Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

article

31.5.2024

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

article

17.5.2024

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

article

3.5.2024

With Crime-as-a-Service, anyone can be an attacker

CaaS = experienced cybercriminals sell access to the tools and information needed for scams. Its generalization is largely the reason why attacks are getting better and more targeted at small businesses as well. #cybersecurity

Go to article at
4.8.2021

This new phishing attack is 'sneakier than usual', Microsoft warns

MS warns 365 users of crafty #phishing messages that mimic a shared OneDrive file. Scams develop at a rapid pace. Comprehensive guidance / training for employees and extensive use of MFA as countermeasures. #cybersecurity

Go to article at
4.8.2021

Ransom demands reaching $1.2M, smaller companies increasingly targeted

#Ransomware a growing #cybersecurity threat for everyone: 🏢 Smaller companies increasingly targeted ⚠️ Avg. ransom demand 1,01M€ (+290% vs. 2020) ⚠️ New variants continuously (e.g. Mount Locker, HelloKitty, Conti)

Go to article at
4.8.2021

On course for a good hacking

The simplicity of hacking somewhere can be eye-openingly impressive. Spoiler: no master tech skills required. Read about how easily hackers could penetrate a premier golf club. #cybersecurity

Go to article at
4.8.2021

Nuisance call-blocking firm fined £170,000 for making almost 200,000 nuisance calls

ICO, the UK's data protection authority, fined a company for unsolicited direct marketing calls. What makes the case ironic is that the company itself sells call-blocking systems. Direct marketing can nowadays backfire. #cybersecurity

Go to article at
4.8.2021

Google shuts down malicious ad posing as Brave browser but delivering malware

Scam targeting Brawe browser downloaders: ⚡ Download page a copy at bravė.com (looks identical on address bar) 💸 Ads directing to malicious site 🦠 A stealer malware distributed along the browser #cybersecurity

Go to article at
4.8.2021

Vishing: What is it and how do I avoid getting scammed?

#Vishing is phishing via phone. Tactics used: 📲 Caller ID spoofing (e.g. location hiding, numeron varastaminen) 📧 Multi-channel scams, SMS / email before the call 👤 Scraping details from social media profiles #cybersecurity

Go to article at
18.6.2021

What is the real cost of ransomware?

Worrying #ransomware statistics: ☠️ 80% of those who paid the ransom were soon the target of another attack 📉 66% reported a clear drop in sales after the attack 🙅 29% of incidents led to employee layoffs #cybersecurity

Go to article at
18.6.2021

Microsoft: Scammers bypass Office 365 MFA in BEC attacks

📧 BEC attack phases: 1. Trick user to fill password in a login form mimicking the real one 2. Circumvent MFA utilizing legacy auth protocols (IMAP/POP3) 3. Use forwarding rules to get important emails to the attacker #cybersecurity

Go to article at
18.6.2021