  {"id":148326,"date":"2025-08-04T07:40:28","date_gmt":"2025-08-04T07:40:28","guid":{"rendered":"https:\/\/news.sap.com\/africa\/?p=148326"},"modified":"2025-08-04T07:40:30","modified_gmt":"2025-08-04T07:40:30","slug":"an-enterprise-security-perspective-on-skipping-software-updates","status":"publish","type":"post","link":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/","title":{"rendered":"An Enterprise Security Perspective on Skipping Software Updates"},"content":{"rendered":"<h1>Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves.<span id=\"more-301356\"><\/span><\/h1>\n<p>Modern security teams are consumed with identity and access management, device management, ransomware threats, phishing attacks, awareness training, privacy and compliance.<\/p>\n<p>Due to a pervasive cybersecurity skills shortage, these teams are often stretched thin. In fact, \u2018cybersecurity skills\u2019 were the most in-demand among African organisations in 麻豆原创\u2019s latest\u00a0<em><u><a href=\"https:\/\/online.flippingbook.com\/view\/478161039\/\">Africa\u2019s AI Skills Readiness Revealed<\/a><\/u><\/em>\u00a0report, with 86% of companies citing demand.<\/p>\n<p>Organisations know they should keep systems up to date. But all too often, updates are postponed in favour of more immediate priorities, leading to potentially costly delays.<\/p>\n<p>Very costly. A Harvard Business School publication notes that the devastating cyberattacks on the UK\u2019s National Health Service and credit bureau Equifax\u00a0<u><a href=\"https:\/\/www.library.hbs.edu\/working-knowledge\/why-companies-shouldnt-delay-software-updates-even-after-crowdstrikes-flaw\">could have been avoided if organisations had updated their software sooner<\/a><\/u>.<\/p>\n<h2><strong>\u2018Outdated\u2019 explained<\/strong><\/h2>\n<p>Outdated software \u2013 referring to applications, platforms or operating systems that have not received critical updates or patches despite newer versions being available \u2013 is one of the most persistent and preventable security risks for modern enterprises.<\/p>\n<p>Outdated software also includes software that has reached end-of-life, meaning it is no longer supported by the vendor through security patches and bug fixes. For example, a surprisingly large number of well-known companies\u00a0<u><a href=\"https:\/\/discovery.hgdata.com\/product\/microsoft-windows-xp\">still use outdated operating systems<\/a><\/u>, despite those operating systems no longer being supported by the vendors.<\/p>\n<p>Businesses often run these older versions of software out of habit, or due to perceived cost savings. Others fear the disruption of change and hope to avoid costly downtime and change management. But these savings are superficial \u2013 the cost of a breach will always outweigh the cost of keeping software updated, especially as\u00a0<u><a href=\"https:\/\/www.itweb.co.za\/article\/data-breach-recovery-costs-in-sa-reach-new-high\/6GxRKqYQag9qb3Wj\">the average cost of a data breach continues to increase<\/a><\/u>.<\/p>\n<h2><strong>Reducing risk<\/strong><\/h2>\n<p>Failing to maintain software updates exposes companies to a range of risks, including:<\/p>\n<ul>\n<li><strong>Known vulnerabilities go unpatched\u00a0<\/strong>\u2013 Every software product has vulnerabilities, but what matters is how quickly they\u2019re fixed. Software vendors actively monitor and patch these flaws. However, once support ends, so does the protection. Cybercriminals actively target known exploits in unpatched software. Since some of these vulnerabilities are widely documented, they risk being exploited if left unresolved.<\/li>\n<li><strong>Incompatibility with modern defences\u00a0<\/strong>\u2013 Cybersecurity doesn\u2019t stand still. Encryption methods evolve. Firewalls improve. Detection tools become smarter. Outdated software struggles to integrate with these advancements, weakening your security posture across the board. Companies could be investing in the latest cyber defences, but if their legacy apps can\u2019t support them, they remain exposed to significant risk.<\/li>\n<li><strong>Standing defenceless against new threats\u00a0<\/strong>\u2013 The threat landscape changes daily. Attackers are constantly developing new techniques, from zero-day exploits to advanced phishing campaigns. Unsupported software doesn\u2019t get the updates needed to recognise or defend against these evolving threats.<\/li>\n<li><strong>The inevitability of data breaches\u00a0<\/strong>\u2013 Once attackers exploit a vulnerability, this can lead to a total compromise of the entire landscape. Personal data, financial records, and customer information all become potential targets. And in the modern threat landscape, it\u2019s not a matter of\u00a0<em>if<\/em>\u00a0a company will suffer a data breach, but\u00a0<em>when<\/em>. When a breach occurs, the consequences can be severe: reputational damage, regulatory fines, legal action, operational downtime and financial losses compound the misery. And these aren\u2019t theoretical risks \u2013 they\u2019re playing out in boardrooms across the continent.