{"id":91516,"date":"2024-10-04T17:40:06","date_gmt":"2024-10-04T09:40:06","guid":{"rendered":"https:\/\/version-2.com\/?p=91516"},"modified":"2024-09-25T17:43:37","modified_gmt":"2024-09-25T09:43:37","slug":"essential-nis2-compliance-checklist-for-businesses","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/essential-nis2-compliance-checklist-for-businesses\/","title":{"rendered":"Essential NIS2 compliance checklist for businesses"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"91516\" class=\"elementor elementor-91516\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/aMDkEK6lP6UjxnQjogX8B\/15acd88c649c1279ce42c33f05356050\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Nowadays, cybersecurity threats are not just evolving\u2014they\u2019re escalating at an alarming rate. The<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\" target=\"_blank\" rel=\"noopener\"> X-Force Threat Intelligence Index 2024<\/a> reveals that nearly half of all breaches involve the theft of sensitive customer data, and attacks using valid credentials have surged by 71%. Ransomware, a relentless menace, has held its position as the most common form of cyberattack for four consecutive years. With the annual cost of cybercrime projected to soar to $10.5 trillion by 2025, the stakes have never been higher.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Against this backdrop, the European Union has introduced<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"noopener\"> the NIS2 Directive<\/a>, <b>a significant update designed to fortify cybersecurity measures across all member states<\/b>. This directive is not just an enhancement of its predecessor\u2014it\u2019s a necessary evolution to confront the sophisticated and pervasive cyber threats that businesses face today. For organizations spanning various sectors, understanding and following NIS2 requirements isn\u2019t just about compliance; <b>it\u2019s about staying secure in an increasingly hostile digital environment<\/b>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This NIS2 checklist is your guide through the critical steps toward NIS2 compliance. It ensures your organization is equipped to meet the rigorous standards required to protect your digital infrastructure and maintain robust security in <b>a world where the next cyberattack is not<\/b> <b>a question of if but when.<\/b><\/p><h2 id=\"overview-of-the-nis2-directive\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Overview of the NIS2 Directive<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The NIS2 Directive is an update to the Network and Information Security (NIS) Directive introduced by the European Union to enhance cybersecurity across member states. It aims to bolster the resilience of critical infrastructure and digital services against <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/network-security\/threats\/\">cyber threats<\/a>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NIS2 extends its scope beyond essential services to include medium and large enterprises in set critical sectors, emphasizing a comprehensive approach to risk management and incident reporting. It requires <b>stricter security measures and sets clearer obligations for organizations <\/b>to manage risks, protect their systems, and report major security incidents.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Who needs to comply?<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Compliance with the NIS2 Directive is required for a broad range of medium and large enterprises operating in critical sectors, including operators in energy, transport, and health sectors, as well as online marketplaces and cloud computing services.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">To comply, these organizations must implement robust cybersecurity measures and follow the directive&#8217;s standards for protecting their digital infrastructure and managing supply chain security.<\/p><h2 id=\"nis2-compliance-checklist\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">NIS2 compliance checklist<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Achieving <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/security-compliance\/nis2\/\">compliance with NIS2<\/a> involves a systematic approach that covers various aspects of your organization\u2019s cybersecurity strategy. This checklist outlines the key considerations to help guide your business toward meeting the directive\u2019s requirements.<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"NIS2 compliance checklist\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/qYpvd5RpnWfzqRKPLy9Uz\/9e7feefaa896911a3044cf5ceb748383\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"488\" \/><\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">1. Governance and risk management<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Establish clear governance structures to support NIS2 compliance. Define organizational goals, risk appetite, and strategic objectives. Assign specific roles and responsibilities for compliance tasks, ensuring accountability in case of non-compliance. Regularly assess and document cyber risks, focusing on internal and external factors that could impact your organization\u2019s security. Involve top management in approving and overseeing cybersecurity measures to ensure they align with business objectives.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">2. Evaluating security effectiveness<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Document and regularly review your security policies to ensure they are up-to-date and in line with NIS2 standards. Implement formal incident response plans with a ticketing system for incident detection, triage, and response. Secure your supply chain by assessing the cybersecurity practices of your suppliers and service providers, ensuring comprehensive protection from potential vulnerabilities. Additionally, establish backup management and disaster recovery plans that align with your organization\u2019s Recovery Time Objectives (RTOs) to maintain business continuity.