{"id":532,"date":"2025-06-01T22:25:00","date_gmt":"2025-06-02T02:25:00","guid":{"rendered":"https:\/\/www.softwareag.com\/?p=532"},"modified":"2026-03-17T14:14:49","modified_gmt":"2026-03-17T18:14:49","slug":"encryption-companies-and-authorities-report-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.softwareag.com\/es\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","title":{"rendered":"El cifrado exime a empresas y autoridades de la obligaci\u00f3n de informar sobre ciberataques"},"content":{"rendered":"<p>Las empresas y las autoridades p\u00fablicas conf\u00edan en las bases de datos para almacenar y procesar grandes cantidades de datos. Estas bases de datos suelen gestionar informaci\u00f3n cr\u00edtica para el negocio y altamente sensible, como datos financieros (registros fiscales, cuentas bancarias y tarjetas de cr\u00e9dito), datos personales (direcciones de domicilios y archivos de personal) o datos de productos. Dado que las bases de datos suelen estar integradas con aplicaciones y servicios web, siguen siendo vulnerables a las ciberamenazas tanto internas como externas.<\/p>\n\n\n\n<p>Muchos CIO y responsables de TI creen que su infraestructura inform\u00e1tica est\u00e1 adecuadamente protegida contra los ciberataques. Los cortafuegos multinivel, el software antivirus y los sistemas de detecci\u00f3n y prevenci\u00f3n de intrusiones (IPS)(1) proporcionan una falsa sensaci\u00f3n de seguridad. Lo que muchos no reconocen es que el mayor riesgo para la seguridad suele venir de dentro: los empleados y funcionarios que utilizan estos sistemas.<\/p>\n\n\n\n<p>Empleados y funcionarios caen con frecuencia v\u00edctimas de correos electr\u00f3nicos de phishing o de llamadas externas enga\u00f1osas, haciendo clic sin darse cuenta en enlaces maliciosos o compartiendo informaci\u00f3n confidencial con extra\u00f1os. Esto se debe a menudo al hecho de que los correos electr\u00f3nicos y las llamadas de phishing ya no se reconocen como una amenaza. Con el avance del enga\u00f1o impulsado por la IA, cada vez es m\u00e1s dif\u00edcil<br>identificar las amenazas. El estr\u00e9s y la premura de tiempo pueden provocar lapsus de juicio, haciendo que los empleados sean m\u00e1s propensos a cometer errores costosos.<\/p>\n\n\n\n<p>Como resultado, los ciberataques siguen teniendo \u00e9xito. En un estudio reciente de la Agencia Europea de Ciberseguridad (ENISA)(2), los expertos en seguridad constataron que las empresas y las autoridades de la Uni\u00f3n Europea, en particular, se han convertido en blanco de ciberataques en los \u00faltimos 12 meses.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg\" alt=\"\" class=\"wp-image-598\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-1-1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>N\u00famero de incidentes - UE y mundial (julio 2023 - junio 2024)<\/p>\n\n\n\n<p>An analysis of individual sectors reveals that the public sector is particularly hard hit, accounting for 19% of attacks, followed by the transport sector (11%) and banking and finance (9%). This is not surprising\u2014many still remember the high-profile cyberattacks targeting the German Bundestag, municipalities, university hospitals, Dutch law enforcement, and Spanish citizens and authorities.<sup>(3-8)<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg\" alt=\"\" class=\"wp-image-599\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Sectores afectados - \u00a1El sector p\u00fablico es el m\u00e1s afectado! (julio de 2023 - junio de 2024)<\/p>\n\n\n\n<p>Desglosando las ciberamenazas por categor\u00edas, la amenaza directa a los datos almacenados -principalmente bases de datos- es de 45%, con 19% de incidentes relacionados con filtraciones de datos y 26% de incidentes relacionados con ataques de ransomware. <sup>(2)<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg\" alt=\"\" class=\"wp-image-600\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-1024x538.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-300x158.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3-768x403.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Artboard-3.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>An\u00e1lisis de las amenazas por tipo<\/p>\n\n\n\n<p class=\"translation-block\">Under Article 32 of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Security of Processing) the following is required: \u201c\u2026the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk.\u201d<\/p>\n\n\n\n<p>En concreto, destaca como medida eficaz \"la seudonimizaci\u00f3n y el cifrado de los datos personales\".&nbsp;<\/p>\n\n\n\n<p class=\"translation-block\">Additionally, the <strong>German Federal Office for Information Security<\/strong> (BSI) also recommends encryption as a key strategy to minimize the risk of IT operations in its <strong>BSI Standards<sup>(10)<\/sup> 200-1 to 200-4.