{"id":2348,"date":"2023-06-28T17:11:12","date_gmt":"2023-06-28T15:11:12","guid":{"rendered":"https:\/\/wavebyagc.com\/?p=2348"},"modified":"2023-06-28T17:27:53","modified_gmt":"2023-06-28T15:27:53","slug":"why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance","status":"publish","type":"post","link":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/","title":{"rendered":"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance"},"content":{"rendered":"\n<p class=\"has-text-color\" style=\"color:#747474;font-size:22px\"><strong>Cyberattacks are on the rise. Ransomware and malware are an ever-present threat. Phishing scams continue to grow more sophisticated and invasive. In a society that\u2019s become so heavily reliant on the virtual world, the pressure on the cybersecurity community to evolve and respond continues to mount. To instill more awareness on the impact of cybersecurity threats on today\u2019s society, the European Parliament launched the NIS directive, urging companies of all sizes across different markets to improve how their data is collected, collated, deployed, and secured.<\/strong><\/p>\n\n\n\n<p>In this blog, we\u2019ll be discussing why this new piece of legislation is so important, how it will have wide reaching effects on the cybersecurity community and how professionals can take steps to improve the integrity of their data while ensuring full NIS2 compliance.<\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/NIS2-Directive-1024x576.jpg\" alt=\"Nis2 Directive\" class=\"wp-image-2364\" title=\"Nis2 Directive\" srcset=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/NIS2-Directive-1024x576.jpg 1024w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/NIS2-Directive-300x169.jpg 300w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/NIS2-Directive-768x432.jpg 768w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/NIS2-Directive-1536x864.jpg 1536w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/NIS2-Directive-650x366.jpg 650w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/NIS2-Directive.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">What is the NIS2 Directive?<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2021)689333\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NIS2 Directive<\/a>, a piece of legislation from the European Parliament, aims to address this issue by raising the threshold of compliance and refreshing the protections required to mitigate these seemingly unending cyber threats.<\/p>\n\n\n\n<p>Back in 2016, the European Union passed the Network and Information Security (NIS) Directive, a new piece of lawmaking designed to address the security requirements for companies and organisations operating within the critical infrastructure of its member states. While it purely focused on the digital security integrity of \u2018essential\u2019 sectors such as aviation, telecoms, and energy, it established a core framework that addresses the importance of strengthening connectivity and the storage of sensitive data.<\/p>\n\n\n\n<p>On the 28<sup>th<\/sup> of November 2022, the EU ratified the next stage of its plan to combat growing cybersecurity concerns with NIS2. With a timeline of two years for its member states to bring themselves into compliance, the race is on to introduce new technologies and innovations that not only meet the standards of this law but help establish confidence in the collective cybersecurity. <a href=\"https:\/\/nis2directive.eu\/why-nis2\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NIS2<\/a> is less of a legislative replacement, and more of a progression, extending this framework to a much wider group of organisations that need to deal with the threat of data breaches.<\/p>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-large-font-size\">Who needs to follow the NIS2 Directive?<\/h3>\n\n\n\n<p>The NIS2 directive is mainly <a href=\"https:\/\/nis2directive.eu\/who-are-affected-by-nis2\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">aimed<\/a> at both:<\/p>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     essential entities in numerous sectors, such as companies generally accounting for 250 employees, an annual turnover of \u20ac 50 million or a balance sheet of \u20ac 43 million<\/p>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     important entities in numerous sectors, such as companies generally accounting for 50 employees, an annual turnover of \u20ac 10 million or a balance sheet of \u20ac 10 million<\/p>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-large-font-size\">Why should everyone be looking at being NIS2-compliant?<\/h3>\n\n\n\n<p>Consumer data itself is new bitcoin, and the value of that data continues to drive the frequency and sophistication of these seemingly unending digital attacks on both a small and larger scale. And scammers and hackers will use any technology, physical or digital, at any scale to get ahold of that data. What sort of attacks can we expect?<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><a><\/a>1.&nbsp;&nbsp;&nbsp; Big scale hacking \u2013 the use of Intentional Electromagnetic Interference (IEMI)<\/h3>\n\n\n\n<p>Watch any film or TV show involving a heist or a hacking attempt, and there\u2019s a good chance some form of electromagnetic device will be used to disrupt some form of electrical security device. Like most fiction, these devices are inspired by real live hardware, and the reality is much scarier. These devices are used for Intentional Electromagnetic Interference (<a href=\"https:\/\/etn-peter.eu\/2021\/06\/22\/the-threat-of-intentional-electromagnetic-interference-iemi\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">IEMI<\/a>) attacks, where an external source is used to halt, hamper, and affect the flow of binary data within the circuits of a physical device.