{"id":1574,"date":"2023-07-12T12:58:40","date_gmt":"2023-07-12T12:58:40","guid":{"rendered":"https:\/\/www.in3-group.com\/cyber-attacks-are-sap-systems-particularly-at-risk\/"},"modified":"2023-08-01T13:14:22","modified_gmt":"2023-08-01T13:14:22","slug":"cyber-attacks-are-sap-systems-particularly-at-risk","status":"publish","type":"post","link":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/","title":{"rendered":"Cyber Attacks &#8211; Are SAP Systems Particularly at Risk?"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-font-size:28px;--awb-line-height:33px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p><em>Cyber attacks are on the rise and won&#8217;t spare the IT systems of companies worldwide. But what about the security of SAP systems, the digital backbone of so many organizations? We get to the bottom of this important question.<\/em><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"text-align:center;--awb-margin-top:20px;--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1500\" height=\"1000\" alt=\"Two men are looking at a project plan.\" title=\"R\u00fcckansicht eines unkenntlichen Hackers mit Kapuze, der in einem dunklen Raum an mehreren Bildschirmen arbeitet.\" src=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/back-view-unrecognizable-cyber-security-hacker-wearing-hood-while-working-programming-dark-room-copy-space.jpg\" class=\"img-responsive wp-image-1478\" srcset=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/back-view-unrecognizable-cyber-security-hacker-wearing-hood-while-working-programming-dark-room-copy-space-200x133.jpg 200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/back-view-unrecognizable-cyber-security-hacker-wearing-hood-while-working-programming-dark-room-copy-space-400x267.jpg 400w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/back-view-unrecognizable-cyber-security-hacker-wearing-hood-while-working-programming-dark-room-copy-space-600x400.jpg 600w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/back-view-unrecognizable-cyber-security-hacker-wearing-hood-while-working-programming-dark-room-copy-space-800x533.jpg 800w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/back-view-unrecognizable-cyber-security-hacker-wearing-hood-while-working-programming-dark-room-copy-space-1200x800.jpg 1200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/back-view-unrecognizable-cyber-security-hacker-wearing-hood-while-working-programming-dark-room-copy-space.jpg 1500w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:24px;--awb-line-height:26px;--awb-margin-top:20px;--awb-margin-bottom:30px;\"><p style=\"font-size: 20px; letter-spacing: 0.3px; line-height: 34.4px;\" data-fusion-font=\"true\">Monday, July 8, 8:45 a.m.: Mr. Smith, the IT manager of a medium-sized company, is sitting in his darkened office. The only illumination comes from the numerous monitors lined up in front of him. His expression is serious and tense, his gaze wanders hurriedly from screen to screen. He is trying to understand the crisis scenario that is unfolding in front of him.<\/p>\n<p style=\"font-size: 20px; letter-spacing: 0.3px; line-height: 34.4px;\" data-fusion-font=\"true\">Countless alerts and error codes indicate that the ERP system, the heart of the food company, is out of control. The dashboard shows a jumble of unknown errors and disturbances; data flows are disrupted. Unknown IP addresses and unexpected network traffic patterns clearly indicate that someone has penetrated the system &#8211; a cyberattack is happening.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:34px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\"><strong>Cyber security at risk<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:20px;\"><p>The number of cyber attacks, such as the one described above, has been on the rise for years. According to the latest report from Bitkom, the German economy is experiencing an <a href=\"https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Wirtschaftsschutz-2022#_\">annual damage of around 203 billion euros due to data theft, espionage and sabotage.<\/a> Of particular concern is the fact that companies and public authorities are not well prepared for such attacks. According to the German Federal Office for Information Security (BSI), <a href=\"https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Publikationen\/Lagebericht\/lagebericht_node.html\">more than 20,000 security vulnerabilities in software products (13% of them critical) were disclosed in 2021 &#8211; an increase of 10% over the previous year.<\/a><\/p>\n<p>But what is it that cyber criminals try to achieve?<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Financial Benefits<\/h3><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Some hackers target sensitive information, such as credit card information, bank data or access data to online banking accounts, which they can then sell. They also often use so-called ransomware, which restricts or prevents access to data and systems by encrypting user data, for example. The perpetrators then demand a ransom in order to decrypt the data.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Industrial espionage<\/h3><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Hackers attack companies to steal confidential information or trade secrets to sell them to competitors or other stakeholders.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\">Sabotage<\/h3><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Disrupting operations, manipulating and destroying data, or causing physical damage: Hackers use targeted attacks to sabotage IT, spread misinformation, or damage systems. The motives are manifold. However, criminals often aim to cause as much damage as possible.<\/p>\n<p>Cybercrime is capable of causing existential damage and, in the case of attacks on administration and infrastructure, can even destabilize democratic states. The recent war in Ukraine impressively demonstrates how cyberattacks and disinformation are increasingly used in modern warfare.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1500\" height=\"1001\" title=\"Ansicht von oben auf einen Laptop, der mit einer Kette und einem Vorh\u00e4ngeschloss versehen ist.