{"id":127,"date":"2025-07-02T11:32:13","date_gmt":"2025-07-02T11:32:13","guid":{"rendered":"https:\/\/hnsecureit.com\/?page_id=127"},"modified":"2025-07-19T14:04:23","modified_gmt":"2025-07-19T14:04:23","slug":"nis2-megfeleles","status":"publish","type":"page","link":"https:\/\/hnsecureit.com\/en\/nis2-megfeleles\/","title":{"rendered":"NIS2 compliance"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"127\" class=\"elementor elementor-127\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54dba872 e-flex e-con-boxed e-con e-child\" data-id=\"54dba872\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5cb6dd64 e-con-full e-flex e-con e-child\" data-id=\"5cb6dd64\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3d8513e7 e-flex e-con-boxed e-con e-child\" data-id=\"3d8513e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21e03925 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-right elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"21e03925\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\tService\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59fc2914 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"59fc2914\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h1 class=\"ekit-heading--title elementskit-section-title text_fill\"><span><span>NIS2<\/span><\/span> compliance <\/h1><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-584f8000 e-flex e-con-boxed e-con e-parent\" data-id=\"584f8000\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6d559813 e-con-full e-flex e-con e-child\" data-id=\"6d559813\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7328d6a6 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"7328d6a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title text_fill translation-block\"><span><span>NIS2<\/span><\/span> Compliance \u2013 New Regulations, New Responsibilities<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60d142b9 elementor-widget elementor-widget-text-editor\" data-id=\"60d142b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Is your organization ready for the challenges of NIS2? We help you meet the new requirements through practical, regulation-based, and technological support \u2014 so you\u2019re not just compliant, but truly secure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3aa04d0 e-con-full e-flex e-con e-child\" data-id=\"3aa04d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce22506 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-right elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"ce22506\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1bf9e4 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"d1bf9e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title text_fill translation-block\">What is the <span><span>NIS2<\/span><\/span> Directive?<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc7b9d8 elementor-widget elementor-widget-text-editor\" data-id=\"dc7b9d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive is the European Union\u2019s new cybersecurity framework, aimed at ensuring a uniform and high level of protection for organizations operating in critical and important sectors.<\/p><p>It significantly broadens the scope of covered entities and introduces stricter requirements in areas such as risk management, incident response, and supply chain security \u2014 with substantial financial penalties for non-compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf76e53 e-con-full e-flex e-con e-child\" data-id=\"bf76e53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-555c53a elementor-widget-divider--view-line_text elementor-widget-divider--element-align-right elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"555c53a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93c322f elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"93c322f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title text_fill translation-block\">How is NIS2 implemented in <span><span>Hungary<\/span><\/span> ?<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a18809 elementor-widget elementor-widget-text-editor\" data-id=\"8a18809\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hungary transposed the NIS2 Directive into national law through Act LXIX of 2024 and Government Decree 7\/2024. These regulations define detailed cybersecurity obligations for both public and private sector organizations.