{"id":192389,"date":"2026-04-15T14:12:41","date_gmt":"2026-04-15T07:12:41","guid":{"rendered":"https:\/\/www.hashmicro.com\/id\/blog\/?p=192389"},"modified":"2026-04-15T14:45:18","modified_gmt":"2026-04-15T07:45:18","slug":"keamanan-data-sistem-erp","status":"publish","type":"post","link":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/","title":{"rendered":"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan"},"content":{"rendered":"<p>Sistem ERP menyimpan aset paling berharga perusahaan Anda: data. Mulai dari catatan keuangan, data karyawan, informasi pelanggan, hingga strategi bisnis, semuanya terintegrasi dalam satu platform terpusat.<\/p>\n<p>Di satu sisi, integrasi ini memberikan efisiensi luar biasa bagi operasional bisnis. Namun di sisi lain, justru karena sifatnya yang terpusat inilah, sistem ERP menjadi target empuk bagi ancaman siber. Satu celah keamanan saja bisa membuka akses ke seluruh data kritikal perusahaan.<\/p>\n<p>Itulah mengapa keamanan data ERP bukan sekadar urusan tim IT, melainkan prioritas strategis yang harus menjadi perhatian seluruh organisasi dari level operasional hingga jajaran manajemen.<\/p>\n<style>\r\n\t.takeaways-container {\r\n\t\tmargin: 20px 0;\r\n\t\tfont-family: sans-serif;\r\n\t}\r\n\t.box-content {\r\n\t\tbackground-color: #fffacd;\r\n\t\tbox-shadow: 0 4px 8px rgba(0, 0, 0, 0.1);\r\n\t\tborder-radius: 25px;\r\n\t\tpadding: 25px;\r\n\t}\r\n\t.title {\r\n\t\tmargin-bottom: 20px;\r\n\t}\r\n\t.title p {\r\n\t\tdisplay: inline-block;\r\n\t\tbackground-color: #8A0E19;\r\n\t\tcolor: #ffffff;\r\n\t\tpadding: 8px 15px;\r\n\t\tborder-radius: 8px;\r\n\t\tfont-size: 22px;\r\n\t\tfont-weight: bold;\r\n\t\tmargin: 0;\r\n\t}\r\n\t.item {\r\n\t\tdisplay: flex;\r\n\t\talign-items: flex-start;\r\n\t\tmargin-bottom: 12px;\r\n\t}\r\n\t.item .circle {\r\n\t\twidth: 8px;\r\n\t\theight: 8px;\r\n\t\tbackground-color: #000000;\r\n\t\tborder-radius: 50%;\r\n\t\tmargin-right: 12px;\r\n\t\tflex-shrink: 0;\r\n\t\tmargin-top: 8px;\r\n\t}\r\n\t.item p {\r\n\t\tmargin: 0;\r\n\t\tfont-size: 16px;\r\n\t\tline-height: 1.6;\r\n\t}\r\n\t.item p a {\r\n\t\tcolor: #8A0E19;\r\n\t\tfont-weight: normal;\r\n\t\ttext-decoration: none;\r\n\t}\r\n\t.item p a:hover {\r\n\t\ttext-decoration: underline;\r\n\t}\r\n\t.button-wrapper {\r\n\t\tmargin-top: 25px;\r\n\t}\r\n\t.submit-button {\r\n\t\tbackground-color: #8a0e19;\r\n\t\tcolor: #fff !important;\r\n\t\ttransition: all .3s ease;\r\n\t\tpadding: 12px 28px;\r\n\t\tdisplay: inline-block;\r\n\t\tborder-radius: 12px;\r\n\t\tfont-size: 16px;\r\n\t\tfont-weight: bold;\r\n\t\ttext-decoration: none;\r\n\t}\r\n\t.submit-button:hover {\r\n\t\tbackground-color: #991b26;\r\n\t}\r\n\t@media (max-width: 767px) {\r\n\t\t.takeaways-container {\r\n\t\t\theight: auto;\r\n\t\t\tpadding: 0;\r\n\t\t}\r\n\t\t.box-content {\r\n\t\t\tpadding: 24px;\r\n\t\t}\r\n\t\t.content,\r\n\t\t.main-content,\r\n\t\t.list-item {\r\n\t\t\twidth: 100%;\r\n\t\t}\r\n\t}\r\n<\/style>\r\n\r\n<div class=\"takeaways-container\">\r\n\t<div class=\"box-content\">\r\n\t\t<div class=\"content\">\r\n\t\t\t<div class=\"title\">\r\n\t\t\t\t<p>Key Takeaways<\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"main-content\">\r\n\t\t\t\t<div class=\"list-item\">\r\n\t\t\t\t\t<div class=\"item\">    <div class=\"circle\"><\/div>    <p><a href=\"#a\">Keamanan data ERP penting<\/a> karena sistem ini menyimpan banyak informasi penting perusahaan dalam satu platform.<\/p><\/div><div class=\"item\">    <div class=\"circle\"><\/div>    <p>ERP cloud dan on-premise punya pendekatan keamanan yang berbeda, sehingga pilihannya perlu disesuaikan dengan kebutuhan bisnis.<\/p><\/div><div class=\"item\">    <div class=\"circle\"><\/div>    <p>Sistem ERP yang aman tidak <a href=\"#c\">cukup mengandalkan teknologi<\/a>, tetapi juga membutuhkan pengaturan akses, pemantauan, dan kesiapan tim internal.<\/p><\/div>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<!-- \t\t\t<div class=\"button-wrapper\">\r\n\t\t\t\t<a href=\"https:\/\/www.equiperp.com\/tour-produk-gratis\/?medium=key-takeaways\" class=\"submit-button\">Klik untuk Demo Gratis!<\/a>\r\n\t\t\t<\/div> -->\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/div><span data-sheets-root=\"1\"><div id=\"toc_group_article\" style=''>\r\n\t<p style='font-size:25px;font-weight:bold; margin-bottom:0px'>\r\n\t\tDaftar Isi:\r\n\t<\/p>\r\n\t<ul id=\"list_toc\" class='list_toc'><\/ul>\r\n<\/div>\r\n\r\n<div id=\"placeholder-toc\"><\/div>\r\n<div id=\"toc\">\r\n    <div class=\"header\">\r\n\t<span class=\"toc-title\" id=\"toc-title\">Daftar Isi<\/span>\t\r\n\t <i class=\"toc-icon\">\r\n        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"30\" height=\"30\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" class=\"header-icon\">\r\n          <path d=\"m6 9 6 6 6-6\" \/>\r\n        <\/svg>\r\n      <\/i>\r\n\t<\/div>\r\n    <div class=\"list\">\r\n      <ul id=\"toc-list\"><\/ul>\r\n    <\/div>\r\n <\/div>\r\n\r\n<style>\r\n\/* Simple styling for the TOC *\/\r\n\t\r\n\t#toc ul li:last-child {\r\n    padding-bottom: 16px; \/* Adjust the value as needed *\/\r\n}\r\n\r\n.td-fix-index {\r\n\t transform: unset !important;\r\n     -webkit-transform: unset !important; \r\n}\r\n.footer-contact .td-fix-index {\r\n\t transform: translateZ(0) !important;\r\n     -webkit-transform: translateZ(0) !important; \r\n}\r\n\t.tdb_single_content .tdb-block-inner.td-fix-index{\r\n\t\tposition: static;\r\n\t}\r\n\t\r\n\r\n\r\n\t\r\n#toc {\r\n  background-color: #FFF;\r\n\tpadding: 17px 24px 0px 24px !important;\r\n  margin-bottom: 20px;\r\n\/*   border: 1px solid #9C171E; *\/\r\n  border-radius: 6px;\r\n\tdisplay: none;\r\n  max-width: 100%;\r\n  transition: .4s ease height;\r\n\tmargin-left: 0;\r\n\toverflow: hidden;\r\n}\r\n\r\n#toc .header{\r\n  display: flex;\r\n  align-items: center;\r\n  justify-content: space-between;\r\n\tbackground-color: transparent;\r\n}\r\n\t\r\n\t#toc.sticky .header{\r\n\t\tpadding: 4px 0;\r\n\t}\r\n\t\r\n.header p{\r\n  font-size: 18px !important;\r\n  font-weight: 600 !important;\r\n  color: #393939;\r\n   margin-bottom: 0;\r\n  \/* margin-top: 20px; *\/\r\n}\r\n\r\n.toc-icon{\r\n  float: right;\r\n\/*   visibility: hidden; *\/\r\n}\r\n\r\n\t.toc-title{\r\n\t\tmargin-right: auto;\r\n\/* \t\tpadding-left: 20px; *\/\r\n\t\tfont-weight: 600;\r\n\t\talign-self: center;\t}\t\r\n\r\n#toc ul {\r\n  list-style-type: none;\r\n  padding-left: 0;\r\n}\r\n\t\r\n#toc.sticky ul{\r\n\toverflow-y: auto;\r\n\tmax-height: 250px;\r\n\tmargin-top: 0px;\r\n\tpadding-top: 20px;\r\n\/* \tborder-top: 1px solid #d3d3d3; *\/\r\n}\r\n\t\r\n#toc ul li {\r\n\/*   margin-bottom: 10px; *\/\r\n  margin-bottom: 10px;\r\n\tmargin-left: 0;\r\n\ttransition: .2s ease;\r\n\tcursor: pointer;\r\n}\r\n\t\r\n\t#toc.sticky ul li {\r\n\t  margin-right: 10px;\r\n\t}\r\n\t\r\n.td-post-content #toc-list li a:hover, .td-post-content #toc-list a.active{\r\n\tbackground-color: #FFF;\r\n\/* \tpadding: 8px 16px 8px 16px; *\/\r\n\tpadding: 4px 16px 4px 16px;\r\n\tborder-radius: 6px;\r\n\tcolor: #9c171e !important;\r\n\tfont-weight: 600 !important;\r\n}\r\n\t\r\n\t.td-post-content #toc-list li:hover a, .td-post-content #toc-list a.active{\r\n\t\tcolor: #9C171E !important;\r\n\t\tfont-weight: 600 !important;\r\n\t}\r\n\t\r\n.td-post-content #toc-list a.active{\r\n\tfont-weight: bold !important;\r\n\tcolor: #9C171E !important;\r\n}\r\n\t\r\n#toc a, .td-post-content #toc-list a {\r\n  text-decoration: none;\r\n  color: #ea1717 !important;\r\n  transition: .2s ease;\r\n\tfont-weight: 400 !important;\r\n\tdisplay: block;\r\n\t\r\n\tpadding: 4px 16px 4px 0;\r\n}\r\n\r\n#toc.sticky {\r\n  position: fixed;\r\n\/*   top: 73px; *\/\r\n\tbottom: 0;\r\n  z-index: 100; \r\n  box-shadow: 0 2px 5px rgba(0,0,0,0.1); \r\n\twidth: 100%; \r\n\tbackground-color: #FFF;\r\n\/* \tbackground-color: #FFF1F1; *\/\r\n\tborder-bottom: 1px solid #ea1717;\r\n\/*   border: 1px solid #393939; *\/\r\n  box-shadow: 0px 0px 14px 0px #00000040;\r\n  cursor: pointer;\r\n\tanimation: fadein .3s ease;\r\n\tpadding: 12px 16px !important;\r\n}\r\n\t\r\n\t.fadein{\r\n\t\tanimation: fadein .3s ease;\r\n\t}\r\n\t\r\n\t.fadeout{\r\n\t\tanimation: fadeout .3s ease;\r\n\t}\r\n\t\r\n\t\r\n\t@keyframes fadein{\r\n\t\t0% {\r\n\t\t\topacity: 0;\r\n\t\t}\r\n\t\t100%{\r\n\t\t\topacity: 1;\r\n\t\t}\r\n\t}\r\n\t\r\n\t@keyframes fadeout{\r\n\t\t0% {\r\n\t\t\topacity: 1;\r\n\t\t}\r\n\t\t100%{\r\n\t\t\topacity: 0;\r\n\t\t}\r\n\t}\r\n\r\n\t\r\n#toc.sticky .header p{\r\n\tmargin-bottom: 10px;\r\n\tmargin-top: 10px;\r\n}\r\n\r\n#toc.sticky .toc-icon{\r\n  visibility: visible;\r\n\/* \ttransition: 0.4s ease; *\/\r\n}\r\n\t\r\n\t.toc-icon{\r\n\t\talign-items: center;\r\n    \tdisplay: flex;\r\n\t}\r\n\t\r\n\tsvg.header-icon{\r\n\/* \t\tbackground-color: #9c171e; *\/\r\n\t\tbackground-color: #FFF;\r\n\t\tborder-radius: 30px;\r\n\t\tpadding: 5px;\r\n\t}\r\n\r\n#toc.sticky .list{\r\n\/*   max-height: 0; *\/\r\n  transition: height 0.4s ease;\r\n}\r\n\t\r\n\t#toc .list{\r\n\/*   max-height: 0; *\/\r\n  transition: height 0.4s ease;\r\n}\r\n\r\n#toc .header.active .toc-icon{\r\n\ttransform: rotate(0deg); \r\n\topacity: 1;\r\n}\r\n\r\n\t#toc .header.active + .list {\r\n\t  max-height: 200px; \/* Adjust this value as needed *\/\r\n\t  opacity: 1;\r\n\t}\r\n\t\r\n\t#placeholder-toc{\r\n\/* \t\tdisplay: none; *\/\r\n\t}\r\n\t\r\n\t@media (min-width: 768px) and (max-width: 991px){\r\n\t\t#toc.sticky{\r\n\/* \t\t\ttop: 104px; *\/\r\n\t\t\tbottom: 0px;\r\n\t\t}\r\n\t\t\r\n\t\t#toc{\r\n\t\t\twidth: unset !important;\r\n\t\t}\r\n\t}\r\n\t\r\n\t@media (max-width: 767px){\r\n\t\t#toc{\r\n\t\t\twidth: 