{"id":97252,"date":"2024-11-28T16:47:44","date_gmt":"2024-11-28T08:47:44","guid":{"rendered":"https:\/\/version-2.com\/?p=97252"},"modified":"2024-11-20T16:34:05","modified_gmt":"2024-11-20T08:34:05","slug":"choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/","title":{"rendered":"Choosing a software solution: Eight things to consider for the NIS2 directive"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"97252\" class=\"elementor elementor-97252\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5338948 post-content elementor-widget elementor-widget-text-editor\" data-id=\"5338948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.cloudm.io\/wp-content\/uploads\/fly-images\/4839\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp\" width=\"700\" height=\"400\" \/><\/p><div class=\"f-container f-container-center \"><p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.cloudm.io\/resources\/blog\/what-is-nis2-what-do-you-need-to-do\/\"><span style=\"font-weight: 400;\">Network and Information Securities Directive (NIS) 2<\/span><\/a><span style=\"font-weight: 400;\"> aims to increase the security and resilience of essential services and digital infrastructure in the European Union. It affects essential entities (including energy, transport, and banking) and important entities (such as postal, food, and manufacturing).\u00a0\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The legislation came into force on 18 October 2024, following the creation of national laws based on the directive. <\/span><a href=\"https:\/\/www.cloudm.io\/resources\/blog\/what-is-nis2-what-do-you-need-to-do\/\"><span style=\"font-weight: 400;\">Key requirements<\/span><\/a><span style=\"font-weight: 400;\"> include risk assessment, management and prevention, incident reporting within 24 hours, and backup and disaster recovery.<\/span><\/p><p><span style=\"font-weight: 400;\">Software can help mandated organisations maintain compliance and stay ahead of cybersecurity threats. Here\u2019s what you should look for in <\/span><span style=\"font-weight: 400;\">NIS2 compliance<\/span><span style=\"font-weight: 400;\">\u00a0software.<br \/><br \/><\/span><\/p><h2><strong>What do you need to keep in mind when choosing a new software solution?<br \/><br \/><\/strong><\/h2><p><span style=\"font-weight: 400;\">Fines and punishments for NIS2 are stringent \u2013 up to 2% of global annual revenue. Staying compliant isn\u2019t just a cybersecurity matter, it\u2019s a financial one.\u00a0<\/span><\/p><p>CloudM helps you meet the NIS2 implementation requirements with Backup, our solution for preventing data loss and ensuring recovery and restoration. Backup keeps data protected in the background, while you\u2019re free to focus on the business.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e350538 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e350538\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-046e814\" data-id=\"046e814\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86f4ff9 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"86f4ff9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" data-attachment-id=\"97255\" data-permalink=\"https:\/\/version-2.com\/zh\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/attachment\/1731920410628\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920410628.jpg\" data-orig-size=\"66,76\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1731920410628\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920410628.jpg\" width=\"66\" height=\"76\" src=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920410628.jpg\" class=\"attachment-full size-full wp-image-97255\" alt=\"\" data-attachment-id=\"97255\" data-permalink=\"https:\/\/version-2.com\/zh\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/attachment\/1731920410628\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920410628.jpg\" data-orig-size=\"66,76\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1731920410628\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920410628.jpg\" srcset=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920410628.jpg 66w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920410628-10x12.jpg 10w\" sizes=\"(max-width: 66px) 100vw, 66px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">\u20ac10 million<\/h3><p class=\"elementor-image-box-description\">\n\nEssential entities face fines of up to \u20ac10 million or 2% of global annual revenue.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c9e51ca\" data-id=\"c9e51ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7970d62 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7970d62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" data-attachment-id=\"97254\" data-permalink=\"https:\/\/version-2.com\/zh\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/attachment\/1731920420700\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920420700.jpg\" data-orig-size=\"77,80\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1731920420700\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920420700.jpg\" width=\"77\" height=\"80\" src=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920420700.jpg\" class=\"attachment-full size-full wp-image-97254\" alt=\"\" data-attachment-id=\"97254\" data-permalink=\"https:\/\/version-2.com\/zh\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/attachment\/1731920420700\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920420700.jpg\" data-orig-size=\"77,80\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1731920420700\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920420700.jpg\" srcset=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920420700.jpg 77w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/1731920420700-12x12.jpg 12w\" sizes=\"(max-width: 77px) 100vw, 77px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">\u20ac7 million<\/h3><p class=\"elementor-image-box-description\">\n\nImportant entities face fines of up to \u20ac7 million or 1.4% of global annual revenue<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-207905c post-content elementor-widget elementor-widget-text-editor\" data-id=\"207905c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"f-container f-container-center \"><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">These software features help stay on track and ensure compliance with the NIS2 directive.