{"id":102047,"date":"2025-01-24T16:27:40","date_gmt":"2025-01-24T08:27:40","guid":{"rendered":"https:\/\/version-2.com\/?p=102047"},"modified":"2025-01-17T16:30:44","modified_gmt":"2025-01-17T08:30:44","slug":"dora-safeguarding-financial-data","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/01\/dora-safeguarding-financial-data\/","title":{"rendered":"DORA: Safeguarding Financial Data"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"102047\" class=\"elementor elementor-102047\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06f0808 post-content elementor-widget elementor-widget-text-editor\" data-id=\"06f0808\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"news__content mt-5\"><p>The new EU regulation, DORA, is set to significantly enhance the protection of customer funds and data within financial institutions.<\/p><p>DORA officially entered into force on January 16, 2023. Since then, financial institutions have begun preparing to meet the new requirements, although compliance was not initially mandatory. However, the regulation will become fully enforceable on January 17, 2025.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-18732 entered loading\" src=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp\" sizes=\"(max-width: 1000px) 100vw, 1000px\" srcset=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp 1000w, https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-57x30.png.webp 57w\" alt=\"\" width=\"1000\" height=\"500\" data-ll-status=\"loading\" \/><\/p><p>DORA consolidates various initiatives from different European regulatory authorities, including the European Central Bank (ECB), into a single document. Essentially, DORA impacts every participant in the financial market, including banks, investment firms, asset management companies, digital asset providers, insurance companies, and others.<\/p><p>In Poland alone, the regulation will apply to 29 commercial banks, nearly 500 cooperative banks, over 40 payment institutions, and notably, dozens of IT solution providers.<\/p><p>Under DORA, financial institutions are obligated to manage information and communication technology (ICT) risks, report incidents, test operational resilience, manage third-party (ICT service providers) risks, and share information with other entities in the financial sector.<\/p><h2 id=\"steeper-penalties-and-greater-order\">Steeper Penalties and Greater Order<\/h2><p>While banks are accustomed to regulations, DORA introduces several new elements. It all began in 2002 with the Sarbanes-Oxley Act, which increased the responsibility of boards in financial reporting and internal controls. Then came Basel I, II, and III, PCI DSS, and numerous other regulations. So, what new aspects does DORA bring to regulations for financial institutions?<\/p><p>Three factors are worth highlighting:<\/p><ul><li>DORA unifies digital security regulations in the financial sector. Regulations for the industry are scattered across various legal acts, and sometimes they simply do not align well with one another.<\/li><li>The introduction of individual penalties for board members ensures that compliance cannot be ignored. The penalties are quite severe, with maximum fines reaching up to \u20ac10 million. In the case of serious or repeated violations, the fine can be doubled, and in extreme situations, imprisonment is not excluded. This personal risk emphasizes the need for top-level managers to be actively involved in ensuring compliance with DORA.<\/li><li>For the first time, regulations include IT system providers. DORA changes the game, as financial institutions are now obligated to impose requirements on IT infrastructure providers. In practice, this means financial entities can only contract external ICT service providers that meet high and up-to-date information security standards. Moreover, certain oversights may result in penalties for infrastructure providers.<\/li><\/ul><p>The regulation sets the bar quite high\u2014not only for IT hardware and software manufacturers but also for cloud service providers and MSSPs (Managed Security Service Providers).<\/p><h2 id=\"dora-and-data-protection\">DORA and Data Protection<\/h2><p>According to data from Check Point, banks operating in Poland must fend off more than 1,600 attacks daily. Hackers target only the military and public institutions more frequently in the country. A similar situation exists in the United States, where the financial sector ranks second in the frequency of cyberattacks.<\/p><p>Attackers have straightforward goals\u2014they want money or data, and financial institutions have both. Banks and insurers handle vast amounts of personal and financial data, including bank accounts, transaction details, investment information, and credit histories. These organizations manage highly sensitive data, and breaches can result in severe consequences for both customers and the institutions themselves. For this reason, the financial sector pays close attention to the ever-growing body of privacy and data protection regulations.