21+00:00","description":"Security has become an important part of the strategy of a business. Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital.","breadcrumb":{"@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#primaryimage","url":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png","contentUrl":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/SecurityBeyondTheSafetyOfERP_Louise-Thompson_2014.png","width":900,"height":410,"caption":"erp data security"},{"@type":"BreadcrumbList","@id":"https:\/\/eu.syspro.com\/blog\/owning-or-running-erp\/security-beyond-the-safety-of-erp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eu.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security beyond the safety of ERP"}]},{"@type":"WebSite","@id":"https:\/\/eu.syspro.com\/blog\/#website","url":"https:\/\/eu.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/eu.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eu.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eu.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/eu.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eu.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/eu.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eu.syspro.com\/blog\/#\/schema\/person\/0d0a60ced797ce88e0066ffb61e2abef","name":"Louise Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/Louise-T-150x150.jpg","url":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/Louise-T-150x150.jpg","contentUrl":"https:\/\/eu.syspro.com\/blog\/wp-content\/uploads\/2021\/02\/Louise-T-150x150.jpg","caption":"Louise Thompson"},"description":"As the Customer Relationship Executive at SYSPRO, Louise advocates the importance of proactive customer engagements and sustainable long-term customer connections. She is passionate about helping customers realize maximum business value from their SYSPRO investment through the adoption of technology.Within this role, she implements strategies to maintain customers, while ensuring a personalized experience with the brand. Louise also takes a hands-on approach to customer queries, where she aims to instill customer trust and loyalty. In support of our customer-first approach, part of Louise\u2019s role is to continually improve and add value to our customer experience journey by understanding and enhancing each customer touchpoint.","sameAs":["http:\/\/www.syspro.com","https:\/\/www.linkedin.com\/in\/louise-thompson-51020b9\/"],"url":"https:\/\/eu.syspro.com\/blog\/author\/louise\/"}]}},"metadata":{"_yoast_wpseo_focuskw":["Security beyond the safety of ERP"],"_yoast_wpseo_focuskw_text_input":["Security beyond the safety of ERP"],"_yoast_wpseo_title":["Security beyond the safety of ERP"],"_yoast_wpseo_metadesc":["Security has become an important part of the strategy of a business. Now, more than ever, strategy, company policies and staff education are vital to protecting intellectual capital."],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_primary_category":[""],"_yoast_wpseo_linkdex":["65"],"_yoast_wpseo_metakeywords":["erp, data security, business software"],"_wp_page_template":["default"],"_thumbnail_id":["5870"],"_edit_lock":["1742894469:224"],"_edit_last":["224"],"_webdados_fb_open_graph_specific_image":[""],"_webdados_fb_open_graph_specific_title":[""],"_monsterinsights_sitenote_active":["0"],"_yoast_wpseo_estimated-reading-time-minutes":[""],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/8858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=8858"}],"version-history":[{"count":1,"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/8858\/revisions"}],"predecessor-version":[{"id":10754,"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/8858\/revisions\/10754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/media\/5870"}],"wp:attachment":[{"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=8858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=8858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eu.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=8858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}