{"id":63878,"date":"2023-02-13T09:06:02","date_gmt":"2023-02-13T01:06:02","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=63878"},"modified":"2024-09-13T16:31:44","modified_gmt":"2024-09-13T08:31:44","slug":"regulatory-compliance-and-nordpass-business","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/02\/regulatory-compliance-and-nordpass-business\/","title":{"rendered":"Regulatory Compliance and NordPass Business"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"63878\" class=\"elementor elementor-63878\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" class=\"head-img\" src=\"https:\/\/s1.npass.app\/nordpass\/media\/1.1702.0\/images\/web\/blog\/svg\/regulatory-compliance-np-business-800x450.svg\" alt=\"\" ><\/p>\n<p >Designed to ensure the safety and security of an organization\u2019s operations and protection of its customers, regulatory compliance standards are a fact of life in today\u2019s business world. Fail to comply and be ready to face serious financial, legal, and reputational harm to your organization.<\/p><p >Today, we\u2019re taking an in depth look at regulatory compliance, exploring different standards, and looking into how NordPass Business can help your organization meet the requirements in an easier and more efficient way.<\/p><h2 id=\"what-is-regulatory-compliance\" style=\"line-height:1.2\">What is regulatory compliance?<\/h2><p class=\"leading-loose text-base my-3\">Regulatory compliance refers to various processes and procedures of adhering to the laws, regulations, and standards set by various governing bodies. The regulations can come from numerous sources such as local, state, federal, or even international agencies, industry groups, and professional associations. The intention behind various regulatory compliance is to protect consumers and other stakeholders.<\/p><h2 id=\"importance-of-regulatory-compliance\" style=\"line-height:1.2\">Importance of regulatory compliance<\/h2><p class=\"leading-loose text-base my-3\">The aim of regulatory compliance is to make sure that businesses and organizations operate in a secure, responsible, and ethical manner. Regulatory compliance can also provide businesses and organizations with a competitive advantage by helping to create a culture of transparency and credibility with customers, employees, and other involved parties. Furthermore, adhering to regulatory compliance can improve internal processes, risk management procedures, and mitigate potential legal issues, which in turn lays a great foundation for a sustainable organization.<\/p><p class=\"leading-loose text-base my-3\">However, it\u2019s critical to remember that most regulatory compliance is mandatory. Failing to comply with any of the mandatory regulations can result in hefty fines. For instance, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.washingtonpost.com\/world\/europe\/france-fines-google-nearly-57-million-for-first-major-violation-of-new-european-privacy-regime\/2019\/01\/21\/89e7ee08-1d8f-11e9-a759-2b8541bbbe20_story.html\">Google has been fined nearly $57 million<\/a> by French regulators for violation of the General Data Protection Regulation (GDPR). Meta \u2014 the company formerly known as Facebook \u2014 recently has been <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.cnbc.com\/2023\/01\/04\/meta-fined-more-than-400-million-in-ireland-over-eu-privacy-breaches.html\">fined over $400 million<\/a> by top EU regulators for forcing users to accept targeted ads.<\/p><p class=\"leading-loose text-base my-3\">Besides financial losses, non-compliance can cause major damage to the organization\u2019s reputation as clients may lose trust in the organization. This can even lead to serious legal issues.<\/p><p class=\"leading-loose text-base my-3\">Below are some of the most common regulatory compliance standards.<\/p><h3 id=\"national-institute-of-standards-and-technology-nist\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">National Institute of Standards and Technology (NIST)<\/h3><p class=\"leading-loose text-base my-3\">The National Institute of Standards and Technology (NIST) is a US federal agency that develops technology, metrics, and standards to drive innovation and ensure operational security within a business environment. NIST compliance is mandatory for all US-based federal information systems except those related to national security. However, the standard can be adopted by any organization.<\/p><p class=\"leading-loose text-base my-3\">To be NIST-compliant, a company needs to implement access controls to limit the risk of unauthorized access, develop a comprehensive incident response plan, and devise audit procedures and schedules.<\/p><h3 id=\"general-data-protection-regulation-gdpr\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">General Data Protection Regulation (GDPR)<\/h3><p class=\"leading-loose text-base my-3\">The General Data Protection Regulation (GDPR) is a data protection law that applies to businesses and organizations operating within the European Union (EU) and the European Economic Area (EEA). It sets out rules for how organizations can collect, use, and store personal data, and provides individuals the right to access and control their personal data.<\/p><p class=\"leading-loose text-base my-3\">To adhere to the GDPR, organizations and businesses need to implement measures such as obtaining consent from individuals before collecting their data, providing clear and concise information about their data collection practices, and implementing appropriate security measures to protect personal data.<\/p><h3 id=\"health-insurance-portability-and-accountability-act-hipaa\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Health Insurance Portability and Accountability Act (HIPAA)<\/h3><p class=\"leading-loose text-base my-3\">The Health Insurance Portability and Accountability Act (HIPAA) is a US law that sets out standards for the protection of personal health information. The law applies to healthcare providers and all other entities that handle personal health information in the US.