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">3. Technical and operational measures<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Implement basic cyber hygiene practices, such as regular <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/training-employees-on-cyber-security\/\">security training for employees<\/a>, to maintain high-security standards. Secure your network and information systems by addressing vulnerabilities and adopting strong cryptographic practices. Use advanced security measures, such as <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/what-is-endpoint-security\/\">endpoint protection<\/a> and robust network defenses, to <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/how-to-prevent-unauthorized-access\/\">prevent unauthorized access<\/a> and safeguard against cyberattacks.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">4. Security technologies and solutions<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Deploy a suite of security technologies that best fit your organization\u2019s needs, ensuring they align with NIS2\u2019s technical requirements. This can include tools like Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and User and Entity Behavior Analytics (UEBA) systems. Ensure these technologies align with industry standards and regulations, such as <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/gdpr\/what-is-gdpr\/\">GDPR<\/a>, and are capable of protecting your digital infrastructure from breaches and unauthorized access.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">5. Technical compliance and certifications<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Utilize <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/multi-factor-authentication-best-practices\/\">multi-factor authentication (MFA)<\/a> and secure communication systems, especially for remote or privileged access. Ensure that your cybersecurity practices are aligned with recognized frameworks and certifications, such as <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/iso\/iso-27001\/\">ISO 27001<\/a> for information security management. Regularly review and update your technical measures to maintain compliance with evolving standards.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">6. Compliance with legal and industry standards<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Familiarize yourself with <b>the specific requirements of NIS2<\/b> and how they <b>differ from the original directive. <\/b>Align your cybersecurity strategies with industry-specific regulations, such as <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/hipaa\/what-is-hipaa-compliance\/\">HIPAA<\/a> for healthcare or NERC CIP for energy. Use recognized frameworks like NIST SP 800 or CIS Controls to strengthen your organization\u2019s security posture.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">7. Reporting and communication<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Develop robust processes for detecting, analyzing, and reporting security incidents. Ensure timely communication with relevant authorities and stakeholders, following the reporting timelines and content requirements set out in NIS2. Document your governance processes and cybersecurity efforts comprehensively, using benchmarks like ISO\/IEC 27002 to support compliance and make your reporting efficient.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">8. Human resources and training<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Implement HR policies that control access based on roles and conduct regular security assessments. Provide ongoing cybersecurity training and awareness programs for all employees, ensuring they have the knowledge to <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/protect-sensitive-data\/\">protect sensitive data<\/a> and comply with NIS2 requirements. Integrate these training initiatives into your overall risk management strategy and regularly update them to address new threats and reinforce best practices.<\/p><h2 id=\"how-nordlayer-can-support-your-nis2-compliance-journey\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How NordLayer can support your NIS2 compliance journey<\/h2><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"How NordLayer fits with NIS2\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5GsKppJ6lgz24DDe3v1t4G\/8ee0856a7fe2615738474af56442ed50\/How_NordLayer_fits_with_NIS2.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"480\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As a network security provider, NordLayer offers a range of tools and services to help your organization meet the stringent requirements of the NIS2 Directive. Here\u2019s how we can assist:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Advanced access control:<\/b> With NordLayer\u2019s <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/private-gateway\/\">Virtual Private Gateways<\/a> and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/cloud-firewall\/\">Cloud Firewall<\/a>, you can enforce strict <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/network-security\/access-control\/\">Network Access Control (NAC)<\/a> policies, ensuring only authorized and compliant devices access your network. Our multi-layered authentication methods, including two-factor authentication (2FA) and biometric verification, provide an additional layer of security.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Effective incident prevention:<\/b> Protect your network from cyber threats with NordLayer\u2019s suite of threat prevention tools, including traffic encryption, IP masking, and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/dns-filtering\/\">DNS filtering by category<\/a>, helps protect your network from cyber threats.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Strong cryptography:<\/b> Our <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/vpn-gateway\/\">VPN gateways<\/a> provide quantum-safe encryption, securing data in transit and safeguarding sensitive information. This creates a secure environment for online activities and access to critical resources.