In just the first half of 2024 more than a billion people saw their information leaked online as a result of high profile data breaches such as those from AT&T and Ticketmaster. Ryan Ermey, senior money reporter at CNBC Make It, shares an article with information on how to go about handling a data breach by cybersecurity expert and Experian’s health of global data breach resolution Michael Bruemmer. “Following a breach, depending on which information was compromised, you may find yourself on the receiving end of targeted scams or picking up the pieces after identity thieves open lines of credit in your name. Here’s how to protect yourself, and what to do if you’re part of a breach.”

 

Practice good online hygiene

Rare are the days that someone would be completely off the grid. Odds are even a small chunk of your information is floating around the web and is vulnerable to cyber attacks.  “I operate under the assumption that pretty much all my information is out there. And that’s a pretty reasonable assumption,” says Ed Skoudis, president at SANS Technology Institute.Nevertheless, Ermey statesthat the more information that fraudsters can piece together about you, the higher risk you run of falling victim to scams and identity theft. To keep your information as private as possible, practice these online hygiene tips from cybersecurity experts.

  1. Use a password manager
  2. Avoid links from strangers
  3. Skip QR codes when possible
  4. Always use credit online

 

What to do in case of a breach

Even if you’re careful, there is still a chance for hackers to breach your information. Here’s what to do if and when that happens.

  1. Don’t bury your head in the sand. “‘It’s important to know what information of yours is out there.’ says Bruemmer.”
  2. Change your passwords. “If you don’t have a password manager yet, be sure to change your password for the site where the breach occurred and for any other where you might use the same password.”
  3. Be vigilant. “‘Following a breach, monitor your credit card statements for any fishy charges, even if the process seems tedious,’ says Skoudis.”
  4. Act quickly. “‘If you do see something alarming on your credit history, like a new credit line in your name, time is of the essence,’ says Bruemmer.”

 

For Full Article, Click Here

Problem:

Error receiving a Purchase Order on MSCM handheld. The error message reads: “PO not Available. PO contains no open PO lines.”

However, the PO has open lines in PO20.1.

 

Resolution:           

This error occurs when a PO’s Ship To location is not designated as a “Receiving, Ship To” location in MSCM.

To resolve this error, follow the steps outlined below:

From the MSCM web application, do the following:

  1. select Location Management.
  2. Select Modify from the Locations drop-down menu.
  3. Enter the Ship To location in the Location Id field.
  4. Click on the Search button.
  5. Check the Receiving, Ship To box.
  6. Click on the Modify button.
  7. Click on the Done button.

Many reasons why companies are adamant in transitioning to the latest advancements is the mere fact that the risks outweigh the benefits. But, more often than not, they aren’t as fully informed of the benefits to truly see the advantage. Take cloud migration for example. While there are still a number of businesses operating their business applications like enterprise resource planning (ERP) on premise, many more businesses have found the advantage in migrating to the cloud. Anise Madh is GM of Global Infor Practice at Wipro, a global leader in e-commerce and mobile solutions for Infor CloudSuite ERP M3 and LN, shares an article on Forbes about how many reasons businesses have yet to migrate is the board’s concerns outweighing the benefits but failing to see it’s true potential. The shift to cloud ERP has been a significant technology trend and the most effective way to prepare for market changes. “For any business executive,” Madh states, “ensuring board satisfaction and cooperation is a daily imperative. To secure board member buy-in on innovative technology implementations, especially large overhauls like moving from on-premise tools to the cloud, business leaders would be wise to anticipate and address common objections.” Below are Madh’s tips for educating and reasoning with them to make the on-premise to cloud ERP transition a reality.

Objection 1: The transition will cause unnecessary downtime. “Cloud migration requires monetary and time investments, both of which are often significant. A common disagreement from the board is that stirring up a tech transformation isn’t necessary; the current technology is working, and there’s no need to cause any unneeded downtime to transition to new systems.

Counterargument: “Rather than causing unnecessary downtime, it’s important to help others understand that a cloud ERP transition can be a step to mitigate downtime in the long run. Avoiding cloud migration can lead to a slew of challenges, including keeping up to date with compliance issues in global operations, greater risk for cyberattacks and data leakage or, worse, complete shutdown. In short, you can let your board know that proactively planning and initiating your cloud migration now ensures you have control over the process and can avoid being forced into a rushed and potentially disruptive transition later. This can actually avoid downtime and streamline data cleaning, sharing and analysis.”

