{"id":79968,"date":"2026-03-17T21:29:57","date_gmt":"2026-03-17T20:29:57","guid":{"rendered":"https:\/\/complior.se\/?p=79968"},"modified":"2026-03-17T21:58:47","modified_gmt":"2026-03-17T20:58:47","slug":"cybersecurity-law-sweden-requirements","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/cybersecurity-law-sweden-requirements\/","title":{"rendered":"S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns79968_5f2b82-fb\"><a class=\"kb-button kt-button button kb-btn79968_2fc9ad-b8 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading79968_5404e2-6e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_5404e2-6e\">Guider<\/span>\n\n\n\n<h1 class=\"kt-adv-heading79968_876ee1-98 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_876ee1-98\">S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tMar 17, 2026\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading79968_460f4f-91 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading79968_460f4f-91\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">6 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image79968_464228-3d size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-1024x576.jpg\" alt=\"Illustration av cybers\u00e4kerhetslagen i Sverige med s\u00e4kerhetstj\u00e4nster som skyddar data och uppfyller NIS2-krav\" class=\"kb-img wp-image-79971\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-1024x576.jpg 1024w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-300x169.jpg 300w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-768x432.jpg 768w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-18x10.jpg 18w, https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg 1279w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-13bin6a is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<blockquote class=\"wp-block-quote blockera-block blockera-block-mj8lx2 has-manrope-font-family is-layout-flow wp-block-quote-is-layout-flow\" style=\"border-left-color:#0e875d;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);\">\n<p class=\"blockera-block blockera-block-1pmq77h\">Du beh\u00f6ver inte byta ut allt \u2013 men du beh\u00f6ver r\u00e4tt tj\u00e4nster p\u00e5 r\u00e4tt plats.<\/p>\n<\/blockquote>\n\n\n\n<p class=\"kt-adv-heading79968_7585c6-dc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_7585c6-dc\">Den 15 januari 2026 tr\u00e4dde cybers\u00e4kerhetslagen (SFS 2025:1506) i kraft. Det \u00e4r Sveriges implementering av EU:s NIS2-direktiv och den omfattar betydligt fler organisationer \u00e4n den tidigare NIS-lagen. Kommuner, regioner, myndigheter och en rad privata verksamheter \u2013 fr\u00e5n energi och h\u00e4lso- och sjukv\u00e5rd till digitala tj\u00e4nster och transport \u2013 omfattas nu av sk\u00e4rpta krav p\u00e5 cybers\u00e4kerhet.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_cdf3be-c1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_cdf3be-c1\">F\u00f6r dig som \u00e4r CISO, dataskyddsombud eller ansvarig f\u00f6r regelefterlevnad inneb\u00e4r det konkreta skyldigheter: tio definierade s\u00e4kerhets\u00e5tg\u00e4rder, incidentrapportering inom 24 timmar och sanktionsavgifter som kan uppg\u00e5 till 2 % av global \u00e5rsoms\u00e4ttning eller 10 miljoner euro.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_5fa8db-0c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_5fa8db-0c\">Cybers\u00e4kerhetslagen kr\u00e4ver handling \u2013 inte bara policydokument.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_a6220c-85 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_a6220c-85\">Den goda nyheten \u00e4r att du inte beh\u00f6ver bygga allt fr\u00e5n grunden. Med r\u00e4tt svenska s\u00e4kerhetstj\u00e4nster p\u00e5 plats kan du redan idag m\u00f6ta m\u00e5nga av lagens krav, oavsett om du anv\u00e4nder egen infrastruktur, publikt moln eller en hybridl\u00f6sning.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_1939b6-da wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_1939b6-da\">H\u00e4r g\u00e5r vi igenom sex tj\u00e4nsteomr\u00e5den som direkt adresserar lagkraven.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1jgnugw is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading79968_b2a50f-31 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_b2a50f-31\">Vad inneb\u00e4r cybers\u00e4kerhetslagen i praktiken?