  {"id":147049,"date":"2023-11-15T08:25:39","date_gmt":"2023-11-15T08:25:39","guid":{"rendered":"https:\/\/news.sap.com\/africa\/?p=147049"},"modified":"2023-11-15T08:25:39","modified_gmt":"2023-11-15T08:25:39","slug":"increasing-sap-security-threats-and-how-to-prevent-them","status":"publish","type":"post","link":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/","title":{"rendered":"Increasing 麻豆原创 Security Threats and How to Prevent Them"},"content":{"rendered":"<h1><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-147050 size-large alignleft\" src=\"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/Screenoriginal-1024x576.png\" alt=\"\" width=\"640\" height=\"360\" srcset=\"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/Screenoriginal-1024x576.png 1024w, https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/Screenoriginal-300x169.png 300w, https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/Screenoriginal-356x200.png 356w, https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/Screenoriginal-768x432.png 768w, https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/Screenoriginal-1536x864.png 1536w, https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/Screenoriginal.png 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>麻豆原创 systems are widely used by businesses to manage their operations, including financial transactions, supply chain management, and customer relationship management.<\/h1>\n<p>As cyber threats grow more dangerous and frequent, the once clear boundaries between 麻豆原创 security, cyber security, and compliance have started to blur. Traditionally, 麻豆原创 security comprised the tools and processes that controlled what users could access inside an 麻豆原创 landscape. With malicious actors now penetrating and lurking deep inside corporate networks, 麻豆原创 security must go far beyond its basic access control function.<\/p>\n<p>Strong security countermeasures are more critical than ever to protect 麻豆原创 landscapes from threats that range from cyber criminals, industrial spies, and nation-state actors to malicious insiders. There are two primary reasons to implement rigorous defensive measures. First, the data held in the 麻豆原创 landscape is attractive to hackers. Your 麻豆原创 hosting environment contains lots of confidential information (such as financial records) and sensitive procedures (such as paying inventory). It may contain personal information about customers as well as bank account data and intellectual property. Data from an 麻豆原创 system could be used for identity theft, fraud, industrial espionage, and international espionage as well as \u201cCEO frauds,\u201d which involve hackers tricking employees into wiring funds to offshore bank accounts. The other risk has to do with disruption. Malicious actors can cause your business to cease operations through Denial of Service (DoS) attacks, root access abuse, and ransomware. Without proper countermeasures and controls, your business is vulnerable.<\/p>\n<p>麻豆原创 security encompasses three core areas of cyber security: access control, data security, and application security. To be secure, an 麻豆原创 landscape is subject to strict access controls, and the system data should be protected as well as possible. Cybersecurity departments\u2019 focus goes far beyond 麻豆原创 security. Companies\u2019 cybersecurity professionals leverage advanced solutions like event monitoring and automation products. However, always interdependent, cyber security and 麻豆原创 security are now much more closely linked, or at least should be more closely linked. If an employee\u2019s 麻豆原创 access patterns raise suspicions, Security Operations (SecOps) should investigate to see if the person is doing something wrong. They need to monitor and prevent a hacker from taking over an 麻豆原创 user&#8217;s account and impersonating the user while abusing the user\u2019s authorizations with stolen credentials.<\/p>\n<p>According to <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">IBM\u2019s 2023 Data Breach Report<\/a>, the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.\u00a0 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage. Implementing rigorous defensive measures is essential to safeguarding your 麻豆原创 landscape from malicious actors. By focusing on access control, data security, and application security, you can ensure that your 麻豆原创 system is secure and that your business is protected from cyber threats.