<\/p><p>The latest of these is the aforementioned <strong>DORA<\/strong>, which clearly defines requirements for financial institutions regarding data backup and recovery. Their obligations include configuring backup systems capable of withstanding cyber incidents, system failures, and disruptions. Notably, DORA emphasizes that creating backups is not just an IT issue but a management responsibility requiring oversight and approval from executive leadership.<\/p><h2 id=\"article-12-data-protection-guidelines\">Article 12 \u2013 Data Protection Guidelines<\/h2><p>Article 12 of the DORA regulation provides detailed guidelines on the principles, procedures, and methods for data backup, restoration, and recovery. According to these provisions, financial entities are required to develop and document rules and procedures for backing up and recovering data.<\/p><p>The document must specify the scope of data to be backed up and the frequency of backups. When determining <strong>RTO (Recovery Time Objective)<\/strong> and <strong>RPO (Recovery Point Objective)<\/strong> for each function, it is essential to consider its criticality and the extent to which disruptions would harm the entity\u2019s financial performance and service continuity.<\/p><p>In addition to regular backups of critical systems and data, DORA mandates periodic testing of backup procedures and recovery methods. Financial institutions are also required to establish clear procedures for both internal and external communication during incidents. This ensures timely and effective responses, including notifying relevant authorities and customers.<\/p><p>Financial institutions must conduct <strong>post-incident reviews<\/strong> to maintain the highest levels of data integrity. These reviews should also be carried out during the reconstruction of data from clients and partners to ensure the consistency of all data transferred between systems.<\/p><p>DORA also specifies requirements for <strong>central securities depositories<\/strong>, which must maintain at least one secondary data processing site:<\/p><p>a) <strong>A safe distance<\/strong> from the primary processing site to prevent the same event from affecting both locations.<br \/>b) <strong>Capability to ensure continuity<\/strong> of critical functions at the same level as the primary site or at a service level sufficient to carry out recovery processes.<br \/>c) <strong>Immediate access<\/strong> for financial entity personnel to ensure the continuity of critical functions if the primary site becomes unavailable.<\/p><h2 id=\"data-protection-for-saas\">Data Protection for SaaS<\/h2><p>Cloud applications are the largest source of data breaches, according to 60% of respondents in <em>The 2024 State of SaaS Resilience<\/em> survey.<\/p><p>However, half of the respondents mistakenly believe that cloud service providers (CSPs) are solely responsible for data protection. In reality, CSPs operate under a <strong>shared responsibility model<\/strong>, meaning they are responsible for the security of the cloud infrastructure and the solutions they offer, while users are responsible for securing their own data and applications within the cloud.<\/p><p>Unfortunately, misunderstanding this principle often results in data loss caused by employee errors or cyberattacks. This issue affects banks, insurance companies, and fintech organizations alike. However, with the implementation of DORA, the situation is set to change. Financial institutions, when signing contracts with SaaS providers, will now inquire about the ability to obtain a complete copy of their data\u2014questions that will be raised as early as the procurement stage.<\/p><p>If the service provider does not offer backup services, the responsibility will fall on the user. In such cases, backups must be stored in a separate local system or in the cloud of another provider.<\/p><h3>How does Storware Backup and Recovery support Digital Operational Resilience Act (DORA)?<\/h3><p>Storware Backup and Recovery software aligns with the principles of the <strong>Digital Operational Resilience Act (DORA)<\/strong> by providing robust data protection, ensuring operational continuity, and supporting compliance with regulatory requirements. Here\u2019s how Storware helps companies meet DORA\u2019s key principles:<\/p><p data-sourcepos=\"1:1-1:138\">1. <strong>ICT Risk Management Framework<\/strong><\/p><ul><li>Centralized management console to monitor backup and recovery activities.