100% !important;\r\n\t\t\tdisplay: inline-block;\r\n\t\t}\r\n\t\t\r\n\t\t#toc.sticky{\r\n\t\t\twidth: 90% !important;\r\n\/* \t\t\ttop: 81px; *\/\r\n\t\t\tbottom: 60px;\r\n\t\t\tmargin-left: auto;\r\n\t\t\tmargin-right: auto;\r\n\t\t\tpadding: 0 16px;\r\n\t\t\tright: 5%;\r\n\t\t}\r\n\t}\r\n\t\r\n\t<\/style>\r\n\r\n<style>\r\n\t#list_toc li {margin-bottom: 0;margin-top: 5px;}\r\n\t#list_toc > li > ul {padding-left: 20px;margin-bottom: 0;}\r\n\t#list_toc{height:max-content;transition:ease-in-out}\r\n\t#list_toc li {margin-bottom: 0;margin-top: 5px;}\r\n\t#list_toc_float li.active > a {color:#b1252d;background: #ffe1e3;}\r\n\t#list_toc_float li a {padding:3px 7px}\r\n\t#list_toc_float li a {\r\n\t\tdisplay: block;\r\n\t\tcolor:#000;\r\n\t\tmargin-bottom: 10px;\r\n\t\ttransition:all 0.2s ease-in-out;\r\n\t\tfont-size:15px\r\n\t}\r\n\t#list_toc_float li{list-style:none;list-style-position:inside; margin-left:0;}\r\n\t#list_toc_float a:hover{color:#b1252d;}\r\n\t\r\n\t#list_toc_float li a{margin-bottom:0px}\r\n\t#toc_group_float{\r\n\t\tline-height: 24px;\r\n\t\tmax-height: calc(100vh - 100px);\r\n\t\toverflow: auto;\r\n\t\tz-index: 99;\r\n\t\tdisplay:none!important;\r\n\t\tbackground:#fff;\r\n\t\ttransition:all 0.5s linear\r\n\t}\r\n\t\r\n\t@media (min-width:1019px){\r\n\t\t#toc_group_float {\r\n\t\t\tdisplay:block!important;\r\n\t\t\t}\r\n\t\t#toc_group_article {\r\n\t\t\tdisplay:none;\r\n\t\t}\r\n\t}\r\n\t\r\n\t@media (max-width:768px){\r\n\t\t#toc_group_article {\r\n\t\t\tdisplay:none;\r\n\t\t}\r\n\t}\r\n\t\r\n\t \/* custom scrollbar style *\/\r\n::-webkit-scrollbar {\r\n    width: 7px;\r\n}\r\n::-webkit-scrollbar-track {\r\n    background: #d7a2a4;\r\n}\r\n::-webkit-scrollbar-thumb {\r\n    background: #b1252d;\r\n    border-radius: 15px;\r\n}\t\t\r\n\r\n<\/style>\r\n\r\n<script>\r\n\tdocument.addEventListener('DOMContentLoaded', function() {\r\n\t\t\/\/ Fungsi untuk menangani klik pada semua elemen <a> dengan href yang dimulai dengan #\r\n\t\tfunction handleTitleClick(event) {\r\n\t\t\tevent.preventDefault();\r\n\t\t\tconst targetId = this.getAttribute('href').substring(1);\r\n\t\t\tconst targetElement = document.getElementById(targetId);\r\n\r\n\t\t\tif (targetElement) {\r\n\t\t\t\tconst headerHeight = document.querySelector('#toc .header').offsetHeight;\r\n\t\t\t\tconst navbarHeight = document.getElementById('tdi_34') ? document.getElementById('tdi_34').offsetHeight : 0;\r\n\t\t\t\tconst windowHeight = window.innerHeight;\r\n\t\t\t\tconst targetOffset = targetElement.offsetTop;\r\n\t\t\t\tconst scrollTo = targetOffset + (windowHeight \/ 2) + (headerHeight) - navbarHeight - 40;\r\n\r\n\t\t\t\twindow.scrollTo({\r\n\t\t\t\t\ttop: scrollTo,\r\n\t\t\t\t\tbehavior: 'smooth'\r\n\t\t\t\t});\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\t\/\/ Tambahkan event listener untuk semua elemen <a> di toc-list dan list-toc\r\n\t\tconst titleLinks = document.querySelectorAll('#toc-list a, #list_toc a');\r\n\t\ttitleLinks.forEach(link => {\r\n\t\t\tlink.addEventListener('click', handleTitleClick);\r\n\t\t});\r\n\t});\r\n<\/script>\r\n\r\n<!-- ToC List for mobile -->\r\n<script>\r\n \/\/ Generate TOC based on headings\r\ndocument.addEventListener(\"DOMContentLoaded\", function() {\r\n  \/\/ Get the element that will contain the TOC\r\n  const tocList = document.getElementById('toc-list');\r\n\r\n  \/\/ Get the element with the ID 'article-left'\r\n  const article = document.querySelector('.td-post-content');\r\n\r\n  \/\/ Find all h2 elements within 'myarticle'\r\n  const headers = article.getElementsByTagName('h2');\r\n\r\n  \/\/ Loop through the h2 elements and create a list item for each one\r\n  for (let i = 0; i < headers.length; i++) {\r\n    const header = headers[i];\r\n    const headerText = header.textContent;\r\n\/\/     const headerId = 'header-' + i;\r\n    const headerId = headerText\r\n    .toLowerCase()\r\n    .trim()\r\n    .replace(\/[^\\w\\s-]\/g, '')  \/\/ hapus tanda baca\r\n    .replace(\/\\s+\/g, '-'); \/\/ ganti spasi jadi \"-\"\r\n\r\n    \/\/ Set an ID for the header if it doesn't have one\r\n    header.setAttribute('id', headerId);\r\n\r\n    \/\/ Create a list item for the TOC\r\n    const listItem = document.createElement('li');\r\n\r\n    \/\/ Create a link for the list item\r\n    const link = document.createElement('a');\r\n    link.setAttribute('href', '#' + headerId);\r\n    link.textContent = headerText;\r\n\r\n    \/\/ Append the link to the list item\r\n    listItem.appendChild(link);\r\n\r\n    \/\/ Append the list item to the TOC list\r\n    tocList.appendChild(listItem);\r\n  }\r\n});\r\n\r\n\/\/ Keep height and placement of content using placeholder in place of TOC\r\ndocument.addEventListener(\"DOMContentLoaded\", function() {\r\n  const toc = document.querySelector('#toc');\r\n  const placeholderToc = document.querySelector('#placeholder-toc');\r\n\r\n  function setPlaceholderHeight() {\r\n    placeholderToc.style.height = `${toc.offsetHeight}px`;\r\n  }\r\n\r\n  \/\/ Set the initial height of the placeholder\r\n  setPlaceholderHeight();\r\n\r\n  \/\/ Update the height on window resize\r\n  window.addEventListener('resize', setPlaceholderHeight);\r\n});\r\n  const tocTitle = document.querySelector('#toc-title'); \/\/ Assuming header-faq is the element for TOC title\r\n\r\n\/\/ Sticky TOC and update heading\r\n\/\/ document.addEventListener(\"DOMContentLoaded\", function() {\r\n\/\/   const toc = document.querySelector('#toc');\r\n\/\/   const footer = document.querySelector('.td-footer-template-wrap');\r\n\/\/   const tocParent = toc.parentElement;\r\n\/\/   const divTop = tocParent.getBoundingClientRect().top + window.pageYOffset;\r\n\/\/   const tocHeight = toc.offsetHeight;\r\n\/\/   const triggerPoint = divTop + tocHeight + 700;\r\n\/\/   const footerHeight = footer.offsetHeight;\r\n\/\/   const triggerFooterPoint = footer.getBoundingClientRect().top + window.pageYOffset - footerHeight - footerHeight - footerHeight;\r\n\/\/   const phtoc = document.querySelector('#placeholder-toc');\r\n\/\/   const headers = document.querySelectorAll('.td-post-content h2');\r\n\/\/   const navLinks = document.querySelectorAll('#toc-list a');\r\n\t\r\n\/\/ \tconst panel2 = document.querySelector(\"#toc .list\");\r\n\/\/ \tvar icon = document.querySelector(\".toc-icon\");\r\n\r\n\/\/   let activeLink = null; \/\/ Declare activeLink outside the loop\r\n\t\r\n\/\/   \/\/ Function to handle scroll and add\/remove .sticky class\r\n\/\/   function handleScroll() {\r\n\/\/     const windowTop = window.pageYOffset || document.documentElement.scrollTop;\r\n\/\/     let currentHeader = '';\r\n\r\n\/\/     \/\/ Highlight user progress as the heading comes\r\n\/\/     headers.forEach(header => {\r\n\/\/ \t\tconst headerTop = header.offsetTop;\r\n\/\/ \t\tconst headerHeight = header.clientHeight;\r\n\/\/ \/\/ \t\tif (window.scrollY >= (headerTop - headerHeight + 700)) {\r\n\/\/ \/\/ \t\t\tconst currentHeaderId = header.getAttribute('id');\r\n\/\/ \/\/ \t\t\tconst currentHeaderText = document.getElementById(currentHeaderId).textContent;\r\n\/\/ \/\/ \t\t\tconsole.log(\"current header text:\", currentHeaderText);\r\n\/\/ \/\/ \t\t\ttocTitle.textContent = currentHeaderText;\r\n\/\/ \/\/ \t\t\tcurrentHeader = currentHeaderId;\r\n\t\t\t\r\n\/\/ \/\/ \t\t\tif(window.innerWidth < 767){\r\n\/\/ \/\/ \t\t\t\ttocTitle.textContent = 'Daftar Isi';\r\n\/\/ \/\/ \t\t\t}\r\n\/\/ \/\/ \t\t}\r\n\/\/ \t\tif(window.innerWidth < 767){\r\n\/\/ \t\t\ttocTitle.textContent = 'Daftar Isi'; \/\/ Selalu pertahankan judul ini di mobile\r\n\/\/ \t\t} else {\r\n\/\/ \t\t\tif (window.scrollY >= (headerTop - headerHeight + 700)) {\r\n\/\/ \t\t\t\tconst currentHeaderId = header.getAttribute('id');\r\n\/\/ \t\t\t\tconst currentHeaderText = document.getElementById(currentHeaderId).textContent;\r\n\/\/ \t\t\t\ttocTitle.textContent = currentHeaderText;\r\n\/\/ \t\t\t\tcurrentHeader = currentHeaderId;\r\n\/\/ \t\t\t}\r\n\/\/ \t\t}\r\n\/\/ \t});\r\n\r\n\/\/     navLinks.forEach(link => {\r\n\/\/       link.classList.remove('active');\r\n\/\/       if(currentHeader != '') {\r\n\/\/ \t\t  if (link.getAttribute('href').includes(currentHeader)) {\r\n\/\/ \t\t\t  link.classList.add('active');\r\n\/\/ \t\t  }\r\n\/\/ \t  }\r\n\/\/     });\r\n\/\/ \/\/     if (windowTop < triggerFooterPoint) {\r\n\/\/ \/\/         toc.style.display = 'block';\r\n\/\/ \/\/ \t}else{\r\n\/\/ \/\/         toc.style.display = 'none';\r\n\/\/ \/\/ \t}\r\n\/\/     \/\/ Update TOC title if sticky\r\n\/\/     if (windowTop > triggerPoint) {\r\n\/\/       if (!toc.classList.contains('sticky')) {\r\n\/\/         phtoc.style.display = \"block\";\r\n\/\/         toc.classList.add('sticky');\r\n\/\/         toc.style.width = `${tocParent.offsetWidth}px`; \/\/ Set width to match the parent element\r\n\/\/         toc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n\/\/         toc.style.backgroundColor = \"#FFF\";\r\n\/\/ \t\tpanel2.style.height = '0px';\r\n\/\/ \t\t  icon.style.transform = \"rotate(180deg)\";\r\n\/\/ \t\t  if(window.innerWidth < 767){\r\n\/\/ \/\/ \t\t\t  const tocs = document.querySelector('#toc.sticky');\r\n\/\/ \t\t\t  tocTitle.textContent = 'Daftar Isi'; \/\/ Reset title\r\n\/\/        \t\t  toc.style.width = '150px'; \/\/ Set width to match the parent element\r\n\/\/ \t\t  }\r\n\/\/       }\r\n\/\/       if (currentHeader) {\r\n\/\/ \/\/         console.log(\"activeLink:\", activeLink);\r\n\/\/         if (activeLink) {\r\n\/\/ \/\/           tocTitle.textContent = activeLink.textContent; \/\/ Update TOC title\r\n\/\/           tocTitle.textContent = activeLink ? activeLink.textContent : \"\"; \/\/ Update title only if activeLink exists\r\n\/\/         }\r\n\/\/       }\r\n\/\/     } else {\r\n\/\/       toc.classList.remove('sticky');\r\n\/\/       phtoc.style.display = \"none\";\r\n\/\/       toc.style.width = 'unset'; \/\/ Reset to original width\r\n\/\/       toc.style.backgroundColor = \"#FFF\";\r\n\/\/       tocTitle.textContent = 'Daftar isi'; \/\/ Reset title\r\n\/\/ \t\tpanel2.style.height = panel2.scrollHeight + \"px\";\r\n\/\/ \t\ticon.style.transform = \"rotate(180deg)\";\r\n\/\/     }\r\n\/\/   }\r\n\r\n\/\/     \/\/ Attach the scroll event listener to the window\r\n\/\/     window.addEventListener('scroll', handleScroll);\r\n\r\n\/\/     \/\/ Initial call to handleScroll to set the correct state on load\r\n\/\/     handleScroll();\r\n\/\/ });\r\n\t\r\n\/\/ \t\/\/ Open toggle TOC\r\n\/\/ \t  document.addEventListener(\"DOMContentLoaded\", function() {\r\n\/\/ \t\tvar tocHeader = document.querySelector(\"#toc .header\");\r\n\/\/ \t\tvar toc = document.querySelector(\"#toc\");\r\n\/\/ \t\tvar icon = document.querySelector(\".toc-icon\");\r\n\/\/ \t\tconst tocTitle = document.querySelector('#toc-title');\r\n\/\/ \t\tconst tocs = document.querySelector('#toc.sticky');\r\n\/\/  \t\tconst tocParent = toc.parentElement;\t\t  \r\n\r\n\/\/ \t\t  tocHeader.addEventListener(\"click\", function() {\r\n\/\/ \t\t\tvar panel = this.nextElementSibling;\r\n\/\/ \t\t\tif (panel.style.height !