Cyberday help content

Help articles

"Edit structure" - Editing units and sites

Learn more about how to create and work with different units and sites in Cyberday in this help article.

Adding custom requirements

There is a way to create custom requirements, which you can then link to either existing or new custom tasks.

Allowing support access

The article discusses granting access to the support team when you need direct assistance. This access to your account is valid for up to 7 days.

Allowing the Teams app and it's permissions

Applications can be allowed either one at a time, as a root user at once on behalf of the entire organization, or as a root user with extensive options from the Teams root user view.

Ask access to organisation dashboard in Teams

In this article we'll show you how to ask access to organization's dashboard.

Asset-based risk identification

Introducing new asset-based risk identification feature

Available frameworks

How to enable and disable frameworks, and what frameworks Cyberday has.

Available frameworks in Cyberday and voting / wishing for new ones

Learn more about our framework library, upcoming frameworks and how you can influence it.

Available support methods for Cyberday use

We are committed to support you with suitable learning materials and Cyberday instructions in our Academy.

Calculating risk level in Cyberday

Find the details for different risk level calculation options in Cyberday from this article.

Case examples and skill tests for guidelines

How can you help your employees to better remember and to follow guidelines more carefully? This help article tells more about case examples and skill tests and how to use those in Cyberday.

Cyberday.ai/intro: Using our online presentation

Learn more about our online slide deck/intro slide deck for Cyberday in this help article.

Dashboard's basics

Using Cyberday's Dashboard, users can choose to view content from the view point of a specific framework, a specific cyber security theme, remote work, or mobile devices.

Distributing reports via Guidebook

Reports can be shared to employees via Guidebook, when it's important that all employees read them through.

Documentation tables

Cyberday does not only allow you to i.e. create policies, you can also keep all of your documentation items in an overview in one place.

Employee guideline monitoring

With Cyberday, the organization can automatically monitor the guideline acceptance status for each employee and get an overview for admins and the core team.

Enabling CIA classification feature for main assets

This help article shows how to enable CIA classification feature in Cyberday.

Enabling MFA

This help explains how to enable MFA in Cyberday

Exporting data from Cyberday

Find different ways to export data from Cyberday

Filling documentation for important data assets

Key information assets in organizations data processing environment includes for example Data systems, Processes, Data stores and Data sets.

Filling security assessments

Security assessments are meant for evaluating organization's readiness against a common security framework, like NIS2 or ISO 27001.

Getting started in Cyberday

Learn more about how to start the setup of you (trial) account and the first steps in Cyberday.

Give feedback on guidelines

Learn more about how you can give feedback to guidelines, where admins can find it and why it is beneficial.

Grouping employees into units

Units are designed to help you target relevant cyber security guidelines and training for employees.

How do I create cyber security reports?

In Cyberday, it is very easy to create any report you need. You can simply choose from our templates, select your target language and benefit from the automations.

How do I start to use Cyberday in Teams?

You can use Cyberday directly in your familiar Teams environment. In this article we will show you how to get started.

How is the Cyberday data backed up?

The data in Cyberday is backed up in two different ways. Backups are kept in the same region (EU) as the database, but in physically separate locations.

How to install the Teams app for multiple users at once

Cyberday Teams app has two different modes. App can be added to an individual user or to a team.

How to use the (internal) audit feature

Learn how to use and benefit from our (internal) auditing feature in Cyberday. Where can you find it, how does it work? Find out here!

Import multiple items at once

In certain documentation listings, you can create multiple items at once.

Improving translations - How you can help to develop Cyberday

We invite everyone to help us improve the translations!

Incident management summary in Cyberday

In this article we will show you how you can approach incident management in Cyberday.

Intro to Cyberday partner features

Learn more about our partner features, such as the GAP analysis or time tracking, and how to use them in this article.

Intro to employee Guidebook on Cyberday

In this article we will show you how Guidebook works.

Joining collaboration groups in Community

The Community section allows you to connect with peers, personalize your experience, and share insights.

Linking existing SharePoint files to your Cyberday content

This article describes how you can add your SharePoint and ten link external files for example to tasks or documentation.

Logs in Cyberday

All changes made in your Cyberday are comprehensively logged. You can view event logs at different levels - as an admin from the "All events" page or from an individual item.

Managing Teams apps as an admin

As the administrator of your Microsoft Teams environment, there are many ways you can control how other users can take advantage of the applications found in the Teams app store.

Managing and sending vendor security assessments

Improve your supply chain security with vendor security assessments.

Managing extensions inside Cyberday

You can extend your Cyberday.ai functionality with available free and paid extension.

Most popular guidelines for remote work and mobile devices

Learn more about the most popular guidelines for remote work and mobile devices and how to use them in Cyberday.