 

Objection 2: The business is already operating with slim teams. Why exacerbate this? “Because of ongoing labor challenges, as well as an aging workforce, boards are hyperaware of where teams are being deployed. They’re focused on having each employee work on business-furthering tasks to keep productivity up. The idea of losing a handful of teammates to focus on a tech migration can cause heartburn.”

Counterargument: “Without transitioning to the cloud, your business may not effectively be using its current headcount and may be wasting time that could be better used on other business-advancing activities. It’s true that training will be required when new technology is implemented. But overall, adequate training—coupled with cloud-enabled software updates and service—can lead to reduced downtime and greater efficiency and productivity levels. Like with the counter to unnecessary downtime, this is about looking at the long-term independence and efficiency of your employees.”

 

Objection 3: If it’s not broken, don’t fix it. “Like with the first objection, the board may feel replacing technology that seemingly runs perfectly fine is a misuse of time and cost investments.”

Counterargument: “Without priming an organization’s tech stack to stay in lockstep with the latest innovations, you’re risking your business falling significantly behind. You can point out how your on-premise ERP systems are filled with numerous legacy applications, adding to unnecessary complexity due to the steady stream of updates and customizations needed for these apps. Point out how moving to the cloud can support the adoption of the latest innovations in AI and ML solutions. Cloud ERP solutions can help enrich visibility across departments, enabling users to access it from any mobile device, whether iPad, mobile phone or other device. Lastly, with older on-premise ERP solutions, leveraging mobile is more complex and more expensive. Plus, it leaves the door wide open for cybersecurity attacks and other risks.”

 

You need to set your organization up for success by getting ahead of your board’s main concerns around migrating away from-prem systems. Madh concludes that achieving the full support and buy-in from your board is a major step in facilitating the transition to a successful cloud ERP solution.

 

For Full Article, Click Here

The landscape of digital threats has undergone a profound transformation over the past few decades, driven by technological advancements and the digital interconnectedness of our world. As our society increasingly relies on digital technology for communication, commerce, and critical infrastructure, the threat landscape has evolved in complexity and sophistication.

 

Businesses of all sizes, industries, corporate entities and so on are victim to digital threats. Thus, ensuring your company’s digital footprint is secure and invulnerable is a top priority.  As we rely on technology for communication, automation, and business tasks, we must also put the effort in ensuring our cybersecurity is up to date. An article on SimpliLearn.com shares the evolving landscape of digital threats and a list of cybersecurity trends we are seeing across industries to combat this.

  1. The Emergence of Automotive Cybersecurity Threats
  2. Harnessing the Power of Artificial Intelligence in Cybersecurity
  3. Mobile Devices: A Growing Target for Cyber Attacks
  4. Cloud Security Challenges and Solutions
  5. Data Breaches: A Persistent Concern
  6. IoT Security in the Era of 5G
  7. Embracing Automation for Enhanced Cybersecurity
  8. Targeted Ransomware Attacks
  9. Escalating State-Sponsored Cyber Warfare
  10. Mitigating Insider Threats Through Awareness
  11. Addressing Cybersecurity Challenges in Remote Work Environments
  12. Combating Social Engineering Attacks
  13. Enhancing Security with Multi-Factor Authentication
  14. Defending Against International State-Sponsored Attacks
  15. Strengthening Identity and Access Management
  16. Real-Time Data Monitoring for Early Threat Detection
  17. Securing Connected Vehicles Against Cyber Threats
  18. Leveraging AI for Enhanced Security
  19. Ensuring Security for IoT Devices
  20. Strengthening Cloud Security Measures

 

Next Up With Cyber Security Trends

Below are trends that, according to SimpliLearn, are emerging and could become the next important factors in cybersecurity:

  • AI and ML in Cybersecurity
  • Zero Trust Security Models
  • Quantum Computing Resistant Cryptography
  • Cloud Security Evolution
  • 5G Network Security
  • IoT Security
  • Supply Chain Security
  • Biometric and Behavioral Authentication
  • Privacy Regulations and Data Protection
  • Cybersecurity Workforce Development
  • Human-Centric Security
  • Automated Threat Hunting
  • International Cybersecurity Collaboration
  • Regulatory and Legal Challenges
  • Cyber Insurance
  • AI-Driven Security Testing
  • Incident Response and Recovery Planning
  • Smart Cities and Critical Infrastructure Security
  • AI-Powered Cybercriminals
  • Ethical Hacking and Bug Bounty Programs

 

For Full Article, Click Here

Problem: Users are not able to log into MSCM on handheld devices. They are able to access the MSCM console through browser, but not directly on the handhelds.