\" src=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg\" alt class=\"img-responsive wp-image-1479\" srcset=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain-200x133.jpg 200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain-400x267.jpg 400w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain-600x400.jpg 600w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain-800x534.jpg 800w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain-1200x801.jpg 1200w, https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg 1500w\" sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:34px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\"><strong>Are SAP systems particularly at risk?<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>More than 444,000 companies worldwide work with SAP solutions. These systems, such as the ERP system SAP S\/4HANA, are an attractive target for hackers. The reason: They often manage critical business processes and store sensitive information such as financial data, personnel information and customer information.<\/p>\n<p>The security of SAP systems is particularly important because they build the digital backbone of companies. If central areas such as production or the supply chain are affected by attacks, damage can skyrocket to millions of euros.<\/p>\n<p>In addition, there are specific aspects that make SAP systems particularly vulnerable to cyber attacks:<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\"><strong>Complexity and inconsistent coding<\/strong><\/h3><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Large SAP systems are highly complex and often strongly customized to the specific needs of a company. This complexity makes it difficult to identify and close all possible security gaps in time. In many cases, different developers are continuously working on different parts of the system.<\/p>\n<p>A common problem in this regard: inconsistent, non-standardized code. This can cause vulnerabilities and errors in the security architecture of an SAP system, through which cybercriminals can gain unauthorized access.<\/p>\n<p>If code is not properly validated or verified, it is much easier for hackers to inject malware into the system and severely damage it.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\"><strong>Outdated Security Measures<\/strong><\/h3><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>Many companies fail to keep their SAP systems up to date. There are many reasons for this: the expected costs are too high, or there is simply not enough trained personnel to take care of cyber security. This often leads to the fact that even well-known security gaps are left unfixed.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:32px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;DIN Condensed Bold &quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;\"><strong>Poor authorization management<\/strong><\/h3><\/div><div class=\"fusion-text fusion-text-10\" style=\"--awb-font-size:20px;--awb-text-font-family:&quot;DIN Alternate Bold&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p>If authorizations in SAP systems are not carefully managed, users may be able to access information or perform actions without approval. In addition, inactive user accounts provide potential attackers with more opportunities to penetrate the system.<\/p>\n<p>This is particularly critical if the Segregation of Duties (SoD) is not being applied properly. It determines that no person is allowed to have sole control over more than one critical function or task in a system or process. If segregation of duties is not enforced, individuals can perform fraudulent or harmful actions with almost no interruption.<\/p>\n<p>What could Mr. Smith have done in advance to protect his company's SAP systems? <strong>We will answer this question in the next article.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":1479,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-1574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Attacks - Are SAP Systems Particularly at Risk?<\/title>\n<meta name=\"description\" content=\"Cyber attacks are on the rise and won&#039;t spare the IT systems of companies worldwide. Are SAP systems particularly at risk?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Attacks - Are SAP Systems Particularly at Risk?\" \/>\n<meta property=\"og:description\" content=\"Cyber attacks are on the rise and won&#039;t spare the IT systems of companies worldwide. Are SAP systems particularly at risk?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"IN3 Group\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-12T12:58:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T13:14:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Inka Grimm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inka Grimm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/\"},\"author\":{\"name\":\"Inka Grimm\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#\\\/schema\\\/person\\\/b7c25c8e80d156dfbe7188a5dc966258\"},\"headline\":\"Cyber Attacks &#8211; Are SAP Systems Particularly at Risk?\",\"datePublished\":\"2023-07-12T12:58:40+00:00\",\"dateModified\":\"2023-08-01T13:14:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/\"},\"wordCount\":2702,\"publisher\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/top-view-laptop-with-lock-chain.jpg\",\"articleSection\":[\"Consulting\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/\",\"name\":\"Cyber Attacks - Are SAP Systems Particularly at Risk?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/top-view-laptop-with-lock-chain.jpg\",\"datePublished\":\"2023-07-12T12:58:40+00:00\",\"dateModified\":\"2023-08-01T13:14:22+00:00\",\"description\":\"Cyber attacks are on the rise and won't spare the IT systems of companies worldwide. Are SAP systems particularly at risk?