The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks. For NIS, companies providing what the law describes as essential or digital services will be affected by these changes. All companies processing personal data of EU residents must comply with GDPR. NIS requires organisations to create and maintain an adaptive, user-centric, layered security model approach based on the principles of being able to:
Predict
Prevent
Detect
Respond
Being compliant under NIS
You are required to have ‘state of the art‘ security solutions and technology partners that allow your organisation to predict and prevent attacks, detect a potentially dangerous presence in your networks, respond quickly to that threat, and have the ability to analyse and report on the health of your networks in real time. You need to know what your company’s position is on and invest in security technologies that carefully consider identity, privacy, data protection, mobility and cyber threats in the security management platform. You should already be having the discussions on what ‘state-of-the-art’ means to your business. And will need to defend its use — or lack of use – in any post-breach investigation. With a continued rise in cybercrime, this legislation is a great opportunity for the business to work together to re-build and update their security capabilities to mitigate against cyber risks. Hardware.com partners with companies that offer state-of-the-art security technologies. And our engineers are highly experienced in using innovative security products. For an informal discussion about how NIS will affect your security requirements please call us on 01285 771600. Tags: Cyber Security, Networks, Security
Related Posts
Will you be ready for GDPR and NIS?
4 Strategies for Keeping Critical Networks Secure
What makes password security so important?
Artificial Intelligence in IT Security
6 Security Measures for Enterprise Campus Networks
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.