Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Password Security: Avoid these 5 common mistakes

Password security is something that no one should underestimate in the face of today's threats. One sensible option for secure password management is to use software designed for this purpose.

article

16.1.2025

Framework recap, role of the CISO & and vendor assessments: Cyberday product and news round-up 12/2024 🛡️

December's product and news round-up will showcase the vendor security assessments and new enterprise-level features, an overview of the key frameworks for 2025 and the roles of the CISO and personnel in an organisation's security.

article

19.12.2024

Europe's Compliance Revolution: Evolving Cyber Sec Consulting

The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.

article

18.12.2024

TISAX: Understanding the Automotive framework

By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.

article

3.12.2024

Recognising growth: move to new offices with Cyberday!

Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.

article

28.11.2024

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

article

22.11.2024

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

article

14.11.2024

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

article

31.10.2024

Deepfake Attacks Are About To Surge, Experts Warn

Report finds a drastic increase in deepfake technology and offered services across the Dark Web. In the future, more and more cybercriminals will certainly incorporate these elements into their scams. #cybersecurity

Go to article at
5.5.2021

U.S. Agency for Global Media data breach caused by a phishing attack

US government agency suffered a breach that started from an employee falling for phishing. MFA deployment on 365-accounts and phishing-related guidelines jumped on top of the development queue after the incident. #cybersecurity

Go to article at
5.5.2021

61% of cybersecurity teams are understaffed

Recent survey highlights some longstanding #cybersecurity skills gap related issues: ⚠️ 61% of cybersec teams are understaffed ⚠️ 55% say they have unfilled positions ⚠️ 50% say cybersec applicants are not well qualified

Go to article at
5.5.2021

Yritykselle seuraamusmaksu tietosuojarikkomuksista pysäköinninvalvontamaksujen yhteydessä

Finnish parking control company gets 75 000 € #GDPR fine: ⚠️ Too broad data collection for data subject identification (e.g. ID number) ⚠️ Too long data retention ⚠️ Failure to exercise the data subject 's rights #cybersecurity

Go to article at
30.4.2021

Five Questions to Ask Your SOCaaS Provider

A large organization can build an own SOC, i.e. 24/7 security operations center, or get it from a partner. This article has some relevant questions to ask, so you can understand in more detail what you're actually acquiring. #cybersecurity

Go to article at
30.4.2021

Only 8% of businesses that paid a ransom got all of their data back

#Ransomware is brutal. Survey findings from Sophos: 📈 avg cost of recovery +143% (0.76M$ (2020) -> 1.85M$ (2021)) 💰 avg ransom paid 170k$ 🦹 8% of got all their data back after paying a ransom #cybersecurity

Go to article at
29.4.2021

Cybercriminals Widely Abusing Excel 4.0 Macro to Distribute Malware

Cyber criminals taking advantage of an age-old feature. Excel 4.0 macros (XLM) were published in v4.0 back in 1992. These are hard to detect for security solutions. Use is e.g. download and execute ZLoader or Quakbot malware. #cybersecurity

Go to article at
29.4.2021

Five steps to get employees invested in security awareness training

Staff engagement in #cybersecurity training: ✅ Examples - What can happen, if an employee doesn't follow guidelines ✅ Focus on the biggest risks for your organisation or each unit ✅ Clarity - Keep materials short and unambiguous

Go to article at
23.4.2021

Mount Locker Ransomware Aggressively Changes Up Tactics

"Product dev" at #ransomware gangs: ⚠️ double-extortion - from data stealing to leaking ⚠️ apps (e.g. AdFind) for AD user query ⚠️ pen-testing tools for lateral movement on networks ⚠️ scripts to disable detection tools #cybersecurity

Go to article at
23.4.2021