== '0px') { \/\/ Check if height is not 0px\r\n\/\/ \t\t\t  panel.style.height = '0px'; \/\/ Set height to 0 for full collapse\r\n\/\/ \t\t\t  icon.style.transform = \"rotate(180deg)\";\r\n\/\/ \/\/ \t\t\t\ttoc.style.paddingBottom = '6px'; \r\n\/\/ \t\t\t\tif(window.innerWidth > 768){\r\n\/\/ \t\t\t\t\tif(!toc.classList.contains('sticky')){\r\n\/\/ \t\t\t\t\t\ttoc.style.width = \"unset\";\r\n\/\/ \/\/ \t\t\t\t\t\ttoc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n\/\/ \t\t\t\t\t}\r\n\/\/ \t\t\t\t\tif (toc.classList.contains('sticky')){\r\n\/\/ \t\t\t\t\t\ttoc.style.width = '${tocParent.offsetWidth}px';\r\n\/\/ \t\t\t\t\t\ttoc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n\/\/ \t\t\t\t\t}\r\n\/\/ \t\t\t\t}\r\n\/\/ \t\t\t\tif(window.innerWidth < 767){\r\n\/\/ \t\t\t\t\ttoc.style.width = \"unset\"; \/\/ Reset width\r\n\/\/ \t\t\t\t}\r\n\/\/ \t\t\t\ttoc.style.backgroundColor = \"#FFF1F1\";\r\n\/\/ \t\t\t} else {\r\n\/\/ \t\t\t  panel.style.height = panel.scrollHeight + \"px\";\r\n\/\/ \t\t\t  icon.style.transform = \"rotate(0deg)\";\r\n\/\/ \t\t\t  toc.style.backgroundColor = \"#FFF\";\r\n\/\/ \t\t\t  tocTitle.textContent = 'Daftar isi'; \/\/ Reset title\r\n\/\/ \t\t\t\ttoc.style.paddingBottom = '24px';\r\n\/\/ \t\t\t \tif(window.innerWidth < 767){\r\n\/\/ \t\t\t\t\ttoc.style.width = `${tocParent.offsetWidth}px`; \/\/ Set width to match the parent element\r\n\/\/ \t\t\t\t\ttoc.setAttribute('style', 'width: ' + tocParent.offsetWidth + 'px !important;');\r\n\/\/ \t\t\t\t}\r\n\/\/ \t\t\t}\r\n\/\/ \t\t  });\r\n\r\n\/\/ \t\t  \/\/ Close TOC when a link inside it is clicked\r\n\/\/ \t\t  var tocLinks = document.querySelectorAll(\"#toc .list a\");\r\n\/\/ \t\t  tocLinks.forEach(function(link) {\r\n\/\/ \t\t\tlink.addEventListener(\"click\", function() {\r\n\/\/ \t\t\t  var panel = document.querySelector(\"#toc .list\");\r\n\/\/ \t\t\t  panel.style.height = '0px'; \/\/ Set height to 0 for full collapse\r\n\/\/ \t\t\t  icon.style.transform = \"rotate(180deg)\";\r\n\/\/ \t\t\t  toc.style.backgroundColor = \"#FFF\";\r\n\/\/ \t\t\t});\r\n\/\/ \t\t  });\r\n\/\/ \t\t});\r\n\r\n\/\/ START new JS for ToC improvements\r\ndocument.addEventListener(\"DOMContentLoaded\", function() {\r\n  const toc = document.querySelector('#toc');\r\n  const footer = document.querySelector('.td-footer-template-wrap');\r\n  const tocParent = toc.parentElement;\r\n  const divTop = tocParent.getBoundingClientRect().top + window.pageYOffset;\r\n  const tocHeight = toc.offsetHeight;\r\n  const triggerPoint = divTop + tocHeight + 1750;\r\n\tconsole.log(triggerPoint)\r\n  const footerHeight = footer.offsetHeight;\r\n  const triggerFooterPoint = footer.getBoundingClientRect().top + window.pageYOffset - footerHeight*3;\r\n  const phtoc = document.querySelector('#placeholder-toc');\r\n  const headers = document.querySelectorAll('.td-post-content h2');\r\n  const navLinks = document.querySelectorAll('#toc-list a');\r\n  \r\n  const panel2 = document.querySelector(\"#toc .list\");\r\n  const icon = document.querySelector(\".toc-icon\");\r\n  const tocTitle = document.querySelector('#toc-title');\r\n\r\n  let activeLink = null;\r\n  let userClosedTOC = false; \/\/ Flag user menutup TOC\r\n\r\n  function handleScroll() {\r\n    const windowTop = window.pageYOffset || document.documentElement.scrollTop;\r\n    let currentHeader = '';\r\n\r\n    \/\/ Update TOC title sesuai header yang terlihat\r\n    headers.forEach(header => {\r\n      const headerTop = header.offsetTop;\r\n      const headerHeight = header.clientHeight;\r\n      if(window.innerWidth < 767){\r\n        tocTitle.textContent = 'Daftar Isi'; \r\n      } else {\r\n        if (window.scrollY >= (headerTop - headerHeight + 1750)) {\r\n          const currentHeaderId = header.getAttribute('id');\r\n          const currentHeaderText = document.getElementById(currentHeaderId).textContent;\r\n          tocTitle.textContent = currentHeaderText;\r\n          currentHeader = currentHeaderId;\r\n        }\r\n      }\r\n    });\r\n\r\n    navLinks.forEach(link => {\r\n      link.classList.remove('active');\r\n      if(currentHeader && link.getAttribute('href').includes(currentHeader)) {\r\n        link.classList.add('active');\r\n      }\r\n    });\r\n\r\n    if (windowTop > triggerPoint) {\r\n      if (!toc.classList.contains('sticky')) {\r\n        phtoc.style.display = \"block\";\r\n        toc.classList.add('sticky');\r\n        toc.style.width = `${tocParent.offsetWidth}px`;\r\n        toc.style.backgroundColor = \"#FFF\";\r\n        \/\/ Saat sticky, TOC otomatis tertutup\r\n        panel2.style.height = '0px';\r\n        icon.style.transform = \"rotate(180deg)\";\r\n        userClosedTOC = true; \/\/ Set flag supaya tidak terbuka saat scroll\r\n      }\r\n      \r\n      if(window.innerWidth < 767){\r\n        tocTitle.textContent = 'Daftar Isi'; \r\n        toc.style.width = '150px';\r\n      }\r\n\r\n    } else {\r\n      toc.classList.remove('sticky');\r\n      phtoc.style.display = \"none\";\r\n      toc.style.width = 'unset';\r\n      toc.style.backgroundColor = \"#FFF\";\r\n      tocTitle.textContent = 'Daftar isi'; \r\n\r\n      \/\/ Kembalikan panel jika user belum menutup manual\r\n      if(!userClosedTOC) {\r\n        panel2.style.height = panel2.scrollHeight + \"px\";\r\n        icon.style.transform = \"rotate(0deg)\";\r\n      }\r\n    }\r\n  }\r\n\r\n  window.addEventListener('scroll', handleScroll);\r\n  handleScroll();\r\n\r\n  \/\/ Toggle TOC saat user klik\r\n  const tocHeader = document.querySelector(\"#toc .header\");\r\n  tocHeader.addEventListener(\"click\", function() {\r\n    const panel = panel2;\r\n    if (panel.style.height !== '0px') {\r\n      panel.style.height = '0px';\r\n      icon.style.transform = \"rotate(180deg)\";\r\n      userClosedTOC = true;\r\n    } else {\r\n      panel.style.height = panel.scrollHeight + \"px\";\r\n      icon.style.transform = \"rotate(0deg)\";\r\n      userClosedTOC = false;\r\n    }\r\n  });\r\n\r\n  \/\/ Close TOC saat link diklik\r\n  document.querySelectorAll(\"#toc .list a\").forEach(link => {\r\n    link.addEventListener(\"click\", function() {\r\n      panel2.style.height = '0px';\r\n      icon.style.transform = \"rotate(180deg)\";\r\n      userClosedTOC = true;\r\n    });\r\n  });\r\n});\r\n\/\/ END new JS for ToC improvements\r\n\r\n\t\r\n\/\/ \tmake the heading at the center of the viewport\r\n\/\/ \tdocument.addEventListener('DOMContentLoaded', function() {\r\n\/\/     \/\/ Add click event listener to all links in the TOC list\r\n\/\/     document.querySelectorAll('#toc-list a').forEach(anchor => {\r\n\/\/         anchor.addEventListener('click', function (e) {\r\n\/\/             e.preventDefault(); \/\/ Prevent the default behavior of jumping to the anchor\r\n\/\/ \/\/ \t\t\tconsole.log(\"prevent default\");\r\n\/\/             const targetId = this.getAttribute('href').substring(1); \/\/ Get the ID of the target element\r\n\/\/             const targetElement = document.getElementById(targetId); \/\/ Get the target element\r\n\r\n\/\/             if (targetElement) {\r\n\/\/                 const headerHeight = document.querySelector('#toc .header').offsetHeight; \/\/ Get the height of the fixed header\r\n\/\/                 const windowHeight = window.innerHeight; \/\/ Get the height of the viewport\r\n\/\/                 const targetOffset = targetElement.offsetTop; \/\/ Get the top offset of the target element\r\n\/\/                 const scrollTo = targetOffset + (windowHeight \/ 2) + (headerHeight); \/\/ Calculate the scroll position to center the target element\r\n\r\n\/\/                 \/\/ Scroll to the calculated position smoothly\r\n\/\/                 window.scrollTo({\r\n\/\/                     top: scrollTo,\r\n\/\/                     behavior: 'smooth'\r\n\/\/                 });\r\n\/\/             }\r\n\/\/         });\r\n\/\/     });\r\n\/\/ });\r\n<\/script>\r\n\r\n<script>\r\n    \/\/ Scrollspy function to highlight the active TOC item based on the scroll position\r\n  function scrollSpy(tocClass) {\r\n    const scrollPosition = window.scrollY;\r\n\r\n    \/\/ Find the active h2 and h3 headings based on their position in the corresponding TOC\r\n    let activeH2 = null;\r\n    let activeH3 = null;\r\n\r\n    const tocItems = document.querySelectorAll(`.