Best Practices for maintaining secure connections to your ERP

Two things protect your company’s ERP the most:
good habits and two-factor authentication (2FA).
Think of them as a strong front door plus a second lock only you can open.

This article explains, in simple terms:

1. What is your ERP and why is it so important?

Your ERP (like SIX ERP) is the place where a company keeps:

If someone breaks in, they can:

So your ERP is not just “another service” – it’s more like the central brain of the company.

2. Best practices for a secure connection

2.1 Use strong, unique passwords

A weak password is like a door key made of paper.

Bad passwords are things like:

Good passwords:

Example of a stronger password (don’t use this exact one):
Sun!Tree92_purpleRoad

Never reuse your ERP password on social media, games, or other websites.
If another site is hacked, attackers will try the same password on your ERP.

2.2 Keep your device clean and updated

Even if your password is strong, your computer or phone can be attacked.

Good habits:

If malware (a virus) is installed, it can steal your passwords or even type for you.

2.3 Avoid unsafe Wi-Fi

Public Wi-Fi (cafés, airports, etc.) can be risky:

Safer choices:

A lot of attacks start with a fake email:

How to spot problems:

If you’re not sure, ask your system administrator or IT for help.

3. Why 2FA should always be enforced

3.1 What is 2FA in simple words?

Two-Factor Authentication (2FA) means:

To log in, you need:

Even if someone steals your password, they still don’t have your phone or inbox.

It’s like:

A door with a key and a special code that changes every minute.

3.2 Realistic attack scenarios

Scenario 1: Password stolen, but 2FA saves you

  1. You use the same password for:

  2. That game website is hacked, and attackers download all passwords.

  3. They try your email and ERP with the same password.

Scenario 2: Phishing email succeeds, but 2FA stops damage

  1. You receive a fake email:
    “Your ERP account has been blocked, click here to unlock it.”

  2. You click the link and enter your username and password into a fake page.

  3. The attacker now knows your password and tries to log into the real ERP.

Even if you made a mistake with the fake site, 2FA reduces the damage.

Scenario 3: Lost or stolen laptop

  1. Your laptop is stolen from your car.

  2. Your browser has saved your username and password for the ERP.

4. What weak account practices can lead to

If passwords are weak and 2FA is not used, attackers might:

This can cause:

All this can start from one weak password or one unprotected account.

5. Why 2FA should be mandatory (not optional)

Even if some users think 2FA is “annoying” or “takes too long,” from a security view:

That’s why 2FA should be enforced by default:

6. Simple checklist for users

To keep your ERP access safe:

See also:

Two-Factor Authentication in SIX ERP
Security in SIX ERP
Setting up email two-factor authentication
Setting up TOTP two-factor authentication with an Authenticator App
Setting up two-factor authentication with WhatsApp
Troubleshooting two-factor authentication