<\/strong><\/p>\n\n\n\n<p class=\"translation-block\">Under <strong>Article 33<\/strong> of the <strong>GDPR<\/strong><sup>(9)<\/sup> (Notification of a personal data breach to the supervisory authority), companies are required to notify a personal data breach to the supervisory authority within 72 hours of becoming aware of the breach. The data controller must notify the relevant supervisory authority in accordance with Article 55 unless the break is unlikely to risk individuals\u2019 rights. If the notification is delayed beyond 72 hours, an explanation for the delay must be provided.<\/p>\n\n\n\n<p>&nbsp;A pesar de la claridad de las directrices, sigue existiendo incertidumbre en el mundo de las TI sobre la correcta aplicaci\u00f3n de los requisitos de informaci\u00f3n del RGPD.<\/p>\n\n\n\n<p class=\"translation-block\">To clarify this, the <strong>European Data Protection Board<\/strong> (EDPB) has developed guidelines<sup>(11)<\/sup>, including case studies.<\/p>\n\n\n\n<p class=\"translation-block\">In \u201c<strong>CASE No. 01: Ransomware with proper backup and without exfiltration<\/strong>,\u201d the following scenario is described:<\/p>\n\n\n\n<p>&nbsp;\"Los sistemas inform\u00e1ticos de una peque\u00f1a empresa manufacturera quedaron expuestos a un ataque de ransomware, y los datos almacenados en esos sistemas fueron cifrados. El controlador de datos utilizaba el cifrado en reposo, por lo que todos los datos a los que acced\u00eda el ransomware se almacenaban cifrados mediante un algoritmo de cifrado de \u00faltima generaci\u00f3n. La clave de descifrado no se vio comprometida en el ataque, es decir, el atacante no pudo acceder a ella ni utilizarla indirectamente. En consecuencia, el atacante s\u00f3lo tuvo acceso a los datos personales cifrados\".<\/p>\n\n\n\n<p>&nbsp;Las medidas necesarias figuran en el cuadro publicado en las directrices:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"342\" src=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg\" alt=\"\" class=\"wp-image-601\" srcset=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1024x342.jpg 1024w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-300x100.jpg 300w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-768x256.jpg 768w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400-1536x513.jpg 1536w, https:\/\/www.softwareag.com\/app\/uploads\/2025\/06\/Table_EN_1200x400.jpg 1990w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Las medidas necesarias se justifican del siguiente modo:<\/p>\n\n\n\n<p>\"En este ejemplo, el atacante tuvo acceso a datos personales y la confidencialidad del texto cifrado que conten\u00eda datos personales cifrados se vio comprometida. Sin embargo, los datos que pudieran haber sido filtrados no pueden ser le\u00eddos ni utilizados por el agresor, al menos por el momento. La t\u00e9cnica de cifrado utilizada por el responsable del tratamiento se ajusta al estado de la t\u00e9cnica. La clave de descifrado no se vio comprometida y presumiblemente tampoco pudo determinarse por otros medios. En consecuencia, los riesgos de confidencialidad para los derechos y libertades de las personas f\u00edsicas se reducen al m\u00ednimo, salvo que se produzcan avances criptoanal\u00edticos que hagan inteligibles los datos cifrados en el futuro.\"<\/p>\n\n\n\n<p><strong>&nbsp;Por ello, la empresa no estaba obligada a informar del incidente a las autoridades ni a las personas afectadas.<\/strong><\/p>\n\n\n\n<p>Si se compara el coste de implantar medidas de seguridad inform\u00e1tica con la posible p\u00e9rdida de reputaci\u00f3n, ventas y confianza de los clientes, r\u00e1pidamente quedan claras las ventajas de una inversi\u00f3n proactiva.<\/p>\n\n\n\n<p>&nbsp;En el mundo hiperconectado de hoy, donde las noticias se propagan instant\u00e1neamente a trav\u00e9s de plataformas en l\u00ednea y medios sociales, las organizaciones no deben subestimar el da\u00f1o a largo plazo causado por un ciberataque.<\/p>\n\n\n\n<p class=\"translation-block\">To mitigate risks, Software AG strongly recommends that its customers implement <strong>encryption<\/strong><sup>(12) <\/sup>and <strong>auditing<\/strong><sup>(12)<\/sup> for our Adabas databases to keep IT risks at a minimum. Both measures complement each other and form the optimal technology mix to protect against attacks and unwanted internal and external data leaks.