{"id":9025,"date":"2020-03-24T00:34:10","date_gmt":"2020-03-23T23:34:10","guid":{"rendered":"https:\/\/139-162-136-174.ip.linodeusercontent.com\/?page_id=9025"},"modified":"2020-04-15T16:24:52","modified_gmt":"2020-04-15T14:24:52","slug":"sap-cybersecurity-self-assessment-tool-level-1","status":"publish","type":"page","link":"https:\/\/www.bowbridge.net\/en\/sap-cybersecurity-self-assessment-tool-level-1\/","title":{"rendered":"Are your SAP systems low-hanging fruit for attackers?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=&#8221;qodef-element-from-fade&#8221; css=&#8221;.vc_custom_1585057712600{margin-bottom: 40px !important;}&#8221;][vc_column css_animation=&#8221;fadeInDown&#8221; width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1585057812081{margin-top: 20px !important;}&#8221;][vc_column_text]With its powerful access to data and mission-critical processes, it\u2019s no surprise that SAP is becoming an increasingly popular target for cyberattack.<\/p>\n<p>The question is: How prepared is your organization to withstand these attacks?<\/p>\n<p>Our helpful self-assessment will help you determine whether your SAP system is well-secured, or low-hanging fruit for attackers.<\/p>\n<p>Ready? Let\u2019s get started![\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1585057699025{margin-top: 25px !important;margin-bottom: 25px !important;}&#8221;][vc_single_image image=&#8221;9078&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInRight&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;qodef-element-from-fade&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Level 1: Check Your SAP Cybersecurity Mindset<\/h2>\n<p><em>What is your understanding of the unique threats to SAP and what general security measures are needed?<\/em><\/p>\n<p>Rate the following statements.[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_raw_html]JTVCcXNtJTIwcXVpeiUzRDElNUQ=[\/vc_raw_html][vc_empty_space height=&#8221;70px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;qodef-element-from-fade&#8221; css=&#8221;.vc_custom_1585057712600{margin-bottom: 40px !important;}&#8221;][vc_column css_animation=&#8221;fadeInDown&#8221; width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1585057812081{margin-top: 20px !important;}&#8221;][vc_column_text]With its powerful access to data and mission-critical processes, it\u2019s no surprise&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-9025","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/9025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/comments?post=9025"}],"version-history":[{"count":8,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/9025\/revisions"}],"predecessor-version":[{"id":9129,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/9025\/revisions\/9129"}],"wp:attachment":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/media?parent=9025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}