<\/p><p class=\"leading-loose text-base my-3\">To meet the requirements set out by the HIPAA, organizations need to implement secure systems for storing and transmitting personal health information, providing training to employees on HIPAA requirements, and implementing access controls to prevent unauthorized access to personal health information.<\/p><h3 id=\"payment-card-industry-data-security-standard-pci-dss\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Payment Card Industry Data Security Standard (PCI DSS)<\/h3><p class=\"leading-loose text-base my-3\">The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards that apply internationally to organizations that handle credit card transactions. The regulatory standard sets out requirements for protecting cardholder data and preventing unauthorized access to such data.<\/p><p class=\"leading-loose text-base my-3\">The PCI DSS regulations require businesses and organizations that process payment card information to implement secure systems for storing and transmitting cardholder data, conduct regular security assessments, and implement further security controls to prevent unauthorized access to cardholder data.<\/p><h3 id=\"isoiec-27001\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">ISO\/IEC 27001<\/h3><p class=\"leading-loose text-base my-3\">The ISO\/IEC 27001 is an international standard that outlines best practices for an information security management system (ISMS). The standard has been developed to help organizations protect their information assets and manage risks related to information security. The ISO\/IEC 27001 is not a mandatory requirement.<\/p><p class=\"leading-loose text-base my-3\">To meet the ISO\/IEC 27001 compliance, organizations need to conduct regular risk assessments, implement controls to protect against unauthorized access, and regularly review and update their information security management systems.<\/p><h3 id=\"california-consumer-privacy-act-ccpa\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">California Consumer Privacy Act (CCPA)<\/h3><p class=\"leading-loose text-base my-3\">The California Consumer Privacy Act (CCPA) is a privacy law that in many ways mimics its European counterpart \u2014 the GDPR. However, the CCPA applies to businesses operating in California and it provides California residents with the right to access and control their personal data, and imposes certain requirements on businesses that collect and handle personal data.<\/p><p class=\"leading-loose text-base my-3\">For an organization to be CCPA compliant, it needs to implement security measures to protect customer data. Furthermore, companies are also required to provide clear and concise information about data collection practices, allowing California residents to request access to and deletion of their personal data.<\/p>\n<h3 id=\"gramm-leach-bliley-act-glba\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Gramm-Leach-Bliley Act (GLBA)<\/h3><p class=\"leading-loose text-base my-3\">The Gramm-Leach-Bliley Act (GLBA) is a US law that applies to financial institutions within the US. Like many of the regulatory compliance standards we already discussed, GLBA requires financial institutions to implement safeguards that would protect personal information as well as to disclose their data collection and sharing practices to customers.<\/p><p class=\"leading-loose text-base my-3\">To comply with the GLBA regulatory standards, financial institutions may need to implement secure systems for storing and transmitting personal financial information, providing customers with information about their data collection and sharing practices, and implementing access controls to prevent unauthorized access to personal financial information.<\/p><h3 id=\"center-for-internet-security-cis\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Center for Internet Security (CIS)<\/h3><p class=\"leading-loose text-base my-3\">The Center for Internet Security (CIS) is a nonprofit organization that provides cybersecurity guidance and best practices to help organizations protect their systems and data. The CIS comprises 18 Critical Security Controls for identifying and protecting against the most common cyber threats.<\/p><p class=\"leading-loose text-base my-3\">To be CIS compliant, companies and organizations need to establish a comprehensive cybersecurity perimeter to ensure protection of their data and information management systems.<\/p><h3 id=\"opinion-498\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Opinion 498<\/h3><p class=\"leading-loose text-base my-3\">The Formal Opinion 498 outlined by the American Bar Association (ABA) provides guidance for US-based lawyers and law firms with regard to virtual practice. While the ABA Model Rules of Professional Conduct permit virtual practice, the Formal Opinion 498 provides an additional set of guidelines for virtual practice.<\/p><p class=\"leading-loose text-base my-3\">To follow the guidelines set out by the Opinion 498, organizations or individuals are urged to establish secure information management systems and protect them with complex passwords to ensure secure storage and access to client data.<\/p><h3 id=\"agence-nationale-de-la-s\u00e9curit\u00e9-des-syst\u00e8mes-dinformation-anssi\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information (ANSSI)<\/h3><p class=\"leading-loose text-base my-3\">ANSSI compliance combines a set of security standards set by the French National Cybersecurity Agency. The ANSSI has been developed as a regulatory standard in France to protect sensitive information and systems from cyber threats such as hacking, malware, and data breaches. Companies that store and handle sensitive information may be required to comply with the ANSSI standards in order to ensure the security of that information.