Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

SOC 2: Working towards compliance

With the help of SOC 2, organisations can provide proof of effectively implemented controls and the use of best practices to protect the data to their customers and stakeholders, which may help to build trust.

article

31.7.2023

Personnel information security training and guidelines in Cyberday

Most data breaches start with human error. Still, investments in technical information security are often made more eagerly. We tell you why staff information security training and guidelines are important and how to implement then efficiently.

article

13.6.2023

Information security risk management in Cyberday: Identifying risks, evaluation, treatment and closure

Every cyber security framework highlights risk management in its own way. We summarize in this post, what's essential in information security risk management and what kind of an approach Cyberday offers for it.

article

13.6.2023

Become a Cyberday partner: Features, benefits and best practices

A good and efficient tool such as Cyberday is a great way to work on the organization's cyber secuirty. However, for some organizations that is not enough and the expertise and support of a consultant is needed. Our partner program offers both!

article

6.6.2023

Cyberday Community has been launched!

We just launched a new Community section inside Cyberday. Our goal is to make collaboration with your peers and with us easier and thus help you improve your information security even further!

article

24.3.2023

ISO 27001 standard updated to 2022 version - what changed?

What has changed when comparing 2013 vs. 2022 versions of ISO 27001 and how are these updates visible on Cyberday?‍

article

18.11.2022

Efficient cyber risk management with new autopilot mode

We're constatly searching for ways to automate and create efficient cyber risk management. Our newest additions is risk autopilot mode. It's concept is described on this post.

article

1.6.2022

Infographic: Why is cyber security getting more and more important?

Here's a visual summary of some of the drivers that continue to make cyber security more and more important for all organizations.

article

11.2.2022

Student’s Negligence Opened Door for Ryuk into Biomolecular Facility

Lots of work and week of biomolecular research data went to waste due to student's #cybersecurity negligence: 🛑 bypassing malware protection ⚠️ searching for a free software version ⚠️ using personal device on work network

Go to article at
19.5.2021

Why Password Hygiene Needs a Reboot

All it takes is one compromised credential to cause a data breach. To combat this, the revised NIST recommendations suggest that you e.g.: ✅ Adapt credential screening solutions 🛑 Don't require periodic password resets #cybersecurity

Go to article at
19.5.2021

Insurer AXA hit by ransomware after dropping support for ransom payments

Week ago insurer AXA announced, that it would be dropping reinbursement for #ransomware payment. Now they are hit by ransomware gang. Breach includes e.g. customers health data 🧪, copies of ID cards 💳 and claim forms 📃. #cybersecurity

Go to article at
19.5.2021

Colonial Pipeline Shells Out $5M in Extortion Payout, Report

Colonial Pipeline paid a ransom of 5 M$ for Eastern-European cyber criminals. This enabled the company to begin restarting the largest refined fuel line in the US, which by itself will anyway take several days. #cybersecurity

Go to article at
14.5.2021

A Closer Look at the DarkSide Ransomware Gang

FBI confirmed, that a relatively new #ransomware group DarkSide was responsible of the cyber attack causing Colonial Pipeline to shut down almost 9000 km of fuel pipe. This article provides a review to group's activity. #cybersecurity

Go to article at
12.5.2021

3 Cybersecurity Myths to Bust

❎ MYTH no 1: Threat actors use sophisticated cyberweapons when breaching organisations ✅ TRUTH no 1: In almost all cases, the initial vector is a (relatively) simple attack against humans (e.g. social engineering) #cybersecurity

Go to article at
12.5.2021

Pidä kiinni rahoistasi - ikääntyneet ovat houkutteleva kohde verkkorikollisille

Finnish NCSC campaigns for elderly #cybersecurity skills. 🤔 Beware of hurry: This is what criminals create. "Pay this bill right now!" 📱 Learn your bank's own mobile app: They are a safe way to do handle money matters.

Go to article at
12.5.2021

Tietosuoja-asetus tunnetaan, mutta käytännön soveltamisessa riittää vielä haasteita

Finnish DPA and Tieke ry surveyed data protection challenges for small businesses: 👍 Majority aware of requirements 🧑‍💻 Help from familiar IT partner 🛡️ Biggest challenge accountability ja #cybersecurity as a whole

Go to article at
7.5.2021

'Millions' of Dell PCs will grant malware, rogue users admin-level access if asked nicely

The update driver in hundreds of millions of Dell devices had a bunch of vulnerabilities for years (CVE-2021-21551), which could be utilized to bypass #cybersecurity features and take control of device. Link to patch on the article.

Go to article at
5.5.2021