NIS-2 will soon come into force

B2B Cyber ​​Security ShortNews

Share post

The NIS-2 guidelines will come into force in a few months and are currently on everyone's lips. The numerous lectures and events on this topic not only underline its importance, but also show that there is still a great need for information among those responsible and decision-makers.

The October deadline is approaching inexorably, and it is of the utmost importance that companies prepare and implement their action strategies now. In principle, the NIS 2 Directive represents a significant step towards improving security standards in companies. The regulations contain clear standards that must be achieved and implemented. They help everyone to protect themselves better and provide concrete recommendations for action. Our look at the industry shows that many companies understand the urgency of the measures and also see the need to protect themselves accordingly.

However, many people are still wondering how to implement it correctly. In many places, there is still uncertainty among security officers just before the deadline. For smaller companies with up to 50 employees, external help in implementing the NIS-2 requirements can therefore be very useful. Large companies usually have the necessary expertise in-house, but should still have their strategies and plans reviewed by external experts to ensure that all requirements are met.

Basic practices for NIS-2

The specific approach will vary from company to company, but there are two practices that will underpin any mature strategy to improve corporate cyber resilience. One of these is securing accounts by implementing multi-factor authentication (MFA) instead of passwords, as modern cyberattacks can easily overcome passwords. However, not all MFA methods are the same: hardware security keys offer better and more phishing-resistant protection here.

The second essential aspect of cybersecurity is protecting critical data through encryption. Even if attackers penetrate a system, encryption makes it unlikely that they will be able to access relevant or
access critical data because they lack the private key to the data. The NIS 2 Directive may seem complex at first, but basic security measures are simple and worthwhile for long-term cyber resilience. Investing in these measures will prevent impending incidents in the future.
Yubico helps companies not only meet new legal requirements but also address broader cybersecurity challenges.

More at Yubico.com

 


About Yubico

Yubico, creator of the YubiKey, provides the gold standard for phishing-resistant multi-factor authentication (MFA) that prevents account takeovers and makes secure logins easy and accessible to everyone. Since its founding in 2007, the company has helped set global standards for secure access to computers, mobile devices, servers, browsers and Internet accounts.


Matching articles on the topic

Curious: Malware developer gives himself away through mistakes

Exposing the Styx Stealer: How a hacker's slip-up led to the discovery of a huge amount of data on his own computer. The ➡ Read more

NIS2 Directive for cybersecurity in the EU

The introduction of the EU NIS2 Directive, which is to be implemented into national law by the Member States by October 2024, brings ➡ Read more

Best-of-breed for cybersecurity

History repeats itself, even in the area of ​​cybersecurity. There are cycles of consolidation and modularization. Currently, consolidation is again ➡ Read more

Webinar 17 September: Implementing NIS2 in a legally compliant manner

NIS2 Deep Dive: In a free, German-language webinar on September 17th from 10 a.m., a lawyer will explain how companies ➡ Read more

Vulnerability in the Google Cloud Platform (GCP)

An exposure management company announces that its research team has identified a vulnerability in the Google Cloud Platform (GCP) ➡ Read more

NIST standards for quantum security

The publication of the post-quantum standards by the National Institute of Standards and Technology (NIST) marks a decisive step forward in securing ➡ Read more

Cisco licensing tool with critical 9.8 vulnerabilities

Cisco reports critical vulnerabilities in the Cisco Smart Licensing Utility that achieve a CVSS score of 9.8 out of 10. These vulnerabilities ➡ Read more

Ransomware attacks: 6 out of 10 companies attacked

Bitkom has surveyed more than 1.000 companies in Germany: More than half of the companies are victims of ransomware attacks ➡ Read more