<\/p><p class=\"leading-loose text-base my-3\">Compliance with the ANSSI standards may involve regular audits, penetration testing, and other security measures to identify and address vulnerabilities in a company&#8217;s systems.<\/p><h2 id=\"how-can-nordpass-help-with-regulatory-compliance\" style=\"line-height:1.2\">How can NordPass help with regulatory compliance?<\/h2><p class=\"leading-loose text-base my-3\">Meeting regulations and staying compliant can be a complex and time-consuming process, as businesses and organizations must stay up-to-date with the latest regulatory requirements and implement appropriate policies, procedures, and tools.<\/p><p class=\"leading-loose text-base my-3\">However, with the right tools at your disposal compliance can be less of a hassle than you might think. One such tool is NordPass Business \u2014 a secure and easy-to-use password manager designed for business use and it can help your organization comply with the security guidelines and requirements outlined in the regulatory compliance standards listed above. But how exactly can it help?<\/p><h3 id=\"strong-passwords-and-secure-password-storage\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Strong passwords and secure password storage<\/h3><p class=\"leading-loose text-base my-3\">Most regulatory compliance standards require organizations to implement some sort of security measures to limit the possibility of unauthorized access.<\/p><p class=\"leading-loose text-base my-3\">For instance, PCI DSS, GLBA, GDPR, and CIS Controls all have outlined guidelines for ensuring the security of personal data processing and storage.<\/p><p class=\"leading-loose text-base my-3\">This is where NordPass comes in as a tool that can help. Designed by the principles of zero-knowledge architecture and equipped with an advanced XChaCha20 encryption algorithm, NordPass offers a secure way to store and access business passwords and other sensitive information in line with regulatory requirements.<\/p><p class=\"leading-loose text-base my-3\">Password Policy \u2014 a NordPass Business feature \u2014 can also play a critical role in compliance. Using Password Policy, companies can set certain specifications for password complexity for the entire organization, which can significantly fortify the overall security of the organization.<\/p><p class=\"leading-loose text-base my-3\">To easily follow Password Policy rules and specifications, users can use our very own Password Generator \u2014 a tool that can generate a password adhering to all the specifications outlined in the Password Policy in just a few clicks.<\/p><p class=\"leading-loose text-base my-3\">On top of that, NordPass Business can ensure that all of your organization\u2019s passwords are stored securely and in line with the regulatory requirements.<\/p><h3 id=\"secure-access-management\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Secure access management<\/h3><p class=\"leading-loose text-base my-3\">Some compliance standards require organizations to implement secure access management solutions. For example, this is the case with ANSSI compliance as well as with HIPAA and NIST.<\/p><p class=\"leading-loose text-base my-3\">Here NordPass Business and its Admin Panel can play a major role because it is designed to provide organizations a way to effectively and easily manage access privileges across the entire organization.<\/p><p class=\"leading-loose text-base my-3\">Via the Admin Panel, solution owners and admins can grant or revoke access to systems as well as monitor member activity within the organization. The Admin Panel is also the place where you can set the Password Policy for the organization, ensuring that passwords throughout the company adhere to certain specifications.<\/p><h3 id=\"breach-monitoring\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height:1.2\">Breach Monitoring<\/h3><p class=\"leading-loose text-base my-3\">Regulatory compliance standards also tend to outline best practices for responding to a security incident such as a data breach. This is explicitly outlined in the GDPR\u2019s Article 33, which states that data breach including personal data breach should be reported within 72 hours to the supervisory authority. Failing to do so may result in a fine of 10 million or 2% of annual revenue.<\/p><p class=\"leading-loose text-base my-3\">NordPass Business is equipped with a Data Breach Scanner \u2014 a tool that can scan the entire company\u2019s domain list for potential breaches. Because the Data Breach Scanner issues a notification to all members of the organization, the company potentially affected by a breach can act quickly and efficiently to contain it.<\/p><p class=\"leading-loose text-base my-3\">The NordPass Password Health tool can help you detect potentially weak, old, or reused passwords throughout the organization and significantly reduce the risk of unauthorized access.<\/p><h2 id=\"bottom-line\" style=\"line-height:1.2\">Bottom line<\/h2><p class=\"leading-loose text-base my-3\">These days, regulatory compliance is an inseparable part of running a business. Fail to comply and be ready to face hefty fines and serious reputational damage. However, compliance is never easy. But with the right tools at your disposal, the whole process can be a lot smoother.<\/p><p class=\"leading-loose text-base my-3\">NordPass Business can be a tool to assist organizations in meeting various requirements in an easier and more efficient way. By staying compliant, organizations can not only avoid costly fines and legal issues, but also gain a competitive advantage by building a culture of transparency and credibility with their customer base or investors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"64131\" class=\"elementor elementor-64131\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/s1.npass.app\/nordpass\/media\/1.1728.0\/images\/web\/blog\/svg\/business-continuity-plan-800x450.svg\" width=\"800\" height=\"450\" \/>\n<div class=\"Post__content mx-auto container--m\">\n<div>\n<div>\n<p class=\"leading-loose text-lead my-3 font-medium\">These days, cybercrime is rampant. It&#8217;s no longer a matter of \u201cif\u201d you&#8217;re going to suffer an attack but \u201cwhen\u201d it will happen. All companies want to be ready for any crisis. And this is where a business continuity plan comes into play.