{"id":29715,"date":"2025-05-20T07:00:50","date_gmt":"2025-05-20T05:00:50","guid":{"rendered":"https:\/\/www.topdesk.mom\/da\/?p=29715"},"modified":"2025-05-19T10:18:59","modified_gmt":"2025-05-19T08:18:59","slug":"saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk","status":"publish","type":"post","link":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/","title":{"rendered":"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM"},"content":{"rendered":"<p><strong>Har du en klar plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? For at efterleve <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS 2-direktivet<\/a> skal du have en klar defineret proces for, hvordan du identificerer og reagerer p\u00e5 en sikkerhedsh\u00e6ndelse. Hurtig og effektiv h\u00e5ndtering af sikkerhedsh\u00e6ndelser er nemlig afg\u00f8rende for at beskytte din organisation mod potentielle skader og datatab.<\/strong><\/p>\n<p>Er du i tvivl om, hvordan du kan h\u00e5ndtere en sikkerhedsh\u00e6ndelse i TOPdesk? S\u00e5 kan du blive klogere i dette blogindl\u00e6g, hvor jeg vil gennemg\u00e5 hele processen &#8211; fra identifikation til analyse.<\/p>\n<h2>Identifikation af sikkerhedsh\u00e6ndelser<\/h2>\n<p>Det f\u00f8rste skridt i h\u00e5ndteringen af en sikkerhedsh\u00e6ndelse er at identifikation. I TOPdesk kan du ops\u00e6tte en formular i <a href=\"https:\/\/www.topdesk.mom\/da\/features\/serviceportal\/\">serviceportalen<\/a>, som g\u00f8r det nemt for dine brugere at henvende sig for at rapportere en sikkerhedsh\u00e6ndelse. Det kan f.eks. v\u00e6re, at de har modtaget en mist\u00e6nkelig e-mail, hvor de har klikket p\u00e5 et link og nu er alle deres filer l\u00e5st eller at de mist\u00e6nker, at deres digitale identitet bliver misbrugt online.<\/p>\n<h2>Reaktionsplan<\/h2>\n<p>N\u00e5r en sikkerhedsh\u00e6ndelse er identificeret, er det (jf. <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS 2-direktivet)<\/a> vigtigt at have en klar <a href=\"https:\/\/www.topdesk.mom\/da\/blog\/fordele-ved-incident-response-planer\/\">reaktionsplan<\/a>, s\u00e5 alle medarbejdere ved, hvordan de skal reagere. Den kunne bl.a. se s\u00e5dan ud:<\/p>\n<ul>\n<li><strong>Isol\u00e9r den ber\u00f8rte del af systemet<\/strong> for at forhindre yderligere skade<\/li>\n<\/ul>\n<ul>\n<li><strong>Saml information<\/strong> om h\u00e6ndelsen, herunder tidspunkt, omfang og ber\u00f8rte systemer<\/li>\n<li><strong>Aktiver dit sikkerhedsteam<\/strong> for at unders\u00f8ge h\u00e6ndelsen og finde en l\u00f8sning<\/li>\n<li><strong>Kommuniker med relevante parter<\/strong>, herunder ledelsen og eventuelt ber\u00f8rte kollegaer, kunder eller partnere<\/li>\n<\/ul>\n<h3>Eksempel p\u00e5 h\u00e5ndtering af en sikkerhedsh\u00e6ndelse<\/h3>\n<p>Hvis vi tager udgangspunkt i eksemplet med den mist\u00e6nkelige email, som en bruger indmelder via serviceportalen, s\u00e5 ser processen s\u00e5ledes ud:<\/p>\n<ol>\n<li>Brugerkontoen sp\u00e6rres for at forhindre yderligere misbrug<\/li>\n<li>Indsamling af information om, hvor og hvad kontoen har v\u00e6ret brugt til i den periode, som du mist\u00e6nker, at den har v\u00e6ret kompromitteret<\/li>\n<li>Implementer nye l\u00f8sninger, s\u00e5 problemet ikke opst\u00e5r igen<\/li>\n<li>Processer og planer opdateres og kommunikeres ud til resten af organisationen<\/li>\n<\/ol>\n<h2>Dokumentation og rapportering<\/h2>\n<p>Effektiv dokumentation og rapportering er afg\u00f8rende for at opfylde <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\">NIS2-direktivet.<\/a> N\u00e5r du har h\u00e5ndteret en sikkerhedsh\u00e6ndelse, skal du derfor have styr p\u00e5 din dokumentation: Hvordan er den opst\u00e5et? Hvor? Hvorn\u00e5r? Hvad er konsekvenserne? I tilf\u00e6lde af, at der har v\u00e6ret tab af personoplysninger, skal dette rapporteres til <a href=\"https:\/\/www.datatilsynet.dk\/sikkerhedsbrud\">Datatilsynet<\/a>.