Multilingual work in Cyberday

Learn more about the available languages and how to use and benefit from the different languages in Cyberday.

Optional data fields in Cyberday

Cyberday’s default structure in documentation directs to document the things required by the requirements framework, which are automatically utilized in e.g. reporting. However, the documentation can be expanded using optional data fields.

Partner Portal

Learn more about our new partner portal in Kiflo.

Personalize the menu by pinning items

Read more about how to personalize your dashboard view main menu.

Posting, replies and notifications in Community

This article goes through the basics of taking part in the Cyberday community.

Printing tips for reports

Print reports with the tips to generate finest possible looking results.

Publishing embeddable reports on your website

For example personal data processing regulations (e.g. the GDPR) and some national legislations require public communication about certain data processing matters. These requirements can be filled by maintaining the documentation in Cyberday and then publishing an embed report. This article will tell you how.

Setting a custom logo for your organization

Learn how to set your custom logo in Cyberday.

Share reports through Microsoft Teams channels

In Cyberday reports are summaries of data that can be distributed in read-only format outside of just admins and core team members utilizing teams inside MS Teams.

Sharing process descriptions

This help article explains how organisations with multiple accounts can share and customize essential process descriptions by distributing them from a main account to selected sub-accounts.

Sharing reports and report collections

This help article is showing how to share reports and how to create and share report collections

Signing up for 14-day free trial

You can try our trial 14 days for free!

Steps needed for ISO 27001 certification audit readiness

This is a recommendation of work priorities in Cyberday, when the goal is to be ready for ISO 27001 certification audit.

Task assurance methods

In this article, you can read more about the different assurance methods and how to use them.

Taskbook instruction guide

The Taskbook is a summary of all the items you are owning in your organization's cyber security management system.

Tasks in Cyberday

In this article you'll learn how to activate, edit, structure and implement tasks.

Tips for processing automatically deactivated users

When using Teams app setup policies to distribute Cyberday, we automatically de-activates the related users when they're removed from your Microsoft tenant. This article instructs on processing automatically de-activated users.

Trust center

This article tells what is trust center and how it works in Cyberday

Unit-employee AD syncing

This article summarizes how units can be synchronized to Cyberday exploiting AD or Entra groups

User management: Different user roles in Cyberday

People who use Cyberday are divided into different user groups with different rights. This article goes through the purposes of different user levels.

User management: Inviting and managing other users

Users are the people who access and manage your organisation's cyber security content. In this article you can learn how to invite and manage other users.

Using "security statement" reports

How do security statement reports in Cyberday work and what kind of detail levels are available?

Using compliance reports

Compliance report serves as a comprehensive overview of your organization's answers to each requirement / control in the related framework.

Visual mode draws out documentation item's connections

You can switch to 'visual mode' on a documentation card to see all item's connections drawn out visually on a canvas.

Vote and post ideas on Development ideas -section

We have published a new Feature in Cyberday - Development ideas -forum, where you can share your development ideas. In the forum, you and other Cyberday users everyone can "vote" on development ideas, and indicate the improvements that are truly needed.

What is cyber security asset documentation?

Many cyber security frameworks and regulations require up-to-date documentation, processed personal data, partner organizations and cyber security risks.

What is the Organisation dashboard and who can access it?

Here you can find a very short definition of the dashboard and who has access to it.

Working as a partner: customer overview

To ensure the transparency and efficiency of our partnership, we have created our own Cyberday "Partner Portal", the customer overview.

Working with Partner management: Data processor, System provider, other stakeholder...

This help article tackles the partner management terminology.

Video courses

Mastering NIS2 Compliance with Cyberday

Understand NIS2 directive and get a detailed go-through of getting compliant with Cyberday!

ISO 27001 introduction

We will go through the basics of Cyberday and how ISO 27001 standard can support systematic information security management. We will also cover the 2022 update to the standard.

NIS2 introduction

We will present the basics of the directive (e.g. who's in the scope, what changed from NIS and how should you react) and Cyberday ISMS as the central place for own information security efforts.

ISO 27001 and certification audit fundamentals

We will present the needed documents and other most important elements of a successful ISO 27001 certification audit.

Asset documentation

We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.

ISO 27001 and personnel awareness

We deal with personnel training, guidance and the automation of all this as part of the information security management system.

ISO 27001 and risk management

We deal with determining the means of managing information security through information security risk management, as well as creating and sharing a Statement of Applicability (SoA).

Cyberday overall intro

We go through the Cyberday concept and the fundamentals of systematic information security management.

Continuously improving your ISMS

We deal with the credible running of your own digital security management system, continuous development and supervision related to digital security work.

Videos

Admin 1: Demo: Main features of Cyberday

We will briefly go through the Cyberday concept, most important features and support methods you can use on your cyber security work.