<\/p>\n<p class=\"leading-loose text-lead my-3 font-medium\">But what is a business continuity plan exactly? Why is it important? What should one include? Today, we&#8217;re exploring all these questions in-depth.<\/p>\n\n<h2 id=\"what-is-a-business-continuity-plan\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">What is a business continuity plan?<\/h2>\n<p class=\"leading-loose text-base my-3\">A business continuity plan (BCP) is a document that sets guidelines for how an organization will continue its operations in the event of a disruption, whether it&#8217;s a fire, flood, other natural disaster or a cybersecurity incident. A BCP aims to help organizations resume operations without significant downtime.<\/p>\n<p class=\"leading-loose text-base my-3\">Unfortunately, according to a 2020 <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/www.mercer.com\/content\/dam\/mercer\/attachments\/global\/gl-2020-mercer-covid-19-global-survey-coronavirus-impact-to-global-market.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Mercer survey<\/a>, 51% of businesses across the globe don&#8217;t have a business continuity plan in place.<\/p>\n\n<h2 id=\"whats-the-difference-between-business-continuity-and-disaster-recovery-plans\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">What&#8217;s the difference between business continuity and disaster recovery plans?<\/h2>\n<p class=\"leading-loose text-base my-3\">We often confuse the terms business continuity plan and disaster recovery plan. The two overlap and often work together, but the disaster recovery plan focuses on containing, examining, and restoring operations after a cyber incident. On the other hand, BCP is a broader concept that considers the whole organization. A business continuity plan helps organizations stay prepared for dealing with a potential crisis and usually encompasses a disaster recovery plan.<\/p>\n\n<h2 id=\"importance-of-business-continuity-planning\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">Importance of business continuity planning<\/h2>\n<p class=\"leading-loose text-base my-3\">The number of news headlines announcing data breaches has numbed us to the fact that cybercrime is very real and frequent and poses an existential risk to companies of all sizes and industries.<\/p>\n<p class=\"leading-loose text-base my-3\">Consider that in 2021, approximately <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/www.forbes.com\/sites\/chuckbrooks\/2022\/06\/03\/alarming-cyber-statistics-for-mid-year-2022-that-you-need-to-know\/?sh=7e691ccf7864\" target=\"_blank\" rel=\"noopener noreferrer\">37% of global organizations<\/a> fell victim to a ransomware attack. Then consider that business interruption and restoration costs account for <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/www.allianz.com\/en\/press\/news\/studies\/211013_Allianz-AGCS-Ransomware-Trends-Risks-and-Resilience.html#:~:text=Business%20interruption%20and%20restoration%20costs,involved%20in%20over%20six%20years\" target=\"_blank\" rel=\"noopener noreferrer\">50% of cyberattack-related losses<\/a>. Finally, take into account that most cyberattacks are financially motivated and the global cost of cybercrime topped <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/techxplore.com\/news\/2022-05-global-cybercrime-topped-trillion-defence.html\" target=\"_blank\" rel=\"noopener noreferrer\">$6 trillion last year<\/a>. The picture is quite clear \u2014 cybercrime is a lucrative venture for bad actors and potentially disastrous for those on the receiving end.<\/p>\n<p class=\"leading-loose text-base my-3\">To thrive in these unpredictable times, organizations go beyond conventional security measures. Many companies develop a business continuity plan parallel to secure infrastructure and consider the plan a critical part of the security ecosystem. The Purpose of a business continuity plan is to significantly reduce the downtime in an emergency and, in turn, reduce the potential reputational damage and \u2014 of course \u2014 revenue losses.<\/p>\n\n<h2 id=\"business-continuity-plan-template\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">Business continuity plan template<\/h2>\n<div class=\"BlogBannerV2 py-8 md:py-10 lg:py-12 mt-8 md:mt-10 lg:mt-12 relative flex flex-col text-center font-medium overflow-hidden BlogBannerV2--default bg-blue-darkest\">\n<h2 class=\"nord-text text-h3 leading-normal font-medium tracking-tight inline-block font-bold mx-6 md:mx-21 z-1 text-white\" style=\"line-height: 1.2;\">Password security for your business<\/h2>\n<p class=\"nord-text text-base leading-normal text-black mt-4 lg:mt-6 z-1 text-white\">Store, manage and share passwords.<\/p>\n\n<div class=\"z-1\"><a class=\"nord-button focus:outline-none font-medium align-bottom rounded-1 select-none transition-colors ease-out duration-250 cursor-pointer nord-button--medium border text-white nord-button--v-contained nord-button--c-teal bg-teal border-teal font-medium inline-block Button__rounded mt-4 lg:mt-6 py-3 px-4 lg:px-6 whitespace-no-wrap\" href=\"\/en\/business-password-manager\/\">Get NordPass Business<\/a><\/div>\n<p class=\"nord-text text-micro leading-normal text-black mt-3 z-1 text-white\">30-day money-back guarantee<\/p>\n\n<\/div>\n<h4 id=\"business-continuity-plan-example\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Business Continuity Plan Example<\/h4>\n<p class=\"leading-loose text-base my-3\">[Company Name]<\/p>\n<p class=\"leading-loose text-base my-3\">[Date]<\/p>\n\n<h4 id=\"i-introduction\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">I. Introduction<\/h4>\n<ul class=\"leading-loose mt-3 mb-6 list--ul\">\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Purpose of the Plan<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Scope of the Plan<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Budget<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Timeline<\/p>\n<\/li>\n<\/ul>\n<p class=\"leading-loose text-base my-3\">The initial stage of developing a business continuity plan starts with a statement of the plan&#8217;s purpose, which explains the main objective of the plan, such as ensuring the organization&#8217;s ability to continue its operations during and after a disruptive event.