<\/p><p>Key components include:<\/p><ul><li>\u2022\tDesignation of supervisory authorities (SZTFH and NKI) and their powers<\/li><li>Classification of organizations into basic, significant, and high categories<\/li><li>Mandatory security measures such as incident reporting, risk management, and audit readiness<\/li><\/ul><p>Decree 7\/2024 further specifies:<\/p><ul><li>A detailed set of cybersecurity controls grouped by domains (e.g., access control, business continuity, network security)<\/li><li>Minimum protection levels based on classification<\/li><li>Measurable and auditable compliance criteria<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bdb52bd e-con-full e-flex e-con e-child\" data-id=\"bdb52bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-250eb8f elementor-widget-divider--view-line_text elementor-widget-divider--element-align-right elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"250eb8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee3f2ae elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"ee3f2ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title text_fill translation-block\">What do <span>auditors<\/span><\/span> expect?<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22792fd elementor-widget elementor-widget-text-editor\" data-id=\"22792fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">The 1\/2025 (II.6.) SZTFH Decree outlines the methodology for cybersecurity audits.<\/p><p>Its purpose is to translate NIS2 requirements into auditable and enforceable expectations.<\/p><p>Key elements include:<\/p><ul><li class=\"translation-block\">Frequency (every 2 years), scope, and methodology of audits<\/li><li class=\"translation-block\">Documentation and record-keeping obligations<\/li><li class=\"translation-block\">Objective evaluation criteria for compliance and non-compliance<\/li><li class=\"translation-block\">Rules for appointing certified audit organizations and qualified experts<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-811d119 e-con-full e-flex e-con e-child\" data-id=\"811d119\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0d5f62 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-right elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"c0d5f62\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1d12b4 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"e1d12b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title text_fill translation-block\">Why is preparation <span><span>important<\/span><\/span>?<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26aef60 elementor-widget elementor-widget-text-editor\" data-id=\"26aef60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity audits are not just a bureaucratic obligation \u2014 they are a strategic opportunity to assess your organization\u2019s maturity, uncover risks, and avoid penalties.<\/p><p>Our experience shows that most Hungarian organizations currently lack not only technical but also administrative (policy-level) controls, which are essential for achieving compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37e7e43 e-con-full e-flex e-con e-child\" data-id=\"37e7e43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8c27ab elementor-widget-divider--view-line_text elementor-widget-divider--element-align-right elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"a8c27ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b2d080 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"9b2d080\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title text_fill translation-block\">Why Choose<span><span> HN Secure IT Ltd<\/span><\/span>?<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1aae8a5 elementor-widget elementor-widget-text-editor\" data-id=\"1aae8a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Because we know not only the rules, but also the official expectations - and we help you meet them.<\/p><p>Our experts have more than a decade of consulting and IT security audit experience, who still perform their auditing activities \"in real time\" today, and have practical experience in conducting NIS2 audits, including the relevant requirements.<\/p><p>We help you prepare for the audit, compile documentation, and fill gaps \u2013 efficiently, transparently, and in accordance with the authority's expectations. We offer full-scale preparation from security classification to technology implementation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1174698 e-con-full e-flex e-con e-child\" data-id=\"1174698\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85ddea8 elementor-widget-divider--view-line_text elementor-widget-divider--element-align-right elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"85ddea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82c65a2 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"82c65a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"ekit-heading--title elementskit-section-title text_fill translation-block\">Don\u2019t wait for the deadline \u2014 start your NIS2 journey <span><span>today<\/span><\/span>.