GPAC ERP security features
GPAC Software require users to authenticate themselves with a username and password before accessing the system.
User and Role
Every user who wants to work directly with the GPAC Software must have a database user with the necessary privileges. This means that the Admin account is created with specific permissions and restrictions, based on the role assigned to it by the system administrator. This helps ensure that the admin user has only the necessary access to perform their duties, while preventing unauthorized access to sensitive data and functionality within the system.
GPAC Software audit trails that track user activities data add, edit and delete.
GPAC ERP providing Two-factor authentication (2FA) for those who want extra security. 2FA by SMS is a commonly used method for providing an extra layer of security when logging into an account or service. It works by sending a one-time password (OTP) via SMS to a user's mobile phone, which the user then enters into the login screen along with their username and password.
Ensure that data is regularly backed up to minimize data loss in the event of a security breach or other disaster.
We regularly update the software to improve overall security.
Provide regular training to employees on data security policies, password best practices, and phishing awareness.