<\/p>\n<p class=\"leading-loose text-base my-3\">The Scope of the Plan outlines the areas or functions that the plan will cover, including business processes, personnel, equipment, and technology.<\/p>\n<p class=\"leading-loose text-base my-3\">The Budget specifies the estimated financial resources required to implement and maintain the BCP. It includes costs related to technology, personnel, equipment, training, and other necessary expenses.<\/p>\n<p class=\"leading-loose text-base my-3\">The Timeline provides a detailed schedule for developing, implementing, testing, and updating the BCP.<\/p>\n\n<h4 id=\"ii-risk-assessment\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">II. Risk Assessment<\/h4>\n<ul class=\"leading-loose mt-3 mb-6 list--ul\">\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Identification of Risks<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Prioritization of Risks<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Mitigation Strategies<\/p>\n<\/li>\n<\/ul>\n<p class=\"leading-loose text-base my-3\">The Risk Assessment section of a Business Continuity Plan (BCP) is an essential part of the plan that identifies potential risks that could disrupt an organization&#8217;s critical functions.<\/p>\n<p class=\"leading-loose text-base my-3\">The Identification of Risks involves identifying potential threats to the organization, such cybersecurity breaches, supply chain disruptions, power outages, and other potential risks. This step is critical to understand the risks and their potential impact on the organization.<\/p>\n<p class=\"leading-loose text-base my-3\">Once the risks have been identified, the Prioritization of Risks follows, which helps determine which risks require the most attention and resources.<\/p>\n<p class=\"leading-loose text-base my-3\">The final step in the Risk Assessment section is developing Mitigation Strategies to minimize the impact of identified risks. Mitigation strategies may include preventative measures, such as system redundancies, data backups, cybersecurity measures, as well as response and recovery measures, such as emergency protocols and employee training.<\/p>\n\n<h4 id=\"iii-emergency-response\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">III. Emergency Response<\/h4>\n<ul class=\"leading-loose mt-3 mb-6 list--ul\">\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Emergency Response Team<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Communication Plan<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Emergency Procedures<\/p>\n<\/li>\n<\/ul>\n<p class=\"leading-loose text-base my-3\">This section of the plan focuses on immediate actions that should be taken to ensure the safety and well-being of employees and minimize the impact of the event on the organization&#8217;s operations.<\/p>\n<p class=\"leading-loose text-base my-3\">The Emergency Response Team is responsible for managing the response to an emergency or disaster situation. This team should be composed of individuals who are trained in emergency response procedures and can act quickly and decisively during an emergency. The team should also include a designated leader who is responsible for coordinating the emergency response efforts.<\/p>\n<p class=\"leading-loose text-base my-3\">The Communication Plan outlines how information will be disseminated during an emergency situation. It includes contact information for employees, stakeholders, and emergency response personnel, as well as protocols for communicating with these individuals.<\/p>\n<p class=\"leading-loose text-base my-3\">The Emergency Procedures detail the steps that should be taken during an emergency or disaster situation. The emergency procedures should be developed based on the potential risks identified in the Risk Assessment section and should be tested regularly to ensure that they are effective.<\/p>\n\n<h4 id=\"iv-business-impact-analysis\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">IV. Business Impact Analysis<\/h4>\n<p class=\"leading-loose text-base my-3\">The Business Impact Analysis (BIA) section of a Business Continuity Plan (BCP) is a critical step in identifying the potential impact of a disruption to an organization&#8217;s critical operations.<\/p>\n<p class=\"leading-loose text-base my-3\">The Business Impact Analysis is typically conducted by a team of individuals who understand the organization&#8217;s critical functions and can assess the potential impact of a disruption to those functions. The team may include representatives from various departments, including finance, operations, IT, and human resources.<\/p>\n\n<h4 id=\"v-recovery-and-restoration\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">V. Recovery and Restoration<\/h4>\n<ul class=\"leading-loose mt-3 mb-6 list--ul\">\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Procedures for recovery and restoration of critical processes<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Prioritization of recovery efforts<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Establishment of recovery time objectives<\/p>\n<\/li>\n<\/ul>\n<p class=\"leading-loose text-base my-3\">The Recovery and Restoration section of a Business Continuity Plan (BCP) outlines the procedures for recovering and restoring critical processes and functions following a disruption.