Before we get to the solution, consider the handheld timeout settings. The Timeout setting is the amount of time the handheld will attempt to connect when sending/receiving information. It can be set by selecting the number of seconds in the counter. Note that the maximum timeout setting is 3600 seconds while the minimum is 60 seconds.

The resolution for users who are not able to log into MSCM on their handheld devices is to truncate the LAWSON_USER table and stop & restart MSCM server to force re-syncing users. You shouldn’t have any more problems logging in on handheld devices.

Gone are the days when firewalls and antivirus softwares were essentially all we needed to keep our computers safe. With more advanced technology comes more advanced threats. So, what does the cybersecurity industry have in store? The answer: cybersecuirty mesh. Anshu Bansal, Forbes Council Member and founder/CEO of CloudDefense.AI shares the newest concept of cybersecurity mesh and it’s future in network defense.

 

What Is Cybersecurity Mesh?
A concept curated by Gartner, cybersecurity mesh is all about ditching the old “castle wall” mentality and creating a flexible, scalable security perimeter around each access point. Instead of trying to protect one extensive network, we’re securing each device, user, and connection individually. Bansal compares it to instead of having one big lock on your front door, you’re putting smart locks on every door, window, and access point in your house and each lock knows who should be allowed in and can make decisions on its own. This means deploying security tools that can communicate with each other, share threat intelligence, and make decisions based on context. One great advantage of this approach is that it doesn’t matter where your data is – in the cloud, on-premises, or accessed from handheld devices. Additionally, security follows the data and the user. Some other key benefits include a stronger defense, faster threat response, improved scalability, simplified management, flexibility and context-aware decisions.

 

Implementing Cybersecurity Mesh
Bansal provides a practical guide below to get you going:

  • Assess Your Current Setup: First, take a good look at what you’ve got. What devices are connected to your network? What security measures are already in place? This inventory will help you figure out where you need to focus.
  • Define Your Security Perimeter: Identify the boundaries of your network, including all your devices, cloud services, and access points. Remember, with remote work, your perimeter extends beyond the office walls.
  • Choose And Integrate Your Tools: You’ll need a mix of security tools that work together. These might include firewalls, intrusion detection systems, identity management solutions and cloud security posture management tools. Look for tools that can easily integrate with each other.
  • Implement Zero Trust: Zero trust is a key principle of cybersecurity mesh. It means verifying every user and device every time they try to access your network. Start by setting up strong authentication methods.
  • Set Up Monitoring: You need to keep an eye on what’s happening across your network. Implement tools that give you real-time visibility into user activities, data movement, and potential threats.
  • Train Your Team: Your staff are a crucial part of your security. Make sure they understand the new system and their role in keeping things secure. Regular training sessions can help keep everyone up to speed.
  • Start Small And Scale: Don’t try to overhaul everything at once. Pick a small area of your network to start with, then gradually expand your mesh as you get more comfortable with the system.
  • Monitor And Respond: Keep a close eye on your mesh. Set up alerts for suspicious activity and have a clear response plan in place.

 

For Full Article, Click Here

Issue: I possess Design Studio forms from the previous version of Lawson System Foundation (LSF) and Infor Lawson for Ming.le. How can I ensure their compatibility with my current LSF and Infor Lawson for Ming.le environment?

 

Solution: A Migrate Tool has been provided, starting from specific LSF versions and patches onwards:

 

– LSF 10.0.4, JT-651295, PORTAL.DIR/utility/upgradeCustomContent.htm version 10.0.4.0.747 minimum

– LSF 10.0.5, JT-651295, PORTAL.DIR/utility/upgradeCustomContent.htm version 10.0.5.0.746 minimum

– LSF 10.0.6, JT-651295, PORTAL.DIR/utility/upgradeCustomContent.htm version 10.0.6.0.745 minimum

– Included in the base release for LSF 10.0.7 and newer versions

 

Steps to follow in LSF 10.0.4, 10.0.5, and 10.0.6 with the specified patches, as well as in the delivered release of LSF 10.0.7 and above:

 

To review the existing Design Studio forms:

  1. Log in to Infor Lawson for Ming.le with a Portal Administrator account.
  2. Navigate to Custom Content Tools.
  3. Select Migrate Custom Content.
  4. Choose Analyze | Custom Forms.