${tocClass} li`);\r\n    tocItems.forEach(item => {\r\n      const a = item.querySelector('a');\r\n      if (!a) return;\r\n      const href = a.getAttribute('href');\r\n      const targetId = href.substring(1); \/\/ Remove the '#' from the href to get the target ID\r\n      const targetElement = document.getElementById(targetId);\r\n      if (!targetElement) return;\r\n\r\n      const targetTop = targetElement.getBoundingClientRect().top + scrollPosition;\r\n      const nextItem = item.nextElementSibling;\r\n      const nextTop = nextItem ? nextItem.getBoundingClientRect().top + scrollPosition : Infinity;\r\n\r\n      if (targetTop <= scrollPosition + 150) {\r\n        if (a.parentElement.parentElement === tocItems) {\r\n          \/\/ The h2 heading is at the root level of the TOC\r\n          activeH2 = { id: targetId, level: 'h2' };\r\n        } \r\n\t\t  else {\r\n          \/\/ The h3 heading is nested under an h2 heading\r\n          const parentH2 = a.parentElement.parentElement.previousElementSibling;\r\n          if (parentH2) {\r\n            const h2Link = parentH2.querySelector('a');\r\n            if (h2Link) {\r\n              const h2Href = h2Link.getAttribute('href');\r\n              const h2Id = h2Href.substring(1);\r\n              activeH2 = { id: h2Id, level: 'h2' };\r\n            }\r\n          }\r\n          activeH3 = { id: targetId, level: 'h3' };\r\n        }\r\n      }\r\n\r\n      if (targetTop > scrollPosition + 150 && nextTop > scrollPosition + 150 && !activeH3) {\r\n        \/\/ Reset the activeH2 when there are no more active h3 headings\r\n        activeH2 = null;\r\n      }\r\n    });\r\n\r\n    \/\/ Update the active state for the TOC items\r\n    tocItems.forEach(item => {\r\n      item.classList.remove('active');\r\n      const a = item.querySelector('a');\r\n      if (a) {\r\n        const href = a.getAttribute('href');\r\n        const targetId = href.substring(1);\r\n        if ((activeH2 && activeH2.id === targetId) || (activeH3 && activeH3.id === targetId)) {\r\n          item.classList.add('active');\r\n        }\r\n      }\r\n    });\r\n  }\r\n\r\n  \/\/ Call scrollSpy for each TOC on window scroll\r\n  const tocClasses = ['list_toc', 'list_toc_float']; \/\/ Add other TOC class names here if you have more than two instances\r\n  tocClasses.forEach(tocClass => {\r\n    window.addEventListener('scroll', () => scrollSpy(tocClass));\r\n  });\r\n<\/script>\r\n\r\n<!-- ToC List for desktop side bar, diganti jadi inject by php, di code snippet \"Sidebar Accordion\" -->\r\n<!-- <script>\r\n\tdocument.addEventListener(\"DOMContentLoaded\", function() {\r\n\r\n        \/\/ Fungsi untuk membuat nested list\r\n        function createNestedList(parentNode, children) {\r\n            if (children.length === 0) return;\r\n\r\n            const nestedUl = document.createElement('ul');\r\n            children.forEach(child => {\r\n                const nestedLi = document.createElement('li');\r\n                const nestedA = document.createElement('a');\r\n                nestedA.textContent = child.title;\r\n                nestedA.href = `#${child.id}`;\r\n                nestedLi.appendChild(nestedA);\r\n                nestedUl.appendChild(nestedLi);\r\n\r\n                if (child.children.length > 0) {\r\n                    createNestedList(nestedLi, child.children);\r\n                }\r\n            });\r\n\r\n            parentNode.appendChild(nestedUl);\r\n        }\r\n\r\n        \/\/ Membuat objek untuk menyimpan daftar h2 dan h3 beserta judulnya\r\n        const headings = [];\r\n\r\n           \/\/ Mengambil semua elemen h2 dan h3\r\n        \/\/ Mengambil semua elemen h2 dan h3\r\n\t\tconst elements = document.querySelectorAll('.td-post-content h2');\r\n\r\n\t\t\tfunction newFormatId(text) {\r\n\t\t\t\tif(text.toLowerCase() === \"key takeaways\") {\r\n\t\t\t\t\treturn;\r\n\t\t\t\t}\r\n\t\t\t\t\r\n\t\t\t\tconst result = text.toLowerCase()\r\n\t\t\t\t.trim()\r\n\t\t\t\t.replace(\/[^\\w\\s-]\/g, '')  \/\/ hapus tanda baca\r\n\t\t\t\t.replace(\/\\s+\/g, '-'); \/\/ ganti spasi jadi \"-\"\r\n\r\n\t\t\t\treturn result;\r\n\t\t\t}\r\n\t\r\n\t\telements.forEach(element => {\r\n\t\t\tif (element.tagName === 'H2') {\r\n\t\t\t\tconst id = newFormatId(element.textContent); \/\/ Hasilkan ID baru\r\n\t\t\t\telement.id = id; \/\/ Tetapkan ID ke elemen h2\r\n\t\t\t\tif (element.textContent.toLowerCase() === \"key takeaways\") {return;} \/\/ Kalau Key Takeaways, jangan dimasukin\r\n\t\t\t\theadings.push({ level: 'h2', id: id, title: element.textContent, children: [] });\r\n\t\t\t} else if (element.tagName === 'H3') {\r\n\t\t\t\tconst id = newFormatId(element.textContent); \/\/ Hasilkan ID baru\r\n\t\t\t\telement.id = id; \/\/ Tetapkan ID ke elemen h3\r\n\t\t\t\tif (headings.length > 0) {\r\n\t\t\t\t\theadings[headings.length - 1].children.push({ level: 'h3', id: id, title: element.textContent, children: [] });\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t});\r\n       \/\/ Membuat list HTML dari objek headings\r\n\t\tconst ul = document.getElementById('list_toc');\r\n\t\tlet currentUl = ul;\r\n\t\theadings.forEach(heading => {\r\n\t\t\tconst li = document.createElement('li');\r\n\t\t\tconst a = document.createElement('a');\r\n\t\t\ta.textContent = heading.title;\r\n\t\t\ta.href = `#${heading.id}`; \/\/ Gunakan ID yang baru dihasilkan\r\n\t\t\tli.appendChild(a);\r\n\r\n\t\t\tif (heading.level === 'h2') {\r\n\t\t\t\tcurrentUl = li;\r\n\t\t\t\tul.appendChild(li);\r\n\t\t\t} else if (heading.level === 'h3') {\r\n\t\t\t\tif (!currentUl.lastElementChild || currentUl.lastElementChild.tagName !== 'UL') {\r\n\t\t\t\t\tconst nestedUl = document.createElement('ul');\r\n\t\t\t\t\tcurrentUl.appendChild(nestedUl);\r\n\t\t\t\t\tcurrentUl = nestedUl;\r\n\t\t\t\t}\r\n\t\t\t\tcurrentUl.appendChild(li);\r\n\t\t\t}\r\n\r\n\t\t\tcreateNestedList(li, heading.children);\r\n\t\t});\r\n\t\t\/\/ Dapatkan elemen ul dengan id 'list_toc'\r\n\t\tconst ulFloat = document.getElementById('list_toc');\r\n\r\n\t\t\/\/ Dapatkan isi (child elements) dari ul dengan id 'list_toc'\r\n\t\tconst clonedChildren = ulFloat.cloneNode(true).children;\r\n\r\n\t\t\/\/ Dapatkan elemen ul dengan id 'list_toc_float'\r\n\t\tconst ulToc = document.getElementById('list_toc_float');\r\n\r\n\t\t\/\/ Tambahkan isi yang telah didapatkan dari 'list_toc' ke ul dengan id 'list_toc_float'\r\n\t\tulToc.append(...clonedChildren);\r\n\r\n\r\n        \/\/ Fungsi untuk mengambil tinggi navbar\r\n\t\tfunction getNavbarHeight() {\r\n\t\t\tconst navbar = document.getElementById('tdi_34');\r\n\t\t\treturn navbar ? navbar.offsetHeight : 0;\r\n\t\t}\r\n\r\n\t\t\/\/ Fungsi untuk menambahkan offset posisi scroll\r\n\t\tfunction scrollToElementWithOffset(elementId) {\r\n\t\t\tconst element = document.getElementById(elementId);\r\n\t\t\tif (element) {\r\n\t\t\t\tconst offset = getNavbarHeight();\r\n\t\t\t\tconst elementPosition = element.getBoundingClientRect().top;\r\n\t\t\t\tconst offsetPosition = elementPosition - offset - 40;\r\n\r\n\t\t\t\twindow.scrollBy({\r\n\t\t\t\t\ttop: offsetPosition,\r\n\t\t\t\t\tbehavior: 'smooth'\r\n\t\t\t\t});\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\t\/\/ Fungsi untuk menangani klik pada tautan judul\r\n\t\tfunction handleTitleClick(event) {\r\n\t\t\tevent.preventDefault();\r\n\t\t\tconst href = event.target.getAttribute('href').substr(1);\r\n\t\t\tscrollToElementWithOffset(href);\r\n\t\t}\r\n\r\n\t\t\/\/ Tambahkan event listener untuk semua tautan judul\r\n\t\tconst titleLinks = document.querySelectorAll('a[href^=\"#\"]');\r\n\t\ttitleLinks.forEach(link => {\r\n\t\t\tlink.addEventListener('click', handleTitleClick);\r\n\t\t});\r\n\t\t\r\n\t});\r\n    <\/script> -->\r\n<\/span><\/p>\n<h2><b>Jenis Teknologi Keamanan Data ERP<\/b><\/h2>\n<p><span id=\"a\">Untuk menjaga data perusahaan tetap aman, sistem ERP biasanya didukung oleh berbagai teknologi keamanan yang saling melengkapi. Setiap teknologi memiliki fungsi berbeda, mulai dari mencegah serangan hingga membatasi akses agar data hanya digunakan oleh pihak yang berwenang.<\/span><\/p>\n<h3><b>1. Firewall dan antivirus<\/b><\/h3>\n<p>Teknologi ini berfungsi sebagai lapisan perlindungan awal untuk menjaga sistem ERP dari ancaman eksternal, seperti virus, malware, dan akses tidak sah. Firewall memantau lalu lintas jaringan, sedangkan antivirus membantu mendeteksi serta menghapus program berbahaya yang dapat merusak data.<\/p>\n<h3><b>2. Intrusion Detection System (IDS)<\/b><\/h3>\n<p>IDS digunakan untuk mendeteksi aktivitas mencurigakan atau upaya penyusupan ke dalam sistem. Dengan pemantauan ini, perusahaan dapat lebih cepat mengetahui ancaman keamanan dan mengambil tindakan sebelum gangguan berkembang menjadi masalah yang lebih besar.<\/p>\n<h3><b>3. Data Loss Prevention (DLP)<\/b><\/h3>\n<p>DLP membantu mencegah kebocoran data penting, baik secara sengaja maupun tidak sengaja. Teknologi ini biasanya digunakan untuk memantau perpindahan file, membatasi pengiriman data sensitif, dan memastikan informasi perusahaan tidak keluar tanpa izin.<\/p>\n<h3><b>4. Access control<\/b><\/h3>\n<p>Access control berfungsi mengatur hak akses setiap pengguna dalam sistem ERP. Dengan pengaturan ini, karyawan hanya dapat melihat atau mengelola data sesuai tugas dan tanggung jawabnya, sehingga risiko penyalahgunaan data dapat dikurangi.