{"id":17519,"date":"2025-05-05T10:56:11","date_gmt":"2025-05-05T09:56:11","guid":{"rendered":"https:\/\/www.eberle.at\/cyber-security-and-nis2-guidelines\/"},"modified":"2026-02-12T13:15:57","modified_gmt":"2026-02-12T12:15:57","slug":"cyber-security-and-nis2-guidelines","status":"publish","type":"page","link":"https:\/\/www.eberle.at\/en\/company\/cyber-security-and-nis2-guidelines\/","title":{"rendered":"NIS2 policy and Cyber Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><h1 class=\"seo-page-title\">NIS2 policy and Cyber Security<\/h1><p>[vc_row][vc_column][vc_single_image image=&#8221;17723&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1748244064217{background-color: #0A3E6B !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1747311635646{background-color: #0A3E6B !important;}&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><strong>NIS stands for \u2018Network and Information Security\u2019<\/strong><\/h2>\n<p style=\"text-align: center;\">Information security increases availability and reduces damage. Contact us for a non-binding on-site analysis.<\/p>\n<h3>Legal matters<\/h3>\n<p>NIS stands for \u2018Network and Information Security\u2019 in administration and production. The European Union published the Network and Information Security Directive on 27 December 2022. Member states are obliged to transpose it into national law by 17 October 2024. The management level is responsible for compliance. As with the GDPR, ISO\/IEC 27001, ISA\/IEC 62443 or NIST 800, NIS2 applies in full to medium-sized and large companies. Minimum measures are recommended for small companies. NIS 2 applies to all sectors.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1747311422540{background-color: #0A3E6B !important;}&#8221;]<\/p>\n<h2>Terms<\/h2>\n<p>NIS: Network and Information Security.<\/p>\n<p>IT: Information Technology in administrative area<\/p>\n<p>OT: Operational Technology in production area<\/p>\n<p>Security: Security in networked systems.<\/p>\n<p>Safety: Safety for people.<\/p>\n<p>MFA: Access protection via multifactor authentication.<\/p>\n<p>ICT; Information and comunication technology<\/p>\n<p>EHMI: Human Machine Interface<\/p>\n<p>GDPR: General Data Protection Regulation<\/p>\n<p>ERP: Enterprise Resource Planning<\/p>\n<p>OEE: Overall Equipment Effectiveness<\/p>\n<p>Backup: Data backup and storage of data carriers<\/p>\n<p>Restore: Restoring or importing data backups[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1747311675416{background-color: #0A3E6B !important;}&#8221;]<\/p>\n<h2>Key points of NIS<\/h2>\n<p>Risk analysis and security concept for information systems.<\/p>\n<p>Management of security incidents.<\/p>\n<p>Business continuity and crisis management.<\/p>\n<p>Security within the supply chain.<\/p>\n<p>Security measures for the acquisition\/development\/maintenance of ICT.<\/p>\n<p>Concepts and procedures for evaluating the effectiveness of risk management measures.<\/p>\n<p>Cyber hygiene and cyber security training<\/p>\n<p>Cryptography and, where applicable, encryption<\/p>\n<p>Personnel security, access control concepts<\/p>\n<p>Multi-factor authentication[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1747311440200{background-color: #0A3E6B !important;}&#8221;]<\/p>\n<h2>Baseline security for all companies<\/h2>\n<p>Risk assessment, information security policy and emergency plan<\/p>\n<p>Define responsibilities.<\/p>\n<p>Security training sessions.<\/p>\n<p>Create a list of all networked devices.<\/p>\n<p>Create a directory of access data using secure technology. Restrict access to files and programs.<\/p>\n<p>Restrict and protect internet presence and external access.<\/p>\n<p>Carry out security updates promptly. Replace discontinued devices, operating systems and applications.<\/p>\n<p>Install protection programs against malicious software. Attack protection, malware protection, virus protection.<\/p>\n<p>Create periodic backups.