<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89888f1 elementor-widget elementor-widget-text-editor\" data-id=\"89888f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During our initial consultation, we assess your current state, identify critical gaps, and deliver a custom action plan to move forward.<\/p><p>Contact us for pricing and service packages.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Szolg\u00e1ltat\u00e1s NIS2 megfelel\u00e9s NIS2 felk\u00e9sz\u00edt\u00e9s \u2013 \u00faj szab\u00e1lyoz\u00e1s, \u00faj felel\u0151ss\u00e9gek Felk\u00e9sz\u00fclt m\u00e1r a NIS2 kih\u00edv\u00e1saira? Seg\u00edt\u00fcnk megfelelni az \u00faj szab\u00e1lyoz\u00e1soknak \u2013 gyakorlati, szab\u00e1lyoz\u00e1salap\u00fa \u00e9s technol\u00f3giai t\u00e1mogat\u00e1ssal, hogy ne csak megfeleljen, hanem biztons\u00e1gosabb is legyen. Mi a NIS2 ir\u00e1nyelv? Az Eur\u00f3pai Uni\u00f3 NIS2 ir\u00e1nyelve a kiberbiztons\u00e1g \u00faj alapk\u00f6ve: c\u00e9lja, hogy egys\u00e9ges \u00e9s magas szint\u0171 v\u00e9delmet biztos\u00edtson [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":330,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-127","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIS2 megfelel\u00e9s &#8211; NIS2 auditfelk\u00e9sz\u00edt\u00e9s \u2013 HN Secure IT Kft.<\/title>\n<meta name=\"description\" content=\"NIS2 audit, tan\u00e1csad\u00e1s, szab\u00e1lyzatok k\u00e9sz\u00edt\u00e9se, oktat\u00e1s \u00e9s teljes k\u00f6r\u0171 felk\u00e9sz\u00edt\u00e9s v\u00e1llalatok r\u00e9sz\u00e9re. B\u00edzza szak\u00e9rt\u0151re!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hnsecureit.com\/en\/nis2-megfeleles\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 megfelel\u00e9s &#8211; NIS2 auditfelk\u00e9sz\u00edt\u00e9s \u2013 HN Secure IT Kft.\" \/>\n<meta property=\"og:description\" content=\"NIS2 audit, tan\u00e1csad\u00e1s, szab\u00e1lyzatok k\u00e9sz\u00edt\u00e9se, oktat\u00e1s \u00e9s teljes k\u00f6r\u0171 felk\u00e9sz\u00edt\u00e9s v\u00e1llalatok r\u00e9sz\u00e9re. B\u00edzza szak\u00e9rt\u0151re!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hnsecureit.com\/en\/nis2-megfeleles\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61577724195498\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-19T14:04:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1463\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hnsecureit.com\/nis2-megfeleles\/\",\"url\":\"https:\/\/hnsecureit.com\/nis2-megfeleles\/\",\"name\":\"NIS2 megfelel\u00e9s &#8211; NIS2 auditfelk\u00e9sz\u00edt\u00e9s \u2013 HN Secure IT Kft.\",\"isPartOf\":{\"@id\":\"https:\/\/hnsecureit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hnsecureit.com\/nis2-megfeleles\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hnsecureit.com\/nis2-megfeleles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg\",\"datePublished\":\"2025-07-02T11:32:13+00:00\",\"dateModified\":\"2025-07-19T14:04:23+00:00\",\"description\":\"NIS2 audit, tan\u00e1csad\u00e1s, szab\u00e1lyzatok k\u00e9sz\u00edt\u00e9se, oktat\u00e1s \u00e9s teljes k\u00f6r\u0171 felk\u00e9sz\u00edt\u00e9s v\u00e1llalatok r\u00e9sz\u00e9re. B\u00edzza szak\u00e9rt\u0151re!\",\"breadcrumb\":{\"@id\":\"https:\/\/hnsecureit.com\/nis2-megfeleles\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hnsecureit.com\/nis2-megfeleles\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/hnsecureit.com\/nis2-megfeleles\/#primaryimage\",\"url\":\"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg\",\"contentUrl\":\"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg\",\"width\":2560,\"height\":1463},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hnsecureit.com\/nis2-megfeleles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\/\/hnsecureit.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 megfelel\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hnsecureit.com\/#website\",\"url\":\"https:\/\/hnsecureit.com\/\",\"name\":\"https:\/\/hnsecureit.com\/\",\"description\":\"IT biztons\u00e1g \u00e9s tan\u00e1csad\u00e1s \u2013 HN Secure IT Kft.\",\"publisher\":{\"@id\":\"https:\/\/hnsecureit.com\/#organization\"},\"alternateName\":\"hnsecureit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hnsecureit.