For growing manufacturers, distributors, and service organizations, compliance touches everything from financial reporting and internal controls to data governance, traceability, and industry-specific regulations. As businesses scale, operate across borders, or prepare for audits, the systems they rely on must ensure compliance with industry and regulatory standards. Microsoft Dynamics 365 Business Central is designed with compliance… Continue reading Business Central and Regulatory Compliance: GAAP, IFRS, SOX, and Beyond
Category: Cybersecurity
ArcherPoint’s Top Ten Blogs of 2025
ArcherPoint is dedicated to supporting the Dynamics 365 Business Central community through informative, explanatory, and practical blog posts. This year, our team members have provided outstanding content covering topics such as AI, security, tariffs, and other relevant areas. In case you missed them, here we highlight our 10 most popular blogs of 2025. ArcherPoint by… Continue reading ArcherPoint’s Top Ten Blogs of 2025
Access Everywhere: Notes on Cyber Security from DEF CON 33
The 2025 DEF CON hacker conference, officially DEF CON 33, took place last August in Las Vegas with the theme, “Access Everywhere”. The event drew more than 30,000 cybersecurity professionals, researchers, and enthusiasts for presentations, workshops, networking, and competitions. DARPA’s AI Cyber Challenge The centerpiece of this year’s event was the conclusion of the AI… Continue reading Access Everywhere: Notes on Cyber Security from DEF CON 33
Why SaaS Is More Secure Than You Might Think: Debunking Myths and Understanding the Modern Cloud Advantage
When cloud software first entered the mainstream, many organizations were understandably cautious. Entrusting critical business data to someone else’s servers seemed risky — especially for companies that had long kept systems locked away in on-premises data centers under their own control. But today, that perception has changed. As technology and cyber threats have evolved, it… Continue reading Why SaaS Is More Secure Than You Might Think: Debunking Myths and Understanding the Modern Cloud Advantage
Is Business Central Secure? A Look at Microsoft’s Cloud Protections
When your organization runs its entire business on a cloud-based ERP like Microsoft Dynamics 365 Business Central, trust in its security is essential. You’re managing the lifeblood of your company: financial data, customer information, supply chain operations, and proprietary insights. So, is Business Central truly secure enough to protect all of it? The short answer… Continue reading Is Business Central Secure? A Look at Microsoft’s Cloud Protections
How AI is Changing Cybersecurity Risk – for Better and for Worse
Artificial intelligence (AI) introduces a range of new attack surfaces and fresh governance obligations. Business and IT leaders face three simultaneous challenges: Protecting AI as an asset, utilizing AI to defend against cyberattacks, and defending against AI-enabled attackers. The stakes are high. The World Economic Forum’s Global Cybersecurity Outlook 2025 identifies emerging technologies (especially generative… Continue reading How AI is Changing Cybersecurity Risk – for Better and for Worse
A Survey of the Changing Landscape of Cybersecurity in 2025
The cybersecurity landscape continues to evolve at a breakneck pace. Advanced AI techniques, geopolitical tensions, sprawling digital perimeters, and regulatory shifts are reshaping the threat and defense paradigm. According to the World Economic Forum’s Global Cybersecurity Outlook 2025, 72% of organizations report an increase in cyber risk, and nearly half (47%) cite advances in generative… Continue reading A Survey of the Changing Landscape of Cybersecurity in 2025
Managing User Permissions in Dynamics 365 Business Central
Managing Permissions and Security Groups in Dynamics 365 Business Central – Part III In previous blogs, we have discussed techniques for managing permission sets and security groups in Microsoft Dynamics 365 Business Central. The main idea is to define permission sets and security groups that will enable all job-related functions to be performed, and then… Continue reading Managing User Permissions in Dynamics 365 Business Central
Brute Force Password Cracking: How Businesses Can Stay Protected
In today’s digital business environment, passwords remain the first—and sometimes only—line of defense that stands between cybercriminals and sensitive business data. Among the many tactics used to compromise credentials, brute-force password cracking remains one of the most persistent and dangerous threats. While not the most sophisticated method, brute force attacks are relentless and increasingly automated,… Continue reading Brute Force Password Cracking: How Businesses Can Stay Protected
Managing Permissions and Security Groups in Dynamics 365 Business Central – Part II: Security Groups
In the first part of this series, Managing Permissions and Security Groups in Dynamics 365 Business Central – Part I, we discussed how to define your own permission sets in Business Central. Our focus in this series concerns granting users permission to view, edit, and delete Table Data, since this is a critical area where… Continue reading Managing Permissions and Security Groups in Dynamics 365 Business Central – Part II: Security Groups