<\/p>\n\n\n\n<p>Since all circuits give off a natural electromagnetic field, practically every form of circuitry is susceptible to this kind of attack. From the smallest devices to hardware that forms part of critical national infrastructure, the potential for these far from fictional electromagnets is truly terrifying. Don\u2019t believe us? Just rewatch Ocean\u2019s Eleven and Goldeneye in the James Bond series.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><a><\/a>2.&nbsp;&nbsp;&nbsp; Small(er) scale hacking – employee networking hacking<\/h3>\n\n\n\n<p>One of the easiest and most exploited ways to access sensitive company (and personal) data is through your employees. It\u2019s estimated that the majority of cyberattacks rely on some form of <a href=\"https:\/\/www.enisa.europa.eu\/topics\/incident-response\/glossary\/what-is-social-engineering\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><em>social engineering<\/em><\/a>, whereby human error is exploited to reach sensitive data and information. New employees are at a far higher risk of being targeted in this way, so implementing much swifter training and IT awareness procedures is vital.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/phishing\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Phishing<\/a> attacks have never really gone away, and these scams continue to grow more and more convincing in their resemblance to real emails and messages. <a href=\"https:\/\/www.ncsc.gov.uk\/ransomware\/home\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ransomware<\/a> attacks are also a prevalent threat to your employees and the integrity of your business data, so there\u2019s always some form of threat lurking in the digital shadows.<\/p>\n\n\n\n<p>The NIS2 directive provides a clear outline on the cybersecurity precautions you should be taking to mitigate and minimise these threats, but what about from a physical point of view? Developing, testing, and implementing effective cybersecurity strategies is a complex task that takes plenty of investment of time. And let\u2019s not forget, it takes hackers far less time to crack a measure or protocol than it does to create it in the first place.<\/p>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-large-font-size\"><a><\/a>So, how should professionals prepare for NIS2?<\/h3>\n\n\n\n<p>Preparing your cybersecurity protocols to comply with NIS2 requires both a <strong><u>physical and virtual<\/u><\/strong> approach. These preparations can be far reaching depending on the extent of your business operations, and with everything from server capabilities and disaster recovery planning to evaluating cryptography and encryption integrity, there are lots of factors to consider.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Here are a few simple suggestions for your IT department to consider when it comes to portable devices:<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     Make sure they are fully secured to negate the impact of hacking attempts.<\/p>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     Adding layers of additional security makes these defenses even more robust.<\/p>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     Brief employees to always log out from workstations in the workplace and lock them to ensure no one can simply plug in a USB and start downloading any locally stored data or even connect directly to the network.<\/p>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     Even printers can store data locally, so securing this kind of hardware is just as important.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>The key is to protect what matters<\/strong> – your data, and the connectivity that proliferates it across your network. That\u2019s why C-level conversations are needed to ensure compliance is followed across an entire organisation so that data protection laws are fully addressed. It\u2019s about warding off any form of electronic eavesdropping, while helping to prevent any potential human errors that compromise the integrity of your data.<\/p>\n\n\n\n<p>That calls for more cybersecurity professionals who can help create and implement these cybersecurity strategies. But with the ongoing \u201c<a href=\"https:\/\/securityintelligence.com\/articles\/rise-above-cybersecurity-poverty-line\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">cyber poverty<\/a>\u201d crisis, not all companies will have the luxury to find and hire dedicated professionals to look into the matter. In which case, it is better to broaden the company scope and explore physical measures that will help prevent human and virtual vulnerabilities. &nbsp;<\/p>\n\n\n\n<p>Mind you, The European Commission set the goal of reaching 80% of adult EU citizens with basic digital skills and 20 million employed Information and communications technology (ICT) specialists by 2030. That is why they launched a <a href=\"https:\/\/www.euractiv.com\/section\/cybersecurity\/news\/eu-seeks-to-bridge-cyber-skills-gap-with-new-academy\/?fbclid=IwAR3-T75b3nYIkIYk3Ce8oibEzu0E3akQyc4180plHxYpVHo0lHqdLw3OSPw_aem_th_AWPee2FaJWO4Rb2UxRPwJCxv3BySrT2Wz-79AVLz3-CbLUz51GbUofFWrYw6tCq6_vZodldvTsZqMTLPeu1rtBTs\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Cybersecurity Skills Academy<\/a> on April 18<sup>th<\/sup>, 2023 to close the cybersecurity sector\u2019s ongoing skills shortage and develop the EU\u2019s cyber resilience.<\/p>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><a><\/a>What kind of physical measures can you implement?