<\/p>\n<p class=\"leading-loose text-base my-3\">The Procedures for recovery and restoration of critical processes describe the steps required to restore critical processes and functions following a disruption. This may include steps such as relocating to alternate facilities, restoring data and systems, and re-establishing key business relationships.<\/p>\n<p class=\"leading-loose text-base my-3\">The Prioritization section of the plan identifies the order in which critical processes will be restored, based on their importance to the organization&#8217;s operations and overall mission.<\/p>\n<p class=\"leading-loose text-base my-3\">Recovery time objectives (RTOs) define the maximum amount of time that critical processes and functions can be unavailable following a disruption. Establishing RTOs ensures that recovery efforts are focused on restoring critical functions within a specific timeframe.<\/p>\n\n<h4 id=\"vi-plan-activation\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">VI. Plan Activation<\/h4>\n<ul class=\"leading-loose mt-3 mb-6 list--ul\">\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Plan Activation Procedures<\/p>\n<\/li>\n<\/ul>\n<p class=\"leading-loose text-base my-3\">The Plan Activation section is critical in ensuring that an organization can quickly and effectively activate the plan and respond to a potential emergency.<\/p>\n<p class=\"leading-loose text-base my-3\">The Plan Activation Procedures describe the steps required to activate the BCP in response to a disruption. The procedures should be clear and concise, with specific instructions for each step to ensure a prompt and effective response.<\/p>\n\n<h4 id=\"vii-testing-and-maintenance\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">VII. Testing and Maintenance<\/h4>\n<ul class=\"leading-loose mt-3 mb-6 list--ul\">\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Testing Procedures<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Maintenance Procedures<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<p class=\"leading-loose text-base my-3\">Review and Update Procedures<\/p>\n<\/li>\n<\/ul>\n<p class=\"leading-loose text-base my-3\">This section of the plan is critical to ensure that an organization can effectively respond to disruptions and quickly resume its essential functions.<\/p>\n<p class=\"leading-loose text-base my-3\">Testing procedures may include scenarios such as natural disasters, cyber-attacks, and other potential risks. The testing procedures should include clear objectives, testing scenarios, roles and responsibilities, and evaluation criteria to assess the effectiveness of the plan.<\/p>\n<p class=\"leading-loose text-base my-3\">The Maintenance Procedures detail the steps necessary to keep the BCP up-to-date and relevant.<\/p>\n<p class=\"leading-loose text-base my-3\">The Review and Update Procedures describe how the BCP will be reviewed and updated regularly to ensure its continued effectiveness. This may involve conducting a review of the plan on a regular basis or after significant changes to the organization&#8217;s operations or threats.<\/p>\n\n<h2 id=\"what-should-a-business-continuity-plan-checklist-include\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">What should a business continuity plan checklist include?<\/h2>\n<p class=\"leading-loose text-base my-3\">Organizations looking to develop a BCP have more than a few things to think through and consider. Variables such as the size of the organization, its IT infrastructure, personnel, and resources all play a significant role in developing a continuity plan. Remember, each crisis is different, and each organization will have a view on handling it according to all the variables in play. However, all business continuity plans will include a few elements in one way or another.<\/p>\n\n<ul class=\"leading-loose mt-3 mb-6 list--ul\">\n \t<li class=\"my-2\">\n<h4 id=\"clearly-defined-areas-of-responsibility\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Clearly defined areas of responsibility<\/h4>\n<p class=\"leading-loose text-base my-3\">A BCP should define specific roles and responsibilities for cases of emergency. Detail who is responsible for what tasks and clarify what course of action a person in a specific position should take. Clearly defined roles and responsibilities in an emergency event allow you to act quickly and decisively and minimize potential damage.<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<h4 id=\"crisis-communication-plan\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Crisis communication plan<\/h4>\n<p class=\"leading-loose text-base my-3\">In an emergency, communication is vital. It is the determining factor when it comes to crisis handling. For communication to be effective, it is critical to establish clear communication pipelines. Furthermore, it is crucial to understand that alternative communication channels should not be overlooked and outlined in a business continuity plan.<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<h4 id=\"recovery-teams\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Recovery teams<\/h4>\n<p class=\"leading-loose text-base my-3\">A recovery team is a collective of different professionals who ensure that business operations are restored as soon as possible after the organization confronts a crisis.<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<h4 id=\"alternative-site-of-operations\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Alternative site of operations<\/h4>\n<p class=\"leading-loose text-base my-3\">Today, when we think of an incident in a business environment, we usually think of something related to cybersecurity. However, as discussed earlier, a BCP covers many possible disasters. In a natural disaster, determine potential alternate sites where the company could continue to operate.