{"id":1761,"date":"2026-03-05T11:43:18","date_gmt":"2026-03-05T11:43:18","guid":{"rendered":"https:\/\/www.guardexy.eu\/innovation-in-cybersecurity-easily-report-exactly-according-to-nis2-requirements\/"},"modified":"2026-03-13T19:32:06","modified_gmt":"2026-03-13T19:32:06","slug":"innovation-in-cybersecurity-easily-report-exactly-according-to-nis2-requirements","status":"publish","type":"post","link":"https:\/\/www.guardexy.eu\/en\/innovation-in-cybersecurity-easily-report-exactly-according-to-nis2-requirements\/","title":{"rendered":"Innovation in cybersecurity: easily report exactly according to NIS2 requirements"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1761\" class=\"elementor elementor-1761 elementor-1617\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7cf4d3 e-flex e-con-boxed e-con e-parent\" data-id=\"e7cf4d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fceb58 elementor-widget elementor-widget-text-editor\" data-id=\"5fceb58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With the arrival of new legislation in the field of cybersecurity, the obligations of municipalities, cities, energy companies, and industrial enterprises have fundamentally changed. The NIS2 Directive and the subsequent Czech Cybersecurity Act impose on selected organizations not only the obligation to actively protect their systems but also to systematically record incidents and, in defined cases, report them to the National Cyber and Information Security Agency (N\u00daKIB). <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b82810a e-flex e-con-boxed e-con e-parent\" data-id=\"b82810a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10cbece elementor-widget elementor-widget-text-editor\" data-id=\"10cbece\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Therefore, starting in March, Guardexy is expanding the functionality of its solution. Alongside continuous monitoring of data flows, we are newly launching a&nbsp;monthly history of captured security events and incidents in the form of a&nbsp;structured report, which is prepared for internal audits as well as for official reporting needs. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e87db7f e-flex e-con-boxed e-con e-parent\" data-id=\"e87db7f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8f2589 elementor-widget elementor-widget-heading\" data-id=\"d8f2589\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Why incident logging is essential<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f93d8e elementor-widget elementor-widget-text-editor\" data-id=\"8f93d8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">NIS2 emphasizes not only prevention but also the organization&#8217;s&nbsp;ability to demonstrably:<\/span><\/p><ul><li><span style=\"font-weight: 400;\"> detect security events,<\/span><\/li><li><span style=\"font-weight: 400;\"> evaluate their severity,<\/span><\/li><li><span style=\"font-weight: 400;\"> take corrective measures,<\/span><\/li><li><span style=\"font-weight: 400;\"> report significant incidents in a&nbsp;timely manner.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3eafd8 e-flex e-con-boxed e-con e-parent\" data-id=\"f3eafd8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ee00c3 elementor-widget elementor-widget-text-editor\" data-id=\"5ee00c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In practice, this means that mere &#8220;traffic logging&#8221; is no longer sufficient. A&nbsp;municipality or company must be able to document what happened, when, with what impact, and how the situation was resolved. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9945b0e elementor-widget elementor-widget-image\" data-id=\"9945b0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/www.guardexy.eu\/wp-content\/uploads\/2026\/03\/2.jpg\" class=\"attachment-full size-full wp-image-1764\" alt=\"\" srcset=\"https:\/\/www.guardexy.eu\/wp-content\/uploads\/2026\/03\/2.jpg 1920w, https:\/\/www.guardexy.eu\/wp-content\/uploads\/2026\/03\/2-300x169.jpg 300w, https:\/\/www.guardexy.eu\/wp-content\/uploads\/2026\/03\/2-1024x576.jpg 1024w, https:\/\/www.guardexy.eu\/wp-content\/uploads\/2026\/03\/2-768x432.jpg 768w, https:\/\/www.guardexy.eu\/wp-content\/uploads\/2026\/03\/2-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17ace09 e-flex e-con-boxed e-con e-parent\" data-id=\"17ace09\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9756a9 elementor-widget elementor-widget-heading\" data-id=\"c9756a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Guardexy: from monitoring to auditable reporting<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8c42da elementor-widget elementor-widget-text-editor\" data-id=\"a8c42da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Our solution has long monitored the communication of photovoltaic power plants. Now, however, we not only analyze data in real-time but also systematically archive and classify it. <\/span><\/p><p><span style=\"font-weight: 400;\">The monthly report contains a&nbsp;history of captured events divided by severity, including information needed for internal security management and regulatory obligations.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9654425 e-flex e-con-boxed e-con e-parent\" data-id=\"9654425\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fc103d elementor-widget elementor-widget-heading\" data-id=\"6fc103d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Four levels of security events according to Guardexy\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8932e56 elementor-widget elementor-widget-text-editor\" data-id=\"8932e56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">To correctly interpret and prioritize incidents, we are introducing a&nbsp;uniform classification of data packets and operations into four levels.