Key Insights Blog

Read the latest insights from our experts on GRC and risk management.

SAP S/4 HANA security considerations

by Simon Persin on 21 June 2018

This article appeared in E-3 Magazine International on 19th June 2018. E-3 Magazine International, independent SAP trends, analyses, strategies and in-depth reports from business and IT.

Is Investment in IT Security Tangible ROI or merely an insurance policy?

by Richard Hunt on 5 July 2016

It is difficult to articulate ROI on IT security. It is a bit like wearing a protective equipment when motorcycle racing: there are regulatory reasons why you need to do it, along with personal ...

S/4HANA - Impressions from the Coal Face

by Alex Ayers on 12 May 2016

Working with new SAP technology can be both frustrating and exciting. Most practitioners have war stories relating to new products that were released before they were ready.  When SAP announced ...

Access Control 5.3 End Of Life - Time To Upgrade, Or Do You Just Keep The Lights On?

by Simon Persin on 23 October 2015

Access Control 5.3 is due to exit “Mainstream Maintenance” and enter Extended Support at the end of 2015. Many organisations will find themselves in a situation of “end of life” with unsupported ...

Do You Have Trust Issues?

by Tom Venables on 6 August 2015

Security is all about trust. Many organisations talk about trust in various ways, especially where systems and processes intersect. Trust in people, in processes and in the accuracy of data are all ...

Don’t Show Your Sensitive Side

by Tom Venables on 23 July 2015

As with so much in security, the most important piece of achieving controls around data protection is human: we should ensure that all employees who are dealing with sensitive data understand their ...

The Paradox Of Password Rules

by Simon Persin on 14 February 2014

Many organisations can expect to see some sort of findings on their audit reports pertaining to their system password rules and settings. Examples of these include the number of lowercase, uppercase, ...

Common Characteristics Of High Performing Teams

by Alex Ayers on 19 December 2013

As we come to the end of 2013 I have been thinking of some of the projects that we have been working on in this time.  One area of focus for me has been been working with clients to improving their ...

SAP: The Increasing Cyber Security Threat

by Richard Hunt on 24 October 2013

The cyber threat to IT systems in on the increase and this time it is not bored teenagers that we need to worry about. In this blog I ask, is it time to refocus some of our efforts towards the ...

SAP GRC – Turning An Obligation Into A Benefit

by Richard Hunt on 27 June 2013

Maintaining SAP Security and supporting Audit processes is often seen by many companies as an obligation that does not generate any profit. Therefore these mandatory tasks often do not get the ...

We would love to hear your thoughts. Please leave a comment.

We can let you know when we have a new blog - subscribe here

* We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.


For a 3 minute Introduction to Turnkey Consulting, Download Our 18 Page Flipboard Guide