{"id":75540,"date":"2024-02-14T16:52:57","date_gmt":"2024-02-14T08:52:57","guid":{"rendered":"https:\/\/version-2.com\/?p=75540"},"modified":"2024-02-07T17:01:31","modified_gmt":"2024-02-07T09:01:31","slug":"nis2-directive-a-key-to-compliance-is-business-continuity","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/02\/nis2-directive-a-key-to-compliance-is-business-continuity\/","title":{"rendered":"NIS2 directive: A key to compliance is business continuity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"75540\" class=\"elementor elementor-75540\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24c3f9c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24c3f9c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c6ecd87\" data-id=\"4c6ecd87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-123ce05e elementor-widget elementor-widget-text-editor\" data-id=\"123ce05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.prismic.io\/keep-it\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800\" width=\"800\" height=\"800\" \/><\/p><div class=\"content\"><div class=\"section\"><p>As the timeline to implementation of the NIS2 directive shortens, businesses find themselves contemplating the necessary steps for implementing robust cyber security and IT compliance. The impending deadline of October 17, 2024, necessitates a strategic approach to meet the regulatory requirements outlined in NIS2.\u00a0<\/p><p>This article provides actionable insights into how organizations can proactively prepare for NIS2 compliance, with a particular focus on backup management and disaster recovery as integral components for ensuring business continuity \u2014 a key focus of the new directive, specifically article 21.<\/p><p>Let\u2019s jump into the essential steps businesses can take now to fortify their defenses against cyber threats by following a best practice framework.<\/p><p>If you\u2019re looking for a general overview of all things NIS2, such as who does NIS2 apply to, read our blog, <a href=\"\/blog\/what-is-nis2-directive\/\">\u201cWhat is the NIS2 Directive?\u201d<\/a><\/p><h2>What to do now: Get your business ready with best practices<\/h2><p><a href=\"https:\/\/www.nis-2-directive.com\/NIS_2_Directive_Article_21.html\" target=\"_blank\" rel=\"noopener\">Article 21 of the NIS2 directive<\/a> sets out clear cybersecurity risk-management measures \u201cto protect network and information systems\u201d that focus on ensuring business continuity through \u201cbackup management and disaster recovery.\u201d<\/p><p>\u00a0<\/p><p>At the minimum, the best practice would be to back up vital data, create a strong disaster recovery plan, and then test these processes to know that they work as expected (meaning you have protected your business-critical data and it can be recovered). Luckily, to help elaborate on this practice, there\u2019s a framework to follow to help guide you through the process: Map, prioritize, test.<\/p><div class=\"lazy\" data-src=\"https:\/\/keep-it.cdn.prismic.io\/keep-it\/d8e20d08-c144-426e-b6b4-c3dd6b6554cb_map-prioritize-test-framework.svg\" data-alt=\"Map-prioritize-test framework for NIS2 directive compliance backup and disaster recovery\" data-rel=\"144,150\"><div class=\"rel\" style=\"padding-top: 104.167%;\"><img decoding=\"async\" class=\"img fade in complete\" src=\"https:\/\/keep-it.cdn.prismic.io\/keep-it\/d8e20d08-c144-426e-b6b4-c3dd6b6554cb_map-prioritize-test-framework.svg\" alt=\"Map-prioritize-test framework for NIS2 directive compliance backup and disaster recovery\" width=\"144\" height=\"150\" \/><\/div><\/div><h3>Map-Prioritize-Test framework to ensure compliance<\/h3><p>This framework is helpful for businesses to prepare for compliance with the expected NIS2 requirements by boosting cyber resiliency, most notably by maintaining business-critical functions through protecting key business infrastructure. Here\u2019s more detail about what each leg of the framework entails:<\/p><p><b>1. Map <\/b>critical systems<\/p><p>Assess and analyze critical infrastructure across on-premises, native cloud, and public cloud environments. Identify and prioritize crucial data, ensuring business continuity. <a href=\"\/blog\/why-on-prem-for-azure-active-directory-is-not-enough\/\" target=\"_blank\" rel=\"noopener\">Don&#8217;t overlook <\/a>SaaS applications like Entra ID; safeguarding identity and credential data is vital.<\/p><p>\u00a0<\/p><p>Neglecting identity and access data can impact business continuity even if other data is fully restored. Microsoft recognizes identity systems as more critical than human life support systems due to how important this data is for businesses: Read what Microsoft has to say about <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/backup-plan-to-protect-against-ransomware\" target=\"_blank\" rel=\"noopener\">the importance of backing up Entra ID (formerly Azure AD).<\/a><\/p><p><b>2. Prioritize:<\/b> What is critical to maintain access to?