<\/h2>\n\n\n\n<p class=\"kt-adv-heading79968_f930a7-90 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_f930a7-90\">Lagen st\u00e4ller krav p\u00e5 att organisationer ska kunna f\u00f6rebygga, uppt\u00e4cka, hantera och rapportera s\u00e4kerhetsincidenter \u2013 samt visa att s\u00e4kerhets\u00e5tg\u00e4rderna \u00e4r effektiva \u00f6ver tid.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_316e44-39 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_316e44-39\">Det handlar inte bara om teknik, utan om kontroll, sp\u00e5rbarhet och f\u00f6rm\u00e5ga att agera snabbt n\u00e4r n\u00e5got h\u00e4nder.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1m3e2f0 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading79968_a63a6f-8e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_a63a6f-8e\">1. Logghantering (SIEM) \u2013 uppt\u00e4ck incidenter i tid<\/h3>\n\n\n\n<p class=\"kt-adv-heading79968_b1d2b5-be wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_b1d2b5-be\"><strong>Lagkrav: <\/strong>Incidenthantering, rapporteringsunderlag och effektivitetsbed\u00f6mning (2 kap. 3 \u00a7 p. 2 och p. 6, samt 2 kap. 5\u20138 \u00a7\u00a7)<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_178452-7f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_178452-7f\">F\u00f6r att kunna uppt\u00e4cka och rapportera incidenter m\u00e5ste du ha insyn i vad som sker i dina system.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_7e017d-53 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_7e017d-53\">En SIEM-tj\u00e4nst (Security Information and Event Management) samlar in och analyserar loggdata fr\u00e5n hela IT-milj\u00f6n i realtid. Avvikelser identifieras automatiskt och ger dig underlag f\u00f6r att rapportera incidenter inom de 24 timmar som lagen kr\u00e4ver.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_aca410-5f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_aca410-5f\">Historisk loggdata g\u00f6r det ocks\u00e5 m\u00f6jligt att visa att dina s\u00e4kerhets\u00e5tg\u00e4rder fungerar \u00f6ver tid \u2013 ett krav i lagen.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_eb2b05-2b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_eb2b05-2b\">Compliors SIEM-tj\u00e4nst driftas fr\u00e5n Sverige med \u00f6vervakning dygnet runt. Loggar lagras i ett svenskt moln och \u00e4r tillg\u00e4ngliga \u00e4ven om din egen milj\u00f6 ligger nere.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1xasprs is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading79968_db372a-b7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_db372a-b7\">2. S\u00e5rbarhetsanalys \u2013 identifiera risker kontinuerligt<\/h3>\n\n\n\n<p class=\"kt-adv-heading79968_5bb85c-ab wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_5bb85c-ab\"><strong>Lagkrav:<\/strong> S\u00e4kerhet vid utveckling och underh\u00e5ll samt effektivitetsbed\u00f6mning (2 kap. 3 \u00a7 p. 5 och p. 6)<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_2ba380-b9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_2ba380-b9\">Cybers\u00e4kerhetslagen kr\u00e4ver att du hanterar s\u00e5rbarheter genom hela systemets livscykel.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_883539-64 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_883539-64\">Med kontinuerlig s\u00e5rbarhetsskanning f\u00e5r du en l\u00f6pande bild av din s\u00e4kerhetsniv\u00e5. Du kan identifiera och prioritera risker innan de utnyttjas och samtidigt dokumentera ditt arbete f\u00f6r tillsynsmyndigheter.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_abc88b-06 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_abc88b-06\">Det ger ett mer proaktivt och strukturerat s\u00e4kerhetsarbete j\u00e4mf\u00f6rt med enstaka tester.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1mqbf5b is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading79968_d5922b-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_d5922b-ad\">3. Nyckelhantering och kryptering \u2013 kontrollera \u00e5tkomsten till din data<\/h3>\n\n\n\n<p class=\"kt-adv-heading79968_7c3678-20 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_7c3678-20\"><strong>Lagkrav:<\/strong> Strategier f\u00f6r kryptografi och kryptering (2 kap. 3 \u00a7 p. 8)<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_f60e62-75 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_f60e62-75\">Kryptering \u00e4r bara s\u00e5 stark som kontrollen \u00f6ver nycklarna.