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1747311522277{background-color: #0A3E6B !important;}&#8221;]<\/p>\n<h1><strong>Our expertise<\/strong><\/h1>\n<p><strong>Eberle Automatic Systems<\/strong> has many years of experience with automatic systems. Today, such systems are comprehensively networked for efficient operation. Controllers communicate with robots and cameras. Master computers and HMIs communicate with the ERP level, edge devices are connected to the internet and send sensor values for monitoring.<\/p>\n<h3><strong>The increasing threat of cybercrime is not fully taken into account in systems, that have \u2018grown\u2019 over the years.<\/strong><\/h3>\n<p>Eberle employs experts in the fields of automation, mechatronics and IT. We are able to comprehensively assess the existing system and propose measures, placing particular emphasis on cost-effectiveness.<\/p>\n<h3><strong>In the course of a retrofit, a machine can become faster, more accurate, more stable, more energy-efficient and, at the same time, more suitable for NIS2 without incurring major additional costs.<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h2>Our service portfolio<\/h2>\n<ul>\n<li><span class=\"Y2IQFc\" lang=\"en\">Retrofit of machinery and equipment (mechanical, electrical, software, OT) taking into account the requirements of NIS2 and the GDPR. <\/span><\/li>\n<li><span class=\"Y2IQFc\" lang=\"en\">Risk assessment and emergency plan. Consideration of recovery scenarios for the energy supply and infrastructure of critical systems, such as refrigeration for food, etc. <\/span><\/li>\n<li><span class=\"Y2IQFc\" lang=\"en\">Firewall for separation and segmentation of IT and OT networks. <\/span><\/li>\n<li><span class=\"Y2IQFc\" lang=\"en\">Access protection via MFA. Encrypted communication. <\/span><\/li>\n<li><span class=\"Y2IQFc\" lang=\"en\">Spare parts. Training and awareness. <\/span><\/li>\n<li><span class=\"Y2IQFc\" lang=\"en\">Backup &amp; restore: machine parameters, product parameters, programs, historical measured values. Monitoring of devices and components such as overload, energy consumption, OEE, <\/span><\/li>\n<li><span class=\"Y2IQFc\" lang=\"en\">Preventive maintenance. <\/span><\/li>\n<li><span class=\"Y2IQFc\" lang=\"en\">Recurring analyses and tests for security and safety.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1770898553268{background-color: #0A3E6B !important;}&#8221;]Click here to go directly to our <a href=\"https:\/\/www.eberle.at\/en\/company\/cyber-security-and-nis2-guidelines\/nis2-eberle-online-advisor\/\" target=\"_blank\" rel=\"noopener\">Eberle online advisor.<\/a><\/p>\n<p>Download our <a href=\"https:\/\/www.eberle.at\/wp-content\/uploads\/2026\/02\/20251010_Produktbroschuere_NIS2_EN.pdf\" target=\"_blank\" rel=\"noopener\">NIS2 brochure<\/a> here.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>NIS2 policy and Cyber Security[vc_row][vc_column][vc_single_image image=&#8221;17723&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1748244064217{background-color: #0A3E6B !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;.vc_custom_1747311635646{background-color: #0A3E6B !important;}&#8221;] NIS stands for \u2018Network and Information Security\u2019 Information security increases availability and reduces damage. Contact us for a non-binding on-site analysis. Legal matters NIS stands for \u2018Network and Information Security\u2019 in administration and production. The European Union published the Network and [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":602,"menu_order":86,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-17519","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/pages\/17519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/comments?post=17519"}],"version-history":[{"count":54,"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/pages\/17519\/revisions"}],"predecessor-version":[{"id":18318,"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/pages\/17519\/revisions\/18318"}],"up":[{"embeddable":true,"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/pages\/602"}],"wp:attachment":[{"href":"https:\/\/www.eberle.at\/en\/wp-json\/wp\/v2\/media?parent=17519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}