<\/p><p>Understanding the nature of your data is key to strengthening your organization&#8217;s data resilience. As you consider the types of data you handle, such as SaaS data from Microsoft 365 (M365) or Entra ID, it becomes evident that not all data holds equal importance. This realization forms the basis for strategic prioritization, a critical step in preparing for NIS2 compliance.<\/p><p>\u00a0<\/p><p>Whether safeguarding CEO emails, logistics data, customer information, intelligence dashboards, or proprietary code, identifying the priority for recovery establishes a strategic foundation. This speeds up recovery time and minimizes downtime, ensuring that your business continuity efforts are precisely aligned with the specific datasets crucial for sustaining your operations.<br \/>By determining what needs to be recovered first, you ensure that your business continuity efforts are targeted and aligned with the specific data sets crucial for sustaining your operations. This strategic prioritization not only optimizes your backup plan but also enhances your preparedness for compliance with the NIS2 directive.<\/p><p><b>3. Test<\/b> that your backup works<\/p><p>This critical phase of the framework involves validating the effectiveness of your backup and disaster recovery processes. Testing is a key element of continuity, because with regular testing, your business ensures that data recovery is possible in the event of a real crisis \u2014 this is best practice data security and compliance in line with the NIS2 framework.<\/p><p>\u00a0<\/p><p>Ensuring the effectiveness of your backup and disaster recovery processes is crucial for maintaining data integrity and business continuity. The following guidelines outline key steps in the testing phase, aimed at validating your organization&#8217;s readiness to swiftly recover critical data in diverse scenarios.<\/p><p>\u00a0<\/p><p>From prompt validation of restoration capability to involving relevant stakeholders, this comprehensive testing phase guideline ensures confidence in your disaster recovery plan and ongoing resilience against potential threats:<\/p><ul><li><b>Validate restoration capability promptly:<\/b><br \/>Promptly validate that your backup systems can efficiently restore critical data without compromising integrity.<\/li><\/ul><ul><li><b>Determine acceptable downtime:<\/b><br \/>Establish the maximum allowable time for data recovery, aligning with recovery time objectives set during prioritization.<\/li><\/ul><ul><li><b>Regularly test backups for confidence:<\/b><br \/>Frequently test your backups to instill confidence in your disaster recovery plan and promptly address any identified issues.<\/li><\/ul><ul><li><b>Consider different scenarios:<\/b><br \/>Simulate diverse scenarios, testing the recovery of individual files, entire databases, and complete systems to identify weaknesses.<\/li><\/ul><ul><li><b>Document and analyze results:<\/b><br \/>After each testing session, document and analyze the time, accuracy, and challenges encountered to gain insights for improvement.<\/li><\/ul><ul><li><b>Involve relevant stakeholders:<\/b><br \/>Collaborate with IT teams, data custodians, and business continuity managers to ensure comprehensive testing aligns with broader goals.<\/li><\/ul><ul><li><b>Update and improve:<\/b><br \/>Continuously update recovery plans based on testing insights, addressing weaknesses, refining procedures, and adapting to evolving threats.<\/li><\/ul><p>As organizations diligently adhere to the rigorous testing guidelines outlined above, they pave the way for a robust IT compliance policy essential for NIS2 readiness. The elements of backup management and disaster recovery, as emphasized by Article 21 of NIS2, not only acknowledge its far-reaching impact but also serve as proactive measures against evolving cyber threats.<\/p><h2>Keepit as an established expert in EU compliance<\/h2><p>Keepit, being a European company based in Denmark, understands the intricacies of EU regulations and their profound impact as we\u2019re also subject to them ourselves. We operate without any sub-processors and maintain our own independent cloud operations within the EU, utilizing data centers in Denmark, Germany, and the UK. With a commitment to excellence in compliance, Keepit holds end-to-end <a href=\"\/blog\/end-to-end-iso-iec-27001-certified\/\">ISO 27001 certification<\/a> and is audited in accordance with ISAE 3402 type 2.<\/p><p>\u00a0<\/p><p>To guide your company through the complexities of legislative directives such as NIS2, NIS, and GDPR, we invite you to explore a demonstration of how Keepit can assist in ensuring comprehensive compliance.