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_abcabf-ea wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_abcabf-ea\">Med en KMS-tj\u00e4nst (Key Management Service) f\u00e5r du central kontroll \u00f6ver hela nyckellivscykeln \u2013 fr\u00e5n skapande till rotation och \u00e5terkallande. Med st\u00f6d f\u00f6r HYOK (Hold Your Own Key) beh\u00e5ller du kontrollen \u00e4ven i publika moln.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_e8c79f-f1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_e8c79f-f1\">F\u00f6r h\u00f6gre s\u00e4kerhetskrav anv\u00e4nds HSM (Hardware Security Module), d\u00e4r nycklar lagras i h\u00e5rdvara och aldrig l\u00e4mnar den s\u00e4kra milj\u00f6n.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_a7ebca-bc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_a7ebca-bc\">Alla tj\u00e4nster kan driftas fr\u00e5n svenska datacenter, vilket s\u00e4kerst\u00e4ller att nycklarna stannar under svensk jurisdiktion.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-dvh352 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading79968_fdf0eb-31 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_fdf0eb-31\">4. Identitetstj\u00e4nst (IdP) \u2013 s\u00e4kerst\u00e4ll vem som f\u00e5r \u00e5tkomst<\/h3>\n\n\n\n<p class=\"kt-adv-heading79968_74ac14-cd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_74ac14-cd\"><strong>Lagkrav:<\/strong> \u00c5tkomstkontroll och autentisering (2 kap. 3 \u00a7 p. 9 och p. 10)<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_e764bb-bf wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_e764bb-bf\">Stark autentisering \u00e4r en grundf\u00f6ruts\u00e4ttning i lagen.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_e865ef-60 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_e865ef-60\">En IdP-tj\u00e4nst (Identity Provider) m\u00f6jligg\u00f6r s\u00e4ker inloggning med MFA, BankID och e-legitimation. Compliors l\u00f6sning \u00e4r godk\u00e4nd p\u00e5 tillitsniv\u00e5 LoA4 \u2013 samma niv\u00e5 som anv\u00e4nds av svenska myndigheter.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_5e7ac0-59 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_5e7ac0-59\">Det ger dig kontroll \u00f6ver vem som f\u00e5r tillg\u00e5ng till vad \u2013 och under vilka f\u00f6ruts\u00e4ttningar.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1wkdpa9 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading79968_0b81d9-47 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_0b81d9-47\">5. Dynamisk \u00e5tkomstkontroll i Microsoft 365<\/h3>\n\n\n\n<p class=\"kt-adv-heading79968_ffd5e1-ba wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_ffd5e1-ba\"><strong>Lagkrav:<\/strong> \u00c5tkomstkontroll och tillg\u00e5ngsf\u00f6rvaltning (2 kap. 3 \u00a7 p. 9)<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_1ce54b-06 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_1ce54b-06\">Standardinst\u00e4llningar i Microsoft 365 r\u00e4cker s\u00e4llan f\u00f6r att m\u00f6ta lagkraven.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_2ce8aa-32 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_2ce8aa-32\">Med NC Protect f\u00e5r du attributbaserad \u00e5tkomstkontroll (ABAC), d\u00e4r \u00e5tkomst styrs baserat p\u00e5 anv\u00e4ndare, enhet och kontext. Kryptering och policyhantering sker utanf\u00f6r Microsofts kontroll, vilket ger ett extra lager av s\u00e4kerhet.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1wkdpa9 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading79968_28429e-25 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_28429e-25\">6. Backup som tj\u00e4nst \u2013 s\u00e4kerst\u00e4ll kontinuitet<\/h3>\n\n\n\n<p class=\"kt-adv-heading79968_adc16b-a5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_adc16b-a5\"><strong>Lagkrav:<\/strong> Kontinuitets- och krishantering (2 kap. 3 \u00a7 p. 3)<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_6bb972-01 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_6bb972-01\">F\u00f6rm\u00e5gan att \u00e5terst\u00e4lla data \u00e4r avg\u00f6rande vid incidenter.