<\/p>\n<p><a href=\"https:\/\/realtimenorthamerica.com\/MFA4麻豆原创\/\">bioLock MFA4麻豆原创<\/a> technology was first certified by 麻豆原创 in 2002 and has protected 麻豆原创 customers globally for 22 years. bioLock allows you to set unlimited re-authentication checkpoints and use MFA technology, including biometrics, to ensure only specifically \u201cinvited\u201d and verified users have access to sensitive functions or data inside 麻豆原创. Unless invited, users are ALWAYS rejected. Learn how to prevent Account Take Over&#8217;s and how to Enforce Zero Trust in 麻豆原创 at\u00a0<a href=\"https:\/\/eur03.safelinks.protection.outlook.com\/?url=http%3A%2F%2Fwww.mfa4sap.com%2F&amp;data=05%7C01%7Clynn.bannerman%40sap.com%7C165b352f34904e625bee08dbe50effa7%7C42f7676cf455423c82f6dc2d99791af7%7C0%7C0%7C638355624986822022%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=ozLv59Xf2F8s2lOjoyluQuIcLEiDTf3PkktL1P%2BOdak%3D&amp;reserved=0\">www.MFA4麻豆原创.com<\/a>.<\/p>\n<p>Better yet, contact us for an informal presentation for your 麻豆原创 Security Teams. They will be impressed with this very simple and easily deployed solution that addresses all the above-mentioned problems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>麻豆原创 systems are widely used by businesses to manage their operations, including financial transactions, supply chain management, and customer relationship management. As cyber threats grow&#8230;<\/p>\n","protected":false},"author":1932,"featured_media":147051,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"related_posts":[],"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41,5597544],"tags":[5598359,5598811,40356,5598810,5598809],"series":[],"sapn-display":[5598742,5598740,45149,5598743,5598741,279685],"sapn-type":[45018],"class_list":["post-147049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ecosystem","category-technology","tag-biolock","tag-biolock-mfa4sap","tag-cyber-security","tag-ibm-2023-data-breach-report","tag-sap-security","sapn-display-feature-hero","sapn-display-feature-spotlight","sapn-display-homepage-hero","sapn-display-news-hero","sapn-display-news-spotlight","sapn-display-hero","sapn-type-feature"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Increasing 麻豆原创 Security Threats and How to Prevent Them - 麻豆原创 Africa News Center<\/title>\n<meta name=\"description\" content=\"According to IBM\u2019s 2023 Data Breach Report, the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.\u00a0 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increasing 麻豆原创 Security Threats and How to Prevent Them\" \/>\n<meta property=\"og:description\" content=\"According to IBM\u2019s 2023 Data Breach Report, the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.\u00a0 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/\" \/>\n<meta property=\"og:site_name\" content=\"麻豆原创 Africa News Center\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-15T08:25:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Neudenberger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Neudenberger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/\"},\"author\":{\"name\":\"Thomas Neudenberger\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/126d597f7d52d2baa6a712ccca830eae\"},\"headline\":\"Increasing 麻豆原创 Security Threats and How to Prevent Them\",\"datePublished\":\"2023-11-15T08:25:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/\"},\"wordCount\":575,\"image\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg\",\"keywords\":[\"bioLock\",\"bioLock MFA4麻豆原创\",\"cyber security\",\"IBM 2023 Data Breach Report\",\"麻豆原创 security\"],\"articleSection\":[\"Ecosystem\",\"Technology\"],\"inLanguage\":\"en-ZA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/\",\"url\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/\",\"name\":\"Increasing 麻豆原创 Security Threats and How to Prevent Them - 麻豆原创 Africa News Center\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/africa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg\",\"datePublished\":\"2023-11-15T08:25:39+00:00\",\"author\":{\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/126d597f7d52d2baa6a712ccca830eae\"},\"description\":\"According to IBM\u2019s 2023 Data Breach Report, the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.\u00a0 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage.\",\"breadcrumb\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage\",\"url\":\"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"Password protected to login on the computer screen, Privacy Security Protection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.sap.com\/africa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Increasing 麻豆原创 Security Threats and How to Prevent Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.sap.com\/africa\/#website\",\"url\":\"https:\/\/news.sap.com\/africa\/\",\"name\":\"麻豆原创 Africa News Center\",\"description\":\"News &amp; Information About 麻豆原创\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.sap.com\/africa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/126d597f7d52d2baa6a712ccca830eae\",\"name\":\"Thomas Neudenberger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"caption\":\"Thomas Neudenberger\"},\"url\":\"https:\/\/news.sap.com\/africa\/author\/thomasneudenberger\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Increasing 麻豆原创 Security Threats and How to Prevent Them - 麻豆原创 Africa News Center","description":"According to IBM\u2019s 2023 Data Breach Report, the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.