Cybersecurity is becoming increasingly important. As the digital landscape evolves, so do the risks and new forms of cybercrime. The information that businesses and freelancers entrust to their ERP systems is highly valuable, confidential data about clients, employees, and suppliers, purchase and sales figures, financial status… In short, extremely sensitive information that must always be stored in secure environments.
At STEL Order, we fully understand the critical importance of providing our users with a secure and trusted platform. That’s why we continuously analyze potential vulnerabilities and work to improve the protection of our system.
With version 3.20.2, we’ve implemented a series of enhancements aimed at increasing the security of the data stored in your STEL Order account. These improvements are designed to help safeguard your business against online threats, giving you the peace of mind that your information is protected by software built to withstand today’s cybersecurity challenges.
Among the new features included is Two-Factor Authentication (2FA), a security measure used to verify the identity of the person trying to log in to an account. Two-step authentication is a highly effective way to protect online accounts from theft attempts. With STEL Order, you can set it up quickly and easily. Plus, it allows you to apply it either to all company users or only to specific users.
In this case, authentication is verified via email, but our development team is already working on adding more options in future versions, such as biometric verification.
Another interesting setting offered by STEL Order is the ability to define who approves new devices. In other words, you can allow each user to verify that they are logging in from a new device (like a home PC or mobile phone), or you can assign that responsibility to a Super Admin who can control and supervise whether the device is truly trusted.
In this way, you’re not only blocking hackers from accessing your account, you’re also ensuring a more controlled record of the devices used to access STEL Order. This is especially useful if you need to ensure access is only granted from company-owned devices.
Additionally, to help you regularly review your authorized devices, STEL Order lets you set an expiration date for device access: 30 days, 90 days… or, if you prefer, never. This way, you can build a whitelist of approved devices that can access your STEL Order account. And if your situation changes, you can remove any device from that list at any time.
It’s important to note that when Two-Factor Authentication (2FA) is activated, all users will be logged out and prompted to enter a verification code sent to their email in order to log in securely.
With these measures, we’re making it much harder for hackers to access the information stored in STEL Order. Starting March 1, 2024, two-factor authentication will be mandatory in our software, a measure that significantly enhances account security and helps prevent unauthorized access.
At STEL Order, we continue evolving with you and for you. We’ve been hard at work and recently released several major improvements to the software, including a brand-new iOS app, and two powerful features: Your Banks in STEL Order and Bundled Products.
Stay tuned for more updates and follow us on social media so you don’t miss any of the latest features and improvements from STEL Order.