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_702cb0-58 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_702cb0-58\">En backup-tj\u00e4nst med krypterade s\u00e4kerhetskopior lagrade i Sverige, kombinerat med regelbundna tester, s\u00e4kerst\u00e4ller att du kan \u00e5terh\u00e4mta dig n\u00e4r det beh\u00f6vs \u2013 och visa att det fungerar.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1wkdpa9 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading79968_93084d-e5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_93084d-e5\">Vill du ha hela l\u00f6sningen samlad?<\/h2>\n\n\n\n<p class=\"kt-adv-heading79968_f2156f-94 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_f2156f-94\">F\u00f6r organisationer som vill samla s\u00e4kerhet och infrastruktur erbjuder Complior Compliant Cloud \u2013 en svensk molnplattform byggd f\u00f6r verksamheter med regulatoriska krav.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_0b7b24-f2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_0b7b24-f2\">Milj\u00f6n \u00e4r revisionsklar och certifierad enligt ISO 27001 och PCI DSS, och kan kombineras med ovanst\u00e5ende tj\u00e4nster i en integrerad l\u00f6sning.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_1f6b80-41 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_1f6b80-41\">Samtidigt fungerar varje tj\u00e4nst frist\u00e5ende \u2013 du kan b\u00f6rja d\u00e4r behovet \u00e4r som st\u00f6rst.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1wkdpa9 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading79968_21902b-7a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_21902b-7a\">Svenskt, certifierat och n\u00e4ra<\/h2>\n\n\n\n<p class=\"kt-adv-heading79968_cb38a6-c9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_cb38a6-c9\">Cybers\u00e4kerhetslagen handlar ytterst om att skydda samh\u00e4llsviktig verksamhet. D\u00e5 spelar det roll var din data finns och vem som hanterar den.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_ebb276-7a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_ebb276-7a\">Compliors tj\u00e4nster levereras fr\u00e5n svenska datacenter med bakgrundskontrollerad personal. Verksamheten \u00e4r certifierad enligt ISO 27001, ISO 9001, ISO 14001 och PCI DSS Level 1.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_ad8742-b9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_ad8742-b9\">N\u00e4r du v\u00e4ljer en svensk leverant\u00f6r st\u00e4rker du inte bara din egen s\u00e4kerhet \u2013 du st\u00e4rker ocks\u00e5 din leveranskedja.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1wkdpa9 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading79968_7022ae-4b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_7022ae-4b\">Ta n\u00e4sta steg<\/h2>\n\n\n\n<p class=\"kt-adv-heading79968_a80216-8b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_a80216-8b\">Cybers\u00e4kerhetslagen g\u00e4ller redan. Fr\u00e5gan \u00e4r inte om du beh\u00f6ver agera \u2013 utan var du b\u00f6rjar.<\/p>\n\n\n\n<p class=\"kt-adv-heading79968_1fdfe8-67 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading79968_1fdfe8-67\">Boka ett m\u00f6te med oss s\u00e5 g\u00e5r vi igenom vilka tj\u00e4nster som passar din organisation.<\/p>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-2ab15fae\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-d12e540a wp-block-button scale-hover\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"http:\/\/complior.se\/en\/contact\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Contact us<\/div><span class=\"uagb-button__icon uagb-button__icon-position-after\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\" aria-hidden=\"true\" focussable=\"false\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Guider S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster 6 min Du beh\u00f6ver inte byta ut allt \u2013 men du beh\u00f6ver r\u00e4tt tj\u00e4nster p\u00e5 r\u00e4tt plats. Den 15 januari 2026 tr\u00e4dde cybers\u00e4kerhetslagen (SFS 2025:1506) i