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bfc170 e-flex e-con-boxed e-con e-parent\" data-id=\"3bfc170\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9b6de7 elementor-widget elementor-widget-jet-table\" data-id=\"c9b6de7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-table jet-elements\">\n\t\t<div class=\"jet-table-wrapper\">\n\t\t\t<table class=\"jet-table jet-table--fa5-compat\">\n\t\t\t\t<thead class=\"jet-table__head\"><tr class=\"jet-table__head-row\"><th class=\"jet-table__cell elementor-repeater-item-fffb72d jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Protection Level<\/div><\/div><\/div><\/th><th class=\"jet-table__cell elementor-repeater-item-83e9576 jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Description<\/div><\/div><\/div><\/th><\/tr><\/thead>\n\t\t\t\t\t\t\t\t<tbody class=\"jet-table__body\"><tr class=\"jet-table__body-row elementor-repeater-item-1b3f45a\"><td class=\"jet-table__cell elementor-repeater-item-8bec004 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Level 0 &#8211; Allowed Event<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-73799fe jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Normal, expected, and legitimate traffic. Typically, this involves standard technology communication, for example:\n\u00b7 automated processes,\n\u00b7 scheduled operations,\n\u00b7 interventions by an authorized user or service,\n\u00b7 data reading (Read) or pre-approved changes (Write).\nThe event has no or negligible impact on operations. It is allowed and recorded only in aggregate for statistical purposes.  <\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-0b78755\"><td class=\"jet-table__cell elementor-repeater-item-8e2ba12 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Level 1 &#8211; Security Event\n<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-345afa2 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">A situation that deviates from standard behavior but does not represent a&nbsp;direct disruption of operations, typically:\n\u00b7 unclear or missing communication context,\n\u00b7 non-standard communication patterns,\n\u00b7 operations with limited impact,\n\u00b7 suspicious but harmless behavior.\nThe event is recorded in detail and displayed in the console as a&nbsp;security finding. It primarily serves for the early detection of potential risks. <\/div><\/div><\/div><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-4e5af31\"><td class=\"jet-table__cell elementor-repeater-item-761ad16 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Level 2 &#8211; Mitigated Security Incident<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-6665284 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">At this level, an unauthorized intervention attempt occurs. Typical manifestations include:\n\u00b7 unauthorized configuration changes,\n\u00b7 attempts to control the device without authorization,\n\u00b7 Write or Control operations with significant impact.\nGuardexy technically stops the incident (for example, by blocking communication or restricting access), and no actual disruption of operations occurs. The incident is recorded in the incident log and presented as a&nbsp;mitigated security incident.  <\/div><\/div><\/div><\/td><\/tr><\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3beaf2a e-flex e-con-boxed e-con e-parent\" data-id=\"3beaf2a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bbc3c6 elementor-widget elementor-widget-heading\" data-id=\"3bbc3c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Ready for municipalities, cities, and enterprises<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad7d916 elementor-widget elementor-widget-text-editor\" data-id=\"ad7d916\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">For the leadership of municipalities and companies, it is crucial that this categorization translates cybersecurity from a&nbsp;purely technical level into a&nbsp;clear managerial view of risks. The report clearly shows what is actually happening in the infrastructure, how severe the situations were, and which of them may have a&nbsp;regulatory impact. The organization thus gains not only protection but also conclusive documentation for audits, inspections, or crisis management.  <\/span><\/p><p><span style=\"font-weight: 400;\">For municipalities and cities, this is often the first tool that allows them to fulfill new obligations without the need to build their own security operations center.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2973dbc e-flex e-con-boxed e-con e-parent\" data-id=\"2973dbc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4df642 elementor-widget elementor-widget-heading\" data-id=\"c4df642\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">NIS2 is not just about protection, but about accountability<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-154b051 elementor-widget elementor-widget-text-editor\" data-id=\"154b051\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Modern cybersecurity is no longer just a&nbsp;technical discipline. Equally important is the ability to demonstrate that the organization is proceeding systematically and responsibly. <\/span><\/p><p><span style=\"font-weight: 400;\">Guardexy therefore elevates monitoring to the level of full-fledged security oversight with an audit trail, which helps protect not only the technology but also the organization&#8217;s&nbsp;leadership from regulatory risks from N\u00daKIB.<\/span><\/p><p><span style=\"font-weight: 400;\">If you are unsure whether you fall under the mandatory entities, or if you want to be certain that your infrastructure meets the new requirements, please contact us.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With the arrival of new legislation in the field of cybersecurity, the obligations of municipalities, cities, energy companies, and industrial enterprises have fundamentally changed. The NIS2 Directive and the subsequent Czech Cybersecurity Act impose on selected organizations not only the obligation to actively protect their systems but also to systematically record incidents and, in defined [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":["post-1761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-news"],"_links":{"self":[{"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/posts\/1761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/comments?post=1761"}],"version-history":[{"count":1,"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/posts\/1761\/revisions"}],"predecessor-version":[{"id":1767,"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/posts\/1761\/revisions\/1767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/media\/1765"}],"wp:attachment":[{"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/media?parent=1761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/categories?post=1761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.guardexy.eu\/en\/wp-json\/wp\/v2\/tags?post=1761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}