<\/li>\n<\/ul>\n<h2><strong>Staying secure<\/strong><\/h2>\n<p>Keeping the enterprise secure requires a proactive approach that includes a strong focus on maintaining up-to-date software as well as a layered security strategy. Organisations should take note of the following best practices to secure against unnecessary cyber risk:<\/p>\n<ul>\n<li><strong>Modernise where it matters<\/strong>\u00a0\u2013 Organisations using end-of-life or unpatched software should transition to supported systems. While upgrades may cause some disruption, the risk of a breach is far greater and harder to control.<\/li>\n<li><strong>Stay current on patches<\/strong>\u00a0\u2013 Even supported software can be vulnerable if it\u2019s not updated. Organisations must ensure their IT teams have a clear process for applying patches and updates in a timely and controlled manner.<\/li>\n<li><strong>Conduct regular security audits<\/strong>\u00a0\u2013 It\u2019s unwise to wait for an incident before identifying a security gap. Regular vulnerability assessments can identify outdated systems, missed patches, and other blind spots in the enterprise environment, giving organisations the opportunity to fix them before they\u2019re found by someone else.<\/li>\n<\/ul>\n<p>Technology isn\u2019t static, and neither are cyber threats. The tools and systems companies rely on must evolve alongside them or they become the weak link in an otherwise strong chain. Outdated software might not grab headlines like a major data breach, but all too often, it\u2019s what causes one.<\/p>\n<p>If cybersecurity is a board-level concern (and it should be), then software maintenance must be a strategic priority. In a world of rising threats, staying up to date isn\u2019t just good practice for African enterprises, it\u2019s a critical defence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves. Modern security teams are consumed&#8230;<\/p>\n","protected":false},"author":5129,"featured_media":148327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"related_posts":[],"footnotes":"","_links_to":"","_links_to_target":""},"categories":[5596456,5597544],"tags":[5599299,5595620,5598706,5599376,5599375,5598691],"series":[],"sapn-display":[5598742,5598740,45149,5598743,5598741,279685],"sapn-type":[45018],"class_list":["post-148326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-services-and-support","category-technology","tag-africas-ai-skills-readiness-revealed","tag-cybersecurity","tag-data-security","tag-outdated-software","tag-software-updates","tag-valencia-karageorgiades","sapn-display-feature-hero","sapn-display-feature-spotlight","sapn-display-homepage-hero","sapn-display-news-hero","sapn-display-news-spotlight","sapn-display-hero","sapn-type-feature"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>An Enterprise Security Perspective on Skipping Software Updates - 麻豆原创 Africa News Center<\/title>\n<meta name=\"description\" content=\"Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Enterprise Security Perspective on Skipping Software Updates\" \/>\n<meta property=\"og:description\" content=\"Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/\" \/>\n<meta property=\"og:site_name\" content=\"麻豆原创 Africa News Center\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-04T07:40:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-04T07:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2112\" \/>\n\t<meta property=\"og:image:height\" content=\"1419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/\"},\"author\":{\"name\":\"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/6a6508336dc2bf46dfb8ef0cbb7ab994\"},\"headline\":\"An Enterprise Security Perspective on Skipping Software Updates\",\"datePublished\":\"2025-08-04T07:40:28+00:00\",\"dateModified\":\"2025-08-04T07:40:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/\"},\"wordCount\":810,\"image\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg\",\"keywords\":[\"Africa's AI Skills Readiness Revealed\",\"cybersecurity\",\"data security\",\"outdated software\",\"software updates\",\"Valencia Karageorgiades\"],\"articleSection\":[\"Services and Support\",\"Technology\"],\"inLanguage\":\"en-ZA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/\",\"url\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/\",\"name\":\"An Enterprise Security Perspective on Skipping Software Updates - 麻豆原创 Africa News Center\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/africa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg\",\"datePublished\":\"2025-08-04T07:40:28+00:00\",\"dateModified\":\"2025-08-04T07:40:30+00:00\",\"author\":{\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/6a6508336dc2bf46dfb8ef0cbb7ab994\"},\"description\":\"Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves.