Kensington EQ

Kensington EQ

Designed Using More Sustainable Materials

Learn More

Skip to Content Skip to footer

Suggestions

  • No Suggestions

Site Pages

Get NIS2 Ready:

Lock, Secure, Comply

The Network and Information Security Directive 2 (NIS2) is designed to establish a consistent level of digital security across EU member states. As impactful as 2018's GDPR directive, NIS2 introduces new responsibilities for organisations and imposes substantial penalties for non-compliance. It applies to organisations offering critical services within an EU member country, with all EU member states required to integrate NIS2 into their national legislation by
17th October 2024.

 

NIS2 Introduces New Requirements In Four Main Areas:

CORPORATE ACCOUNTABILITY

Management must supervise, authorise and recieve training on the organisation's cybersecurity protocols, actively managing cyber risks.

REPORTING OBLIGATIONS

Security incidents that significantly impact service or recipients must be reported by the organisation promptly.

BUSINESS CONTINUITY

Organisations must have plans in plave to ensure business continuity in the event of a major cyber attack. Including, system recovery, emergency procedures and establishing a crisis response team.

RISK MANAGEMENT

Steps to reduce should include incident management, adopting encryption, improving acess control and enhancing supply chain & network security.

NIS2 DIRECTIVE, ARTICLE #79

"Cybersecurity risk-management measures should ... protect network and information systems ... from events such as theft, ... unauthorised physical access, and damage to information processing facilities, which could compromise the availability, authenticity, integrity, or confidentiality of data." *

 

 

 
View Kensington Locks

A simple, fast and cost-effective way of securing devices and deterring theft, requiring no software setup or specialist knowledge.

 
Biometric Fingerprint Keys

With cyber threats becoming more sophisticated, biometrics offers a strong security solution, enabling two-factor (2FA) and Passwordless authentication.

 
Privacy Screen Filters

The use of high-definition screens makes visual hacking easier than ever. Protect onscreen data from unauthorised viewing by using a privacy screen filter.

 
AES Encrypted Devices

The advanced encryption standard (AES) provides end-to-end encryption, ensuring data cannot be deciphered, even if its intercepted when using accessories such as mice, keyboards and biometric keys.


Need Help?

Want to find out more about Kensington's security solutions? Fill in a contact form and our sales team will be in touch.

Contact Us

Use Kensington's accessory finder to find the right product for the devices you use.

Accessory Finder

 

*Read the complete NIS2 Directive article HERE