<\/h2>\n\n\n\n<p>The whole is always greater than the sum of its parts, but big journeys always start with small steps. When it comes to physical locations, we recommend you look into:<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     Server rooms, the heart of your business data. <strong>Establishing a faraday setup<\/strong> is one such safety strategy, providing an incredibly secure \u2018cage\u2019 for your data, but bunkering it in also limits how easily your own employees and systems can access that information as part of your normal business practices.<\/p>\n\n\n\n<p><strong>&nbsp;\u2022<\/strong>     <strong>EM\/RF shielding glass<\/strong> is another protective option and one that can be far more flexible in how it secures your sensitive data. It can be tailored to your unique security policies and settings, offering a fully transparent protective layer. It\u2019s not impact proof, but it can be combined with other glass properties (such as fire-resistant and anti-burglary materials)<\/p>\n\n\n\n<p><strong>Why not involve your architect, contractor, office facilities manager to look into the matter and ask them which preventative measures might contribute to a bigger (cyber)security scope?<\/strong><\/p>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><a><\/a>How can companies avoid vulnerabilities from a structural perspective?<\/h2>\n\n\n\n<p>Adopting a holistic approach will be crucial. The entire workforce will need to keep the helicopter overview while enforcing a very practical can-do mindset. The only way to hold everyone accountable is by following pointers like these:<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-medium-font-size\"><a><\/a>1.&nbsp;&nbsp;&nbsp;&nbsp; Align all stakeholders<\/h4>\n\n\n\n<p>All stakeholders in the business need to be aligned and on the same page when it comes to addressing security concerns and how this brings the company into compliance with NIS2. This includes C-level management and IT managers but also project managers, architects, contractors and more.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-medium-font-size\"><a><\/a>2.&nbsp;&nbsp;&nbsp;&nbsp; Ensure the right training is in place<\/h4>\n\n\n\n<p>All these new security measures might make sense to you or the team that\u2019s procured and implemented them, but that won\u2019t come into their own unless all members of staff in the workplace (both on-site and remote) have completed the relevant training to ensure these updated IT and security policies are understood.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-medium-font-size\"><a><\/a>3.&nbsp;&nbsp;&nbsp;&nbsp; Establish the right setup<\/h4>\n\n\n\n<p>Unsurprisingly, having the right settings in place to apply these best practices is a must. Be proactive and install both physical and virtual firewalls to protect your data at both levels. A technology such as EM\/RF shielding glass is ESI-compliant, making it an ideal solution for businesses looking for a tailored glazing solution.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-medium-font-size\"><a><\/a>4.&nbsp;&nbsp;&nbsp;&nbsp; Be bold and \u2018go beyond\u2019<\/h4>\n\n\n\n<p>Never, ever settle, just because a potential solution seems easier or more cost effective. As cliche as it may sound, you simply cannot put a price on the integrity of your business data. Hackers are constantly evolving their means of attack, so you can\u2019t afford to rest on your laurels. Minimise the risk by maximising your security options.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/Colorful-Simple-4-point-step-Brainstorms-1024x512.png\" alt=\"WAVETRAP\" class=\"wp-image-2361\" srcset=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/Colorful-Simple-4-point-step-Brainstorms-1024x512.png 1024w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/Colorful-Simple-4-point-step-Brainstorms-300x150.png 300w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/Colorful-Simple-4-point-step-Brainstorms-768x384.png 768w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/Colorful-Simple-4-point-step-Brainstorms-1536x768.png 1536w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/Colorful-Simple-4-point-step-Brainstorms-650x325.png 650w, https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/Colorful-Simple-4-point-step-Brainstorms.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:6px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Conclusion<\/h2>\n\n\n\n<p>There\u2019s unlikely to ever be a watertight solution that fixes every cybersecurity issue or woe, but that doesn\u2019t mean you can\u2019t take steps to ensure you\u2019re NIS2 compliant. As with any ISO standardisation method out there, ensuring you\u2019re fully compliant is the safest bet.<\/p>\n\n\n\n<p><strong>With WAVETRAP EM\/EF shielding glass, you can leverage a fully ESI-compliant solution that\u2019s been trialed, tested, and validated by the KU Leuven.<\/strong><\/p>\n\n\n\n<p>If you would like to learn more about NIS2-compliant security measures, such as EM\/RF shielding glass, <a href=\"https:\/\/wavebyagc.com\/contact\/\">contact one of our experts today<\/a>.