<\/li><li>Reporting and alerts for backup failures<\/li><li>Supports enterprise-wide implementation of ICT risk strategies.<\/li><\/ul><p data-sourcepos=\"1:1-1:138\">2. <strong>Incident Reporting<\/strong><\/p><ul><li>Logs and audit trails for all backup and restore operations, facilitating incident detection and reporting.<\/li><li>Detailed insights into data integrity issues or failures.<\/li><li>Automated reporting features to notify of anomalies or recovery scenarios.<\/li><\/ul><p data-sourcepos=\"1:1-1:138\">3. <strong>Digital Operational Resilience Testing<\/strong><\/p><ul><li>Built-in recovery testing features ensure backup data is recoverable and operational.<\/li><li>Non-disruptive testing capabilities to verify disaster recovery plans without impacting live environments.<\/li><li>Tools to simulate different failure scenarios and measure recovery time objectives (RTOs) and recovery point objectives (RPOs).<\/li><\/ul><p data-sourcepos=\"1:1-1:138\">4. <strong>Third-Party Risk Management<\/strong><\/p><ul><li>Supports backup of data across diverse environments, including on-premises, cloud, and hybrid setups, ensuring resilience against third-party failures.<\/li><li>Vendor-neutral architecture minimizes dependency on any single third-party provider.<\/li><li>Data encryption and access controls to secure data managed by external service providers.<\/li><\/ul><p data-sourcepos=\"1:1-1:138\">5. <strong>Information Sharing<\/strong><\/p><ul><li>Facilitates collaboration with IT and security teams by providing clear reports and analytics on backup-related events.<\/li><li>Promotes a unified approach to managing cybersecurity threats through visibility into data protection workflows.<\/li><\/ul><p data-sourcepos=\"1:1-1:138\">6. <strong>Governance and Oversight<\/strong><\/p><ul><li>Role-based access controls (RBAC) and user activity tracking ensure accountability within the organization.<\/li><li>Simplifies audits with detailed documentation of backup configurations and recovery processes.<\/li><\/ul><p data-sourcepos=\"1:1-1:138\">7. <strong>Critical ICT Providers Oversight<\/strong><\/p><ul><li>Works seamlessly with major cloud providers (AWS, Azure, Google Cloud) and ensures their data protection meets compliance requirements.<\/li><li>Encrypts backups and ensures secure data transfer, reducing risks from third-party vulnerabilities.<\/li><\/ul><p data-sourcepos=\"1:1-1:138\">8. <strong>Adaptation and Compliance<\/strong><\/p><ul><li>Regular updates to the software ensure compatibility with evolving cybersecurity threats and regulations.<\/li><li>Flexible deployment options enable organizations to adapt their data protection strategy as needed.<\/li><li>Compliance-friendly features such as encryption, immutability, and detailed reporting support adherence to regulatory standards like DORA.<\/li><\/ul><p>By delivering <strong>resilient, secure, and adaptive backup and recovery solutions<\/strong>, Storware enables financial entities to meet the stringent requirements of DORA, ensuring business continuity and safeguarding critical data in an increasingly digital and regulated environment.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c2fd39 elementor-widget elementor-widget-video\" data-id=\"1c2fd39\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/Spck_g-K8gs&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ae6f3 post-content elementor-widget elementor-widget-text-editor\" data-id=\"47ae6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p>A data <a href=\"https:\/\/storware.eu\/blog\/disaster-recovery-or-how-to-get-your-business-back-on-track\/\"><span style=\"text-decoration: underline;\">recovery plan<\/span><\/a> (DRP) is a structured approach that describes how an organization will respond quickly to resume activities after a disaster that disrupts the usual flow of activities. A vital part of your DRP is recovering lost data.<\/p><p>Virtualization helps you protect your data online through virtual data recovery (VDR). VDR is the creation of a virtual copy of an organization\u2019s data in a virtual environment to ensure a quick bounce back to normalcy following an IT disaster.<\/p><p>While having a virtual data recovery plan is good, you must also provide an off-site backup for a wholesome data recovery plan that can adequately prevent permanent data loss. An off-premises backup location provides an extra security layer in the event of data loss. Thus, you shouldn\u2019t leave this out when planning your data recovery process.<\/p><p>Let\u2019s try to look at this issue in a general way, knowing how diverse and capacious the issue of virtualization and disaster recovery is. Certainly, implementing a <a href=\"https:\/\/storware.eu\/why-storware\/\"><span style=\"text-decoration: underline;\">dedicated data protection solution<\/span><\/a> will help streamline data protection and disaster recovery processes.