<\/p>\n<p>I <a href=\"https:\/\/www.topdesk.mom\/da\/itsm-software\/\">TOPdesk<\/a> kan du h\u00e5ndtere dokumentation og rapportering s\u00e5ledes:<\/p>\n<ul>\n<li>Oprette en detaljeret rapport om h\u00e6ndelsen, der inkluderer alle relevante oplysninger og trin, der er taget<\/li>\n<li>Sikre, at rapporten sendes til de relevante myndigheder inden for den fastsatte tidsramme<\/li>\n<li>Opbevare dokumentationen sikkert til fremtidig reference og revision<\/li>\n<\/ul>\n<h2>Efterf\u00f8lgende analyse<\/h2>\n<p>Efter at en sikkerhedsh\u00e6ndelse er h\u00e5ndteret, er det vigtigt at udf\u00f8re en efterf\u00f8lgende analyse for at forhindre fremtidige h\u00e6ndelser. Afh\u00e6ngigt af konsekvenserne af sikkerhedsbruddet skal der laves en r\u00e6kke foranstaltninger, der kan begr\u00e6nse fremtidige skader. Det kan g\u00f8res ved:<\/p>\n<ul>\n<li>At <strong>identificere \u00e5rsagerne<\/strong> til h\u00e6ndelsen og finde ud af, hvordan den kunne v\u00e6re blevet forhindret<\/li>\n<li>At <strong>implementere nye sikkerhedsforanstaltninger<\/strong> baseret p\u00e5 indsigten fra analysen<\/li>\n<li>At <strong>opdatere din reaktionsplan<\/strong> for at reflektere over, hvad I l\u00e6rte af h\u00e6ndelsen<\/li>\n<\/ul>\n<h2>Kort fortalt<\/h2>\n<p>En veldefineret h\u00e5ndteringsproces for sikkerhedsh\u00e6ndelser er afg\u00f8rende for at beskytte din organisation mod cybertrusler. Ved at f\u00f8lge disse trin i TOPdesk kan du sikre, at du er forberedt p\u00e5 at h\u00e5ndtere sikkerhedsh\u00e6ndelser effektivt og i overensstemmelse med NIS 2-direktivet. Det er vigtigt at huske, at cybersikkerhed er en kontinuerlig proces, og at regelm\u00e6ssig revision og opdatering af dine foranstaltninger er n\u00f8dvendig for at opretholde et robust sikkerhedsniveau.<\/p>\n<h2>Interesseret i at vide mere?<\/h2>\n<p>Deltag i webinaret: <a href=\"https:\/\/www.topdesk.mom\/da\/webinars\/generelt\/hold-styr-paa-nis-2-processerne-sikkerhedshaendelser-og-forebyggende-tjek\/\">Hold styr p\u00e5 NIS 2-processerne: Sikkerhedsh\u00e6ndelser og forebyggende tjek<\/a> og f\u00e5 inspiration til, hvordan du kan arbejde med cybersikkerhed i\u00a0TOPdesk. Her bliver du b\u00e5de introduceret til konkrete l\u00f8sninger samt gode tips og tricks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Har du en klar plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? For at efterleve NIS 2-direktivet skal du have en klar defineret proces for, hvordan du identificerer og reagerer p\u00e5 en sikkerhedsh\u00e6ndelse. Hurtig og effektiv h\u00e5ndtering af sikkerhedsh\u00e6ndelser er nemlig afg\u00f8rende for at beskytte din organisation mod potentielle skader og datatab.<\/p>\n","protected":false},"author":1,"featured_media":29730,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-29715","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":19050,"blog_hubspot_cta_link":{"title":"Tilmeld dig vores NIS 2 webinar","url":"https:\/\/www.topdesk.mom\/da\/webinars\/generelt\/hold-styr-paa-nis-2-processerne-sikkerhedshaendelser-og-forebyggende-tjek\/","target":""},"toc_display":"compact","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM<\/title>\n<meta name=\"description\" content=\"Har du en plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? Det er nemlig en af de centrale krav i NIS 2-direktivet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM | Bedre support, glade kunder | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Har du en plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? Det er nemlig en af de centrale krav i NIS 2-direktivet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/\" \/>\n<meta property=\"og:site_name\" content=\"T2 TOPdesk - DA\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-20T05:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Timon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@topdesk\" \/>\n<meta name=\"twitter:site\" content=\"@topdesk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/\"},\"author\":{\"name\":\"Timon\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\"},\"headline\":\"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM\",\"datePublished\":\"2025-05-20T05:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/\"},\"wordCount\":687,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/\",\"url\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/\",\"name\":\"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png\",\"datePublished\":\"2025-05-20T05:00:50+00:00\",\"description\":\"Har du en plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? Det er nemlig en af de centrale krav i NIS 2-direktivet.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png\",\"contentUrl\":\"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.mom\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/#website\",\"url\":\"https:\/\/www.topdesk.mom\/da\/\",\"name\":\"TOPdesk\",\"description\":\"Brugervenlig service management og ticketing software. TOPdesk hj\u00e6lper 4000+ virksomheder verden over med at supportere deres kunder. SaaS eller On-premise.