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Network monitoring and management:<\/b> Gain a clear overview of connected devices and network usage with NordLayer\u2019s <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/network-visibility\/\">activity monitoring<\/a> and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/device-posture-security\/\">device posture<\/a> management features. This helps you proactively identify and address potential security issues.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Continuous security controls:<\/b> Ensure your network is protected around the clock with NordLayer\u2019s <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/always-on-vpn\/\">Always-On VPN<\/a> and auto-connect features. These controls reinforce compliance with security policies and practices.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With NordLayer, you can simplify the management of your security infrastructure while confidently meeting the demanding requirements of the NIS2 Directive. <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/contact-sales\/\">Contact NordLayer<\/a> today to learn more about how we can support your compliance efforts.<\/p><div class=\"CTABlock_ctaBlock__F0Azy\"><p class=\"Text_text__rSWMU CTABlock_caption__r3Qu_ Text_headingColor__NboQZ\" data-testid=\"text\">Get insights on achieving NIS2 compliance and learn how NordLayer&#8217;s cybersecurity solutions can help your organization. Watch the webinar recording Your recipe for NIS2 compliance strategy: What you might be missing<\/p><\/div><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a493c elementor-widget elementor-widget-text-editor\" data-id=\"c6a493c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Nowadays, cybersecurity threats are not just evolving\u2014t [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1130,61],"tags":[974,1132,1272],"class_list":["post-91516","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordlayer","category-press-release","tag-nord-security","tag-nordlayer","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Essential NIS2 compliance checklist for businesses - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential NIS2 compliance checklist for businesses - Version 2\" \/>\n<meta property=\"og:description\" content=\"Nowadays, cybersecurity threats are not just evolving\u2014t [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T09:40:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/aMDkEK6lP6UjxnQjogX8B\/15acd88c649c1279ce42c33f05356050\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/essential-nis2-compliance-checklist-for-businesses\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Essential NIS2 compliance checklist for businesses\",\"datePublished\":\"2024-10-04T09:40:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/essential-nis2-compliance-checklist-for-businesses\\\/\"},\"wordCount\":1250,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/aMDkEK6lP6UjxnQjogX8B\\\/15acd88c649c1279ce42c33f05356050\\\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordLayer\",\"2024\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/essential-nis2-compliance-checklist-for-businesses\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/\",\"name\":\"Essential NIS2 compliance checklist for businesses - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/aMDkEK6lP6UjxnQjogX8B\\\/15acd88c649c1279ce42c33f05356050\\\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-10-04T09:40:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/aMDkEK6lP6UjxnQjogX8B\\\/15acd88c649c1279ce42c33f05356050\\\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/aMDkEK6lP6UjxnQjogX8B\\\/15acd88c649c1279ce42c33f05356050\\\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nis2-compliance-checklist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Essential NIS2 compliance checklist for businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Essential NIS2 compliance checklist for businesses - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/","og_locale":"zh_HK","og_type":"article","og_title":"Essential NIS2 compliance checklist for businesses - Version 2","og_description":"Nowadays, cybersecurity threats are not just evolving\u2014t [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/","og_site_name":"Version 2","article_published_time":"2024-10-04T09:40:06+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/aMDkEK6lP6UjxnQjogX8B\/15acd88c649c1279ce42c33f05356050\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/essential-nis2-compliance-checklist-for-businesses\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Essential NIS2 compliance checklist for businesses","datePublished":"2024-10-04T09:40:06+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/essential-nis2-compliance-checklist-for-businesses\/"},"wordCount":1250,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/aMDkEK6lP6UjxnQjogX8B\/15acd88c649c1279ce42c33f05356050\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordLayer","2024"],"articleSection":["2024","Nord Security","NordLayer","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/essential-nis2-compliance-checklist-for-businesses\/","url":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/","name":"Essential NIS2 compliance checklist for businesses - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/aMDkEK6lP6UjxnQjogX8B\/15acd88c649c1279ce42c33f05356050\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-10-04T09:40:06+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/aMDkEK6lP6UjxnQjogX8B\/15acd88c649c1279ce42c33f05356050\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/aMDkEK6lP6UjxnQjogX8B\/15acd88c649c1279ce42c33f05356050\/NIS2_compliance_checklist.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/nis2-compliance-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Essential NIS2 compliance checklist for businesses"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-nO4","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=91516"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91516\/revisions"}],"predecessor-version":[{"id":91525,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/91516\/revisions\/91525"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=91516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=91516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=91516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}