<\/p><h2 id=\"benefits-of-virtualization-for-disaster-recovery\">Benefits of Virtualization for Disaster Recovery<\/h2><p>Virtualization plays a crucial role in disaster recovery. Its ability to create a digital version of your hardware offers a backup in the event of a disaster. Here are some benefits of virtualization for disaster recovery.<\/p><ul><li>Recover Data From Any Hardware<\/li><\/ul><p>If your hardware fails, you can recover data from it through virtualization. You can access your virtual desktop from any hardware, allowing you to recover your information quickly. Thus, you can save time and prevent data loss during disasters.<\/p><ul><li>Backup and Restore Full Images<\/li><\/ul><p>With virtualization, your server\u2019s files will be stored in a single image file. Restoring the image file during data recovery requires you to duplicate and restore it. Thus, you can effectively store your files and recover them when needed.<\/p><ul><li>Copy Data to a Backup Site<\/li><\/ul><p>Your organization\u2019s backups must have at least one extra copy stored off-site. This off-premise backup protects your data against loss during natural disasters, hardware failure, and power outages. Data recovery will help automatically copy and transfer files virtually to the off-site storage occasions.<\/p><ul><li>Reduce Downtime<\/li><\/ul><p>There\u2019s little to no downtime when a disaster event occurs. You can quickly restore the data from the virtual machines. So recovery can happen within seconds to minutes instead of an hour, saving vital time for your organization.<\/p><ul><li>Test Disaster Recovery Plans<\/li><\/ul><p>Virtualization can help you <a href=\"https:\/\/storware.eu\/blog\/disaster-recovery-testing-best-practices\/\"><span style=\"text-decoration: underline;\">test your disaster recovery plans<\/span><\/a> to see if they are fail-proof. Hence, you can test and analyze what format works for your business, ensuring you can predict a disaster\u2019s aftermath.<\/p><ul><li>Reduce Hardware Needs<\/li><\/ul><p>Since virtualization works online, it reduces the hardware resources you need to upscale. With only a few hardware, you can access multiple virtual machines simultaneously. This leads to a smaller workload and lower operation costs.<\/p><ul><li>Cost Effective<\/li><\/ul><p>Generally, virtualization helps to reduce the cost of funding virtual disaster recovery time. With reduced use of hardware and quicker recovery time, the data recovery cost is reduced, decreasing the potential loss caused by disasters.<\/p><h2 id=\"data-recovery-strategies-for-virtualization\">Data Recovery Strategies for Virtualization<\/h2><p>Below are some practical strategies to help build a robust data recovery plan for your organization\u2019s virtual environment:<\/p><ul><li>Backup and Replication<\/li><\/ul><p>Create regular backups of your virtual machines that will be stored in a different location\u2014for instance, an external drive or a cloud service. You can also create replicas and copies of your virtual machines that are synchronized with the original. You can switch from the original to a replica in case of failure.<\/p><ul><li>Snapshot and Restore<\/li><\/ul><p>Snapshots capture your data at specific preset moments, creating memories of them. Restore points also capture data but include all information changes after the last snapshot. You can use snapshot and restore to recover the previous state of your data before the data loss or corruption.<\/p><ul><li>Encryption and Authentication<\/li><\/ul><p>Encryption and authentication are essential security measures that work in tandem to safeguard data from unauthorized access. By employing both methods, you establish robust layers of defense. This, thereby, fortifies your data against potential cyber threats, ultimately mitigating the risks associated with corruption and theft.<\/p><h2 id=\"conclusion\">Conclusion<\/h2><p>Creating a disaster recovery plan is crucial for every organization as it helps prevent permanent data loss in the event of a disaster, leading to data loss or corruption. Virtualization helps in data recovery by creating a virtual copy of your hardware that can be accessed after a disaster.<\/p><p>Virtualization reduces downtime, helps to recover data from the hardware, reduces hardware needs, and facilitates testing your data recovery plans. However, you must note that virtual data recovery is only a part of a failproof disaster recovery plan. You must make provisions for an off-premises backup site for more robust protection.