 

To update the existing Design Studio forms:

  1. Log in to Infor Lawson for Ming.le with a Portal Administrator account.
  2. Navigate to Custom Content Tools.
  3. Select Migrate Custom Content.
  4. Choose Migrate | Custom Forms.

 

Please note:

This process won’t alter the “XMLGenBy=”xscrgen 10.0.7.0.1240 2016-03-09 08:32:37″” listed in the XML of the Design Studio form. Instead, it will append this tag to the first line: dateupgrade=”1443633109897″. To ascertain the date of the upgrade, visit https://currentmillis.com/ and input the associated value.

 

To review the current Design Studio forms with custom JavaScript:

  1. Log in to Infor Lawson for Ming.le with a Portal Administrator account.
  2. Navigate to Custom Content Tools.
  3. Select Migrate Custom Content.
  4. Choose Analyze | Custom Script.

 

Please note:

There isn’t a migration process for Custom Script. This requires manual handling based on the information from the Analyze step.

Recently, Infor announced a pair of acquisitions of data-migration partner Albanero and CPG consulting expert Acumen. Shána Briddock, Associate Editor at ERP Today, shares an article of Infor’s data-driven decision making to help with their data capabilities. Briddock notes, “Aligned with last year’s bi-annual release cycle for customer agility, Infor included enhancements in ESG reporting and Infor GenAI, especially aimed at leveraging industry-specific data for improved decision-making.” Additionally, with all these acquisitions, Infor is enhancing its data migration, management and analytics capabilities, keeping them on track with its biggest competitors. Their goal is to take advantage of a robust data foundation for its cloud solutions. Infor CEO Kevin Samuelson notes of their strategic alliances, “Infor’s strategy remains fiercely focused on helping customers unlock core value drivers within their industry-specific operations. The next wave of innovation is completely data-driven and generating real value from it begins with a secure industry-rich data foundation.”

 

For Full Article, Click Here

IT writer Sok Yee Tham shares an exclusive interview on Channel Asia with Infor’s senior vice president and general manager of Asia Pacific and Japan (APJ), Terry Smagh, relayed his focus on establishing “longevity” with partners by identifying commonalities and how they complement each other. Tham shares how Infor aims for long-term, strategic collaborations to ensure effective partner management and that partners have sufficient market share for success. According to Smagh, Infor has traditionally leveraged channel partners in ASEAN, and the partner network is one of Infor’s “most established” network in Asia Pacific when compared to other regions. Smagh notes in the interview the tech giant’s strategies with their channel partners, “Although Infor’s ASEAN strategy has been tapping on these partnerships, the company recognizes it may be “jaded”. However, Smagh assured that the company is “changing and evolving”. He outlined that Infor’s strategy involves considering how to engage with partners and make them successful, highlighting a collaborative approach in their partner strategy.” Additionally, Smagh comments that he finds partners complementary and integral to Infor’s business. He aims to do so by providing support, engagement, education and funding to partners. Furthermore, Infor plans to launch their global partner program in the first quarter of 2025.

 

For Full Article, Click Here

Below is a cheat sheet for batch status numbers & their descriptions:

There are several use cases for querying the QUEUEDJOB table in GEN in order to get batch job details, such as status and run times.  The status is stored as a numeric value, not the actual status that is seen in the GUI. It can also be useful to be able to map it to the description.  Here are the batch job status numbers with their descriptions:

# 0 – Running
# 30 – Waiting
# 31 – Waiting Step
# 32 – Waiting On Time
# 33 – Waiting Recovery
# 34 – Needs Recovery
# 35 – Invalid Parameters
# 36 – Queue Inactive
# 37 – On Hold
# 60 – Recurring Skipped
# 61 – Recovery Deleted
# 62 – Cancelled
# 63 – Normal Completion