A few weeks ago, at Vercom, we began the process of implementing the NIS2 Directive and preparing to meet the requirements of the Digital Operational Resilience Act (DORA).
According to the European Commission, the NIS2 Directive aims to establish a minimum level of regulations and requirements among member states to mitigate the risk of cybersecurity incidents effectively. At the same time, the Digital Operational Resilience Act (DORA) has been adopted, effectively tightening European cybersecurity requirements, particularly in the financial sector. Thus, it can be said that DORA provides more specific (and overarching) regulations to NIS2.
Already published in the Official Journal of the European Union, this new directive introduces comprehensive measures for a high common standard of cybersecurity across the Union, focusing on strengthening the cyber resilience of essential and important entities.
Compliance with NIS2 focuses on three key areas: securing network and information systems, handling security incidents, and monitoring the supply chain in the context of countries of origin. Moving forward, organizations must prepare to define what constitutes a cybersecurity incident and what qualifies as a major incident that must be reported to the relevant authority (CSIRT, short for Computer Security Incident Response Team).
These reports will follow a three-step procedure (initial notification – interim report – final report). Additionally, at the end of incident handling, there may be a need to address and remove the vulnerability that led to the major incident.
The announced changes are just an evolution of the original NIS Directive that was introduced in 2016. However, as revealed through various audits and inspections, enforcing these requirements in individual member states left much to be desired.
This highlighted the need for a more uniform and decisive approach to boosting the level of cybersecurity, especially since we are increasingly reliant on various online services, including government platforms. New cloud solutions and SaaS have also been developed, and we have embraced IoT solutions more readily. Consequently, the number of cyberattacks, including ransomware, has also increased.
Now that we understand that NIS2 will significantly impact the high common level of cybersecurity across many companies (according to PwC, it will affect over 6,000 entities operating across 18 different sectors of the economy), it’s worth considering the reasons behind these measures.
Chief among them is the continuously increasing trend of ransomware attacks, which affect various organizations almost daily. For example, according to the M-Trends report created by Mandiant in 2023, the number of investigations related to ransomware attacks increased by 5% (from 18% to 23%). In 2024 alone, there have already been over 3,000 victims of such malicious software (including 15 companies in Poland).
The main vectors of these incidents include the exploitation of vulnerabilities in various public services or phishing attacks. In its M-Trends report, Mandiant highlighted that it is tracking the activities of over 4,000 groups, nearly a quarter of which were identified in 2023. These insights highlight the ongoing evolution of cybercrime and the importance of securing systems in advance.
The NIS2 Directive emphasizes the importance of proactive cybersecurity risk management to address evolving threats effectively.
The most important points include:
It’s important to note that non-compliance or infringement of this directive can result in significant financial penalties. Therefore, it is crucial to verify in advance whether your organization is subject to it before it enters into force and if you are part of a supply chain that falls under NIS2.
Even if it turns out that the directive does not apply to you, it is still beneficial to take steps to enhance cybersecurity.
The deadline for implementing NIS2 into national legal frameworks across the European Union is October 17th, 2024. While this timeline may seem tight, it’s important to note that NIS2 isn’t regulating a new issue but rather evolving an existing system.
Our legal team has been proactively preparing our organization for these changes. As an organization certified in ISO 27001 and 27018, we aim to be a model of excellence in information security processes in our industry.
We are familiar with the NIS2 Directive, the current ANSC – the Act on the National Cybersecurity System (which includes regulations concerning operators of essential services, the predecessors of “key entities”), the first draft of the act implementing NIS2 (i.e., the draft amendment of the NSC), and various ENISA (European Union Agency for Cybersecurity) guidelines on topics such as risk management.
The draft NSC amendment suggests that cybersecurity obligations, previously limited to operators of essential services, will now extend to all key and important entities, aligning with the NIS2 Directive’s requirements.
Given the above, we can assume that there shouldn’t be any major surprises regarding obligations that will burden key and important entities. It can be argued that the biggest change is the inclusion of entirely new sectors under the NSC, with obligations related to risk management and incident reporting.
