{"id":34635,"date":"2025-11-19T11:55:34","date_gmt":"2025-11-19T11:55:34","guid":{"rendered":"https:\/\/mainstream.eu\/?p=34635"},"modified":"2026-01-29T12:25:53","modified_gmt":"2026-01-29T12:25:53","slug":"nis2-directive","status":"publish","type":"post","link":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive","title":{"rendered":"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance"},"content":{"rendered":"\n<p>The introduction of the&nbsp;<strong>NIS2 Directive<\/strong>&nbsp;has brought significant changes to cybersecurity across the European Union. Unlike its predecessor, the new version of NIS covers a broader range of organisations from various industries (including digital service providers, postal services, public administration, manufacturing, and more). NIS2 also tightens cybersecurity requirements and introduces legal accountability for corporate management teams. To make matters worse, organisations that fail to comply may face even stricter penalties up to \u20ac10 million or 2% of their global annual revenue.<\/p>\n\n\n\n<p>There is no doubt that compliance with NIS2 regulations is essential for any entity operating fully or partially within the EU. On this journey, organisations face critical questions such as:&nbsp;<strong>How can risk be kept under control, and how can business continuity be ensured\u2014even during unplanned incidents?<\/strong><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#NIS2_and_Business_Continuity\" >NIS2 and Business Continuity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#Where_to_Begin\" >Where to Begin?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#Focus_on_Risk_Reduction\" >Focus on Risk Reduction<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"NIS2_and_Business_Continuity\"><\/span><strong>NIS2 and Business Continuity<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/nis2directive.eu\">NIS2 Directive<\/a>&nbsp;webpage outlines the requirements and obligations across four areas, and business continuity is one of them. According to the Directive, companies are required to develop a plan for maintaining uninterrupted operations in case of major cyber incidents. This plan should include system recovery procedures, emergency protocols, and the formation of a crisis response team. In addition to these requirements, NIS2 mandates that essential and important entities should implement security mechanisms that address specific cyber threats. One of these mechanisms is a business operations management plan, along with strategies to ensure access to IT systems and operational functions during and after a security incident.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2-1024x683.jpg\" alt=\"\" class=\"wp-image-34637\" srcset=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2-1024x683.jpg 1024w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2-300x200.jpg 300w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2-768x512.jpg 768w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2-1536x1024.jpg 1536w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2.jpg 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>NIS2 Compliance: The Role of Backup and Disaster Recovery Solutions<\/strong><\/h3>\n\n\n\n<p>When it comes to business continuity, preparation is half the battle. This is where<a href=\"https:\/\/mainstream.eu\/en\/cloud-services\/back-up-as-a-service\/\">\u00a0Backup<\/a><a href=\"https:\/\/mainstream.eu\/en\/cloud-services\/disaster-recovery\/\"> <\/a>and<a href=\"https:\/\/mainstream.eu\/en\/cloud-services\/disaster-recovery\/\"> Disaster Recovery (DR) strategies<\/a>\u00a0and solutions come into play, serving to enable the rapid and reliable recovery of critical systems and data. With an effective Backup and DR strategy in place, organisations can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Minimise downtime: Fast failover to a secondary site helps reduce service disruption, ensuring the availability of business-critical systems.<\/li>\n\n\n\n<li>Protect data: Mechanisms such as advanced data encryption are essential for maintaining data security and meeting NIS2 compliance requirements.<\/li>\n\n\n\n<li>Ensure operational resilience: A comprehensive DR plan addresses a variety of scenarios from ransomware attacks and human error to natural disasters, enabling the organisation to continue operating under unforeseen circumstances.<\/li>\n<\/ul>\n\n\n\n<p>Meeting the requirements of the NIS2 Directive goes beyond deploying isolated solutions, and requires thorough planning, control, and risk evaluation at the company level. This includes, among other things:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Backup strategy: The 3-2-1 backup rule is recommended\u2014three copies of data, stored on two different media, with one copy kept offsite.<\/li>\n\n\n\n<li>Full backup solution review: This should include regular testing and verification of backup integrity, detection of changes in backup configuration, and validation that backups are protected against unauthorised access.<\/li>\n\n\n\n<li>Strategic planning of recovery environments: Planning and using a separate, secure recovery environment is essential, especially since it is often not possible to rely on systems located at the site affected by the incident.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Where_to_Begin\"><\/span><strong>Where to Begin?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Every business requires a unique Disaster Recovery (DR) plan, tailored to its specific needs. To define the optimal approach for your organisation, it is essential to evaluate the criticality of systems, applications, and data in relation to potential risks. Since a DR plan involves proper development, regular updates, and testing, the best practice is to establish a dedicated Disaster Recovery team or to partner with an external provider offering specialised expertise in this area.<\/p>\n\n\n\n<p>Another high-priority aspect is the resumption of operations after an attack. The latest version of the NIS Directive makes comprehensive preparation for rapid recovery a necessity. This means that recovery plans must not only be developed but also tested through role-play scenarios and cyberattack simulations. In this context, companies should also assess the recovery and security capabilities of third-party providers delivering critical services and carefully select their partners accordingly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Focus_on_Risk_Reduction\"><\/span><strong>Focus on Risk Reduction<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>All prescribed measures are designed to strengthen cybersecurity and should, therefore, be approached strategically, as initiatives that help your organisation operate seamlessly in a world of increasingly complex and evolving threats. In this regard, while implementing advanced Backup and Disaster Recovery solutions is not a magic wand for achieving full NIS2 compliance, it is a crucial step on the journey toward reducing business risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how Backup and Disaster Recovery strategies help comply with the NIS2 directive and strengthen cybersecurity and business continuity.