<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<h4 id=\"backup-power-and-data-backups\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Backup power and data backups<\/h4>\n<p class=\"leading-loose text-base my-3\">Whether a cyber event or a real-life physical event, ensuring that you have access to power is crucial if you wish to continue operations. In a BCP, you can often come across lists of alternative power sources such as generators, where such tools are located, and who should oversee them. The same applies to data. Regularly scheduled data backups can significantly reduce potential losses incurred by a crisis event.<\/p>\n<\/li>\n \t<li class=\"my-2\">\n<h4 id=\"recovery-guidelines\" class=\"text-lead font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Recovery guidelines<\/h4>\n<p class=\"leading-loose text-base my-3\">If a crisis is significant, a comprehensive business continuity plan usually includes detailed guidelines on how the recovery process will be carried out.<\/p>\n<\/li>\n<\/ul>\n<h2 id=\"business-continuity-planning-steps\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">Business continuity planning steps<\/h2>\n<figure class=\"my-12\">\n<div class=\"mx-auto\" style=\"max-width: 746px; max-height: 320px;\">\n<div class=\"nord-intrinsic relative w-full h-0 bg-transparent\" style=\"padding-top: 42.8954%;\"><picture class=\"nord-picture\"><source srcset=\"https:\/\/s1.npass.app\/nordpass\/media\/1.1728.0\/images\/web\/blog\/svg\/business-continuity-plan-steps-746x320.svg\" \/><img decoding=\"async\" class=\"nord-image nord-image--responsive\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"business continuity plan steps\" \/><\/picture><\/div>\n<\/div><\/figure>\n<p class=\"leading-loose text-base my-3\">Here are some general guidelines that an organization looking to develop a BCP should consider:<\/p>\n\n<h3 id=\"analysis\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Analysis<\/h3>\n<p class=\"leading-loose text-base my-3\">A business continuity plan should include an in-depth analysis of everything that could negatively affect the overall organizational infrastructure and operations. Assessing different levels of risk should also be a part of the analysis phase.<\/p>\n\n<h3 id=\"design-and-development\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Design and development<\/h3>\n<p class=\"leading-loose text-base my-3\">Once you have a clear overview of potential risks your company could face, start developing a plan. Create a draft and reassess it to see if it takes into account even the smallest of details.<\/p>\n\n<h3 id=\"implementation\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Implementation<\/h3>\n<p class=\"leading-loose text-base my-3\">Implement BCP within the organization by providing training sessions for the staff to get familiar with the plan. Getting everyone on the same page regarding crisis management is critical.<\/p>\n\n<h3 id=\"testing\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Testing<\/h3>\n<p class=\"leading-loose text-base my-3\">Rigorously test the plan. Play out a variety of scenarios in training sessions to learn the overall effectiveness of the continuity plan. By doing so, everyone on the team will be closely familiar with the business continuity plan&#8217;s guidelines.<\/p>\n\n<h3 id=\"maintenance-and-updating\" class=\"text-h6 font-medium mb-3 mt-6 leading-loose\" style=\"line-height: 1.2;\">Maintenance and updating<\/h3>\n<p class=\"leading-loose text-base my-3\">Because the threat landscape constantly changes and evolves, you should regularly reassess your BCP and take steps to update it. By making your continuity plan in tune with the times, you will be able to stay a step ahead of a crisis.<\/p>\n\n<h2 id=\"level-up-your-companys-security-with-nordpass-business\" class=\"text-h5 font-bold mb-6 mt-12 leading-normal\" style=\"line-height: 1.2;\">Level up your company&#8217;s security with NordPass Business<\/h2>\n<p class=\"leading-loose text-base my-3\">A comprehensive business continuity plan is vital for the entire organization&#8217;s security posture. However, in a perfect world, you wouldn&#8217;t have to use it. This is where NordPass Business can help.<\/p>\n<p class=\"leading-loose text-base my-3\">Remember, weak, reused, or compromised passwords are often cited as one of the top contributing factors in data breaches. It&#8217;s not surprising, considering that an average user has around 100 passwords. Password fatigue is real and significantly affects how people treat their credentials. NordPass Business counters these issues.<\/p>\n<p class=\"leading-loose text-base my-3\">With <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/business-password-manager\/\">NordPass Business<\/a>, your team will have a single secure place to store all work-related passwords, credit cards, and other sensitive information. Accessing all the data stored in NordPass is quick and easy, which allows your employees not to be distracted by the task of finding the correct passwords for the correct account.<\/p>\n<p class=\"leading-loose text-base my-3\">In cyber incidents, NordPass Business ensures that company credentials remain secure at all times. Everything stored in the NordPass vault is secured with advanced encryption algorithms, which would take hundreds of years to brute force.<\/p>\n<p class=\"leading-loose text-base my-3\">If you are interested in learning more about NordPass Business and how it can fortify corporate security, do not hesitate to <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/business-password-manager\/request-demo\/\">book a demo<\/a> with our representative.