<\/p>\n\n\n\n<p><sub>(1) <a href=\"https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.gartner.com\/reviews\/market\/intrusion-prevention-systems<\/a><\/sub><br><sub>(2) <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2024<\/a><\/sub><br><sub>(3) <a href=\"https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/hacker-attack-bundestag-2345580<\/a><\/sub><br><sub>(4) <a href=\"https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dw.com\/en\/germany-cybercrime-by-foreign-actors-rose-by-28-in-2023\/a-69065980<\/a><\/sub><br><sub>(5) <a href=\"https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.heise.de\/en\/news\/After-cyber-attack-Suedwestfalen-IT-wants-to-reform-itself-profoundly-10188167.html<\/a><\/sub><br><sub>(6) <a href=\"https:\/\/www.bbc.com\/news\/technology-54204356\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bbc.com\/news\/technology-54204356<\/a><\/sub><br><sub>(7) <a href=\"https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.dutchnews.nl\/2024\/09\/police-leak-leaves-data-of-62000-officers-in-hands-of-hackers\/<\/a><\/sub><br><sub>(8) <a href=\"https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.statista.com\/topics\/7011\/cyber-crime-in-spain\/#topicOverview<\/a><\/sub><br><sub>(9) <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679<\/a><\/sub><br><sub>(10) <a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html<\/a><\/sub><br><sub>(11) <a href=\"https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-012021-examples-regarding-personal-data-breach_en<\/a><\/sub><br><sub>(12) <a href=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf\" data-no-translation>https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/ebook-adabas-maximize-security-en.pdf.sagdownload.inline.1669044425901.pdf<\/a><\/sub><\/p>\n\n\n\n<p><a href=\"https:\/\/www.softwareag.com\/es\/resources\/adabas-natural\/maximize-security-of-adabas-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s informaci\u00f3n<\/a><\/p>\n\n\n\n<div class=\"wp-block-jetpack-related-posts\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Companies and public authorities rely on databases to store and process large amounts of data. These databases typically manage business-critical and highly sensitive information, such as [&hellip;]<\/p>","protected":false},"author":9,"featured_media":537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[44],"tags":[],"product":[66],"class_list":["post-532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","product-adabas-natural"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Database Security: Protecting Sensitive Information | Software AG<\/title>\n<meta name=\"description\" content=\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareag.com\/es\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta property=\"og:description\" content=\"Learn the essentials of database security and how to protect sensitive information from internal and external threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareag.com\/es\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Software AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoftwareAG\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-02T02:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T18:14:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SoftwareAG Staff Writer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Database Security: Protecting Sensitive Information\" \/>\n<meta name=\"twitter:description\" content=\"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.\" \/>\n<meta name=\"twitter:creator\" content=\"@softwareag\" \/>\n<meta name=\"twitter:site\" content=\"@softwareag\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SoftwareAG Staff Writer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"author\":{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/es\/#person-softwareag-staff-writer\",\"name\":\"SoftwareAG Staff Writer\"},\"headline\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"},\"wordCount\":983,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"url\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\",\"name\":\"Database Security: Protecting Sensitive Information | Software AG\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"datePublished\":\"2025-06-02T02:25:00+00:00\",\"dateModified\":\"2026-03-17T18:14:49+00:00\",\"description\":\"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareag.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption relieves companies and authorities of the obligation to report cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#website\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"name\":\"Software AG\",\"description\":\"Software AG&#039;s digital transformation solutions &amp; services\",\"publisher\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\"},\"alternateName\":\"SAG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareag.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#organization\",\"name\":\"Software AG\",\"alternateName\":\"SAG\",\"url\":\"https:\/\/www.softwareag.