kraft. Det \u00e4r Sveriges implementering av EU:s NIS2-direktiv och den omfattar betydligt fler organisationer \u00e4n den tidigare NIS-lagen. Kommuner, regioner, myndigheter [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":79971,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[139],"tags":[],"class_list":["post-79968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e4kerhetslagen i Sverige \u2013 s\u00e5 m\u00f6ter du kraven | Complior AB<\/title>\n<meta name=\"description\" content=\"Cybers\u00e4kerhetslagen i Sverige st\u00e4ller nya krav. L\u00e4r dig hur du uppfyller dem med r\u00e4tt s\u00e4kerhetstj\u00e4nster \u2013 fr\u00e5n SIEM till KMS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/cybersecurity-law-sweden-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e4kerhetslagen i Sverige \u2013 s\u00e5 m\u00f6ter du kraven | Complior AB\" \/>\n<meta property=\"og:description\" content=\"Cybers\u00e4kerhetslagen i Sverige st\u00e4ller nya krav. L\u00e4r dig hur du uppfyller dem med r\u00e4tt s\u00e4kerhetstj\u00e4nster \u2013 fr\u00e5n SIEM till KMS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/cybersecurity-law-sweden-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T20:29:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T20:58:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1279\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Johan Challita\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Johan Challita\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/\"},\"author\":{\"name\":\"Johan Challita\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/4f8ee22971e159ae840462b4d30be258\"},\"headline\":\"S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster\",\"datePublished\":\"2026-03-17T20:29:57+00:00\",\"dateModified\":\"2026-03-17T20:58:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/\"},\"wordCount\":987,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/testfar.jpg\",\"articleSection\":[\"Guides\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/\",\"name\":\"Cybers\u00e4kerhetslagen i Sverige \u2013 s\u00e5 m\u00f6ter du kraven | Complior AB\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/testfar.jpg\",\"datePublished\":\"2026-03-17T20:29:57+00:00\",\"dateModified\":\"2026-03-17T20:58:47+00:00\",\"description\":\"Cybers\u00e4kerhetslagen i Sverige st\u00e4ller nya krav. L\u00e4r dig hur du uppfyller dem med r\u00e4tt s\u00e4kerhetstj\u00e4nster \u2013 fr\u00e5n SIEM till KMS.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/testfar.jpg\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/testfar.jpg\",\"width\":1279,\"height\":720,\"caption\":\"Illustration av cybers\u00e4kerhetslagen i Sverige med s\u00e4kerhetstj\u00e4nster som skyddar data och uppfyller NIS2-krav\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/cybersecurity-law-sweden-requirements\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/4f8ee22971e159ae840462b4d30be258\",\"name\":\"Johan Challita\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2113613224ceed47d63c314fb8528037888e4aa55b0d2174bfa117ccef8b522?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2113613224ceed47d63c314fb8528037888e4aa55b0d2174bfa117ccef8b522?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2113613224ceed47d63c314fb8528037888e4aa55b0d2174bfa117ccef8b522?s=96&d=mm&r=g\",\"caption\":\"Johan Challita\"},\"sameAs\":[\"https:\\\/\\\/complior.se\"],\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/johan-challita\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e4kerhetslagen i Sverige \u2013 s\u00e5 m\u00f6ter du kraven | Complior AB","description":"Cybers\u00e4kerhetslagen i Sverige st\u00e4ller nya krav. L\u00e4r dig hur du uppfyller dem med r\u00e4tt s\u00e4kerhetstj\u00e4nster \u2013 fr\u00e5n SIEM till KMS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/cybersecurity-law-sweden-requirements\/","og_locale":"en_GB","og_type":"article","og_title":"Cybers\u00e4kerhetslagen i Sverige \u2013 s\u00e5 m\u00f6ter du kraven | Complior AB","og_description":"Cybers\u00e4kerhetslagen i Sverige st\u00e4ller nya krav. L\u00e4r dig hur du uppfyller dem med r\u00e4tt s\u00e4kerhetstj\u00e4nster \u2013 fr\u00e5n