<\/p><p>\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 post-content elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"83046\" class=\"elementor elementor-83046\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f508312 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1f508312\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d0a9f4a\" data-id=\"5d0a9f4a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1aff8842 elementor-widget elementor-widget-text-editor\" data-id=\"1aff8842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Storware<br \/><\/strong>Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The new EU regulation, DORA, is set to significantly en [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1291,1305,61],"tags":[1077,1292],"class_list":["post-102047","post","type-post","status-publish","format-standard","hentry","category-storware","category-1305","category-press-release","tag-1077","tag-storware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA: Safeguarding Financial Data - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA: Safeguarding Financial Data - Version 2\" \/>\n<meta property=\"og:description\" content=\"The new EU regulation, DORA, is set to significantly en [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-24T08:27:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/dora-safeguarding-financial-data\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"DORA: Safeguarding Financial Data\",\"datePublished\":\"2025-01-24T08:27:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/dora-safeguarding-financial-data\\\/\"},\"wordCount\":2222,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/12_2024_DORA_1200x630_2-1000x500.png.webp\",\"keywords\":[\"2025\",\"Storware\"],\"articleSection\":[\"Storware\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/dora-safeguarding-financial-data\\\/\",\"url\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/\",\"name\":\"DORA: Safeguarding Financial Data - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/12_2024_DORA_1200x630_2-1000x500.png.webp\",\"datePublished\":\"2025-01-24T08:27:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/12_2024_DORA_1200x630_2-1000x500.png.webp\",\"contentUrl\":\"https:\\\/\\\/storware.eu\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/12_2024_DORA_1200x630_2-1000x500.png.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/storware.eu\\\/blog\\\/dora-safeguarding-financial-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DORA: Safeguarding Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA: Safeguarding Financial Data - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/","og_locale":"zh_HK","og_type":"article","og_title":"DORA: Safeguarding Financial Data - Version 2","og_description":"The new EU regulation, DORA, is set to significantly en [&hellip;]","og_url":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/","og_site_name":"Version 2","article_published_time":"2025-01-24T08:27:40+00:00","og_image":[{"url":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"11 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/01\/dora-safeguarding-financial-data\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"DORA: Safeguarding Financial Data","datePublished":"2025-01-24T08:27:40+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/01\/dora-safeguarding-financial-data\/"},"wordCount":2222,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp","keywords":["2025","Storware"],"articleSection":["Storware","2025","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/01\/dora-safeguarding-financial-data\/","url":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/","name":"DORA: Safeguarding Financial Data - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#primaryimage"},"image":{"@id":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp","datePublished":"2025-01-24T08:27:40+00:00","breadcrumb":{"@id":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#primaryimage","url":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp","contentUrl":"https:\/\/storware.eu\/wp-content\/uploads\/2025\/01\/12_2024_DORA_1200x630_2-1000x500.png.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/storware.eu\/blog\/dora-safeguarding-financial-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"DORA: Safeguarding Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qxV","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=102047"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102047\/revisions"}],"predecessor-version":[{"id":102054,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102047\/revisions\/102054"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=102047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=102047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=102047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}