{"id":532,"date":"2025-06-01T22:25:00","date_gmt":"2025-06-02T02:25:00","guid":{"rendered":"https:\/\/www.softwareag.com\/?p=532"},"modified":"2026-03-17T14:14:49","modified_gmt":"2026-03-17T18:14:49","slug":"encryption-companies-and-authorities-report-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.softwareag.com\/en\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","title":{"rendered":"Encryption relieves companies and authorities of the obligation to report cyberattacks"},"content":{"rendered":"\n<p>Companies and public authorities rely on databases to store and process large amounts of data. These databases typically manage business-critical and highly sensitive information, such as financial data (tax records, bank accounts, and credit cards), personal data (home addresses and personnel files), or product data. Since the databases are usually integrated with applications and web services, they remain vulnerable to cyberthreats both internally and externally.<\/p>\n\n\n\n<p>Many CIOs and IT leaders believe that their IT infrastructure is adequately protected against cyberattacks. Multi-level firewalls, antivirus software, and intrusion detection and prevention systems (IPS)(1) provide a false sense of security. What many fail to recognize is that the biggest security risk often comes from within\u2014the employees and officials using these systems.<\/p>\n\n\n\n<p>Employees and officials frequently fall prey to phishing emails or deceptive external callers, unwittingly clicking on malicious links or sharing confidential information with outsiders. This is often due to the fact that phishing emails and callers are no longer recognized as a threat. With the advancement of AI-driven deception, it is increasingly difficult to<br>identify threats. Stress and time pressure can lead to lapses in judgement, making employees more likely to make costly mistakes.<\/p>\n\n\n\n<p>As a result, cyberattacks continue to succeed. In a recent study by the European Cybersecurity Agency (ENISA)(2) security experts found that companies and authorities in the European Union, in particular, have become the target of cyberattacks in the last 12 months.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg\" alt=\"\" class=\"wp-image-598\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Number of incidents \u2013 EU and global (July 2023 \u2013 June 2024)<\/p>\n\n\n\n<p>An analysis of individual sectors reveals that the public sector is particularly hard hit, accounting for 19% of attacks, followed by the transport sector (11%) and banking and finance (9%). This is not surprising\u2014many still remember the high-profile cyberattacks targeting the German Bundestag, municipalities, university hospitals, Dutch law enforcement, and Spanish citizens and authorities.<sup>(3-8)<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg\" alt=\"\" class=\"wp-image-599\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Affected sectors \u2013 The public sector is the most affected! (July 2023 &#8211; June 2024)<\/p>\n\n\n\n<p>Breaking down cyber threats by category, the direct threat to stored data\u2014primarily databases\u2014is 45% with 19% of incidents involving data breaches and 26% of incidents involving ransomware attacks <sup>(2)<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg\" alt=\"\" class=\"wp-image-600\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Analysis of threats by type<\/p>\n\n\n\n<p>Under Article 32 of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Security of Processing) the following is required: \u201c\u2026the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk.\u201d<\/p>\n\n\n\n<p>Specifically it highlights, \u201cthe pseudonymization and encryption of personal data\u201cas an effective measure.&nbsp;<\/p>\n\n\n\n<p>Additionally, the <strong>German Federal Office for Information Security<\/strong> (BSI) also recommends encryption as a key strategy to minimize the risk of IT operations in its <strong>BSI Standards<sup>(10)<\/sup> 200-1 to 200-4.<\/strong><\/p>\n\n\n\n<p>&nbsp;Under <strong>Article 33<\/strong> of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Notification of a personal data breach to the supervisory authority), companies are required to notify a personal data breach to the supervisory authority within 72 hours of becoming aware of the breach. The data controller must notify the relevant supervisory authority in accordance with Article 55 unless the break is unlikely to risk individuals\u2019 rights. If the notification is delayed beyond 72 hours, an explanation for the delay must be provided.<\/p>\n\n\n\n<p>&nbsp;Despite the clear guidelines, uncertainty remains in the IT world regarding the correct application of GDPR reporting requirements.<\/p>\n\n\n\n<p>&nbsp;To clarify this, the <strong>European Data Protection Board<\/strong> (EDPB) has developed guidelines<sup>(11)<\/sup>, including case studies.<\/p>\n\n\n\n<p>&nbsp;In \u201c<strong>CASE No. 01: Ransomware with proper backup and without exfiltration<\/strong>,\u201d the following scenario is described:<\/p>\n\n\n\n<p>&nbsp;\u201cComputer systems of a small manufacturing company were exposed to a ransomware attack, and data stored in those systems were encrypted. The data controller used encryption at rest, so all data accessed by the ransomware was stored in encrypted form using a state-of-the-art encryption algorithm. The decryption key was not compromised in the attack, i.e. the attacker could neither access it nor use it indirectly. In consequence, the attacker only had access to encrypted personal data.\u201d<\/p>\n\n\n\n<p>&nbsp;The necessary measures are set out in the table published in the guidelines:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"342\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg\" alt=\"\" class=\"wp-image-601\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-300x100.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-768x256.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1536x513.jpg 1536w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400.jpg 1990w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The necessary measures are justified as follows:<\/p>\n\n\n\n<p>\u201cIn this example, the attacker had access to personal data and the confidentiality of cipher text containing personal data in encrypted form was compromised. However, any data that might have been exfiltrated cannot be read or used by the perpetrator, at least for the time being. The encryption technique used by the data controller conforms to the state-of-the-art. The decryption key was not compromised and presumably could also not be determined by other means. In consequence, the confidentiality risks to the rights and freedoms of natural persons are reduced to a minimum barring cryptanalytic progress that renders the encrypted data intelligible in the future.