{"id":532,"date":"2025-06-01T22:25:00","date_gmt":"2025-06-02T02:25:00","guid":{"rendered":"https:\/\/www.softwareag.com\/?p=532"},"modified":"2026-03-17T14:14:49","modified_gmt":"2026-03-17T18:14:49","slug":"encryption-companies-and-authorities-report-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","title":{"rendered":"A criptografia isenta empresas e autoridades europ\u00e9ias da obriga\u00e7\u00e3o de relatar ataques cibern\u00e9ticos"},"content":{"rendered":"<p>Empresas e autoridades p\u00fablicas dependem de bancos de dados para armazenar e processar grandes quantidades de dados. Em geral, esses bancos de dados gerenciam informa\u00e7\u00f5es cr\u00edticas para os neg\u00f3cios e altamente confidenciais, como dados financeiros (registros fiscais, contas banc\u00e1rias e cart\u00f5es de cr\u00e9dito), dados pessoais (endere\u00e7os residenciais e arquivos pessoais) ou dados de produtos. Como os bancos de dados geralmente s\u00e3o integrados a aplicativos e servi\u00e7os da Web, eles permanecem vulner\u00e1veis a amea\u00e7as cibern\u00e9ticas internas e externas.<\/p>\n\n\n\n<p>Muitos CIOs e l\u00edderes de TI acreditam que sua infraestrutura de TI est\u00e1 adequadamente protegida contra ataques cibern\u00e9ticos. Firewalls de v\u00e1rios n\u00edveis, software antiv\u00edrus e sistemas de detec\u00e7\u00e3o e preven\u00e7\u00e3o de intrus\u00f5es (IPS)(1) proporcionam uma falsa sensa\u00e7\u00e3o de seguran\u00e7a. O que muitos n\u00e3o reconhecem \u00e9 que o maior risco de seguran\u00e7a geralmente vem de dentro - dos funcion\u00e1rios e dos oficiais que usam esses sistemas.<\/p>\n\n\n\n<p>Os funcion\u00e1rios e as autoridades frequentemente s\u00e3o v\u00edtimas de e-mails de phishing ou de liga\u00e7\u00f5es externas enganosas, clicando sem querer em links maliciosos ou compartilhando informa\u00e7\u00f5es confidenciais com estranhos. Isso geralmente se deve ao fato de que os e-mails de phishing e os autores de chamadas n\u00e3o s\u00e3o mais reconhecidos como uma amea\u00e7a. Com o avan\u00e7o do engano orientado por IA, \u00e9 cada vez mais dif\u00edcil<br>identificar amea\u00e7as. O estresse e a press\u00e3o do tempo podem levar a lapsos de julgamento, tornando os funcion\u00e1rios mais propensos a cometer erros dispendiosos.<\/p>\n\n\n\n<p>Como resultado, os ataques cibern\u00e9ticos continuam a ter sucesso. Em um estudo recente da Ag\u00eancia Europeia de Seguran\u00e7a Cibern\u00e9tica (ENISA)(2) , especialistas em seguran\u00e7a descobriram que empresas e autoridades da Uni\u00e3o Europeia, em particular, tornaram-se alvo de ataques cibern\u00e9ticos nos \u00faltimos 12 meses.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg\" alt=\"\" class=\"wp-image-598\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>N\u00famero de incidentes - UE e global (julho de 2023 - junho de 2024)<\/p>\n\n\n\n<p>An analysis of individual sectors reveals that the public sector is particularly hard hit, accounting for 19% of attacks, followed by the transport sector (11%) and banking and finance (9%). This is not surprising\u2014many still remember the high-profile cyberattacks targeting the German Bundestag, municipalities, university hospitals, Dutch law enforcement, and Spanish citizens and authorities.<sup>(3-8)<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg\" alt=\"\" class=\"wp-image-599\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Setores afetados - O setor p\u00fablico \u00e9 o mais afetado! (Julho de 2023 - junho de 2024)<\/p>\n\n\n\n<p>Analisando as amea\u00e7as cibern\u00e9ticas por categoria, a amea\u00e7a direta aos dados armazenados - principalmente bancos de dados - \u00e9 de 45%, com 19% de incidentes envolvendo viola\u00e7\u00f5es de dados e 26% de incidentes envolvendo ataques de ransomware <sup>(2)<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg\" alt=\"\" class=\"wp-image-600\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>An\u00e1lise de amea\u00e7as por tipo<\/p>\n\n\n\n<p class=\"translation-block\">Under Article 32 of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Security of Processing) the following is required: \u201c\u2026the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk.\u201d<\/p>\n\n\n\n<p>Especificamente, ele destaca \"a pseudonimiza\u00e7\u00e3o e a criptografia de dados pessoais\" como uma medida eficaz.&nbsp;<\/p>\n\n\n\n<p class=\"translation-block\">Additionally, the <strong>German Federal Office for Information Security<\/strong> (BSI) also recommends encryption as a key strategy to minimize the risk of IT operations in its <strong>BSI Standards<sup>(10)<\/sup> 200-1 to 200-4.<\/strong><\/p>\n\n\n\n<p class=\"translation-block\">Under <strong>Article 33<\/strong> of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Notification of a personal data breach to the supervisory authority), companies are required to notify a personal data breach to the supervisory authority within 72 hours of becoming aware of the breach. The data controller must notify the relevant supervisory authority in accordance with Article 55 unless the break is unlikely to risk individuals\u2019 rights. If the notification is delayed beyond 72 hours, an explanation for the delay must be provided.