{"id":34644,"date":"2025-05-19T12:16:05","date_gmt":"2025-05-19T12:16:05","guid":{"rendered":"https:\/\/mainstream.eu\/?p=34644"},"modified":"2025-11-20T09:25:41","modified_gmt":"2025-11-20T09:25:41","slug":"nis2-direktiva","status":"publish","type":"post","link":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva","title":{"rendered":"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0"},"content":{"rendered":"\n<p>Uvedba&nbsp;<strong>NIS2 direktive<\/strong>&nbsp;je prinesla pomembne spremembe na podro\u010dju kibernetske varnosti v Evropski uniji. Za razliko od prej\u0161nje razli\u010dice, nova verzija NIS vklju\u010duje \u0161ir\u0161i krog organizacij iz najrazli\u010dnej\u0161ih sektorjev (digitalni ponudniki, po\u0161tne storitve, dr\u017eavna uprava, proizvodnja itd.). NIS2 hkrati zaostruje varnostne zahteve in uvaja pravne posledice za vodstvene ekipe podjetij. \u0160e ve\u010d \u2013 organizacije, ki se ne uskladijo z regulativo, se lahko soo\u010dijo s stro\u017ejimi kaznimi, ki lahko dose\u017eejo do 10 milijonov evrov ali 2\u202f% globalnega letnega prihodka.&nbsp;<\/p>\n\n\n\n<p>Ni dvoma, da je uskladitev z NIS2 predpisi klju\u010dna za vse, ki poslujejo \u2013 delno ali v celoti \u2013 na obmo\u010dju EU. Na tej poti se odpirajo bistvena vpra\u0161anja, kot so<strong>&nbsp;kako obvladovati tveganje in zagotoviti neprekinjeno poslovanje tudi ob nepredvidenih incidentih?<\/strong><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#NIS2_in_stalnost_poslovanja\" >NIS2 in stalnost poslovanja&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#Kje_zaceti\" >Kje za\u010deti?&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#Fokus_na_zmanjsanje_tveganja\" >Fokus na zmanj\u0161anje tveganja&nbsp;<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"NIS2_in_stalnost_poslovanja\"><\/span><strong>NIS2 in stalnost poslovanja&nbsp;<\/strong><strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Na strani&nbsp;<a href=\"applewebdata:\/\/DE57A071-0D00-4E99-B5F2-17D62D1CFA82\/quot;https:\/nis2directive.eu&amp;quot\">NIS2 direktive<\/a>&nbsp;so navedene zahteve in obveznosti na \u0161tirih podro\u010djih, med katerimi je tudi kontinuiteta poslovanja. Kot je navedeno, so podjetja dol\u017ena na\u010drtovati, kako bodo zagotovila nemoteno poslovanje v primeru ve\u010djih kibernetskih incidentov. Ta na\u010drt naj vklju\u010duje obnovo sistemov, nujne postopke in vzpostavitev krizne ekipe za odziv. Poleg izpostavljenih zahtev NIS2 zahteva, da bistveni in pomembni subjekti implementirajo varnostne mehanizme, s katerimi bodo naslovili konkretne kibernetske gro\u017enje. Eden od teh je na\u010drt za upravljanje poslovnih operacij ter na\u010drt za zagotavljanje dostopa do IT sistemov in njihovih operativnih funkcij med in po varnostnem incidentu.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-1024x683.jpg\" alt=\"\" class=\"wp-image-34627\" srcset=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-1024x683.jpg 1024w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-300x200.jpg 300w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-768x512.jpg 768w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering-1536x1024.jpg 1536w, https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg 1800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Usklajevanje z NIS2: vloga Backup in Disaster Recovery re\u0161itev&nbsp;<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>Ko govorimo o stalnosti poslovanja, je priprava \u017ee polovica poti. Na tej to\u010dki v ospredje stopajo&nbsp;<a href=\"https:\/\/mainstream.eu\/sl\/cloud-storitve\/back-up-as-a-service\/\">Backup&nbsp;<\/a>i<a href=\"https:\/\/mainstream.eu\/sl\/cloud-storitve\/disaster-recovery\/\">&nbsp;Disaster Recovery (DR) strategija<\/a>&nbsp;in re\u0161itve, ki omogo\u010dajo hitro in zanesljivo obnovo klju\u010dnih sistemov in podatkov.&nbsp;&nbsp;Z u\u010dinkovitim Backup in DR pristopom lahko organizacije:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Minimizirajo downtime Hiter failover na sekundarno lokacijo pomaga zmanj\u0161ati prekinitev storitev in ohranja razpolo\u017eljivost business-critical sistemov.&nbsp;<\/li>\n\n\n\n<li>Za\u0161\u010dite svoje podatke &#8211; kot je napredna enkripcija podatkov, so klju\u010dni za njihovo varnost in skladnost z zahtevami NIS2.&nbsp;<\/li>\n\n\n\n<li>Zagotovijo operativno odpornost- Celovit DR na\u010drt naslavlja razli\u010dne scenarije \u2013 od ransomware napadov, \u010dlove\u0161kih napak, do naravnih nesre\u010d \u2013 in podjetju omogo\u010da delovanje tudi v nepredvidenih okoli\u0161\u010dinah.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Izpolnjevanje zahtev NIS2 presega zgolj uvedbo posameznih re\u0161itev in zahteva skrbno na\u010drtovanje, nadzor ter oceno tveganj na ravni celotnega podjetja. To med drugim vklju\u010duje:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Backup strategijo &#8211; Priporo\u010da se uporaba pravila 3-2-1: hranjenje treh kopij podatkov na dveh razli\u010dnih medijih, pri \u010demer se ena kopija nahaja offsite.