\u201d<\/p>\n\n\n\n<p><strong>&nbsp;Because of this, the company was not required to report the incident to authorities or affected individuals.<\/strong><\/p>\n\n\n\n<p>When comparing the cost of implementing IT security measures with the potential loss of reputation, sales, and customer trust, the benefits of proactive invetment quickly becomes clear.<\/p>\n\n\n\n<p>&nbsp;In today&#8217;s hyperconnected world, where news spreads instantly through online platforms and social media, organizations must not underestimate the long-term damage caused by a cyberattack.<\/p>\n\n\n\n<p>&nbsp;To mitigate risks, Software AG strongly recommends that its customers implement <strong>encryption<\/strong><sup>(12) <\/sup>and <strong>auditing<\/strong><sup>(12)<\/sup> for our Adabas databases to keep IT risks at a minimum. Both measures complement each other and form the optimal technology mix to protect against attacks and unwanted internal and external data leaks.<\/p>\n\n\n\n<p><sub>(1) <a href=\"https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems<\/a><\/sub><br><sub>(2) <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024<\/a><\/sub><br><sub>(3) <a href=\"https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580<\/a><\/sub><br><sub>(4) <a href=\"https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980<\/a><\/sub><br><sub>(5) <a href=\"https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html<\/a><\/sub><br><sub>(6) <a href=\"https:\/\/www.bbc.com\/news\/technology-54204356\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bbc.com\/news\/technology-54204356<\/a><\/sub><br><sub>(7) <a href=\"https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/<\/a><\/sub><br><sub>(8) <a href=\"https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview<\/a><\/sub><br><sub>(9) <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679<\/a><\/sub><br><sub>(10) <a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html<\/a><\/sub><br><sub>(11) <a href=\"https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en<\/a><\/sub><br><sub>(12) <a href=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf\">https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf<\/a><\/sub><\/p>\n\n\n\n<p><a href=\"https:\/\/www.softwareag.com\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more here<\/a><\/p>\n\n\n\n<div class=\"wp-block-jetpack-related-posts\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies and public authorities rely on databases to store and process large amounts of data. These databases typically manage business-critical and highly sensitive information, such as [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[44],"tags":[],"product":[66],"class_list":["post-532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","product-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Database Security: Protecting Sensitive Information | Software AG<\/title>\n<meta name=\"description\" content=\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/en\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta property=\"og:description\" content=\"Learn the essentials of database security and how to protect sensitive information from internal and external threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/en\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-02T02:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T18:14:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SoftwareAG Staff Writer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta name=\"twitter:description\" content=\"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.\" \/>\n<meta name=\"twitter:creator\" content=\"@softwareag\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SoftwareAG Staff Writer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"author\":{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#person-softwareag-staff-writer\",\"name\":\"SoftwareAG Staff Writer\"},\"headline\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"wordCount\":983,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"url\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"name\":\"Database Security: Protecting Sensitive Information | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"description\":\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7\",\"name\":\"Josh Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"caption\":\"Josh Smith\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Database Security: Protecting Sensitive Information | Software AG","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/en\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Database Security: Protecting Sensitive Information","og_description":"Learn the essentials of database security and how to protect sensitive information from internal and external threats.","og_url":"https:\/\/www.softwareag.com\/en\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_published_time":"2025-06-02T02:25:00+00:00","article_modified_time":"2026-03-17T18:14:49+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","type":"image\/jpeg"}],"author":"SoftwareAG Staff Writer","twitter_card":"summary_large_image","twitter_title":"Database Security: Protecting Sensitive Information","twitter_description":"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.","twitter_creator":"@softwareag","twitter_site":"@softwareag","twitter_misc":{"Written by":"SoftwareAG Staff Writer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"author":{"@type":"Person","@id":"https:\/\/www.softwareag.com\/en\/#person-softwareag-staff-writer","name":"SoftwareAG Staff Writer"},"headline":"Encryption relieves companies and authorities of the obligation to report cyberattacks","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"wordCount":983,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","url":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","name":"Database Security: Protecting Sensitive Information | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Encryption relieves companies and authorities of the obligation to report cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Software AG&#039;s digital transformation solutions &amp; services","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}},{"@type":"Person","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7","name":"Josh Smith","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","caption":"Josh Smith"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/posts\/532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":11,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"predecessor-version":[{"id":6409,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/posts\/532\/revisions\/6409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/media\/537"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/tags?post=532"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/en\/wp-json\/wp\/v2\/product?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}