<\/p>\n<h3><b>5. Security Information and Event Management (SIEM)<\/b><\/h3>\n<p>SIEM mengumpulkan dan menganalisis data keamanan dari berbagai sumber dalam satu sistem terpusat. Teknologi ini membantu tim TI memantau insiden keamanan secara real-time, mengenali pola ancaman, dan merespons masalah dengan lebih cepat.<\/p>\n<h3><b>6. Enkripsi data<\/b><\/h3>\n<p>Enkripsi mengubah data menjadi kode yang tidak dapat dibaca oleh pihak yang tidak memiliki otorisasi. Teknologi ini penting untuk melindungi data sensitif, baik saat disimpan di server maupun saat dikirim melalui jaringan.<\/p>\n<h3><b>7. Multi-factor authentication (MFA)<\/b><\/h3>\n<p>MFA menambahkan lapisan keamanan saat pengguna login ke sistem ERP. Selain memasukkan password, pengguna juga perlu melewati verifikasi tambahan, seperti kode OTP atau autentikasi melalui perangkat tertentu.<\/p>\n<h2><b><span id=\"b\">Keamanan ERP Cloud<\/span><\/b><\/h2>\n<table style=\"width: 100%; max-width: 860px; margin: 0 auto; border-spacing: 0; border-collapse: collapse; font-family: 'Segoe UI', Arial, sans-serif;\"><!-- Header --><\/p>\n<tbody>\n<tr>\n<td style=\"text-align: center; padding: 28px 20px 20px; background: linear-gradient(135deg, #990000 0%, #cc2222 100%); border-radius: 16px 16px 0 0;\">\n<p style=\"font-size: 22px; color: #fff; margin: 0 0 6px;\"><strong>Keamanan ERP Cloud<\/strong><\/p>\n<p style=\"font-size: 13px; color: rgba(255,255,255,0.85); margin: 0; max-width: 520px; display: inline-block; line-height: 1.5;\">Vendor menangani infrastruktur, tapi perusahaan tetap punya peran penting dalam menjaga keamanan data.<\/p>\n<\/td>\n<\/tr>\n<p><!-- Body --><\/p>\n<tr>\n<td style=\"padding: 0;\">\n<table style=\"width: 100%; border-spacing: 0; border-collapse: collapse;\">\n<tbody>\n<tr><!-- Kolom Kiri: Perlindungan dari Vendor --><\/p>\n<td style=\"width: 50%; vertical-align: top; padding: 24px 16px 24px 24px; background: #fdf0f0; border-bottom: 1px solid #e8c4c4;\">\n<div style=\"display: inline-block; background: #b71c1c; color: #fff; font-size: 10px; font-weight: bold; padding: 3px 10px; border-radius: 12px; text-transform: uppercase; letter-spacing: 0.8px; margin-bottom: 14px;\">&#x1f6e1;&#xfe0f; Perlindungan dari Vendor<\/div>\n<table style=\"width: 100%; border-spacing: 0; border-collapse: collapse;\">\n<tbody>\n<tr>\n<td style=\"padding: 0 8px 12px 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #b71c1c; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">\u2713<\/div>\n<\/td>\n<td style=\"padding-bottom: 12px; vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Enkripsi data<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Data dilindungi saat disimpan maupun dikirimkan<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 0 8px 12px 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #b71c1c; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">\u2713<\/div>\n<\/td>\n<td style=\"padding-bottom: 12px; vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Backup otomatis<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Cadangan data tersedia tanpa perlu konfigurasi manual<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 0 8px 12px 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #b71c1c; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">\u2713<\/div>\n<\/td>\n<td style=\"padding-bottom: 12px; vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pemantauan 24 jam<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Sistem diawasi sepanjang waktu oleh tim vendor<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 0 8px 12px 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #b71c1c; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">\u2713<\/div>\n<\/td>\n<td style=\"padding-bottom: 12px; vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pembaruan keamanan berkala<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Patch keamanan diterapkan secara otomatis<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 0 8px 0 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #b71c1c; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">\u2713<\/div>\n<\/td>\n<td style=\"vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Perlindungan server<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Infrastruktur dilindungi dari ancaman siber<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<p><!-- Kolom Kanan: Tanggung Jawab Perusahaan --><\/p>\n<td style=\"width: 50%; vertical-align: top; padding: 24px 24px 24px 16px; background: #FFF8E1; border-bottom: 1px solid #f0e0a0; border-left: 2px dashed #e0c8c8;\">\n<div style=\"display: inline-block; background: #F57F17; color: #fff; font-size: 10px; font-weight: bold; padding: 3px 10px; border-radius: 12px; text-transform: uppercase; letter-spacing: 0.8px; margin-bottom: 14px;\">&#x26a0;&#xfe0f; Tanggung Jawab Perusahaan<\/div>\n<table style=\"width: 100%; border-spacing: 0; border-collapse: collapse;\">\n<tbody>\n<tr>\n<td style=\"padding: 0 8px 12px 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #F57F17; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">!<\/div>\n<\/td>\n<td style=\"padding-bottom: 12px; vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pembatasan hak akses<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Atur level akses sesuai peran tiap pengguna<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 0 8px 12px 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #F57F17; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">!<\/div>\n<\/td>\n<td style=\"padding-bottom: 12px; vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Password yang kuat<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Terapkan kebijakan password kompleks &amp; ganti berkala<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 0 8px 12px 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #F57F17; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">!<\/div>\n<\/td>\n<td style=\"padding-bottom: 12px; vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pantau aktivitas login<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Monitor log akses untuk deteksi aktivitas mencurigakan<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 0 8px 0 0; vertical-align: top; width: 28px;\">\n<div style=\"width: 24px; height: 24px; background: #F57F17; color: #fff; border-radius: 50%; text-align: center; line-height: 24px; font-size: 13px;\">!<\/div>\n<\/td>\n<td style=\"vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Edukasi karyawan<\/div>\n<div style=\"font-size: 11.5px; color: #666; margin-top: 1px;\">Latih tim agar paham risiko &amp; prosedur keamanan data<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- Footer --><\/p>\n<tr>\n<td style=\"text-align: center; padding: 16px 20px; background: #f5f5f5; border-radius: 0 0 16px 16px; border-top: none;\">\n<p style=\"font-size: 12.5px; color: #555; margin: 0; line-height: 1.6;\">Vendor menyediakan fondasi keamanan, tapi perusahaan tetap harus aktif mengelola akses dan perilaku pengguna.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/www.hashmicro.com\/id\/blog\/cloud-erp-adalah\/\">Keamanan ERP cloud<\/a> bergantung pada infrastruktur penyedia layanan yang umumnya sudah dilengkapi sistem perlindungan berlapis. Karena vendor menangani banyak aspek teknis, perusahaan dapat lebih fokus pada pengelolaan pengguna dan kebijakan penggunaan sistem.<\/p>\n<p>Beberapa bentuk perlindungan yang biasanya tersedia dalam ERP cloud meliputi:<\/p>\n<ul>\n<li aria-level=\"1\">enkripsi data<\/li>\n<li aria-level=\"1\">backup otomatis<\/li>\n<li aria-level=\"1\">pemantauan sistem 24 jam<\/li>\n<li aria-level=\"1\">pembaruan keamanan berkala<\/li>\n<li aria-level=\"1\">perlindungan server dari ancaman siber<\/li>\n<\/ul>\n<p>Meski demikian, keamanan ERP cloud tetap tidak bisa sepenuhnya diserahkan kepada vendor. Perusahaan tetap perlu mengatur akses pengguna dengan baik agar data sensitif tidak mudah disalahgunakan.<\/p>\n<p>Hal yang tetap perlu dikontrol oleh perusahaan antara lain:<\/p>\n<ul>\n<li aria-level=\"1\">pembatasan hak akses tiap pengguna<\/li>\n<li aria-level=\"1\">penggunaan password yang kuat<\/li>\n<li aria-level=\"1\">pemantauan aktivitas login dan penggunaan sistem<\/li>\n<li aria-level=\"1\">edukasi karyawan terkait keamanan data<\/li>\n<\/ul>\n<h2><b>Keamanan ERP On Premise<\/b><\/h2>\n<p>Pada <a href=\"https:\/\/www.hashmicro.com\/id\/blog\/erp-on-premise\/\">ERP on-premise<\/a>, data dan infrastruktur disimpan di server internal perusahaan. Model ini memberi kendali lebih besar karena perusahaan dapat mengatur sendiri konfigurasi keamanan, lokasi penyimpanan data, serta kebijakan perlindungan yang sesuai dengan kebutuhan bisnis.<\/p>\n<p>Karena itu, ERP on-premise sering dipilih oleh perusahaan yang:<\/p>\n<ul>\n<li aria-level=\"1\">mengelola data sangat sensitif<\/li>\n<li aria-level=\"1\">memiliki standar kepatuhan khusus<\/li>\n<li aria-level=\"1\">membutuhkan kontrol penuh atas server dan jaringan<\/li>\n<li aria-level=\"1\">ingin menyesuaikan sistem keamanan secara lebih spesifik<\/li>\n<\/ul>\n<p>Namun, tanggung jawab keamanannya juga sepenuhnya berada di pihak perusahaan. Jika tim internal tidak memiliki pengelolaan yang kuat, risiko gangguan sistem dan kebocoran data bisa menjadi lebih besar.<\/p>\n<p>Agar tetap aman, perusahaan perlu memastikan beberapa hal berikut:<\/p>\n<ul>\n<li aria-level=\"1\">server terlindungi dengan baik<\/li>\n<li aria-level=\"1\">sistem selalu diperbarui secara rutin<\/li>\n<li aria-level=\"1\">backup data dilakukan secara berkala<\/li>\n<li aria-level=\"1\">ancaman keamanan dipantau terus-menerus<\/li>\n<li aria-level=\"1\">akses internal diawasi dengan ketat<\/li>\n<\/ul>\n<h2><b>Perbandingan Keamanan Data ERP Cloud dan On Premise<\/b><\/h2>\n<p>Setiap model ERP memiliki pendekatan keamanan yang berbeda. ERP cloud umumnya mengandalkan perlindungan dari penyedia layanan, sedangkan ERP on-premise memberi perusahaan kendali lebih besar untuk mengatur sistem keamanannya sendiri.