<\/p>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks are on the rise. Ransomware and malware are an ever-present threat. Phishing scams continue to grow more sophisticated and invasive. In a society that\u2019s become so heavily reliant on the virtual world, the pressure on the cybersecurity community to evolve and respond continues to mount. To instill more awareness on the impact of cybersecurity [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2357,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[68],"tags":[76],"class_list":["post-2348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wavetrap","tag-highlight"],"acf":[],"yoast_head":"<title>Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance - WAVE by AGC<\/title>\n<meta name=\"description\" content=\"Discover the latest innovation in radiation shielding glass with WAVETRAP and how glass is making headway in safety, security, and sanity. Head of Wave, Bernard Monville, provides insights into this groundbreaking solution. Learn how WAVETRAP blocks electromagnetic waves while maintaining an open and transparent view. Find out how it addresses connectivity concerns, enhances security, and protects against health issues. Explore the WAVETRAP product line, its applications, and its compatibility with other glass features. Get a glimpse of the market feedback and the coexistence of connectivity and shielding. Don&#039;t compromise\u2014be safe, secure, and connected with WAVETRAP.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance - WAVE by AGC\" \/>\n<meta property=\"og:description\" content=\"Discover the latest innovation in radiation shielding glass with WAVETRAP and how glass is making headway in safety, security, and sanity. Head of Wave, Bernard Monville, provides insights into this groundbreaking solution. Learn how WAVETRAP blocks electromagnetic waves while maintaining an open and transparent view. Find out how it addresses connectivity concerns, enhances security, and protects against health issues. Explore the WAVETRAP product line, its applications, and its compatibility with other glass features. Get a glimpse of the market feedback and the coexistence of connectivity and shielding. Don&#039;t compromise\u2014be safe, secure, and connected with WAVETRAP.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"WAVE by AGC\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T15:11:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-28T15:27:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/3_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KatiaHansenAgc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"KatiaHansenAgc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/\"},\"author\":{\"name\":\"KatiaHansenAgc\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/person\\\/c5581385968519b6f7132a349af45822\"},\"headline\":\"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance\",\"datePublished\":\"2023-06-28T15:11:12+00:00\",\"dateModified\":\"2023-06-28T15:27:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/\"},\"wordCount\":1771,\"publisher\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/3_1.jpg\",\"keywords\":[\"highlight\"],\"articleSection\":[\"WAVETRAP\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/\",\"name\":\"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance - WAVE by AGC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/3_1.jpg\",\"datePublished\":\"2023-06-28T15:11:12+00:00\",\"dateModified\":\"2023-06-28T15:27:53+00:00\",\"description\":\"Discover the latest innovation in radiation shielding glass with WAVETRAP and how glass is making headway in safety, security, and sanity. Head of Wave, Bernard Monville, provides insights into this groundbreaking solution. Learn how WAVETRAP blocks electromagnetic waves while maintaining an open and transparent view. Find out how it addresses connectivity concerns, enhances security, and protects against health issues. Explore the WAVETRAP product line, its applications, and its compatibility with other glass features. Get a glimpse of the market feedback and the coexistence of connectivity and shielding. Don't compromise\u2014be safe, secure, and connected with WAVETRAP.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/3_1.jpg\",\"contentUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/3_1.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"3 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\",\"item\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/\",\"name\":\"WAVE by AGC\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#organization\",\"name\":\"WAVE by AGC\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/agc_logo_color.svg\",\"contentUrl\":\"https:\\\/\\\/wavebyagc.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/agc_logo_color.svg\",\"caption\":\"WAVE by AGC\"},\"image\":{\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/wave-by-agc\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/#\\\/schema\\\/person\\\/c5581385968519b6f7132a349af45822\",\"name\":\"KatiaHansenAgc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6999c25084429e2761cd507a69c7a491f7f84c8a494f2567cb2c38a27c284880?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6999c25084429e2761cd507a69c7a491f7f84c8a494f2567cb2c38a27c284880?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6999c25084429e2761cd507a69c7a491f7f84c8a494f2567cb2c38a27c284880?s=96&d=mm&r=g\",\"caption\":\"KatiaHansenAgc\"},\"url\":\"https:\\\/\\\/wavebyagc.com\\\/en\\\/blog\\\/author\\\/4b467e8e8233e54d\\\/\"}]}<\/script>","yoast_head_json":{"title":"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance - WAVE by AGC","description":"Discover the latest innovation in radiation shielding glass with WAVETRAP and how glass is making headway in safety, security, and sanity. Head of Wave, Bernard Monville, provides insights into this groundbreaking solution. Learn how WAVETRAP blocks electromagnetic waves while maintaining an open and transparent view. Find out how it addresses connectivity concerns, enhances security, and protects against health issues. Explore the WAVETRAP product line, its applications, and its compatibility with other glass features. Get a glimpse of the market feedback and the coexistence of connectivity and shielding. Don't compromise\u2014be safe, secure, and connected with WAVETRAP.