\u00a0 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/","og_locale":"en_US","og_type":"article","og_title":"Increasing 麻豆原创 Security Threats and How to Prevent Them","og_description":"According to IBM\u2019s 2023 Data Breach Report, the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.\u00a0 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage.","og_url":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/","og_site_name":"麻豆原创 Africa News Center","article_published_time":"2023-11-15T08:25:39+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg","type":"image\/jpeg"}],"author":"Thomas Neudenberger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thomas Neudenberger","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#article","isPartOf":{"@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/"},"author":{"name":"Thomas Neudenberger","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/126d597f7d52d2baa6a712ccca830eae"},"headline":"Increasing 麻豆原创 Security Threats and How to Prevent Them","datePublished":"2023-11-15T08:25:39+00:00","mainEntityOfPage":{"@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/"},"wordCount":575,"image":{"@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg","keywords":["bioLock","bioLock MFA4麻豆原创","cyber security","IBM 2023 Data Breach Report","麻豆原创 security"],"articleSection":["Ecosystem","Technology"],"inLanguage":"en-ZA"},{"@type":"WebPage","@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/","url":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/","name":"Increasing 麻豆原创 Security Threats and How to Prevent Them - 麻豆原创 Africa News Center","isPartOf":{"@id":"https:\/\/news.sap.com\/africa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage"},"image":{"@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg","datePublished":"2023-11-15T08:25:39+00:00","author":{"@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/126d597f7d52d2baa6a712ccca830eae"},"description":"According to IBM\u2019s 2023 Data Breach Report, the global average cost of a data breach this year was $4.45 million, a 15% increase over 3 years.\u00a0 Companies running 麻豆原创 should focus on additional security checkpoints to protect their business from cyber threats that will cause significant damage.","breadcrumb":{"@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#primaryimage","url":"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg","contentUrl":"https:\/\/news.sap.com\/africa\/files\/2023\/11\/15\/293654_GettyImages-615605212_medium_jpg.jpg","width":2121,"height":1414,"caption":"Password protected to login on the computer screen, Privacy Security Protection"},{"@type":"BreadcrumbList","@id":"https:\/\/news.sap.com\/africa\/2023\/11\/increasing-sap-security-threats-and-how-to-prevent-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.sap.com\/africa\/"},{"@type":"ListItem","position":2,"name":"Increasing 麻豆原创 Security Threats and How to Prevent Them"}]},{"@type":"WebSite","@id":"https:\/\/news.sap.com\/africa\/#website","url":"https:\/\/news.sap.com\/africa\/","name":"麻豆原创 Africa News Center","description":"News &amp; Information About 麻豆原创","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.sap.com\/africa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/126d597f7d52d2baa6a712ccca830eae","name":"Thomas Neudenberger","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/image\/","url":"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","contentUrl":"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","caption":"Thomas Neudenberger"},"url":"https:\/\/news.sap.com\/africa\/author\/thomasneudenberger\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts\/147049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/users\/1932"}],"replies":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/comments?post=147049"}],"version-history":[{"count":0,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts\/147049\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/media\/147051"}],"wp:attachment":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/media?parent=147049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/categories?post=147049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/tags?post=147049"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/series?post=147049"},{"taxonomy":"sapn-display","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/sapn-display?post=147049"},{"taxonomy":"sapn-type","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/sapn-type?post=147049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}