About the importance of securing the Vertec installation and keeping it up to current.
Operating mode
Cloud Suite
|ON-PREMISES
Modules
Services & CRM
Budget & Phases
Purchases
Resource Planning
Business Intelligence
Vertec installation security is a dynamic and ongoing process that must be carried out continuously.
First of all, is my Vertec accessible via the Internet or not? This leads to the following scenarios:
When running Vertec in a Cloud Suite, Vertec is used directly from the cloud without local server installation. Vertec operates the software in the cloud and is responsible for most of the security measures.
However, Cloud Suite customers need to keep these two things in mind:
Customers of a Vertec On-Premises installation have two options to put their Vertec on the Internet. Either they use the Webaccess service from spektra netcom ag, or they put their Vertec Cloud Server even on the Internet.
In both cases, Vertec strongly recommends that you address the already described Password Security and 2 Factor Authentication, activate the additional protection mechanisms described below and always use the latest Vertec version.
We recommend activating or not deactivating these additional protective measures (whenever possible):
In all of these cases, we recommend that you always the current Vertec version use the current version of Vertec, but at least install every major release. Why is this so relevant? This has to be seen in the context of further technical development, because what was good enough perhaps three years ago is no longer OK and vulnerable today. Like the encryption standards used on the Internet for data transmission, Vertec is constantly evolving. Old versions of Vertec should therefore no longer be used.
In addition to the measures mentioned above, customers who place their Vertec independently on the Internet must also ensure that:
a locally operated (On-Premises) installation that is not connected to the Internet is the least common. Only in this case are older Vertec versions acceptable and passwords of less importance.
The key to a strong password is its length: it is at least ten digits long, upper and lower case, numbers, and special characters. Ideally, it does not appear as a “real” word in the dictionary and does not relate to the user. For each service, a different password should be used, and password generators should be used to create it. Passwords should also never be written down or stored in plain text. Instead, password managers should be used to manage them.