<\/p>\n<h3><b>1. Enkripsi data<\/b><\/h3>\n<p>Pada ERP cloud, penyedia layanan biasanya sudah menyediakan enkripsi yang kuat untuk melindungi data, baik saat dikirim melalui jaringan maupun saat disimpan di server.<\/p>\n<p>Sementara itu, pada ERP on-premise, perusahaan dapat menentukan sendiri metode enkripsi yang digunakan agar sesuai dengan kebutuhan operasional dan tingkat sensitivitas data.<\/p>\n<h3><b>2. Firewall dan perlindungan jaringan<\/b><\/h3>\n<p>ERP cloud umumnya didukung firewall modern dan sistem perlindungan jaringan yang diperbarui secara berkala oleh vendor. Sebaliknya, pada ERP on-premise, perusahaan perlu menyiapkan, mengelola, dan memelihara perlindungan jaringan secara mandiri, sehingga membutuhkan tim serta infrastruktur yang memadai.<\/p>\n<h3><b>3. Deteksi dan penanganan ancaman<\/b><\/h3>\n<p>Dalam sistem ERP cloud, vendor biasanya telah menggunakan teknologi deteksi ancaman yang lebih canggih dan didukung tim keamanan khusus untuk merespons insiden.<\/p>\n<p>Pada ERP on-premise, seluruh proses pemantauan dan penanggulangan ancaman menjadi tanggung jawab perusahaan, termasuk investasi pada tools dan tenaga ahli yang dibutuhkan.<\/p>\n<h3><b>4. Kepatuhan regulasi<\/b><\/h3>\n<p>Penyedia ERP cloud sering kali sudah mengikuti standar keamanan dan kepatuhan internasional, seperti ISO 27001 atau regulasi perlindungan data tertentu, sehingga dapat membantu perusahaan memenuhi persyaratan keamanan.<\/p>\n<p>Di sisi lain, ERP on-premise memberi kontrol penuh kepada perusahaan untuk menyesuaikan sistem dengan regulasi yang berlaku, tetapi prosesnya biasanya memerlukan usaha, biaya, dan pengawasan yang lebih besar.<\/p>\n<div style=\"overflow-x: auto; margin: 20px 0;\">\n<table style=\"width: 100%; border-collapse: collapse; font-family: Arial, sans-serif; font-size: 14px; line-height: 1.6; min-width: 700px;\">\n<thead>\n<tr style=\"background-color: #990000; color: #ffffff;\">\n<th style=\"padding: 12px; border: 1px solid #ddd; text-align: left;\">Aspek Keamanan<\/th>\n<th style=\"padding: 12px; border: 1px solid #ddd; text-align: left;\">ERP Cloud<\/th>\n<th style=\"padding: 12px; border: 1px solid #ddd; text-align: left;\">ERP On-Premise<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"background-color: #ffffff;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Enkripsi data<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Penyedia layanan biasanya sudah menyiapkan enkripsi yang kuat untuk melindungi data saat dikirim maupun saat disimpan.<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Perusahaan dapat memilih dan mengatur sendiri metode enkripsi sesuai kebutuhan operasional dan tingkat sensitivitas data.<\/td>\n<\/tr>\n<tr style=\"background-color: #f9f9f9;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Firewall dan perlindungan jaringan<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Umumnya didukung firewall modern dan perlindungan jaringan yang diperbarui secara berkala oleh vendor.<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Perusahaan perlu menyiapkan, mengelola, dan memelihara sendiri perlindungan jaringan, sehingga membutuhkan tim dan infrastruktur yang memadai.<\/td>\n<\/tr>\n<tr style=\"background-color: #ffffff;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Deteksi dan penanganan ancaman<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Vendor biasanya memakai teknologi deteksi ancaman yang lebih canggih dan didukung tim keamanan khusus untuk merespons insiden.<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Pemantauan dan penanganan ancaman menjadi tanggung jawab perusahaan, termasuk investasi pada tools dan tenaga ahli.<\/td>\n<\/tr>\n<tr style=\"background-color: #f9f9f9;\">\n<td style=\"padding: 12px; border: 1px solid #ddd;\"><strong>Kepatuhan regulasi<\/strong><\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Penyedia cloud sering sudah mengikuti standar keamanan tertentu, sehingga dapat membantu perusahaan memenuhi persyaratan kepatuhan.<\/td>\n<td style=\"padding: 12px; border: 1px solid #ddd;\">Perusahaan memiliki kontrol penuh untuk menyesuaikan sistem dengan regulasi, tetapi membutuhkan usaha, biaya, dan pengawasan yang lebih besar.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2><b><span id=\"c\">Tantangan Keamanan Data ERP<\/span><\/b><\/h2>\n<p>Tantangan keamanan ERP cloud dan on-premise umumnya berbeda dari sisi kontrol, biaya, dan kesiapan sistem.<\/p>\n<p>Pada ERP cloud, tantangan lebih banyak berkaitan dengan keterlibatan pihak ketiga dalam pengelolaan data. Sementara itu, pada ERP on-premise, beban keamanan lebih besar karena seluruh perlindungan sistem harus dikelola sendiri oleh perusahaan.<\/p>\n<p>Pada <b>ERP cloud<\/b>, beberapa tantangan yang paling sering muncul meliputi:<\/p>\n<ul>\n<li aria-level=\"1\">kontrol perusahaan terhadap data cenderung lebih terbatas<\/li>\n<li aria-level=\"1\">keamanan sangat bergantung pada koneksi internet yang aman dan stabil<\/li>\n<li aria-level=\"1\">perusahaan perlu memastikan vendor mematuhi regulasi keamanan dan privasi data<\/li>\n<\/ul>\n<p>Sementara itu, pada <b>ERP on-premise<\/b>, tantangan utamanya biasanya terletak pada besarnya tanggung jawab internal. Karena infrastruktur dikelola sendiri, perusahaan harus menyiapkan sumber daya yang cukup agar perlindungan data tetap optimal.<\/p>\n<p>Beberapa tantangan pada ERP on-premise antara lain:<\/p>\n<ul>\n<li aria-level=\"1\">biaya infrastruktur keamanan cenderung lebih tinggi<\/li>\n<li aria-level=\"1\">penambahan kapasitas keamanan sering membutuhkan investasi baru<\/li>\n<li aria-level=\"1\">proses pemulihan bencana bisa lebih lambat dan kompleks<\/li>\n<li aria-level=\"1\">kebutuhan tenaga ahli internal menjadi lebih besar<\/li>\n<\/ul>\n<p>Artinya, perusahaan perlu menimbang bukan hanya tingkat keamanan yang diinginkan, tetapi juga kemampuan tim, anggaran, dan kesiapan operasional jangka panjang.<\/p>\n<h2><b>Cara Menerapkan Keamanan Data ERP<\/b><\/h2>\n<table style=\"width: 100%; max-width: 900px; margin: 0 auto; border-spacing: 12px; border-collapse: separate; font-family: 'Segoe UI', Arial, sans-serif;\"><!-- Header --><\/p>\n<tbody>\n<tr>\n<td style=\"text-align: center; padding-bottom: 20px;\" colspan=\"2\">\n<p style=\"font-size: 26px; color: #1a1a2e; margin-bottom: 6px;\"><strong>Cara Menerapkan Keamanan Data ERP<\/strong><\/p>\n<p style=\"font-size: 14px; color: #666; margin: 0;\">Strategi perlindungan yang tepat untuk ERP Cloud &amp; On-Premise<\/p>\n<\/td>\n<\/tr>\n<p><!-- Dua Kolom --><\/p>\n<tr><!-- KOLOM CLOUD --><\/p>\n<td style=\"width: 50%; vertical-align: top; background: linear-gradient(135deg, #e8f4fd 0%, #f0f7ff 100%); border-radius: 16px; padding: 24px; border: 1px solid #bdd8f1;\">\n<div style=\"display: inline-block; background: #2196F3; color: #fff; font-size: 11px; font-weight: bold; padding: 4px 12px; border-radius: 20px; text-transform: uppercase; letter-spacing: 1px; margin-bottom: 14px;\">&#x2601;&#xfe0f; ERP Cloud<\/div>\n<p style=\"font-size: 12.5px; color: #555; margin-bottom: 18px; line-height: 1.5;\">Keamanan bergantung pada kolaborasi antara perusahaan dan vendor.<\/p>\n<table style=\"width: 100%; border-spacing: 0; border-collapse: collapse;\">\n<tbody>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #2196F3; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">1<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pilih vendor terpercaya<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Pastikan memiliki reputasi baik &amp; standar keamanan jelas<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #2196F3; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">2<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Konfigurasi keamanan sejak awal<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Atur pengaturan keamanan saat implementasi dimulai<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #2196F3; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">3<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pantau sistem secara berkala<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Deteksi aktivitas mencurigakan sebelum jadi ancaman<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #2196F3; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">4<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Evaluasi kebijakan akses<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Review hak akses pengguna secara rutin<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 0 0;\">\n<div style=\"width: 30px; height: 30px; background: #2196F3; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">5<\/div>\n<\/td>\n<td style=\"vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pastikan backup &amp; respons insiden<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Vendor harus punya prosedur pemulihan yang jelas<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<p><!-- KOLOM ON-PREMISE --><\/p>\n<td style=\"width: 50%; vertical-align: top; background: linear-gradient(135deg, #f3e8fd 0%, #f8f0ff 100%); border-radius: 16px; padding: 24px; border: 1px solid #d4b8f0;\">\n<div style=\"display: inline-block; background: #7B1FA2; color: #fff; font-size: 11px; font-weight: bold; padding: 4px 12px; border-radius: 20px; text-transform: uppercase; letter-spacing: 1px; margin-bottom: 14px;\">&#x1f3e2; ERP On-Premise<\/div>\n<p style=\"font-size: 12.5px; color: #555; margin-bottom: 18px; line-height: 1.5;\">Seluruh tanggung jawab keamanan berada di tangan perusahaan.