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance - WAVE by AGC","og_description":"Discover the latest innovation in radiation shielding glass with WAVETRAP and how glass is making headway in safety, security, and sanity. Head of Wave, Bernard Monville, provides insights into this groundbreaking solution. Learn how WAVETRAP blocks electromagnetic waves while maintaining an open and transparent view. Find out how it addresses connectivity concerns, enhances security, and protects against health issues. Explore the WAVETRAP product line, its applications, and its compatibility with other glass features. Get a glimpse of the market feedback and the coexistence of connectivity and shielding. Don't compromise\u2014be safe, secure, and connected with WAVETRAP.","og_url":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/","og_site_name":"WAVE by AGC","article_published_time":"2023-06-28T15:11:12+00:00","article_modified_time":"2023-06-28T15:27:53+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/3_1.jpg","type":"image\/jpeg"}],"author":"KatiaHansenAgc","twitter_card":"summary_large_image","twitter_misc":{"Written by":"KatiaHansenAgc","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/#article","isPartOf":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/"},"author":{"name":"KatiaHansenAgc","@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/person\/c5581385968519b6f7132a349af45822"},"headline":"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance","datePublished":"2023-06-28T15:11:12+00:00","dateModified":"2023-06-28T15:27:53+00:00","mainEntityOfPage":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/"},"wordCount":1771,"publisher":{"@id":"https:\/\/wavebyagc.com\/en\/#organization"},"image":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/3_1.jpg","keywords":["highlight"],"articleSection":["WAVETRAP"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/","url":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/","name":"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance - WAVE by AGC","isPartOf":{"@id":"https:\/\/wavebyagc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/#primaryimage"},"image":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/3_1.jpg","datePublished":"2023-06-28T15:11:12+00:00","dateModified":"2023-06-28T15:27:53+00:00","description":"Discover the latest innovation in radiation shielding glass with WAVETRAP and how glass is making headway in safety, security, and sanity. Head of Wave, Bernard Monville, provides insights into this groundbreaking solution. Learn how WAVETRAP blocks electromagnetic waves while maintaining an open and transparent view. Find out how it addresses connectivity concerns, enhances security, and protects against health issues. Explore the WAVETRAP product line, its applications, and its compatibility with other glass features. Get a glimpse of the market feedback and the coexistence of connectivity and shielding. Don't compromise\u2014be safe, secure, and connected with WAVETRAP.","breadcrumb":{"@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/#primaryimage","url":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/3_1.jpg","contentUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2023\/06\/3_1.jpg","width":1920,"height":1080,"caption":"3 1"},{"@type":"BreadcrumbList","@id":"https:\/\/wavebyagc.com\/en\/blog\/why-you-need-to-go-beyond-the-virtual-realm-when-securing-your-nis2-cybersecurity-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"","item":"https:\/\/wavebyagc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Why you need to go beyond the virtual realm when securing your NIS2 cybersecurity compliance"}]},{"@type":"WebSite","@id":"https:\/\/wavebyagc.com\/en\/#website","url":"https:\/\/wavebyagc.com\/en\/","name":"WAVE by AGC","description":"","publisher":{"@id":"https:\/\/wavebyagc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wavebyagc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wavebyagc.com\/en\/#organization","name":"WAVE by AGC","url":"https:\/\/wavebyagc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2021\/05\/agc_logo_color.svg","contentUrl":"https:\/\/wavebyagc.com\/wp-content\/uploads\/2021\/05\/agc_logo_color.svg","caption":"WAVE by AGC"},"image":{"@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/wave-by-agc\/"]},{"@type":"Person","@id":"https:\/\/wavebyagc.com\/en\/#\/schema\/person\/c5581385968519b6f7132a349af45822","name":"KatiaHansenAgc","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6999c25084429e2761cd507a69c7a491f7f84c8a494f2567cb2c38a27c284880?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6999c25084429e2761cd507a69c7a491f7f84c8a494f2567cb2c38a27c284880?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6999c25084429e2761cd507a69c7a491f7f84c8a494f2567cb2c38a27c284880?s=96&d=mm&r=g","caption":"KatiaHansenAgc"},"url":"https:\/\/wavebyagc.com\/en\/blog\/author\/4b467e8e8233e54d\/"}]}},"_links":{"self":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/posts\/2348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/comments?post=2348"}],"version-history":[{"count":0,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/posts\/2348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/media\/2357"}],"wp:attachment":[{"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/media?parent=2348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/categories?post=2348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wavebyagc.com\/en\/wp-json\/wp\/v2\/tags?post=2348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}