&nbsp;<\/li>\n\n\n\n<li>Celovit pregled Backup re\u0161itev- Vklju\u010duje redno preizku\u0161anje in preverjanje integritete varnostnih kopij, zaznavanje sprememb v konfiguraciji ter potrjevanje za\u0161\u010dite pred nepoobla\u0161\u010denim dostopom.&nbsp;<\/li>\n\n\n\n<li>Strate\u0161ko na\u010drtovanje obnovitvenega okolja- Na\u010drtovanje in uporaba lo\u010denega, varnega okolja za obnovo je klju\u010dno, saj tega pogosto ni mogo\u010de zagotoviti na lokaciji, ki jo je prizadel incident.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Kje_zaceti\"><\/span><strong>Kje za\u010deti?&nbsp;<\/strong><strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Vsako podjetje potrebuje svoj Disaster Recovery plan, prilagojen specifi\u010dnim potrebam in tveganjem. Za oblikovanje optimalnega pristopa je treba oceniti kriti\u010dnost sistemov, aplikacij in podatkov glede na mo\u017ene nevarnosti. Glede na to, da DR na\u010drt vklju\u010duje ustrezno zasnovo, posodabljanje in preizku\u0161anje, je najbolj\u0161a praksa ustanovitev namenskega DR tima ali sodelovanje z zunanjim partnerjem, ki prina\u0161a specializirano znanje.&nbsp;<\/p>\n\n\n\n<p>Pomemben dejavnik je tudi ponovni zagon poslovanja po napadu. Nova verzija NIS regulative zahteva celostno pripravljenost na hitro obnovo, kar pomeni, da je treba na\u010drte ne le oblikovati, ampak jih tudi redno preverjati s pomo\u010djo simulacij napadov in role-play scenarijev. V tem kontekstu morajo podjetja oceniti tudi varnostne (recovery) kapacitete partnerjev, ki zagotavljajo klju\u010dne storitve, in jih skrbno izbrati.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Fokus_na_zmanjsanje_tveganja\"><\/span><strong>Fokus na zmanj\u0161anje tveganja&nbsp;<\/strong><strong><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Vse predpisane varnostne ukrepe je treba obravnavati strate\u0161ko \u2013 kot pobude, ki krepijo kibernetsko odpornost in omogo\u010dajo nemoteno poslovanje v svetu nara\u0161\u010dajo\u010dih in vse bolj zapletenih gro\u017eenj. Implementacija naprednih Backup in Disaster Recovery re\u0161itev sicer ni \u010dude\u017ena re\u0161itev za skladnost z NIS2, a vsekakor predstavlja pomemben korak na poti k zmanj\u0161evanju poslovnih tveganj.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spoznajte, kako strategije varnostnega kopiranja in obnovitve po katastrofi pomagajo pri skladnosti z direktivo NIS2 ter krepijo kibernetsko varnost in neprekinjeno poslovanje.<\/p>\n","protected":false},"author":4,"featured_media":34627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[232,250],"tags":[],"class_list":["post-34644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-sl","category-varnost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0 - Mainstream<\/title>\n<meta name=\"description\" content=\"Spoznajte, kako strategije varnostnega kopiranja in obnovitve po katastrofi pomagajo pri skladnosti z direktivo NIS2 ter krepijo kibernetsko varnost in neprekinjeno poslovanje.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/\" \/>\n<meta property=\"og:locale\" content=\"sl_SI\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0 - Mainstream\" \/>\n<meta property=\"og:description\" content=\"Spoznajte, kako strategije varnostnega kopiranja in obnovitve po katastrofi pomagajo pri skladnosti z direktivo NIS2 ter krepijo kibernetsko varnost in neprekinjeno poslovanje.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/\" \/>\n<meta property=\"og:site_name\" content=\"Mainstream\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-19T12:16:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T09:25:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mainstream\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mainstream\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/\"},\"author\":{\"name\":\"Mainstream\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"headline\":\"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0\",\"datePublished\":\"2025-05-19T12:16:05+00:00\",\"dateModified\":\"2025-11-20T09:25:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/\"},\"wordCount\":713,\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"articleSection\":[\"Data\",\"Varnost\"],\"inLanguage\":\"sl-SI\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/\",\"name\":\"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0 - Mainstream\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"datePublished\":\"2025-05-19T12:16:05+00:00\",\"dateModified\":\"2025-11-20T09:25:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"description\":\"Spoznajte, kako strategije varnostnega kopiranja in obnovitve po katastrofi pomagajo pri skladnosti z direktivo NIS2 ter krepijo kibernetsko varnost in neprekinjeno poslovanje.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/#breadcrumb\"},\"inLanguage\":\"sl-SI\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"contentUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg\",\"width\":1800,\"height\":1200,\"caption\":\"Close up of laptop on desk with hologram. Cloud computing concept. Smart city wireless internet communication with cloud storage, cloud services. Download, upload data on server. 