Information security in supplier relationships

The IT contract is no longer just a commercial contract. Today, its primary purpose is to support the IT department's KPIs on availability – as close to 100% as possible. Therefore, it is important that you are aware of the requirements that the extensive cybersecurity regulation, such as NIS 2 implementation legislation and DORA, impose on the terms of an IT contract. The […]

Are US tech giants the future? Is your cloud exit plan ready?

Do you have a Cloud Exit Plan? With all the chaos following Trump's re-election as president and the noyb organization (none of your business) pointing out that it could soon become a very big problem to use the big US tech giants, especially in the context of GDPR, it is extra important that you have a cloud exit plan for your […]

NIS 2: Note – Who is covered in the water sector

As you know, NIS 2 applies to significant and important entities in various critical sectors, including the water sector. To be even more precise, it is the specific activities actually carried out by the entity that determine whether it is covered or not. One might even speak of a reality check when determining whether […]

Contact Unitas – your partner in security and compliance

Unitas provides reliable advice in compliance, IT and information security. With a pragmatic approach, we help companies in regulated industries manage security and operational responsibility effectively. Contact us to discuss how we can help you.

Form for contact page

NIS 2 implementation calculates

We throw ourselves around with knowledge...

Order your free material here and receive it in a few minutes in your inbox. To be safe, check your SPAM folder if necessary.

Get material ordered on the website sent

Wanna join? Sign up Unitas' newsletter

Registration form for newsletter

UNITAS vulnerability scanning