<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>1. Automation<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">Under the <\/span><span style=\"font-weight: 400;\">NIS2 directive<\/span><span style=\"font-weight: 400;\">, organizations need to have regular backups so critical data can be restored following an incident. When this process is automated it reduces the risk of human error and enables business continuity. Features like automated event logging and detection also mean you\u2019re in a better position to meet the 24-hour incident response time.\u00a0<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>2. Support<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">With just 24 hours to respond to an incident, additional support from your software vendor can be a lifeline.<\/span><\/p><p><span style=\"font-weight: 400;\">Responsive, round-the-clock support helps you navigate incidents swiftly and effectively within 24 hours. Beyond incident support, modern software providers also offer guidance and training on how to use tools effectively, so you can ensure future<\/span><span style=\"font-weight: 400;\"> NIS2 compliance<\/span><span style=\"font-weight: 400;\"> and be prepared for what\u2019s ahead.\u00a0<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>3. Security and compliance<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">Effective prevention can help you avoid the most harmful situations. Using end-to-end encryption, single sign-on, multi-factor authentication, and role-based access controls protects your data. Your software provider should also meet security standards, such as ISO 27001, which demonstrates they use data protection best practices.<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>4. Incident reporting\u00a0<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">You need fast and comprehensive incident reporting mechanisms to meet the 24-hour requirement for <\/span><span style=\"font-weight: 400;\">NIS2 compliance<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Real-time monitoring, alerting, and automated logging of suspicious or unusual activity can help you achieve this. These features enable your security team to respond effectively before any damage is done \u2013 and means instead of searching for the specific cause, they can focus on solutions for recovery first.<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>5. Disaster recovery<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">As the spate of <\/span><a href=\"https:\/\/news.sky.com\/story\/procedures-cancelled-after-cyber-attack-affects-major-london-hospitals-13147595\"><span style=\"font-weight: 400;\">recent NHS cyberattacks<\/span><\/a><span style=\"font-weight: 400;\"> prove, security breaches are a real threat, with serious consequences for organizations.<\/span><\/p><p><span style=\"font-weight: 400;\">Data recovery tools help to ensure business continuity. Frequent, automated data backups enable you to recover the most recent file versions. Flexible restoration options \u2013 such as folder, user, and item-specific recovery \u2013 can be particularly helpful if you only need to complete a partial restoration.\u00a0<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>6. Scalability and flexibility<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">Organizational data grows as your business does, and the ability to handle more of it is essential for <\/span><span style=\"font-weight: 400;\">NIS2 compliance<\/span><span style=\"font-weight: 400;\">. Every piece of data your organization gains is something that could leak or be accessed by a cybercriminal.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Finding software that\u2019s scalable and flexible will help you maintain business continuity. Whether you\u2019re responding to regulatory or organizational changes, having software that grows with you and updates in line with new legislation is key.\u00a0<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>7. Data protection and privacy<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">Strict data retention controls \u2013 including the ability to wipe data as needed and limit access to business-critical data \u2013 can help you meet <\/span><span style=\"font-weight: 400;\">NIS2 directive<\/span><span style=\"font-weight: 400;\"> risk management requirements.<\/span><\/p><p><span style=\"font-weight: 400;\">Security requirements differ in every region, and your software should be able to accommodate these variations. Consider the range of security standards your organization needs to meet \u2013 and whether your chosen provider is set up for future changes.\u00a0<\/span><\/p><p>\u00a0<\/p><h3><span style=\"color: #f06742;\"><strong>8. Customizable security settings<br \/><br \/><\/strong><\/span><\/h3><p><span style=\"font-weight: 400;\">All organizations require different levels of data access. Getting this right can help you meet NIS2 risk management, incident prevention, and corporate accountability requirements.<\/span><\/p><p><span style=\"font-weight: 400;\">Opt for software with adjustable access levels and protocols depending on organization size and the amount of data. By assigning specific permissions to people in your organization, you can limit the risk of data falling into the wrong hands.