{"id":206606,"date":"2025-05-20T20:07:17","date_gmt":"2025-05-20T20:07:17","guid":{"rendered":"https:\/\/emdinfotech.com\/national-cybersecurity-requirements-framework-s3\/"},"modified":"2025-05-20T20:07:17","modified_gmt":"2025-05-20T20:07:17","slug":"national-cybersecurity-requirements-framework-s3","status":"publish","type":"post","link":"https:\/\/emdinfotech.com\/en\/national-cybersecurity-requirements-framework-s3\/","title":{"rendered":"National Cybersecurity Requirements Framework (S3)"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/online-university-18.jpg&#8221; custom_padding=&#8221;8vw||0px||false|false&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-a9d8e14e-2f78-408a-a83c-506939196b52&#8243; custom_padding=&#8221;60px|60px|60px|120px|true|false&#8221; custom_padding_tablet=&#8221;30px|30px|30px|60px|true|false&#8221; custom_padding_phone=&#8221;20px|20px|20px|40px|true|false&#8221; border_radii=&#8221;off|30px|30px||&#8221; global_colors_info=&#8221;{%22gcid-a9d8e14e-2f78-408a-a83c-506939196b52%22:%91%22background_color%22%93}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;d343c4fc-656d-4a09-a789-aaac73e94025&#8243; header_font=&#8221;Roboto|300|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;55px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>NIS2 National Cybersecurity Framework  <\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1280px&#8221; max_width_tablet=&#8221;1280px&#8221; max_width_phone=&#8221;1280px&#8221; max_width_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;640e0153-b982-4bd5-b76d-dc78dcfc5a61&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>National Cybersecurity Requirements Framework (S3): a New Era for Security in the Digital World<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;eac53637-81be-470b-aa2c-f0a69663910e&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p data-start=\"424\" data-end=\"511\" class=\"\"><strong data-start=\"424\" data-end=\"511\">What every business needs to know in 2025 &#8211; Full guide by EMD Infotech<\/strong><\/p>\n<h3 data-start=\"513\" data-end=\"573\" class=\"\">What is S3 and why is it relevant to every modern business?<\/h3>\n<p data-start=\"575\" data-end=\"1002\" class=\"\">In 2025, cybersecurity enters a new era with the implementation of the <strong data-start=\"643\" data-end=\"696\">National Cybersecurity Requirements Framework (S3)<\/strong>, which is the key tool for the implementation of the European <strong data-start=\"768\" data-end=\"776\">NIS2<\/strong> Directive (Directive 2022\/2555\/EU).S3 sets out specific obligations and measures for organisations that are considered &#8220;key&#8221; and &#8220;important entities&#8221; and operate in critical sectors of the Greek economy and society. <\/p>\n<p data-start=\"1004\" data-end=\"1203\" class=\"\">The new Greek legislation (Law 5160\/2024 and relevant ministerial decisions of May 2025) is directly binding and affects public, but mainly PRIVATE businesses operating in:<\/p>\n<ul data-start=\"1204\" data-end=\"1486\">\n<li data-start=\"1204\" data-end=\"1223\" class=\"\">\n<p data-start=\"1206\" data-end=\"1223\" class=\"\">Telecommunications<\/p>\n<\/li>\n<li data-start=\"1224\" data-end=\"1236\" class=\"\">\n<p data-start=\"1226\" data-end=\"1236\" class=\"\">Energy<\/p>\n<\/li>\n<li data-start=\"1237\" data-end=\"1246\" class=\"\">\n<p data-start=\"1239\" data-end=\"1246\" class=\"\">Health<\/p>\n<\/li>\n<li data-start=\"1247\" data-end=\"1260\" class=\"\">\n<p data-start=\"1249\" data-end=\"1260\" class=\"\">Transport<\/p>\n<\/li>\n<li data-start=\"1261\" data-end=\"1289\" class=\"\">\n<p data-start=\"1263\" data-end=\"1289\" class=\"\">Information technologies<\/p>\n<\/li>\n<li data-start=\"1290\" data-end=\"1322\" class=\"\">\n<p data-start=\"1292\" data-end=\"1322\" class=\"\">Financial services<\/p>\n<\/li>\n<li data-start=\"1323\" data-end=\"1334\" class=\"\">\n<p