GPAC ERP security features

User authentication
GPAC Software require users to authenticate themselves with a username and password before accessing the system.

User and Role
Every user who wants to work directly with the GPAC Software must have a database user with the necessary privileges. This means that the Admin account is created with specific permissions and restrictions, based on the role assigned to it by the system administrator. This helps ensure that the admin user has only the necessary access to perform their duties, while preventing unauthorized access to sensitive data and functionality within the system.

Audit trail
GPAC Software audit trails that track user activities data add, edit and delete.

Two-factor authentication
GPAC ERP providing Two-factor authentication (2FA) for those who want extra security. 2FA by SMS is a commonly used method for providing an extra layer of security when logging into an account or service. It works by sending a one-time password (OTP) via SMS to a user's mobile phone, which the user then enters into the login screen along with their username and password.

Data backups
Ensure that data is regularly backed up to minimize data loss in the event of a security breach or other disaster.

Security updates
We regularly update the software to improve overall security.

Employee training
Provide regular training to employees on data security policies, password best practices, and phishing awareness.