Adding custom requirements
There is a way to create custom requirements, which you can then link to either existing or new custom tasks.
Allowing the Teams app and it's permissions
Applications can be allowed either one at a time, as a root user at once on behalf of the entire organization, or as a root user with extensive options from the Teams root user view.
Employee guideline monitoring
With Cyberday, the organization can automatically monitor the guideline acceptance status for each employee and get an overview for admins and the core team.
Feature: Documentation tables
Cyberday does not only allow you to i.e. create policies, you can also keep all of your documentation items in an overview in one place.
Feature: Guideline list
You can activate either pre-made or your individual guidelines, which will be shown to your employees in the Guidebook.
How do I create cyber security reports?
In Cyberday, it is very easy to create any report you need. You can simply choose from our templates, select your target language and benefit from the automations.
How is the Cyberday data backed up?
The data in Cyberday is backed up in two different ways. Backups are kept in the same region (EU) as the database, but in physically separate locations.
How to manage Teams apps as an admin?
As the administrator of your Microsoft Teams environment, there are many ways you can control how other users can take advantage of the applications found in the Teams app store.
Optional data fields in Cyberday
Cyberday’s default structure in documentation directs to document the things required by the requirements framework, which are automatically utilized in e.g. reporting. However, the documentation can be expanded using optional data fields.
Publishing embeddable reports on your website
For example personal data processing regulations (e.g. the GDPR) and some national legislations require public communication about certain data processing matters. These requirements can be filled by maintaining the documentation in Cyberday and then publishing an embed report. This article will tell you how.
Task assurance methods
In this article, you can read more about the different assurance methods and how to use them.
Taskbook instruction guide
The Taskbook is a summary of all the items you are owning in your organization's cyber security management system.
Using compliance reports
Compliance report serves as a comprehensive overview of your organization's answers to each requirement / control in the related framework.