data-start=\"1325\" data-end=\"1334\" class=\"\">Food<\/p>\n<\/li>\n<li data-start=\"1335\" data-end=\"1356\" class=\"\">\n<p data-start=\"1337\" data-end=\"1356\" class=\"\">Water management<\/p>\n<\/li>\n<li data-start=\"1357\" data-end=\"1391\" class=\"\">\n<p data-start=\"1359\" data-end=\"1391\" class=\"\">Critical industrial infrastructure<\/p>\n<\/li>\n<li data-start=\"1392\" data-end=\"1486\" class=\"\">\n<p data-start=\"1394\" data-end=\"1486\" class=\"\">Plenty of other sectors, <strong data-start=\"1416\" data-end=\"1486\">including the hotel and tourism business<\/strong><\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1488\" data-end=\"1533\" class=\"\">What changes with S3 and the new legislation?<\/h3>\n<p data-start=\"1535\" data-end=\"1556\" class=\"\"><strong data-start=\"1535\" data-end=\"1556\">It is now required:<\/strong><\/p>\n<ul data-start=\"1557\" data-end=\"2721\">\n<li data-start=\"1557\" data-end=\"1710\" class=\"\">\n<p data-start=\"1559\" data-end=\"1710\" class=\"\"><strong data-start=\"1559\" data-end=\"1591\">Holistic risk management<\/strong>: Policies, procedures and measures based on international standards (ISO, NIST, etc.), with documentation of all actions.<\/p>\n<\/li>\n<li data-start=\"1711\" data-end=\"1849\" class=\"\">\n<p data-start=\"1713\" data-end=\"1849\" class=\"\"><strong data-start=\"1713\" data-end=\"1738\">Explicit management responsibility<\/strong>: top management bodies (Board, CEO, etc.) are now personally responsible for implementation and accountability.<\/p>\n<\/li>\n<li data-start=\"1850\" data-end=\"1975\" class=\"\">\n<p data-start=\"1852\" data-end=\"1975\" class=\"\"><strong data-start=\"1852\" data-end=\"1896\">Continuous risk assessment and management<\/strong>: regular review of threats, measures and incident response plans.<\/p>\n<\/li>\n<li data-start=\"1976\" data-end=\"2234\" class=\"\">\n<p data-start=\"1978\" data-end=\"2234\" class=\"\"><strong data-start=\"1978\" data-end=\"2015\">Safety policies &amp; procedures<\/strong>: Mandatory existence and regular updating of policies for access, account management, encryption, encryption, backups, physical and environmental security, vendor partnerships, software development, etc.<\/p>\n<\/li>\n<li data-start=\"2235\" data-end=\"2348\" class=\"\">\n<p data-start=\"2237\" data-end=\"2348\" class=\"\"><strong data-start=\"2237\" data-end=\"2276\">Designation of a Safety Officer (SHO)<\/strong>: a mandatory role in every entity reporting directly to management.<\/p>\n<\/li>\n<li data-start=\"2349\" data-end=\"2468\" class=\"\">\n<p data-start=\"2351\" data-end=\"2468\" class=\"\"><strong data-start=\"2351\" data-end=\"2386\">Independent checks and tests<\/strong>: Annual internal\/external audits and penetration testing.<\/p>\n<\/li>\n<li data-start=\"2469\" data-end=\"2581\" class=\"\">\n<p data-start=\"2471\" data-end=\"2581\" class=\"\"><strong data-start=\"2471\" data-end=\"2504\">Continuous staff training<\/strong>: Awareness and technical training programmes for all staff.<\/p>\n<\/li>\n<li data-start=\"2582\" data-end=\"2721\" class=\"\">\n<p data-start=\"2584\" data-end=\"2721\" class=\"\"><strong data-start=\"2584\" data-end=\"2628\">Incident management and notification<\/strong>: Recording, analysis and mandatory reporting of cybersecurity incidents to competent authorities.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"2723\" data-end=\"2779\" class=\"\">More specifically for Hotels &amp; Tourism Businesses<\/h3>\n<p data-start=\"2781\" data-end=\"3075\" class=\"\">Very often hotel businesses handle critical customer data, online booking processes, payment systems, and smart hospitality technologies (smart rooms, self check-in, etc.). Compliance with S3 is <strong data-start=\"3011\" data-end=\"3033\">legally mandatory<\/strong> and will now be audited on a regular basis. <\/p>\n<h3 data-start=\"3077\" data-end=\"3119\" class=\"\">Who is at risk if they do not comply?