<\/p>\n<table style=\"width: 100%; border-spacing: 0; border-collapse: collapse;\">\n<tbody>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #7B1FA2; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">1<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Investasi infrastruktur keamanan<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Siapkan anggaran untuk hardware &amp; software keamanan<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #7B1FA2; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">2<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Pelatihan keamanan karyawan<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Kurangi risiko human error melalui edukasi rutin<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #7B1FA2; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">3<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Rencana pemulihan bencana<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Susun disaster recovery plan agar data bisa dipulihkan<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 14px 0;\">\n<div style=\"width: 30px; height: 30px; background: #7B1FA2; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">4<\/div>\n<\/td>\n<td style=\"vertical-align: top; padding-bottom: 14px;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Update sistem secara rutin<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Perbarui perangkat &amp; patch keamanan secara berkala<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 36px; vertical-align: top; padding: 0 10px 0 0;\">\n<div style=\"width: 30px; height: 30px; background: #7B1FA2; color: #fff; border-radius: 50%; text-align: center; line-height: 30px; font-weight: bold; font-size: 13px;\">5<\/div>\n<\/td>\n<td style=\"vertical-align: top;\">\n<div style=\"font-weight: 600; font-size: 13px; color: #1a1a2e;\">Audit keamanan berkala<\/div>\n<div style=\"font-size: 12px; color: #666; margin-top: 2px;\">Evaluasi celah risiko untuk menjaga kekuatan pertahanan<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- Footer --><\/p>\n<tr>\n<td style=\"text-align: center; padding: 14px 20px; background: #f8f9fa; border-radius: 12px; border: 1px solid #e0e0e0; margin-top: 10px;\" colspan=\"2\">\n<p style=\"font-size: 13px; color: #444; margin: 0; line-height: 1.6;\">Dengan penerapan yang tepat, perusahaan dapat menjaga sistem ERP tetap aman sekaligus mendukung operasional yang lebih stabil.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b>Implementasi keamanan ERP perlu disesuaikan dengan model sistem yang digunakan.<\/b> Baik ERP cloud maupun on-premise sama-sama membutuhkan strategi perlindungan yang terencana agar risiko kebocoran data, gangguan sistem, dan akses tidak sah dapat ditekan sejak awal.<\/p>\n<p>Beberapa praktik yang perlu diperhatikan dalam ERP cloud meliputi:<\/p>\n<ul>\n<li aria-level=\"1\">memilih vendor yang memiliki reputasi baik dan standar keamanan yang jelas<\/li>\n<li aria-level=\"1\">memastikan konfigurasi keamanan diatur dengan tepat sejak awal implementasi<\/li>\n<li aria-level=\"1\">melakukan pemantauan sistem secara berkala untuk mendeteksi aktivitas mencurigakan<\/li>\n<li aria-level=\"1\">mengevaluasi kebijakan akses pengguna secara rutin<\/li>\n<li aria-level=\"1\">memastikan vendor memiliki prosedur backup dan respons insiden yang memadai<\/li>\n<\/ul>\n<p>Sementara itu, pada <b>implementasi ERP on-premise<\/b>, perusahaan memegang tanggung jawab penuh atas perlindungan sistem dan data. Karena itu, pendekatannya perlu lebih kuat dari sisi infrastruktur, kesiapan tim internal, dan perencanaan jika terjadi gangguan.<\/p>\n<p>Beberapa best practices untuk ERP on-premise antara lain:<\/p>\n<ul>\n<li aria-level=\"1\">menyiapkan investasi yang cukup untuk perangkat keras dan software keamanan<\/li>\n<li aria-level=\"1\">memberikan pelatihan keamanan kepada karyawan agar risiko human error berkurang<\/li>\n<li aria-level=\"1\">menyusun rencana pemulihan bencana agar data tetap bisa dipulihkan saat terjadi insiden<\/li>\n<li aria-level=\"1\">memperbarui sistem dan perangkat keamanan secara rutin<\/li>\n<li aria-level=\"1\">melakukan audit keamanan secara berkala untuk mengevaluasi celah risiko<\/li>\n<\/ul>\n<p>Dengan penerapan yang tepat, perusahaan dapat menjaga sistem ERP tetap aman sekaligus mendukung operasional yang lebih stabil.<\/p>\n<h2><b>Kesimpulan<\/b><\/h2>\n<p>Keamanan jadi hal penting saat perusahaan memilih ERP cloud atau on-premise. ERP cloud biasanya unggul karena update keamanan lebih praktis, kapasitasnya lebih fleksibel, dan proses backup serta pemulihan data umumnya lebih cepat.<\/p>\n<p>Sementara itu, ERP on-premise memberi perusahaan kontrol yang lebih besar atas data dan sistemnya sendiri, tetapi biaya dan tanggung jawab pengelolaannya juga lebih besar. Karena itu, pilihan terbaik sebaiknya disesuaikan dengan kebutuhan bisnis, anggaran, dan kesiapan tim internal perusahaan.<\/p>\n<p><span data-sheets-root=\"1\"><\/span><\/p>\n<h2><strong>Pertanyaan Seputar Keamanan Data ERP<\/strong><\/h2>\n<ul class=\"bottom_faq\">\n<li>\n<details>\n<summary><strong>Apakah keamanan data ERP hanya menjadi tanggung jawab tim IT?<\/strong><\/summary>\n<p>Keamanan data ERP tidak hanya menjadi tanggung jawab tim IT karena kesalahan akses, password lemah, dan kelalaian pengguna juga bisa memicu risiko kebocoran data. Perusahaan perlu melibatkan seluruh tim agar perlindungan data berjalan lebih konsisten.<\/p>\n<\/details>\n<\/li>\n<li>\n<details>\n<summary><strong>Bagaimana cara menilai vendor ERP cloud dari sisi keamanan?<\/strong><\/summary>\n<p>Perusahaan dapat menilai vendor dari standar keamanan yang dimiliki, kebijakan backup data, sistem enkripsi, serta kejelasan prosedur saat terjadi insiden. Selain itu, penting juga memastikan vendor memiliki transparansi terkait pengelolaan akses dan kepatuhan regulasi.<\/p>\n<\/details>\n<\/li>\n<li>\n<details>\n<summary><strong>Seberapa sering sistem keamanan ERP perlu ditinjau?<\/strong><\/summary>\n<p>Sistem keamanan ERP sebaiknya ditinjau secara berkala, terutama saat ada perubahan pengguna, penambahan modul, atau pembaruan sistem. Review rutin membantu perusahaan menemukan celah keamanan lebih cepat sebelum menimbulkan masalah yang lebih besar.<\/p>\n<\/details>\n<\/li>\n<li>\n<details>\n<summary><strong>Apakah bisnis skala menengah juga perlu memperhatikan keamanan data ERP?<\/strong><\/summary>\n<p>Bisnis skala menengah tetap perlu memperhatikan keamanan data ERP karena data keuangan, stok, pelanggan, dan operasional tetap bersifat penting bagi kelangsungan bisnis. Risiko gangguan atau kebocoran data dapat berdampak besar meski skala perusahaan belum sebesar enterprise.<\/p>\n<\/details>\n<\/li>\n<\/ul>\n<p><script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Apakah keamanan data ERP hanya menjadi tanggung jawab tim IT?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Keamanan data ERP tidak hanya menjadi tanggung jawab tim IT karena kesalahan akses, password lemah, dan kelalaian pengguna juga bisa memicu risiko kebocoran data. Perusahaan perlu melibatkan seluruh tim agar perlindungan data berjalan lebih konsisten.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Bagaimana cara menilai vendor ERP cloud dari sisi keamanan?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Perusahaan dapat menilai vendor dari standar keamanan yang dimiliki, kebijakan backup data, sistem enkripsi, serta kejelasan prosedur saat terjadi insiden. Selain itu, penting juga memastikan vendor memiliki transparansi terkait pengelolaan akses dan kepatuhan regulasi.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Seberapa sering sistem keamanan ERP perlu ditinjau?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Sistem keamanan ERP sebaiknya ditinjau secara berkala, terutama saat ada perubahan pengguna, penambahan modul, atau pembaruan sistem. Review rutin membantu perusahaan menemukan celah keamanan lebih cepat sebelum menimbulkan masalah yang lebih besar.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Apakah bisnis skala menengah juga perlu memperhatikan keamanan data ERP?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Bisnis skala menengah tetap perlu memperhatikan keamanan data ERP karena data keuangan, stok, pelanggan, dan operasional tetap bersifat penting bagi kelangsungan bisnis. Risiko gangguan atau kebocoran data dapat berdampak besar meski skala perusahaan belum sebesar enterprise.\"\n      }\n    }\n  ]\n}\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sistem ERP menyimpan aset paling berharga perusahaan Anda: data. Mulai dari catatan keuangan, data karyawan, informasi pelanggan, hingga strategi bisnis, semuanya terintegrasi dalam satu platform terpusat. Di satu sisi, integrasi ini memberikan efisiensi luar biasa bagi operasional bisnis. Namun di sisi lain, justru karena sifatnya yang terpusat inilah, sistem ERP menjadi target empuk bagi ancaman [&hellip;]<\/p>\n","protected":false},"author":223,"featured_media":192404,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-192389","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-erp"},"acf":{"post_reviewer":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v25.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pentingnya Keamanan Data ERP dalam Operasional Perusahaan<\/title>\n<meta name=\"description\" content=\"Pelajari cara melindungi data ERP perusahaan Anda. Bandingkan keamanan ERP cloud vs on-premise, tantangan, dan best practices penerapannya.