3D Rendering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/blog\\\/nis2-direktiva\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Doma\u010da\",\"item\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/\",\"name\":\"Mainstream\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sl-SI\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\",\"name\":\"Mainstream\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"caption\":\"Mainstream\"},\"url\":\"https:\\\/\\\/mainstream.eu\\\/sl\\\/author\\\/mainstream\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0 - Mainstream","description":"Spoznajte, kako strategije varnostnega kopiranja in obnovitve po katastrofi pomagajo pri skladnosti z direktivo NIS2 ter krepijo kibernetsko varnost in neprekinjeno poslovanje.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/","og_locale":"sl_SI","og_type":"article","og_title":"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0 - Mainstream","og_description":"Spoznajte, kako strategije varnostnega kopiranja in obnovitve po katastrofi pomagajo pri skladnosti z direktivo NIS2 ter krepijo kibernetsko varnost in neprekinjeno poslovanje.","og_url":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/","og_site_name":"Mainstream","article_published_time":"2025-05-19T12:16:05+00:00","article_modified_time":"2025-11-20T09:25:41+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","type":"image\/jpeg"}],"author":"Mainstream","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mainstream","Est. reading time":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#article","isPartOf":{"@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/"},"author":{"name":"Mainstream","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"headline":"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0","datePublished":"2025-05-19T12:16:05+00:00","dateModified":"2025-11-20T09:25:41+00:00","mainEntityOfPage":{"@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/"},"wordCount":713,"image":{"@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","articleSection":["Data","Varnost"],"inLanguage":"sl-SI"},{"@type":"WebPage","@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/","url":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/","name":"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0 - Mainstream","isPartOf":{"@id":"https:\/\/mainstream.eu\/sr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#primaryimage"},"image":{"@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","datePublished":"2025-05-19T12:16:05+00:00","dateModified":"2025-11-20T09:25:41+00:00","author":{"@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"description":"Spoznajte, kako strategije varnostnega kopiranja in obnovitve po katastrofi pomagajo pri skladnosti z direktivo NIS2 ter krepijo kibernetsko varnost in neprekinjeno poslovanje.","breadcrumb":{"@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#breadcrumb"},"inLanguage":"sl-SI","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/"]}]},{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#primaryimage","url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","contentUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2025\/05\/close-up-laptop-desk-with-hologram-cloud-computing-concept-smart-city-wireless-internet-communication-with-cloud-storage-cloud-services-download-upload-data-server-3d-rendering.jpg","width":1800,"height":1200,"caption":"Close up of laptop on desk with hologram. Cloud computing concept. Smart city wireless internet communication with cloud storage, cloud services. Download, upload data on server. 3D Rendering"},{"@type":"BreadcrumbList","@id":"https:\/\/mainstream.eu\/sl\/blog\/nis2-direktiva\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Doma\u010da","item":"https:\/\/mainstream.eu\/sl\/"},{"@type":"ListItem","position":2,"name":"NIS2 direktiva: Kako strategija Backup in Disaster Recovery pomaga na poti k skladnosti\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/mainstream.eu\/sr\/#website","url":"https:\/\/mainstream.eu\/sr\/","name":"Mainstream","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mainstream.eu\/sr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sl-SI"},{"@type":"Person","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3","name":"Mainstream","image":{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","caption":"Mainstream"},"url":"https:\/\/mainstream.eu\/sl\/author\/mainstream\/"}]}},"_links":{"self":[{"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/posts\/34644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/comments?post=34644"}],"version-history":[{"count":0,"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/posts\/34644\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/media\/34627"}],"wp:attachment":[{"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/media?parent=34644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/categories?post=34644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mainstream.eu\/sl\/wp-json\/wp\/v2\/tags?post=34644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}