<\/h3>\n<ul data-start=\"3121\" data-end=\"3287\">\n<li data-start=\"3121\" data-end=\"3154\" class=\"\">\n<p data-start=\"3123\" data-end=\"3154\" class=\"\">Fines and legal sanctions<\/p>\n<\/li>\n<li data-start=\"3155\" data-end=\"3189\" class=\"\">\n<p data-start=\"3157\" data-end=\"3189\" class=\"\">Loss of partnerships\/contracts<\/p>\n<\/li>\n<li data-start=\"3190\" data-end=\"3208\" class=\"\">\n<p data-start=\"3192\" data-end=\"3208\" class=\"\">Damage to reputation<\/p>\n<\/li>\n<li data-start=\"3209\" data-end=\"3287\" class=\"\">\n<p data-start=\"3211\" data-end=\"3287\" class=\"\">Real operational risk (downtime, data loss)<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"3289\" data-end=\"3335\" class=\"\">How can <strong data-start=\"3318\" data-end=\"3334\">EMD Infotech<\/strong> help?<\/h3>\n<p data-start=\"3337\" data-end=\"3456\" class=\"\"><strong data-start=\"3339\" data-end=\"3355\">EMD Infotech<\/strong> provides a complete package of cybersecurity compliance and management services, which includes:<\/p>\n<ul data-start=\"3458\" data-end=\"4457\">\n<li data-start=\"3458\" data-end=\"3608\" class=\"\">\n<p data-start=\"3460\" data-end=\"3608\" class=\"\"><strong data-start=\"3460\" data-end=\"3491\">Initial Audit &#8211; gap analysis<\/strong>: investigation of the current situation and weaknesses of your business in relation to S3\/NIS2 requirements.<\/p>\n<\/li>\n<li data-start=\"3609\" data-end=\"3805\" class=\"\">\n<p data-start=\"3611\" data-end=\"3805\" class=\"\"><strong data-start=\"3611\" data-end=\"3663\">Preparation and updating of security policies<\/strong>: We prepare tailor-made policies and procedures (for access, asset management, incidents, encryption, backups, supply chain, etc.).<\/p>\n<\/li>\n<li data-start=\"3806\" data-end=\"3940\" class=\"\">\n<p data-start=\"3808\" data-end=\"3940\" class=\"\"><strong data-start=\"3808\" data-end=\"3836\">Technical implementation of measures<\/strong>: we install and configure endpoint protection systems, firewalls, MFA, data encryption, etc.<\/p>\n<\/li>\n<li data-start=\"3941\" data-end=\"4052\" class=\"\">\n<p data-start=\"3943\" data-end=\"4052\" class=\"\"><strong data-start=\"3943\" data-end=\"3982\">Staff and management training<\/strong>: seminars and online workshops, tailored to the role of each team.<\/p>\n<\/li>\n<li data-start=\"4053\" data-end=\"4188\" class=\"\">\n<p data-start=\"4055\" data-end=\"4188\" class=\"\"><strong data-start=\"4055\" data-end=\"4117\">Conduct penetration tests and vulnerability assessments<\/strong>: annual or ad hoc audits, with full reporting and suggestions for improvement.<\/p>\n<\/li>\n<li data-start=\"4189\" data-end=\"4300\" class=\"\">\n<p data-start=\"4191\" data-end=\"4300\" class=\"\"><strong data-start=\"4191\" data-end=\"4226\">DPO\/CISO-as-a-Service<\/strong>: permanent or on-demand consultancy to maintain compliance.<\/p>\n<\/li>\n<li data-start=\"4301\" data-end=\"4457\" class=\"\">\n<p data-start=\"4303\" data-end=\"4457\" class=\"\"><strong data-start=\"4303\" data-end=\"4356\">Incident management and reporting support<\/strong>: immediate response to incidents and guidance on mandatory incident notification.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4459\" data-end=\"4501\" class=\"\">The next steps for each business:<\/h3>\n<ol data-start=\"4503\" data-end=\"4907\">\n<li data-start=\"4503\" data-end=\"4606\" class=\"\">\n<p data-start=\"4506\" data-end=\"4606\" class=\"\"><strong data-start=\"4506\" data-end=\"4549\">Contact EMD Infotech directly<\/strong> for a first update and free compliance assessment.