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"contentUrl\":\"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg\",\"width\":800,\"height\":450,\"caption\":\"Software AG\"},\"image\":{\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SoftwareAG\",\"https:\/\/x.com\/softwareag\",\"https:\/\/www.linkedin.com\/company\/software-ag\",\"https:\/\/www.youtube.com\/user\/SOFTWAREAG\"],\"description\":\"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7\",\"name\":\"Josh Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g\",\"caption\":\"Josh Smith\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Database Security: Protecting Sensitive Information | Software AG","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareag.com\/es\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_locale":"es_ES","og_type":"article","og_title":"Database Security: Protecting Sensitive Information","og_description":"Learn the essentials of database security and how to protect sensitive information from internal and external threats.","og_url":"https:\/\/www.softwareag.com\/es\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","og_site_name":"Software AG","article_publisher":"https:\/\/www.facebook.com\/SoftwareAG","article_published_time":"2025-06-02T02:25:00+00:00","article_modified_time":"2026-03-17T18:14:49+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","type":"image\/jpeg"}],"author":"SoftwareAG Staff Writer","twitter_card":"summary_large_image","twitter_title":"Database Security: Protecting Sensitive Information","twitter_description":"Explore database security and learn how internal threats can compromise sensitive information and business-critical data.","twitter_creator":"@softwareag","twitter_site":"@softwareag","twitter_misc":{"Written by":"SoftwareAG Staff Writer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"author":{"@type":"Person","@id":"https:\/\/www.softwareag.com\/es\/#person-softwareag-staff-writer","name":"SoftwareAG Staff Writer"},"headline":"Encryption relieves companies and authorities of the obligation to report cyberattacks","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"},"wordCount":983,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","articleSection":["Security"],"inLanguage":"es-ES","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","url":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/","name":"Database Security: Protecting Sensitive Information | Software AG","isPartOf":{"@id":"https:\/\/www.softwareag.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","datePublished":"2025-06-02T02:25:00+00:00","dateModified":"2026-03-17T18:14:49+00:00","description":"Explore the importance of database security in protecting sensitive information from internal and external cyberthreats.","breadcrumb":{"@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#primaryimage","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/08\/data-flow-image-c.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareag.com\/br\/blog\/security\/encryption-companies-and-authorities-report-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareag.com\/de\/"},{"@type":"ListItem","position":2,"name":"Encryption relieves companies and authorities of the obligation to report cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareag.com\/en\/#website","url":"https:\/\/www.softwareag.com\/en\/","name":"Software AG","description":"Soluciones y servicios de transformaci\u00f3n digital de Software AG","publisher":{"@id":"https:\/\/www.softwareag.com\/en\/#organization"},"alternateName":"SAG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareag.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.softwareag.com\/en\/#organization","name":"Software AG","alternateName":"SAG","url":"https:\/\/www.softwareag.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","contentUrl":"https:\/\/www.softwareag.com\/app\/uploads\/2025\/09\/software-gmbh-dark-logo-bg_Small.jpeg","width":800,"height":450,"caption":"Software AG"},"image":{"@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoftwareAG","https:\/\/x.com\/softwareag","https:\/\/www.linkedin.com\/company\/software-ag","https:\/\/www.youtube.com\/user\/SOFTWAREAG"],"description":"Software AG is a global enterprise software company dedicated to facilitating digital transformation for large-scale organizations. They specialize in modernizing legacy infrastructure, optimizing mainframe operations, and enabling seamless data integration across hybrid environments.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}},{"@type":"Person","@id":"https:\/\/www.softwareag.com\/en\/#\/schema\/person\/01b3bf721a70a667820cd608911526e7","name":"Josh Smith","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b63d603716ac4c23887f0bbd176fa6c379126c91f64d52d2cf27a6e4d7b2fd6?s=96&d=mm&r=g","caption":"Josh Smith"}}]}},"_links":{"self":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/posts\/532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":11,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"predecessor-version":[{"id":6409,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/posts\/532\/revisions\/6409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/media\/537"}],"wp:attachment":[{"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/tags?post=532"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.softwareag.com\/es\/wp-json\/wp\/v2\/product?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}