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c5768c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c5768c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9abbb0a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e987c36\" data-id=\"e987c36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73b3a92 elementor-widget elementor-widget-shortcode\" data-id=\"73b3a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"50842\" class=\"elementor elementor-50842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1043a3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c1043a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c911d7d\" data-id=\"c911d7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-026fa41 elementor-widget elementor-widget-text-editor\" data-id=\"026fa41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Keepit<\/strong><br \/>At Keepit, we believe in a digital future where all software is delivered as a service. Keepit\u2019s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As the timeline to implementation of the NIS2 directive [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[853,1273,61],"tags":[854,1272],"class_list":["post-75540","post","type-post","status-publish","format-standard","hentry","category-keepit","category-1273","category-press-release","tag-keepit","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 directive: A key to compliance is business continuity - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 directive: A key to compliance is business continuity - Version 2\" \/>\n<meta property=\"og:description\" content=\"As the timeline to implementation of the NIS2 directive [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T08:52:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.prismic.io\/keep-it\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/nis2-directive-a-key-to-compliance-is-business-continuity\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"NIS2 directive: A key to compliance is business continuity\",\"datePublished\":\"2024-02-14T08:52:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/nis2-directive-a-key-to-compliance-is-business-continuity\\\/\"},\"wordCount\":999,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800\",\"keywords\":[\"Keepit\",\"2024\"],\"articleSection\":[\"Keepit\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/nis2-directive-a-key-to-compliance-is-business-continuity\\\/\",\"url\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/\",\"name\":\"NIS2 directive: A key to compliance is business continuity - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800\",\"datePublished\":\"2024-02-14T08:52:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800\",\"contentUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/nis2-key-to-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 directive: A key to compliance is business continuity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 directive: A key to compliance is business continuity - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/","og_locale":"zh_HK","og_type":"article","og_title":"NIS2 directive: A key to compliance is business continuity - Version 2","og_description":"As the timeline to implementation of the NIS2 directive [&hellip;]","og_url":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/","og_site_name":"Version 2","article_published_time":"2024-02-14T08:52:57+00:00","og_image":[{"url":"https:\/\/images.prismic.io\/keep-it\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/02\/nis2-directive-a-key-to-compliance-is-business-continuity\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"NIS2 directive: A key to compliance is business continuity","datePublished":"2024-02-14T08:52:57+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/02\/nis2-directive-a-key-to-compliance-is-business-continuity\/"},"wordCount":999,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800","keywords":["Keepit","2024"],"articleSection":["Keepit","2024","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/02\/nis2-directive-a-key-to-compliance-is-business-continuity\/","url":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/","name":"NIS2 directive: A key to compliance is business continuity - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800","datePublished":"2024-02-14T08:52:57+00:00","breadcrumb":{"@id":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#primaryimage","url":"https:\/\/images.prismic.io\/keep-it\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800","contentUrl":"https:\/\/images.prismic.io\/keep-it\/30bbf18a-e387-48a0-9fb3-c3ee3400cdd8_blog-81-nis2-key-to-compliance.png?auto=compress,format&amp;rect=0,0,1000,1000&amp;w=800&amp;h=800"},{"@type":"BreadcrumbList","@id":"https:\/\/www.keepit.com\/blog\/nis2-key-to-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"NIS2 directive: A key to compliance is business continuity"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jEo","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/75540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=75540"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/75540\/revisions"}],"predecessor-version":[{"id":75545,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/75540\/revisions\/75545"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=75540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=75540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=75540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}