Innovations through NIS-2
An important innovation is the introduction of the so-called “size cap” rule, which enables a differentiated classification of the affected companies.
For companies that have already taken security precautions in accordance with GDPR or KRITIS, the adaptation to NIS-2 will probably be manageable. However, companies without existing measures can face greater challenges. The German Federal Office for Information Security (BSI) provides orientation.
How can you implement NIS-2 now?
Even if your company isn't directly affected, it's worth thinking about cybersecurity. Ultimately, all companies are subject to the GDPR and must protect customers’, employees’ and suppliers’ data. You don't have to invest a lot of time or budget, as there are already cheap and time-saving methods to secure all digital data and processes in your company and to stay one step ahead of attackers.
Our small checklist can help you to effectively implement the first steps in order to meet the NIS-2 requirements in the future:
1. Analyze the current security situation:
Start with a comprehensive assessment of your organization's security posture to identify potential vulnerabilities. Also pay attention to seemingly small things, such as employees using their own technical devices, such as USB sticks, data cables or similar. The use of private laptops or mobile devices should also be taken into account. Determine your employees' level of knowledge in the area of cybersecurity in order to be able to specifically assess their training needs.
2. Build a risk management plan:
In the area of cybersecurity, prevention and active defense measures are not only more time-saving, but also significantly more cost-effective than reacting to an attack and repairing the resulting damage. It is therefore essential to create a plan that effectively secures all identified vulnerabilities. For example, if you notice that employees regularly use private email accounts for professional purposes, you should not only prohibit this but also effectively prevent it using technical measures such as blockers. This can be achieved on mobile devices by using a Mobile Device Management (MDM) system.
3. Schedule Regular Training:
The biggest risk factor remains the human. That's why it's very important that you conduct regular training on data protection and current security threats. In 2024, the BSI conducted a major survey on knowledge of cyber security measures: 26% of those surveyed stated that they felt overwhelmed with the choice of measures. The training should therefore contain practical tips that your employees can implement directly in their everyday work in order to minimize security risks. Additionally, it can be helpful to post small written reminders in strategic locations throughout your organization to further increase cybersecurity awareness.
4. Create a plan in case an incident occurs (Incident Response Plan):
Despite the best safety precautions, problems can arise. In this case, you should already have a plan in place for how you will respond: Which systems need to be disabled immediately? How are employees informed? What actually counts as a violation of security guidelines and how is it punished?
All answers to these questions should also be grouped from minor incident to major (critical) security incident. In addition, you should record when and how any affected third parties, e.g. customers or partner companies, will be informed.
5. Involve partners and suppliers:
Make sure that the companies you work with also comply with data protection regulations and, ideally, have a comprehensive cybersecurity strategy. A security incident at one of your partners could ultimately endanger your company. Inform your partner companies about your company's security policies and, if necessary, establish specific rules of conduct for external parties. Examples of this could be a mandatory registration before entering the company premises or a ban on photo and video recordings. In addition, external companies should not have direct access to your corporate network. Only share access or files if it is absolutely necessary.