\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.mom\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.mom\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.mom\/da\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/x.com\/topdesk\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\",\"name\":\"Timon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.mom\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"caption\":\"Timon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM","description":"Har du en plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? Det er nemlig en af de centrale krav i NIS 2-direktivet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/","og_locale":"en_US","og_type":"article","og_title":"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM | Bedre support, glade kunder | TOPdesk","og_description":"Har du en plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? Det er nemlig en af de centrale krav i NIS 2-direktivet.","og_url":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/","og_site_name":"T2 TOPdesk - DA","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2025-05-20T05:00:50+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png","type":"image\/png"}],"author":"Timon","twitter_card":"summary_large_image","twitter_creator":"@topdesk","twitter_site":"@topdesk","twitter_misc":{"Written by":"Timon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/"},"author":{"name":"Timon","@id":"https:\/\/www.topdesk.mom\/da\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916"},"headline":"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM","datePublished":"2025-05-20T05:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/"},"wordCount":687,"publisher":{"@id":"https:\/\/www.topdesk.mom\/da\/#organization"},"image":{"@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/","url":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/","name":"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM","isPartOf":{"@id":"https:\/\/www.topdesk.mom\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png","datePublished":"2025-05-20T05:00:50+00:00","description":"Har du en plan for h\u00e5ndteringen af sikkerhedsh\u00e6ndelser i din organisation? Det er nemlig en af de centrale krav i NIS 2-direktivet.","breadcrumb":{"@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#primaryimage","url":"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png","contentUrl":"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/header-sikkerhedshaendelse-i-TOPdesk_ITSM-2.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.mom\/da\/blog\/saadan-handterer-du-en-sikkerhedshaendelse-i-topdesk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.mom\/da\/"},{"@type":"ListItem","position":2,"name":"S\u00e5dan h\u00e5ndterer du en sikkerhedsh\u00e6ndelse i TOPdesk ITSM"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.mom\/da\/#website","url":"https:\/\/www.topdesk.mom\/da\/","name":"TOPdesk","description":"Brugervenlig service management og ticketing software. TOPdesk hj\u00e6lper 4000+ virksomheder verden over med at supportere deres kunder. SaaS eller On-premise.","publisher":{"@id":"https:\/\/www.topdesk.mom\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.mom\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.mom\/da\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.mom\/da\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.mom\/da\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.mom\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.mom\/da\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/x.com\/topdesk","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk"]},{"@type":"Person","@id":"https:\/\/www.topdesk.mom\/da\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916","name":"Timon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.mom\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","caption":"Timon"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/posts\/29715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/comments?post=29715"}],"version-history":[{"count":10,"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/posts\/29715\/revisions"}],"predecessor-version":[{"id":29757,"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/posts\/29715\/revisions\/29757"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/person\/19050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/media\/29730"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.mom\/da\/wp-json\/wp\/v2\/media?parent=29715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}