{"id":5274,"date":"2026-03-17T08:44:39","date_gmt":"2026-03-17T07:44:39","guid":{"rendered":"https:\/\/enthec.com\/?p=5274"},"modified":"2026-03-17T08:44:39","modified_gmt":"2026-03-17T07:44:39","slug":"how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/","title":{"rendered":"How the DORA regulation impacts businesses and what steps you should take"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">If you work in the financial or technology sector, you have surely heard of an acronym that is keeping more than one IT director up at night: DORA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DORA is the<\/span> <b>Digital Operational Resilience Act, <\/b><span style=\"font-weight: 400;\">one of the European Union&#8217;s most ambitious and demanding cybersecurity regulations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From January 2025, the<\/span> <b>DORA regulation <\/b><span style=\"font-weight: 400;\"> is a mandatory reality. But why is it so important, and what will it really change for your business? It&#8217;s not just another law; it&#8217;s a shift in mindset. Having a good firewall is no longer enough; now, authorities want proof that your company can withstand a cyberattack and continue operating as if nothing happened.   <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What exactly is the DORA regulation, and which sector does it primarily target?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Although the name sounds general,<\/span> <b>which sector the DORA regulation primarily targets<\/b> <span style=\"font-weight: 400;\">is one of the most frequently asked questions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The short answer is: to the<\/span> <b>financial sector,<\/b><span style=\"font-weight: 400;\">. but the long answer is much more interesting. Unlike previous regulations that only targeted large banks, DORA extends to: <\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Credit institutions and payment establishments.<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Investment and asset management companies.<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Insurance and reinsurance entities.<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>ICT service providers<\/b> <span style=\"font-weight: 400;\">that provide support to the above.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This last point is critical. If your company is a technology firm that sells software or cloud services to a bank, the DORA regulation also applies to you. The European Union has identified that the biggest weakness of the financial system is not always the bank itself, but rather the digital supply chain.  <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The pillars of the DORA regulation and cybersecurity<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The aim of this regulation is to create a robust framework for the European financial system to withstand serious incidents. To achieve this, the DORA cybersecurity regulation rests on several fundamental pillars that companies must address: <\/span><\/p>\n<h3><b>1. ICT risk management<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Organizations must have a<\/span> <b>solid governance framework. <\/b><span style=\"font-weight: 400;\">. Delegating security solely to the IT department is no longer permitted; company management is now legally responsible for risk decisions.<\/span><\/p>\n<h3><b>2. Incident Management and Reporting<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If something happens, it must be reported. And quickly. The regulations establish strict deadlines and harmonized formats for reporting serious ICT incidents to the relevant authorities.  <\/span><\/p>\n<h3><b>3. Digital operational resilience tests<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This is where things get serious. DORA requires companies to conduct regular testing of their systems. For the most critical entities, this includes the   <\/span><strong>TLPT (Threat-Led Penetration Testing)<\/strong><span style=\"font-weight: 400;\">, or penetration tests based on threat intelligence.<\/span><\/p>\n<h3><b>4. Third-party risk management<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As we mentioned earlier, the DORA regulation focuses on your suppliers. You must audit how they manage their own security, since a breach in their system is, for all practical purposes, a breach in yours. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" class=\"alignnone wp-image-5265\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora.jpg\" alt=\"DORA Regulation\" width=\"554\" height=\"528\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora.jpg 650w, https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-300x286.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-350x333.jpg 350w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><b>Analysis and guide to the DORA regulation: from compliance to strategy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you look for analysis and guidance on the DORA regulation, you&#8217;ll see that most experts agree on one thing: compliance cannot be reactive. Many companies make the mistake of waiting for an audit to find out whether their systems are up to date. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the current threat landscape doesn&#8217;t wait. According to data from various European security reports,  <\/span><a href=\"https:\/\/enthec.com\/en\/what-is-a-ransomware-attack-and-how-to-anticipate-it-with-advanced-monitoring\/\"><span style=\"font-weight: 400;\">ransomware attacks<\/span><\/a> <span style=\"font-weight: 400;\">and credential theft have increased exponentially in the last two years, particularly affecting financial services companies.<\/span><\/p>\n<h3><b>How to move from theory to practice?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To comply with the regulations, it is necessary to adopt tools that not only analyze risk once a year, but also offer a continuous overview. This is where the concept of  <\/span><a href=\"https:\/\/enthec.com\/en\/ctem-continuous-threat-exposure-management-as-a-prominent-cybersecurity-approach\/\"><span style=\"font-weight: 400;\">CTEM,<\/span><\/a> Continuous Threat Exposure Management, becomes vital.<\/p>\n<p><span style=\"font-weight: 400;\">Traditionally, companies would do a <\/span><a href=\"https:\/\/enthec.com\/en\/main-advantages-and-disadvantages-of-pentesting-in-a-company\/\"><span style=\"font-weight: 400;\">&#8220;pentesting&#8221;<\/span><\/a><span style=\"font-weight: 400;\">annually. The problem is that if a new vulnerability emerges the day after the test, your report is useless. A CTEM strategy proposes a five-stage cycle:  <\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Discovery<\/b> <span style=\"font-weight: 400;\">of assets and attack surfaces.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mapping<\/b> <span style=\"font-weight: 400;\">of possible attack routes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Prioritization<\/b> <span style=\"font-weight: 400;\">based on real risk (not just technical).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Validation<\/b> <span style=\"font-weight: 400;\">that the controls work.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mobilization<\/b> t<span style=\"font-weight: 400;\">o correct what really matters.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><b>How Kartos from Enthec helps you with compliance<\/b><\/h2>\n<p>At Enthec,<span style=\"font-weight: 400;\">we understand that managing all this information can be overwhelming. That&#8217;s why we&#8217;ve developed solutions that align perfectly with the philosophy of the DORA regulation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For companies seeking professional and continuous management, our Kartos platform is the answer. It positions itself as a  <\/span><b>key tool for CTEM, enabling organizations to automatically and non-intrusively monitor their external exposure.<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Third-party surveillance.