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hnsecureit.com\/#organization\",\"name\":\"hnsecureit\",\"url\":\"https:\/\/hnsecureit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/hnsecureit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/HN-Secure-v5_1.svg\",\"contentUrl\":\"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/HN-Secure-v5_1.svg\",\"width\":536,\"height\":608,\"caption\":\"hnsecureit\"},\"image\":{\"@id\":\"https:\/\/hnsecureit.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61577724195498\",\"https:\/\/www.linkedin.com\/company\/hn-secure-it-kft\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 megfelel\u00e9s &#8211; NIS2 auditfelk\u00e9sz\u00edt\u00e9s \u2013 HN Secure IT Kft.","description":"NIS2 audit, tan\u00e1csad\u00e1s, szab\u00e1lyzatok k\u00e9sz\u00edt\u00e9se, oktat\u00e1s \u00e9s teljes k\u00f6r\u0171 felk\u00e9sz\u00edt\u00e9s v\u00e1llalatok r\u00e9sz\u00e9re. B\u00edzza szak\u00e9rt\u0151re!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hnsecureit.com\/en\/nis2-megfeleles\/","og_locale":"en_GB","og_type":"article","og_title":"NIS2 megfelel\u00e9s &#8211; NIS2 auditfelk\u00e9sz\u00edt\u00e9s \u2013 HN Secure IT Kft.","og_description":"NIS2 audit, tan\u00e1csad\u00e1s, szab\u00e1lyzatok k\u00e9sz\u00edt\u00e9se, oktat\u00e1s \u00e9s teljes k\u00f6r\u0171 felk\u00e9sz\u00edt\u00e9s v\u00e1llalatok r\u00e9sz\u00e9re. B\u00edzza szak\u00e9rt\u0151re!","og_url":"https:\/\/hnsecureit.com\/en\/nis2-megfeleles\/","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61577724195498","article_modified_time":"2025-07-19T14:04:23+00:00","og_image":[{"width":2560,"height":1463,"url":"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hnsecureit.com\/nis2-megfeleles\/","url":"https:\/\/hnsecureit.com\/nis2-megfeleles\/","name":"NIS2 megfelel\u00e9s &#8211; NIS2 auditfelk\u00e9sz\u00edt\u00e9s \u2013 HN Secure IT Kft.","isPartOf":{"@id":"https:\/\/hnsecureit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hnsecureit.com\/nis2-megfeleles\/#primaryimage"},"image":{"@id":"https:\/\/hnsecureit.com\/nis2-megfeleles\/#primaryimage"},"thumbnailUrl":"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg","datePublished":"2025-07-02T11:32:13+00:00","dateModified":"2025-07-19T14:04:23+00:00","description":"NIS2 audit, tan\u00e1csad\u00e1s, szab\u00e1lyzatok k\u00e9sz\u00edt\u00e9se, oktat\u00e1s \u00e9s teljes k\u00f6r\u0171 felk\u00e9sz\u00edt\u00e9s v\u00e1llalatok r\u00e9sz\u00e9re. B\u00edzza szak\u00e9rt\u0151re!","breadcrumb":{"@id":"https:\/\/hnsecureit.com\/nis2-megfeleles\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hnsecureit.com\/nis2-megfeleles\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/hnsecureit.com\/nis2-megfeleles\/#primaryimage","url":"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg","contentUrl":"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/abstract-cybersecurity-concept-design-scaled.jpg","width":2560,"height":1463},{"@type":"BreadcrumbList","@id":"https:\/\/hnsecureit.com\/nis2-megfeleles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/hnsecureit.com\/"},{"@type":"ListItem","position":2,"name":"NIS2 megfelel\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/hnsecureit.com\/#website","url":"https:\/\/hnsecureit.com\/","name":"https:\/\/hnsecureit.com\/","description":"IT biztons\u00e1g \u00e9s tan\u00e1csad\u00e1s \u2013 HN Secure IT Kft.","publisher":{"@id":"https:\/\/hnsecureit.com\/#organization"},"alternateName":"hnsecureit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hnsecureit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/hnsecureit.com\/#organization","name":"hnsecureit","url":"https:\/\/hnsecureit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/hnsecureit.com\/#\/schema\/logo\/image\/","url":"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/HN-Secure-v5_1.svg","contentUrl":"https:\/\/hnsecureit.com\/wp-content\/uploads\/2025\/07\/HN-Secure-v5_1.svg","width":536,"height":608,"caption":"hnsecureit"},"image":{"@id":"https:\/\/hnsecureit.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61577724195498","https:\/\/www.linkedin.com\/company\/hn-secure-it-kft\/"]}]}},"_links":{"self":[{"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/pages\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":26,"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/pages\/127\/revisions"}],"predecessor-version":[{"id":823,"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/pages\/127\/revisions\/823"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/media\/330"}],"wp:attachment":[{"href":"https:\/\/hnsecureit.com\/en\/wp-json\/wp\/v2\/media?parent=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}