<\/p>\n<\/li>\n<li data-start=\"4607\" data-end=\"4686\" class=\"\">\n<p data-start=\"4610\" data-end=\"4686\" class=\"\"><strong data-start=\"4610\" data-end=\"4685\">Start with a complete inventory of your assets, systems and processes<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4687\" data-end=\"4744\" class=\"\">\n<p data-start=\"4690\" data-end=\"4744\" class=\"\"><strong data-start=\"4690\" data-end=\"4743\">Train and raise awareness among your staff<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4745\" data-end=\"4809\" class=\"\">\n<p data-start=\"4748\" data-end=\"4809\" class=\"\"><strong data-start=\"4748\" data-end=\"4808\">Adopt international cybersecurity standards and practices<\/strong>.<\/p>\n<\/li>\n<li data-start=\"4810\" data-end=\"4907\" class=\"\">\n<p data-start=\"4813\" data-end=\"4907\" class=\"\"><strong data-start=\"4813\" data-end=\"4907\">Keep active engagement with experts as the threat landscape is constantly changing.<\/strong><\/p>\n<\/li>\n<\/ol>\n<hr data-start=\"4909\" data-end=\"4912\" class=\"\">\n<p data-start=\"4914\" data-end=\"5048\" class=\"\"><strong data-start=\"4914\" data-end=\"5048\">EMD Infotech is here to ensure that your business is shielded, compliant and ready for the digital future.<\/strong><\/p>\n<p data-start=\"5050\" data-end=\"5121\" class=\"\"><em data-start=\"5050\" data-end=\"5121\">For any questions or support requests, please contact our team.<\/p>\n<p><a href=\"https:\/\/emdinfotech.com\/contact\/\" title=\"Contact us\">For contact click here<\/a> <br \/><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_4,1_4&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;700px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/cybersecurity-1.jpg&#8221; title_text=&#8221;cybersecurity&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|30px|30px|30px|30px&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.19.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/emdinfotech.com\/wp-content\/uploads\/2025\/05\/cybersecurity-2.jpg&#8221; title_text=&#8221;cybersecurity-2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; position_origin_a_tablet=&#8221;bottom_left&#8221; position_origin_a_phone=&#8221;bottom_left&#8221; position_origin_a_last_edited=&#8221;off|desktop&#8221; position_origin_f_last_edited=&#8221;off|desktop&#8221; position_origin_r_last_edited=&#8221;off|desktop&#8221; custom_margin=&#8221;|-20vw|||false|false&#8221; custom_margin_tablet=&#8221;|0vw|||false|false&#8221; custom_margin_phone=&#8221;|0vw|||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; hover_enabled=&#8221;0&#8243; positioning_tablet=&#8221;none&#8221; positioning_phone=&#8221;none&#8221; positioning_last_edited=&#8221;off|desktop&#8221; border_radii=&#8221;on|30px|30px|30px|30px&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto|300|||||||&#8221; header_font=&#8221;Roboto|300|||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>More Information<\/h1>\n<p>[\/et_pb_text][et_pb_blog fullwidth=&#8221;off&#8221; include_categories=&#8221;all,43,42,40,41,1,39,current&#8221; show_more=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NIS2 National Cybersecurity Framework National Cybersecurity Requirements Framework (S3): a New Era for Security in the Digital World What every business needs to know in 2025 &#8211; Full guide by EMD Infotech What is S3 and why is it relevant to every modern business? In 2025, cybersecurity enters a new era with the implementation of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[55,48],"tags":[],"class_list":["post-206606","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-en","category-e-e-instructions"],"_links":{"self":[{"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/posts\/206606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/comments?post=206606"}],"version-history":[{"count":0,"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/posts\/206606\/revisions"}],"wp:attachment":[{"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/media?parent=206606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/categories?post=206606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emdinfotech.com\/en\/wp-json\/wp\/v2\/tags?post=206606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}