Update on the E-Invoicing Reform Pilot: Where Do We Stand?
For several months now, uncertainty has surrounded the pilot phase of the e-invoicing reform. Initially planned for early 2024, it…
Simultaneous implementation of the SOLOCHAIN Warehouse Management System (WMS) in 5 distribution centers View the press release
An IS project is considered sensitive if it involves any data — whether personal or not — for which a loss of integrity would have an impact on the host company. The consequences of a security breach could be legal, financial, or operational in nature. Whatever the case, they will be damaging to the brand image.
To protect against the most common cyber-attacks, MANQUE LE LIEN >> such as ransomwares, your service provider must implement a cyber-resilience approach with the security manager right from project launch. The ISO 27001 standard and indications provided by the CNIL should be considered minimum best practices when evaluating your cybersecurity.
Beyond the kick-off phase, data safety should remain an important part of company policy, meaning that a designated contact should be assigned to it at every project milestone.
During project development, the MANQUE LE LIEN >> rules to implement in order to secure your system are defined by the SaaS service provider:
At Generix Group, these cyberprotection actions are performed in-house: all information is stored on the company’s SaaS server, except for passwords.
Access must also be secured client- and provider-end. Companies must remain vigilant with respect to professional equipment theft and notify service providers so that they can restrict access remotely. When employees leave the company, it is imperative to revoke their rights to services and software they had access to.
At Generix Group, a single procedure offers connection to a client’s internal address book. When an employee leaves the company, the client address book transmits this information to the Generix Group address book automatically. The information is deleted instantly, thus ensuring data security. Conversely, new company arrivals are managed directly so that they are immediately operational in the company.
Right before production launch, care must be taken to verify that the commitments made by project teams were made operational.
This is the case at Generix Group, where project teams implement test phases for all applications. Code audits and intrusion testing are also carried out by an ethical hacker in lean startup mode (continuous improvement) shortly before production launch. The goal is to refine the data security measures implemented late in the game.
For several months now, uncertainty has surrounded the pilot phase of the e-invoicing reform. Initially planned for early 2024, it…
During the opening conference at the Solutions trade show, which focused on AI & dematerialization, the discussions were sparked with…
With the CSRD, the European directive on corporate sustainability reporting, imposing a new reporting timeline, large companies and SMEs (Small…
Work with our team to build your ideal supply chain software stack and tailor it to your unique business needs.