<\/span><\/p><p>\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41b66e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41b66e0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2550e64\" data-id=\"2550e64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-343f771 elementor-widget elementor-widget-spacer\" data-id=\"343f771\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c224d94 elementor-widget elementor-widget-shortcode\" data-id=\"c224d94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"56698\" class=\"elementor elementor-56698\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About CloudM<\/strong><br \/>CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.<br \/><br \/>Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it\u2019s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.<\/p><p>By automating time-consuming tasks like IT admin, onboarding &amp; offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.<br \/><br \/>With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-61a601d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61a601d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a1f7c0\" data-id=\"4a1f7c0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Network and Information Securities Directive (NIS)  [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1014,1273,61],"tags":[1015,1272],"class_list":["post-97252","post","type-post","status-publish","format-standard","hentry","category-cloudm","category-1273","category-press-release","tag-cloudm","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Choosing a software solution: Eight things to consider for the NIS2 directive - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Choosing a software solution: Eight things to consider for the NIS2 directive - Version 2\" \/>\n<meta property=\"og:description\" content=\"The Network and Information Securities Directive (NIS) [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-28T08:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudm.io\/wp-content\/uploads\/fly-images\/4839\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Choosing a software solution: Eight things to consider for the NIS2 directive\",\"datePublished\":\"2024-11-28T08:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\\\/\"},\"wordCount\":744,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudm.io\\\/wp-content\\\/uploads\\\/fly-images\\\/4839\\\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp\",\"keywords\":[\"CloudM\",\"2024\"],\"articleSection\":[\"CloudM\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\\\/\",\"url\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/\",\"name\":\"Choosing a software solution: Eight things to consider for the NIS2 directive - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudm.io\\\/wp-content\\\/uploads\\\/fly-images\\\/4839\\\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp\",\"datePublished\":\"2024-11-28T08:47:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cloudm.io\\\/wp-content\\\/uploads\\\/fly-images\\\/4839\\\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp\",\"contentUrl\":\"https:\\\/\\\/www.cloudm.io\\\/wp-content\\\/uploads\\\/fly-images\\\/4839\\\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudm.io\\\/resources\\\/blog\\\/product-release-cloudm-migrate-november-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Choosing a software solution: Eight things to consider for the NIS2 directive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Choosing a software solution: Eight things to consider for the NIS2 directive - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/","og_locale":"zh_HK","og_type":"article","og_title":"Choosing a software solution: Eight things to consider for the NIS2 directive - Version 2","og_description":"The Network and Information Securities Directive (NIS) [&hellip;]","og_url":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/","og_site_name":"Version 2","article_published_time":"2024-11-28T08:47:44+00:00","og_image":[{"url":"https:\/\/www.cloudm.io\/wp-content\/uploads\/fly-images\/4839\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Choosing a software solution: Eight things to consider for the NIS2 directive","datePublished":"2024-11-28T08:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/"},"wordCount":744,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudm.io\/wp-content\/uploads\/fly-images\/4839\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp","keywords":["CloudM","2024"],"articleSection":["CloudM","2024","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/11\/choosing-a-software-solution-eight-things-to-consider-for-the-nis2-directive\/","url":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/","name":"Choosing a software solution: Eight things to consider for the NIS2 directive - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudm.io\/wp-content\/uploads\/fly-images\/4839\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp","datePublished":"2024-11-28T08:47:44+00:00","breadcrumb":{"@id":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#primaryimage","url":"https:\/\/www.cloudm.io\/wp-content\/uploads\/fly-images\/4839\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp","contentUrl":"https:\/\/www.cloudm.io\/wp-content\/uploads\/fly-images\/4839\/NIS2-compliance-software-8-key-considerations-2-2000x410.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudm.io\/resources\/blog\/product-release-cloudm-migrate-november-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Choosing a software solution: Eight things to consider for the NIS2 directive"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-piA","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/97252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=97252"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/97252\/revisions"}],"predecessor-version":[{"id":97516,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/97252\/revisions\/97516"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=97252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=97252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=97252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}