<\/b><span style=\"font-weight: 400;\"> One of the most challenging aspects of DORA is monitoring your suppliers. Kartos allows you to analyze the risk level of your supply chain without installing anything on their systems or requesting special permissions. You&#8217;ll get a real and objective picture of their digital health.  <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Leak detection. <\/b><span style=\"font-weight: 400;\">Kartos scans the Deep and Dark Web looking for leaked credentials or confidential information from your company before cybercriminals can use it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk scoring. <\/b><span style=\"font-weight: 400;\">It provides a clear score on your security posture, which greatly simplifies life for CISOs when reporting to the board of directors, as required by the new regulatory framework.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you are a<\/span> <b>freelancer or concerned about your personal digital identity<\/b>, <span style=\"font-weight: 400;\">we also have<\/span> <b><a href=\"https:\/\/enthec.com\/en\/qondar\/\">Qondar<\/a>, <\/b><span style=\"font-weight: 400;\">our cyber-surveillance solution for individuals that applies the same principles of prevention and continuous monitoring.<\/span><\/p>\n<p><b>Important:<\/b><span style=\"font-weight: 400;\"> The DORA regulations are not just a checklist. They are an opportunity for your company to become more competitive and build greater trust with its customers. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Practical steps you should take today<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If your company falls under the umbrella of this regulation (or if you simply want to improve your cybersecurity), here&#8217;s a simple roadmap:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Find out if you are affected. <\/b><span style=\"font-weight: 400;\">Check whether your activity, or that of your main clients, falls within the scope of the DORA regulation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Map your assets and suppliers.<\/b><span style=\"font-weight: 400;\"> You can&#8217;t protect what you don&#8217;t know. You need an up-to-date inventory of all your systems and, above all, your critical IT providers. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Adopt a CTEM mentality. <\/b><span style=\"font-weight: 400;\">Leave static audits behind. Implement continuous monitoring tools, such as Kartos, to have 24\/7 visibility into your external attack surface. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Review your contracts. <\/b><span style=\"font-weight: 400;\">Make sure that agreements with your technology service providers include the security and incident notification clauses required by law.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Training and awareness. <\/b><span style=\"font-weight: 400;\">Human error remains the primary entry point. Train your team and, above all, raise management&#8217;s awareness of their new legal responsibilities. <\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The DORA regulation may seem like a huge logistical challenge, but with the right tools and a proactive approach, it can become the<\/span> <b>best shield for your organization&#8217;s future.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Are you worried about how the new regulations will affect your infrastructure or your suppliers? <br \/>Get in touch with usand we&#8217;ll help you assess your actual exposure through a Kartos demo. <\/span><b> It&#8217;s time to move from worry to prevention!<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you work in the financial or technology sector, you have surely heard of an acronym that is keeping more [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":5268,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[32,54,71],"class_list":["post-5274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-kartos-en","tag-regulations","tag-europe"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 DORA Regulation: Impact and Measures<\/title>\n<meta name=\"description\" content=\"Discover how the DORA regulation affects the financial and technology sectors and what steps to take to comply successfully \u27a1\ufe0f Here\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 DORA Regulation: Impact and Measures\" \/>\n<meta property=\"og:description\" content=\"Discover how the DORA regulation affects the financial and technology sectors and what steps to take to comply successfully \u27a1\ufe0f Here\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T07:44:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2368\" \/>\n\t<meta property=\"og:image:height\" content=\"1568\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"How the DORA regulation impacts businesses and what steps you should take\",\"datePublished\":\"2026-03-17T07:44:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/\"},\"wordCount\":1097,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg\",\"keywords\":[\"Kartos\",\"Regulations\",\"Europe\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/\",\"url\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/\",\"name\":\"\u25b7 DORA Regulation: Impact and Measures\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg\",\"datePublished\":\"2026-03-17T07:44:39+00:00\",\"description\":\"Discover how the DORA regulation affects the financial and technology sectors and what steps to take to comply successfully \u27a1\ufe0f Here\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg\",\"width\":2368,\"height\":1568,\"caption\":\"Reglamento DORA UE\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How the DORA regulation impacts businesses and what steps you should take\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 DORA Regulation: Impact and Measures","description":"Discover how the DORA regulation affects the financial and technology sectors and what steps to take to comply successfully \u27a1\ufe0f Here","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 DORA Regulation: Impact and Measures","og_description":"Discover how the DORA regulation affects the financial and technology sectors and what steps to take to comply successfully \u27a1\ufe0f Here","og_url":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2026-03-17T07:44:39+00:00","og_image":[{"width":2368,"height":1568,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"How the DORA regulation impacts businesses and what steps you should take","datePublished":"2026-03-17T07:44:39+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/"},"wordCount":1097,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg","keywords":["Kartos","Regulations","Europe"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/","url":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/","name":"\u25b7 DORA Regulation: Impact and Measures","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg","datePublished":"2026-03-17T07:44:39+00:00","description":"Discover how the DORA regulation affects the financial and technology sectors and what steps to take to comply successfully \u27a1\ufe0f Here","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/reglamento-dora-UE.jpg","width":2368,"height":1568,"caption":"Reglamento DORA UE"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/how-the-dora-regulation-impacts-businesses-and-what-steps-you-should-take\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"How the DORA regulation impacts businesses and what steps you should take"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/5274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=5274"}],"version-history":[{"count":1,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/5274\/revisions"}],"predecessor-version":[{"id":5276,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/5274\/revisions\/5276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/5268"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=5274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=5274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=5274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}