SIEM till KMS.","og_url":"https:\/\/complior.se\/en\/cybersecurity-law-sweden-requirements\/","og_site_name":"Complior","article_published_time":"2026-03-17T20:29:57+00:00","article_modified_time":"2026-03-17T20:58:47+00:00","og_image":[{"width":1279,"height":720,"url":"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg","type":"image\/jpeg"}],"author":"Johan Challita","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Johan Challita","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/#article","isPartOf":{"@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/"},"author":{"name":"Johan Challita","@id":"https:\/\/complior.se\/#\/schema\/person\/4f8ee22971e159ae840462b4d30be258"},"headline":"S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster","datePublished":"2026-03-17T20:29:57+00:00","dateModified":"2026-03-17T20:58:47+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/"},"wordCount":987,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg","articleSection":["Guides"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/","url":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/","name":"Cybers\u00e4kerhetslagen i Sverige \u2013 s\u00e5 m\u00f6ter du kraven | Complior AB","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg","datePublished":"2026-03-17T20:29:57+00:00","dateModified":"2026-03-17T20:58:47+00:00","description":"Cybers\u00e4kerhetslagen i Sverige st\u00e4ller nya krav. L\u00e4r dig hur du uppfyller dem med r\u00e4tt s\u00e4kerhetstj\u00e4nster \u2013 fr\u00e5n SIEM till KMS.","breadcrumb":{"@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg","width":1279,"height":720,"caption":"Illustration av cybers\u00e4kerhetslagen i Sverige med s\u00e4kerhetstj\u00e4nster som skyddar data och uppfyller NIS2-krav"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/cybersecurity-law-sweden-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/4f8ee22971e159ae840462b4d30be258","name":"Johan Challita","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f2113613224ceed47d63c314fb8528037888e4aa55b0d2174bfa117ccef8b522?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f2113613224ceed47d63c314fb8528037888e4aa55b0d2174bfa117ccef8b522?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2113613224ceed47d63c314fb8528037888e4aa55b0d2174bfa117ccef8b522?s=96&d=mm&r=g","caption":"Johan Challita"},"sameAs":["https:\/\/complior.se"],"url":"https:\/\/complior.se\/en\/author\/johan-challita\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg",1279,720,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-150x150.jpg",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-300x169.jpg",300,169,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-768x432.jpg",768,432,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg",1279,720,false],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar.jpg",1279,720,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2026\/03\/testfar-18x10.jpg",18,10,true]},"uagb_author_info":{"display_name":"Johan Challita","author_link":"https:\/\/complior.se\/en\/author\/johan-challita\/"},"uagb_comment_info":0,"uagb_excerpt":"Guider S\u00e5 m\u00f6ter du cybers\u00e4kerhetslagen med svenska s\u00e4kerhetstj\u00e4nster 6 min Du beh\u00f6ver inte byta ut allt \u2013 men du beh\u00f6ver r\u00e4tt tj\u00e4nster p\u00e5 r\u00e4tt plats. Den 15 januari 2026 tr\u00e4dde cybers\u00e4kerhetslagen (SFS 2025:1506) i kraft. Det \u00e4r Sveriges implementering av EU:s NIS2-direktiv och den omfattar betydligt fler organisationer \u00e4n den tidigare NIS-lagen. Kommuner, regioner, myndigheter&hellip;","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/79968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=79968"}],"version-history":[{"count":10,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/79968\/revisions"}],"predecessor-version":[{"id":79986,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/79968\/revisions\/79986"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/79971"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=79968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=79968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=79968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}