<\/p>\n\n<\/div>\n<\/div>\n<div class=\"Post__socials-sticky fixed left-0 lg:ml-6\" style=\"top: 50%; bottom: unset;\">\n<div class=\"flex lg:flex-col justify-center align-center\"><\/div>\n<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Designed to ensure the safety and security of an organi [&hellip;]<\/p>","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,1129,973,61],"tags":[974,1076,1131],"class_list":["post-63878","post","type-post","status-publish","format-standard","hentry","category-year2023","category-nordpass","category-nord-security","category-press-release","tag-nord-security","tag-1076","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Regulatory Compliance and NordPass Business - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/password-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Regulatory Compliance and NordPass Business - Version 2\" \/>\n<meta property=\"og:description\" content=\"Designed to ensure the safety and security of an organi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/password-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T01:06:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s1.npass.app\/nordpass\/media\/1.1702.0\/images\/web\/blog\/svg\/regulatory-compliance-np-business-800x450.svg\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/regulatory-compliance-and-nordpass-business\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"Regulatory Compliance and NordPass Business\",\"datePublished\":\"2023-02-13T01:06:02+00:00\",\"dateModified\":\"2024-09-13T08:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/regulatory-compliance-and-nordpass-business\\\/\"},\"wordCount\":1903,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1702.0\\\/images\\\/web\\\/blog\\\/svg\\\/regulatory-compliance-np-business-800x450.svg\",\"keywords\":[\"Nord Security\",\"2023\",\"NordPass\"],\"articleSection\":[\"2023\",\"NordPass\",\"Nord Security\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/regulatory-compliance-and-nordpass-business\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/\",\"name\":\"Regulatory Compliance and NordPass Business - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1702.0\\\/images\\\/web\\\/blog\\\/svg\\\/regulatory-compliance-np-business-800x450.svg\",\"datePublished\":\"2023-02-13T01:06:02+00:00\",\"dateModified\":\"2024-09-13T08:31:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1702.0\\\/images\\\/web\\\/blog\\\/svg\\\/regulatory-compliance-np-business-800x450.svg\",\"contentUrl\":\"https:\\\/\\\/s1.npass.app\\\/nordpass\\\/media\\\/1.1702.0\\\/images\\\/web\\\/blog\\\/svg\\\/regulatory-compliance-np-business-800x450.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/password-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Regulatory Compliance and NordPass Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Regulatory Compliance and NordPass Business - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/password-policy\/","og_locale":"en_US","og_type":"article","og_title":"Regulatory Compliance and NordPass Business - Version 2","og_description":"Designed to ensure the safety and security of an organi [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/password-policy\/","og_site_name":"Version 2","article_published_time":"2023-02-13T01:06:02+00:00","article_modified_time":"2024-09-13T08:31:44+00:00","og_image":[{"url":"https:\/\/s1.npass.app\/nordpass\/media\/1.1702.0\/images\/web\/blog\/svg\/regulatory-compliance-np-business-800x450.svg","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"versionpan","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/password-policy\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/02\/regulatory-compliance-and-nordpass-business\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"Regulatory Compliance and NordPass Business","datePublished":"2023-02-13T01:06:02+00:00","dateModified":"2024-09-13T08:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/02\/regulatory-compliance-and-nordpass-business\/"},"wordCount":1903,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/password-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/s1.npass.app\/nordpass\/media\/1.1702.0\/images\/web\/blog\/svg\/regulatory-compliance-np-business-800x450.svg","keywords":["Nord Security","2023","NordPass"],"articleSection":["2023","NordPass","Nord Security","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/02\/regulatory-compliance-and-nordpass-business\/","url":"https:\/\/nordpass.com\/blog\/password-policy\/","name":"Regulatory Compliance and NordPass Business - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/password-policy\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/password-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/s1.npass.app\/nordpass\/media\/1.1702.0\/images\/web\/blog\/svg\/regulatory-compliance-np-business-800x450.svg","datePublished":"2023-02-13T01:06:02+00:00","dateModified":"2024-09-13T08:31:44+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/password-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/password-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/password-policy\/#primaryimage","url":"https:\/\/s1.npass.app\/nordpass\/media\/1.1702.0\/images\/web\/blog\/svg\/regulatory-compliance-np-business-800x450.svg","contentUrl":"https:\/\/s1.npass.app\/nordpass\/media\/1.1702.0\/images\/web\/blog\/svg\/regulatory-compliance-np-business-800x450.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/password-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Regulatory Compliance and NordPass Business"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/en\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-gCi","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/63878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=63878"}],"version-history":[{"count":1,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/63878\/revisions"}],"predecessor-version":[{"id":64204,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/63878\/revisions\/64204"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=63878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=63878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=63878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}