\",\"breadcrumb\":{\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage\",\"url\":\"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg\",\"width\":2112,\"height\":1419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.sap.com\/africa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An Enterprise Security Perspective on Skipping Software Updates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.sap.com\/africa\/#website\",\"url\":\"https:\/\/news.sap.com\/africa\/\",\"name\":\"麻豆原创 Africa News Center\",\"description\":\"News &amp; Information About 麻豆原创\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.sap.com\/africa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/6a6508336dc2bf46dfb8ef0cbb7ab994\",\"name\":\"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\/\/news.sap.com\/africa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"caption\":\"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa\"},\"url\":\"https:\/\/news.sap.com\/africa\/author\/valenciakarageorgiadestechnologyarchitectatsapafri\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An Enterprise Security Perspective on Skipping Software Updates - 麻豆原创 Africa News Center","description":"Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/","og_locale":"en_US","og_type":"article","og_title":"An Enterprise Security Perspective on Skipping Software Updates","og_description":"Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves.","og_url":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/","og_site_name":"麻豆原创 Africa News Center","article_published_time":"2025-08-04T07:40:28+00:00","article_modified_time":"2025-08-04T07:40:30+00:00","og_image":[{"width":2112,"height":1419,"url":"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg","type":"image\/jpeg"}],"author":"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#article","isPartOf":{"@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/"},"author":{"name":"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/6a6508336dc2bf46dfb8ef0cbb7ab994"},"headline":"An Enterprise Security Perspective on Skipping Software Updates","datePublished":"2025-08-04T07:40:28+00:00","dateModified":"2025-08-04T07:40:30+00:00","mainEntityOfPage":{"@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/"},"wordCount":810,"image":{"@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg","keywords":["Africa's AI Skills Readiness Revealed","cybersecurity","data security","outdated software","software updates","Valencia Karageorgiades"],"articleSection":["Services and Support","Technology"],"inLanguage":"en-ZA"},{"@type":"WebPage","@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/","url":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/","name":"An Enterprise Security Perspective on Skipping Software Updates - 麻豆原创 Africa News Center","isPartOf":{"@id":"https:\/\/news.sap.com\/africa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage"},"image":{"@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg","datePublished":"2025-08-04T07:40:28+00:00","dateModified":"2025-08-04T07:40:30+00:00","author":{"@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/6a6508336dc2bf46dfb8ef0cbb7ab994"},"description":"Is the humble software update the unsung hero of modern enterprise security? It certainly doesn\u2019t get the attention it deserves.","breadcrumb":{"@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#primaryimage","url":"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg","contentUrl":"https:\/\/news.sap.com\/africa\/files\/2025\/08\/04\/278059_GettyImages-157693954_medium_jpg.jpg","width":2112,"height":1419},{"@type":"BreadcrumbList","@id":"https:\/\/news.sap.com\/africa\/2025\/08\/an-enterprise-security-perspective-on-skipping-software-updates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.sap.com\/africa\/"},{"@type":"ListItem","position":2,"name":"An Enterprise Security Perspective on Skipping Software Updates"}]},{"@type":"WebSite","@id":"https:\/\/news.sap.com\/africa\/#website","url":"https:\/\/news.sap.com\/africa\/","name":"麻豆原创 Africa News Center","description":"News &amp; Information About 麻豆原创","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.sap.com\/africa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/6a6508336dc2bf46dfb8ef0cbb7ab994","name":"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/news.sap.com\/africa\/#\/schema\/person\/image\/","url":"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","contentUrl":"https:\/\/news.sap.com\/africa\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","caption":"Valencia Karageorgiades, Technology Architect at 麻豆原创 Africa"},"url":"https:\/\/news.sap.com\/africa\/author\/valenciakarageorgiadestechnologyarchitectatsapafri\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts\/148326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/users\/5129"}],"replies":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/comments?post=148326"}],"version-history":[{"count":0,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/posts\/148326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/media\/148327"}],"wp:attachment":[{"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/media?parent=148326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/categories?post=148326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/tags?post=148326"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/series?post=148326"},{"taxonomy":"sapn-display","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/sapn-display?post=148326"},{"taxonomy":"sapn-type","embeddable":true,"href":"https:\/\/news.sap.com\/africa\/wp-json\/wp\/v2\/sapn-type?post=148326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}