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan\" \/>\n<meta property=\"og:description\" content=\"Pelajari cara melindungi data ERP perusahaan Anda. Bandingkan keamanan ERP cloud vs on-premise, tantangan, dan best practices penerapannya.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/\" \/>\n<meta property=\"og:site_name\" content=\"HashMicro Indonesia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hashmicro\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-15T07:12:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T07:45:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Nur Fi&#039;llia Nugrahani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hashmicro\" \/>\n<meta name=\"twitter:site\" content=\"@hashmicro\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nur Fi&#039;llia Nugrahani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/\"},\"author\":{\"name\":\"Nur Fi'llia Nugrahani\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/person\/116eac6e4748cbaa02f000016234fc39\"},\"headline\":\"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan\",\"datePublished\":\"2026-04-15T07:12:41+00:00\",\"dateModified\":\"2026-04-15T07:45:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/\"},\"wordCount\":2006,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp\",\"articleSection\":[\"ERP\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/\",\"url\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/\",\"name\":\"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan\",\"isPartOf\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp\",\"datePublished\":\"2026-04-15T07:12:41+00:00\",\"dateModified\":\"2026-04-15T07:45:18+00:00\",\"description\":\"Pelajari cara melindungi data ERP perusahaan Anda. Bandingkan keamanan ERP cloud vs on-premise, tantangan, dan best practices penerapannya.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage\",\"url\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp\",\"contentUrl\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp\",\"width\":1536,\"height\":1024,\"caption\":\"keamanan-data-erp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hashmicro.com\/id\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#website\",\"url\":\"https:\/\/www.hashmicro.com\/id\/blog\/\",\"name\":\"HashMicro Indonesia\",\"description\":\"Blog Software Manajemen Bisnis Indonesia #1\",\"publisher\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hashmicro.com\/id\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#organization\",\"name\":\"HashMicro Indonesia\",\"url\":\"https:\/\/www.hashmicro.com\/id\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2023\/11\/hashmicro-logo-blog.webp\",\"contentUrl\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2023\/11\/hashmicro-logo-blog.webp\",\"width\":924,\"height\":121,\"caption\":\"HashMicro Indonesia\"},\"image\":{\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/hashmicro\",\"https:\/\/x.com\/hashmicro\",\"https:\/\/www.linkedin.com\/company\/hashmicro\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/person\/116eac6e4748cbaa02f000016234fc39\",\"name\":\"Nur Fi'llia Nugrahani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2025\/08\/cropped-foto-profil-nuri-96x96.webp\",\"contentUrl\":\"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2025\/08\/cropped-foto-profil-nuri-96x96.webp\",\"caption\":\"Nur Fi'llia Nugrahani\"},\"description\":\"Nuri adalah seorang spesialis dalam bidang inventory management dengan pengalaman 3 tahun. Berfokus pada penulisan yang mengangkat topik pengelolaan stok, pengendalian persediaan, dan implementasi sistem inventory digital untuk menjamin efisiensi operasional bisnis.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/nur-fi-llia-nugrahani\"],\"url\":\"https:\/\/www.hashmicro.com\/id\/blog\/author\/fillia-nugrahani\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan","description":"Pelajari cara melindungi data ERP perusahaan Anda. Bandingkan keamanan ERP cloud vs on-premise, tantangan, dan best practices penerapannya.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/","og_locale":"id_ID","og_type":"article","og_title":"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan","og_description":"Pelajari cara melindungi data ERP perusahaan Anda. Bandingkan keamanan ERP cloud vs on-premise, tantangan, dan best practices penerapannya.","og_url":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/","og_site_name":"HashMicro Indonesia","article_publisher":"https:\/\/www.facebook.com\/hashmicro","article_published_time":"2026-04-15T07:12:41+00:00","article_modified_time":"2026-04-15T07:45:18+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp","type":"image\/webp"}],"author":"Nur Fi'llia Nugrahani","twitter_card":"summary_large_image","twitter_creator":"@hashmicro","twitter_site":"@hashmicro","twitter_misc":{"Ditulis oleh":"Nur Fi'llia Nugrahani","Estimasi waktu membaca":"12 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#article","isPartOf":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/"},"author":{"name":"Nur Fi'llia Nugrahani","@id":"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/person\/116eac6e4748cbaa02f000016234fc39"},"headline":"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan","datePublished":"2026-04-15T07:12:41+00:00","dateModified":"2026-04-15T07:45:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/"},"wordCount":2006,"commentCount":0,"publisher":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/#organization"},"image":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp","articleSection":["ERP"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/","url":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/","name":"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan","isPartOf":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage"},"image":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp","datePublished":"2026-04-15T07:12:41+00:00","dateModified":"2026-04-15T07:45:18+00:00","description":"Pelajari cara melindungi data ERP perusahaan Anda. Bandingkan keamanan ERP cloud vs on-premise, tantangan, dan best practices penerapannya.","breadcrumb":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#primaryimage","url":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp","contentUrl":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2026\/04\/keamanan-data-erp.webp","width":1536,"height":1024,"caption":"keamanan-data-erp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hashmicro.com\/id\/blog\/keamanan-data-sistem-erp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hashmicro.com\/id\/blog\/"},{"@type":"ListItem","position":2,"name":"Pentingnya Keamanan Data ERP dalam Operasional Perusahaan"}]},{"@type":"WebSite","@id":"https:\/\/www.hashmicro.com\/id\/blog\/#website","url":"https:\/\/www.hashmicro.com\/id\/blog\/","name":"HashMicro Indonesia","description":"Blog Software Manajemen Bisnis Indonesia #1","publisher":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hashmicro.com\/id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Organization","@id":"https:\/\/www.hashmicro.com\/id\/blog\/#organization","name":"HashMicro Indonesia","url":"https:\/\/www.hashmicro.com\/id\/blog\/","logo":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2023\/11\/hashmicro-logo-blog.webp","contentUrl":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2023\/11\/hashmicro-logo-blog.webp","width":924,"height":121,"caption":"HashMicro Indonesia"},"image":{"@id":"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hashmicro","https:\/\/x.com\/hashmicro","https:\/\/www.linkedin.com\/company\/hashmicro"]},{"@type":"Person","@id":"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/person\/116eac6e4748cbaa02f000016234fc39","name":"Nur Fi'llia Nugrahani","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hashmicro.com\/id\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2025\/08\/cropped-foto-profil-nuri-96x96.webp","contentUrl":"https:\/\/www.hashmicro.com\/id\/blog\/wp-content\/uploads\/2025\/08\/cropped-foto-profil-nuri-96x96.webp","caption":"Nur Fi'llia Nugrahani"},"description":"Nuri adalah seorang spesialis dalam bidang inventory management dengan pengalaman 3 tahun. Berfokus pada penulisan yang mengangkat topik pengelolaan stok, pengendalian persediaan, dan implementasi sistem inventory digital untuk menjamin efisiensi operasional bisnis.","sameAs":["https:\/\/www.linkedin.com\/in\/nur-fi-llia-nugrahani"],"url":"https:\/\/www.hashmicro.com\/id\/blog\/author\/fillia-nugrahani\/"}]}},"focus_keyword":"keamanan data erp","order_j":"","_links":{"self":[{"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/posts\/192389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/users\/223"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/comments?post=192389"}],"version-history":[{"count":5,"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/posts\/192389\/revisions"}],"predecessor-version":[{"id":192409,"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/posts\/192389\/revisions\/192409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/media\/192404"}],"wp:attachment":[{"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/media?parent=192389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/categories?post=192389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hashmicro.com\/id\/blog\/wp-json\/wp\/v2\/tags?post=192389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}