<\/p>\n\n\n\n<p>&nbsp;Apesar das diretrizes claras, ainda h\u00e1 incerteza no mundo da TI quanto \u00e0 aplica\u00e7\u00e3o correta dos requisitos de relat\u00f3rio do GDPR.<\/p>\n\n\n\n<p class=\"translation-block\">To clarify this, the <strong>European Data Protection Board<\/strong> (EDPB) has developed guidelines<sup>(11)<\/sup>, including case studies.<\/p>\n\n\n\n<p class=\"translation-block\">In \u201c<strong>CASE No. 01: Ransomware with proper backup and without exfiltration<\/strong>,\u201d the following scenario is described:<\/p>\n\n\n\n<p>&nbsp;\"Os sistemas de computador de uma pequena empresa de manufatura foram expostos a um ataque de ransomware, e os dados armazenados nesses sistemas foram criptografados. O controlador de dados usou criptografia em repouso, portanto, todos os dados acessados pelo ransomware foram armazenados de forma criptografada usando um algoritmo de criptografia de \u00faltima gera\u00e7\u00e3o. A chave de descriptografia n\u00e3o foi comprometida no ataque, ou seja, o invasor n\u00e3o p\u00f4de acess\u00e1-la nem us\u00e1-la indiretamente. Consequentemente, o invasor s\u00f3 teve acesso a dados pessoais criptografados.\"<\/p>\n\n\n\n<p>&nbsp;As medidas necess\u00e1rias est\u00e3o definidas na tabela publicada nas diretrizes:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"342\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg\" alt=\"\" class=\"wp-image-601\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-300x100.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-768x256.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1536x513.jpg 1536w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400.jpg 1990w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>As medidas necess\u00e1rias s\u00e3o justificadas da seguinte forma:<\/p>\n\n\n\n<p>\"Neste exemplo, o invasor teve acesso a dados pessoais e a confidencialidade do texto cifrado contendo dados pessoais em formato criptografado foi comprometida. Entretanto, quaisquer dados que possam ter sido exfiltrados n\u00e3o podem ser lidos ou usados pelo criminoso, pelo menos por enquanto. A t\u00e9cnica de criptografia usada pelo controlador de dados est\u00e1 em conformidade com o estado da arte. A chave de descriptografia n\u00e3o foi comprometida e, presumivelmente, tamb\u00e9m n\u00e3o poderia ser determinada por outros meios. Consequentemente, os riscos de confidencialidade para os direitos e liberdades das pessoas f\u00edsicas s\u00e3o reduzidos ao m\u00ednimo, exceto pelo progresso criptoanal\u00edtico que torna os dados criptografados intelig\u00edveis no futuro.\"<\/p>\n\n\n\n<p><strong>&nbsp;Por esse motivo, a empresa n\u00e3o foi obrigada a relatar o incidente \u00e0s autoridades ou \u00e0s pessoas afetadas.<\/strong><\/p>\n\n\n\n<p>Ao comparar o custo da implementa\u00e7\u00e3o de medidas de seguran\u00e7a de TI com a poss\u00edvel perda de reputa\u00e7\u00e3o, vendas e confian\u00e7a do cliente, os benef\u00edcios do investimento proativo rapidamente se tornam claros.<\/p>\n\n\n\n<p>&nbsp;No mundo hiperconectado de hoje, em que as not\u00edcias se espalham instantaneamente por meio de plataformas on-line e m\u00eddias sociais, as organiza\u00e7\u00f5es n\u00e3o devem subestimar os danos de longo prazo causados por um ataque cibern\u00e9tico.<\/p>\n\n\n\n<p class=\"translation-block\">To mitigate risks, Software AG strongly recommends that its customers implement <strong>encryption<\/strong><sup>(12) <\/sup>and <strong>auditing<\/strong><sup>(12)<\/sup> for our Adabas databases to keep IT risks at a minimum. Both measures complement each other and form the optimal technology mix to protect against attacks and unwanted internal and external data leaks.<\/p>\n\n\n\n<p><sub>(1) <a href=\"https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems<\/a><\/sub><br><sub>(2) <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024<\/a><\/sub><br><sub>(3) <a href=\"https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580<\/a><\/sub><br><sub>(4) <a href=\"https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980<\/a><\/sub><br><sub>(5) <a href=\"https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html<\/a><\/sub><br><sub>(6) <a href=\"https:\/\/www.bbc.com\/news\/technology-54204356\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bbc.com\/news\/technology-54204356<\/a><\/sub><br><sub>(7) <a href=\"https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/<\/a><\/sub><br><sub>(8) <a href=\"https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview<\/a><\/sub><br><sub>(9) <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679<\/a><\/sub><br><sub>(10) <a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html<\/a><\/sub><br><sub>(11) <a href=\"https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en<\/a><\/sub><br><sub>(12) <a