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/top-view-laptop-with-lock-chain.jpg\",\"contentUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/top-view-laptop-with-lock-chain.jpg\",\"width\":1500,\"height\":1001},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Attacks &#8211; Are SAP Systems Particularly at Risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/\",\"name\":\"IN3 Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#organization\",\"name\":\"IN3 Group\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/in3group\\\/\"],\"address\":{\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"49.3064\",\"longitude\":\"8.6425\"},\"telephone\":[\"062276989924\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}],\"email\":\"info@in3-group.com\",\"faxNumber\":\"IN3 GmbH & Co. KG\",\"priceRange\":\"$$$$\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/#\\\/schema\\\/person\\\/b7c25c8e80d156dfbe7188a5dc966258\",\"name\":\"Inka Grimm\",\"sameAs\":[\"http:\\\/\\\/www.in3-group.com\"],\"url\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/author\\\/inkagrimm\\\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#local-main-place-address\",\"streetAddress\":\"Altrottstrasse 31, 173\",\"addressLocality\":\"Walldorf\",\"postalCode\":\"69190\",\"addressRegion\":\"Baden-W\u00fcrttemberg\",\"addressCountry\":\"DE\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.in3-group.com\\\/en\\\/cyber-attacks-are-sap-systems-particularly-at-risk\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png\",\"contentUrl\":\"https:\\\/\\\/www.in3-group.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png\",\"width\":1563,\"height\":1563,\"caption\":\"IN3 Group\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Walldorf\" \/>\n<meta name=\"geo.position\" content=\"49.3064;8.6425\" \/>\n<meta name=\"geo.region\" content=\"Germany\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Attacks - Are SAP Systems Particularly at Risk?","description":"Cyber attacks are on the rise and won't spare the IT systems of companies worldwide. Are SAP systems particularly at risk?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Attacks - Are SAP Systems Particularly at Risk?","og_description":"Cyber attacks are on the rise and won't spare the IT systems of companies worldwide. Are SAP systems particularly at risk?","og_url":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/","og_site_name":"IN3 Group","article_published_time":"2023-07-12T12:58:40+00:00","article_modified_time":"2023-08-01T13:14:22+00:00","og_image":[{"width":1500,"height":1001,"url":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg","type":"image\/jpeg"}],"author":"Inka Grimm","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inka Grimm","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/"},"author":{"name":"Inka Grimm","@id":"https:\/\/www.in3-group.com\/en\/#\/schema\/person\/b7c25c8e80d156dfbe7188a5dc966258"},"headline":"Cyber Attacks &#8211; Are SAP Systems Particularly at Risk?","datePublished":"2023-07-12T12:58:40+00:00","dateModified":"2023-08-01T13:14:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/"},"wordCount":2702,"publisher":{"@id":"https:\/\/www.in3-group.com\/en\/#organization"},"image":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg","articleSection":["Consulting"],"inLanguage":"en-US","copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.in3-group.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/","url":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/","name":"Cyber Attacks - Are SAP Systems Particularly at Risk?","isPartOf":{"@id":"https:\/\/www.in3-group.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg","datePublished":"2023-07-12T12:58:40+00:00","dateModified":"2023-08-01T13:14:22+00:00","description":"Cyber attacks are on the rise and won't spare the IT systems of companies worldwide. Are SAP systems particularly at risk?","breadcrumb":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#primaryimage","url":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg","contentUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2023\/07\/top-view-laptop-with-lock-chain.jpg","width":1500,"height":1001},{"@type":"BreadcrumbList","@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.in3-group.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Attacks &#8211; Are SAP Systems Particularly at Risk?"}]},{"@type":"WebSite","@id":"https:\/\/www.in3-group.com\/en\/#website","url":"https:\/\/www.in3-group.com\/en\/","name":"IN3 Group","description":"","publisher":{"@id":"https:\/\/www.in3-group.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.in3-group.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.in3-group.com\/en\/#organization","name":"IN3 Group","url":"https:\/\/www.in3-group.com\/en\/","logo":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#local-main-organization-logo"},"sameAs":["https:\/\/www.linkedin.com\/company\/in3group\/"],"address":{"@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"49.3064","longitude":"8.6425"},"telephone":["062276989924"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"17:00"}],"email":"info@in3-group.com","faxNumber":"IN3 GmbH & Co. KG","priceRange":"$$$$"},{"@type":"Person","@id":"https:\/\/www.in3-group.com\/en\/#\/schema\/person\/b7c25c8e80d156dfbe7188a5dc966258","name":"Inka Grimm","sameAs":["http:\/\/www.in3-group.com"],"url":"https:\/\/www.in3-group.com\/en\/author\/inkagrimm\/"},{"@type":"PostalAddress","@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#local-main-place-address","streetAddress":"Altrottstrasse 31, 173","addressLocality":"Walldorf","postalCode":"69190","addressRegion":"Baden-W\u00fcrttemberg","addressCountry":"DE"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.in3-group.com\/en\/cyber-attacks-are-sap-systems-particularly-at-risk\/#local-main-organization-logo","url":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2026\/01\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png","contentUrl":"https:\/\/www.in3-group.com\/wp-content\/uploads\/2026\/01\/IN3-Logo-weiss-auf-schwarz-mir-Trademark.png","width":1563,"height":1563,"caption":"IN3 Group"}]},"geo.placename":"Walldorf","geo.position":{"lat":"49.3064","long":"8.6425"},"geo.region":"Germany"},"_links":{"self":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts\/1574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/comments?post=1574"}],"version-history":[{"count":8,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts\/1574\/revisions"}],"predecessor-version":[{"id":1789,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/posts\/1574\/revisions\/1789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/media\/1479"}],"wp:attachment":[{"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/media?parent=1574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/categories?post=1574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.in3-group.com\/en\/wp-json\/wp\/v2\/tags?post=1574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}