The Polish legislative process is still in its early stages, as we are currently in the public consultation phase of the draft. Our lawyers are actively engaged in the work within the chambers. The draft amendment of the NSC may change compared to the current draft, although it is unlikely to result in stricter obligations. Rather, any changes will likely aim at liberalizing these obligations, as this is the direction that businesses are advocating for.
NIS2 significantly expands the scope of requirements to additional sectors and entities. The directive applies to all entities with more than 50 employees and an annual turnover exceeding 10 million euros. NIS2 defines two categories or entities: key entities and important entities, each with its own guidelines. It’s important to note that the financial sector doesn’t have to comply with the NIS 2 directive; instead, the DORA regulation applies to this sector.
At Vercom, we have divided the implementation of NIS2 and DORA into stages:
We will keep you informed of any changes.
Meanwhile, in August, we have an ISO 27001 audit, where we will be certifying ourselves for the new ISO/IEC 27001:2022 standard – Information Security, Cybersecurity, and Privacy Protection.
The update to the standard that took place in October 2022 concerns:
The ISO 27001:2022 structure also includes several new elements, such as threat analysis, IT readiness for ensuring business continuity, data masking, network filtering, data leakage prevention, and secure coding principles.
We live in a world where your customers switch seamlessly between laptops, smartphones, and tablets. They navigate a complex digital ecosystem – checking emails, using mobile apps, and reacting...
We are delighted to announce that Vercom S.A., the company behind the EmailLabs project, has successfully completed the ISO 22301 certification process. This significant achievement underscores our commitment to...
EmailLabs, as part of the Vercom group, proudly announces its full commitment to aligning its ICT services with the latest cybersecurity standards. In response to dynamically changing regulations, the...
We are pleased to announce that MessageFlow, a product from the Vercom S.A. group, has received the prestigious CSA (Certified Senders Alliance) Certification. This recognition not only underscores the...
Gmail, Google and Yahoo's Requirements
You might have noticed a new item in your Gmail sidebar recently – the “Manage subscriptions” tab, often flagged with a blue notification dot. While Google announced this feature...
IT & Tech, Pytania i odpowiedzi, Technical
Efficient email communication isn’t just about sending messages — it also involves integrating email functionality into your business systems and applications. Email APIs (Application Programming Interfaces) serve as the...
One of the most important yet often underestimated elements in shaping a company’s brand perception is the transactional email. In e-commerce, the design of such messages must be carefully...
Gmail, Google and Yahoo's Requirements
You might have noticed a new item in your Gmail sidebar recently – the “Manage subscriptions” tab, often flagged with a blue notification dot. While Google announced this feature...
IT & Tech, Pytania i odpowiedzi, Technical
Efficient email communication isn’t just about sending messages — it also involves integrating email functionality into your business systems and applications. Email APIs (Application Programming Interfaces) serve as the...
One of the most important yet often underestimated elements in shaping a company’s brand perception is the transactional email. In e-commerce, the design of such messages must be carefully...
Google and Yahoo's Requirements, Yahoogle
2024 brought fundamental changes to email marketing, introducing new, stringent requirements for senders. Since February 1, 2024, Google and Yahoo have started enforcing new deliverability rules, primarily targeting bulk...
We live in a world where your customers switch seamlessly between laptops, smartphones, and tablets. They navigate a complex digital ecosystem – checking emails, using mobile apps, and reacting...
Are your campaigns not engaging all recipients as you expect? Do they fail to open your emails or click on links, lowering your campaign effectiveness and email marketing ROI?...
Gmail, Google and Yahoo's Requirements, Updates
Gmail’s educational phase has ended. Google has officially announced the start of a new phase – the Gmail Enforcement Phase – which begins to take effect in November 2025....
Running a business requires professional communication channels. While free personal email services might work for individual use, they fall short when representing a business. Understanding the fundamentals of email...
Email routing requires sophisticated mechanisms to ensure messages reach their intended recipients across the vast landscape of the internet. At the heart of this email delivery system lies the Mail...