<\/p>\n","protected":false},"author":4,"featured_media":34626,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[215,311,305],"tags":[309],"class_list":["post-34635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bezbednost","category-data-en","category-security-en","tag-cloud-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance - Mainstream<\/title>\n<meta name=\"description\" content=\"Learn how Backup and Disaster Recovery strategies help comply with the NIS2 directive and strengthen cybersecurity and business continuity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance - Mainstream\" \/>\n<meta property=\"og:description\" content=\"Learn how Backup and Disaster Recovery strategies help comply with the NIS2 directive and strengthen cybersecurity and business continuity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/\" \/>\n<meta property=\"og:site_name\" content=\"Mainstream\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-19T11:55:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T12:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mainstream\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mainstream\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/\"},\"author\":{\"name\":\"Mainstream\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"headline\":\"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance\",\"datePublished\":\"2025-11-19T11:55:34+00:00\",\"dateModified\":\"2026-01-29T12:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/\"},\"wordCount\":712,\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"keywords\":[\"cloud\"],\"articleSection\":[\"Bezbednost\",\"Data\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/\",\"name\":\"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance - Mainstream\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"datePublished\":\"2025-11-19T11:55:34+00:00\",\"dateModified\":\"2026-01-29T12:25:53+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"description\":\"Learn how Backup and Disaster Recovery strategies help comply with the NIS2 directive and strengthen cybersecurity and business continuity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"contentUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"width\":1800,\"height\":1200,\"caption\":\"Close up of laptop on desk with hologram. Cloud computing concept. Smart city wireless internet communication with cloud storage, cloud services. Download, upload data on server. 3D Rendering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/nis2-directive\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/\",\"name\":\"Mainstream\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\",\"name\":\"Mainstream\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"caption\":\"Mainstream\"},\"url\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/author\\\/mainstream\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance - Mainstream","description":"Learn how Backup and Disaster Recovery strategies help comply with the NIS2 directive and strengthen cybersecurity and business continuity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/","og_locale":"en_US","og_type":"article","og_title":"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance - Mainstream","og_description":"Learn how Backup and Disaster Recovery strategies help comply with the NIS2 directive and strengthen cybersecurity and business continuity.","og_url":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/","og_site_name":"Mainstream","article_published_time":"2025-11-19T11:55:34+00:00","article_modified_time":"2026-01-29T12:25:53+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-2.jpg","type":"image\/jpeg"}],"author":"Mainstream","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mainstream","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#article","isPartOf":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/"},"author":{"name":"Mainstream","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"headline":"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance","datePublished":"2025-11-19T11:55:34+00:00","dateModified":"2026-01-29T12:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/"},"wordCount":712,"image":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","keywords":["cloud"],"articleSection":["Bezbednost","Data","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/","url":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/","name":"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance - Mainstream","isPartOf":{"@id":"https:\/\/mainstream.eu\/sr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#primaryimage"},"image":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","datePublished":"2025-11-19T11:55:34+00:00","dateModified":"2026-01-29T12:25:53+00:00","author":{"@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"description":"Learn how Backup and Disaster Recovery strategies help comply with the NIS2 directive and strengthen cybersecurity and business continuity.","breadcrumb":{"@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#primaryimage","url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","contentUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","width":1800,"height":1200,"caption":"Close up of laptop on desk with hologram. Cloud computing concept. Smart city wireless internet communication with cloud storage, cloud services. Download, upload data on server. 3D Rendering"},{"@type":"BreadcrumbList","@id":"https:\/\/mainstream.eu\/en\/blog\/nis2-directive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mainstream.eu\/en\/"},{"@type":"ListItem","position":2,"name":"NIS2 Directive: How a Backup and Disaster Recovery Strategy Supports the Path to Compliance"}]},{"@type":"WebSite","@id":"https:\/\/mainstream.eu\/sr\/#website","url":"https:\/\/mainstream.eu\/sr\/","name":"Mainstream","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mainstream.eu\/sr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3","name":"Mainstream","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","caption":"Mainstream"},"url":"https:\/\/mainstream.eu\/en\/author\/mainstream\/"}]}},"_links":{"self":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts\/34635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/comments?post=34635"}],"version-history":[{"count":0,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts\/34635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/media\/34626"}],"wp:attachment":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/media?parent=34635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/categories?post=34635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/tags?post=34635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}