href=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf\" data-no-translation>https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf<\/a><\/sub><\/p>\n\n\n\n<p><a href=\"https:\/\/www.softwareag.com\/br\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">Leia mais aqui<\/a><\/p>\n\n\n\n<div class=\"wp-block-jetpack-related-posts\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Companies and public authorities rely on databases to store and process large amounts of data. These databases typically manage business-critical and highly sensitive information, such as [&hellip;]<\/p>","protected":false},"author":9,"featured_media":537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[44],"tags":[],"product":[66],"class_list":["post-532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","product-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Database Security: Protecting Sensitive Information | Software AG<\/title>\n<meta name=\"description\" content=\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta property=\"og:description\" content=\"Learn the essentials of database security and how to protect sensitive information from internal and external threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-02T02:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T18:14:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SoftwareAG Staff Writer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta name=\"twitter:description\" content=\"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.\" \/>\n<meta name=\"twitter:creator\" content=\"@softwareag\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SoftwareAG Staff Writer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"author\":{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/br\/#person-softwareag-staff-writer\",\"name\":\"SoftwareAG Staff Writer\"},\"headline\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"wordCount\":983,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"url\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"name\":\"Database Security: Protecting Sensitive Information | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"description\":\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7\",\"name\":\"Josh Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"caption\":\"Josh Smith\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Database Security: Protecting Sensitive Information | Software AG","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_locale":"pt_BR","og_type":"article","og_title":"Database Security: Protecting Sensitive Information","og_description":"Learn the essentials of database security and how to protect sensitive information from internal and external threats.","og_url":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_published_time":"2025-06-02T02:25:00+00:00","article_modified_time":"2026-03-17T18:14:49+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","type":"image\/jpeg"}],"author":"SoftwareAG Staff Writer","twitter_card":"summary_large_image","twitter_title":"Database Security: Protecting Sensitive Information","twitter_description":"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.","twitter_creator":"@softwareag","twitter_site":"@softwareag","twitter_misc":{"Written by":"SoftwareAG Staff Writer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"author":{"@type":"Person","@id":"https:\/\/www.softwareag.com\/br\/#person-softwareag-staff-writer","name":"SoftwareAG Staff Writer"},"headline":"Encryption relieves companies and authorities of the obligation to report cyberattacks","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"wordCount":983,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","articleSection":["Security"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","url":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","name":"Database Security: Protecting Sensitive Information | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Encryption relieves companies and authorities of the obligation to report cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Solu\u00e7\u00f5es e servi\u00e7os de transforma\u00e7\u00e3o digital da Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}},{"@type":"Person","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7","name":"Josh Smith","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","caption":"Josh Smith"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/posts\/532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":11,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"predecessor-version":[{"id":6409,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/posts\/532\/revisions\/6409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media\/537"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/tags?post=532"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/br\/wp-json\/wp\/v2\/product?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}