Admin 1: Demo: Quick intro to basics of Cyberday

We will briefly go through the Cyberday concept, most important features and support methods you can use on your cyber security work.

Admin 1: Different information security frameworks

We will briefly go through the Cyberday concept, most important features and support methods you can use on your cyber security work.

Admin 1: ISMS and what is Cyberday

We will briefly go through the Cyberday concept, most important features and support methods you can use on your cyber security work.

Admin 1: Steps to becoming skilled in using Cyberday

We will briefly go through the Cyberday concept, most important features and support methods you can use on your cyber security work.

Admin 2: Demo: Asset identification

We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.

Admin 2: Demo: Configuring your Cyberday account

We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.

Admin 2: Demo: Editing documentation card templates

We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.

Admin 2: Identification of assets

We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.

Admin 2: What are information security frameworks

We will present configuring your ISMS with proper security standards, managing users and starting the work with asset identification.

Admin 3: Basics of risk management process

We will present the most important features that are required for setting up systematic information security management in an organization.

Admin 3: Demo: Find your baseline

We will present the most important features that are required for setting up systematic information security management in an organization.

Admin 3: Demo: Risk treatment in Cyberday

We will present the most important features that are required for setting up systematic information security management in an organization.

Admin 3: What are information security risks

We will present the most important features that are required for setting up systematic information security management in an organization.

Admin 3: What standards require from risk management

We will present the most important features that are required for setting up systematic information security management in an organization.

Admin 4: Demo: Dynamic policy documents

We will present extending the ISMS to processes for employee training, reporting about own compliance and improving the ISMS even further.

Admin 4: Demo: Personnel guidance in Cyberday

We will present extending the ISMS to processes for employee training, reporting about own compliance and improving the ISMS even further.

Admin 4: Demo: Personnel training in Cyberday

We will present extending the ISMS to processes for employee training, reporting about own compliance and improving the ISMS even further.

Admin 4: Personnel's role in information security

We will present extending the ISMS to processes for employee training, reporting about own compliance and improving the ISMS even further.

Admin 4: Why is staff's role growing in information security

We will present extending the ISMS to processes for employee training, reporting about own compliance and improving the ISMS even further.

Admin 5: Continuous improvement

We will present ways for successfully operating and continuously improving your ISMS.

Admin 5: Demo: Improvements management in Cyberday

We will present ways for successfully operating and continuously improving your ISMS.

Admin 5: Demo: Reacting to important events in Cyberday

We will present ways for successfully operating and continuously improving your ISMS.

Admin 5: Demo: Running your ISMS and treating issues

We will present ways for successfully operating and continuously improving your ISMS.

Admin 5: Improvements in Cyberday

We will present ways for successfully operating and continuously improving your ISMS.

ISO 27001 1: Demo: Reports & end results for auditor or you

We will go through the basics of Cyberday and how ISO 27001 standard can support systematic information security management. We will also cover the 2022 update to the standard.

ISO 27001 1: Demo: Starting your ISO 27001 journey in Cyberday

We will go through the basics of Cyberday and how ISO 27001 standard can support systematic information security management. We will also cover the 2022 update to the standard.

ISO 27001 1: ISO 27001 certification and popularity

We will go through the basics of Cyberday and how ISO 27001 standard can support systematic information security management. We will also cover the 2022 update to the standard.

ISO 27001 1: What is Cyberday?

We will go through the basics of Cyberday and how ISO 27001 standard can support systematic information security management. We will also cover the 2022 update to the standard.

ISO 27001 1: What is ISO 27001?

We will go through the basics of Cyberday and how ISO 27001 standard can support systematic information security management. We will also cover the 2022 update to the standard.

ISO 27001 2: Demo: Risk evaluation and treatment in Cyberday

We will present the basics of risk management, defining security controls and utilizing the statement of applicability.

ISO 27001 2: Demo: Statement of Applicability (SoA) in Cyberday

We will present the basics of risk management, defining security controls and utilizing the statement of applicability.

ISO 27001 2: Intro to information security risk management

We will present the basics of risk management, defining security controls and utilizing the statement of applicability.

ISO 27001 2: Risk management process and automation in Cyberday

We will present the basics of risk management, defining security controls and utilizing the statement of applicability.

ISO 27001 2: Statement of Applicability in ISO 27001

We will present the basics of risk management, defining security controls and utilizing the statement of applicability.

ISO 27001 3: Demo: Internal audits and management reviews

We will present the most important elements of a successful ISO 27001 certification audit.

ISO 27001 3: Demo: Share reports to the auditor in Teams

We will present the most important elements of a successful ISO 27001 certification audit.

ISO 27001 3: Mandatory documents needed in the audit

We will present the most important elements of a successful ISO 27001 certification audit.

ISO 27001 3: What does the auditor do and phases of the audit

We will present the most important elements of a successful ISO 27001 certification audit.

ISO 27001 3: Why get certified?

We will present the most important elements of a successful ISO 27001 certification audit.

ISO 27001 4: Demo: Automated app distribution in Teams

We will present the creation of an automatized and compliant staff training and awareness procedure.

ISO 27001 4: Demo: Personnel security guidance in Cyberday

We will present the creation of an automatized and compliant staff training and awareness procedure.

ISO 27001 4: Demo: Tips on policy documents and other topics

We will present the creation of an automatized and compliant staff training and awareness procedure.

ISO 27001 4: ISO 27001 requirements for personnel awareness

We will present the creation of an automatized and compliant staff training and awareness procedure.

ISO 27001 4: Importance of personnel awareness to security

We will present the creation of an automatized and compliant staff training and awareness procedure.

ISO 27001 5: Demo: Improvement management

We will present ways for successfully operating and continuously improving your ISMS.

ISO 27001 5: Demo: Incident management

We will present ways for successfully operating and continuously improving your ISMS.

ISO 27001 5: Demo: Operating your ISMS without problems

We will present ways for successfully operating and continuously improving your ISMS.

ISO 27001 5: Different improvements in Cyberday

We will present ways for successfully operating and continuously improving your ISMS.

ISO 27001 5: ISO 27001 and continuous improvement in Cyberday

We will present ways for successfully operating and continuously improving your ISMS.

NIS2: Demo: Build your NIS2-compliant plan in Cyberday

We will present the basics of the directive (e.g. who's in the scope, what changed from NIS and how should you react) and Cyberday ISMS as the central place for own information security efforts.

NIS2: Demo: Intro to important NIS2-topics in Cyberday

We will present the basics of the directive (e.g. who's in the scope, what changed from NIS and how should you react) and Cyberday ISMS as the central place for own information security efforts.

NIS2: NIS background

We will present the basics of the directive (e.g. who's in the scope, what changed from NIS and how should you react) and Cyberday ISMS as the central place for own information security efforts.

NIS2: What is Cyberday?

We will present the basics of the directive (e.g. who's in the scope, what changed from NIS and how should you react) and Cyberday ISMS as the central place for own information security efforts.

NIS2: What is NIS2 Directive?

We will present the basics of the directive (e.g. who's in the scope, what changed from NIS and how should you react) and Cyberday ISMS as the central place for own information security efforts.

Blog posts

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

10 most common non-conformities in ISO 27001 audits

Audits and non-conformities drive organizations toward continuous improvement. But before your first ISO 27001 certification, it's good to be aware of some most common non-conformities, so you can avoid these in your certification audit.

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

6 ways to assess security work effectiveness

Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

Access control & MFA in NIS2: Build a solid foundation with ISO 27001 controls

What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

Become a Cyberday partner: Features, benefits and best practices

A good and efficient tool such as Cyberday is a great way to work on the organization's cyber secuirty. However, for some organizations that is not enough and the expertise and support of a consultant is needed. Our partner program offers both!

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️

May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.

Content update published to Cyberday

We released an update to Cyberday documentation. The goal was to streamline documentation, highlight the most important things and significantly reduce the amount of separately documented items.

Continuity management in NIS2: Benchmark measures for business continuity and backups with ISO 27001

This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

Cyberday Community has been launched!

We just launched a new Community section inside Cyberday. Our goal is to make collaboration with your peers and with us easier and thus help you improve your information security even further!

Cyberday Teams app is now available!

Our Teams app passed the latest Microsoft tests and is now available from the Teams app store. This article reviews the benefits and deployment of Cyberday's Teams app.

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

Cyberday launched: Frameworks, Teams-integration and much more

Cyberday works now inside a Microsoft Teams and by choosing a framework you can guide your own work. In this blog you'll find a summary from reforms!

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

Efficient cyber risk management with new autopilot mode

We're constatly searching for ways to automate and create efficient cyber risk management. Our newest additions is risk autopilot mode. It's concept is described on this post.

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

Europe's Compliance Revolution: Evolving Cyber Sec Consulting

The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.

Framework recap, role of the CISO & and vendor assessments: Cyberday product and news round-up 12/2024 🛡️

December's product and news round-up will showcase the vendor security assessments and new enterprise-level features, an overview of the key frameworks for 2025 and the roles of the CISO and personnel in an organisation's security.

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

Got an ISO 27001 audit interview request - what should I expect?

In this blog, we will talk about the importance of employee participation in the audit interview process, why auditors value employee insights, and look into possible questions asked in an ISO 27001 interview.

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

HR security in NIS2: Best practices for compliance

Discover how the crucial role of HR in information security not only shapes the corporate security culture, but also steers the organization towards ISO 27001 and NIS2 compliance, ensuring secure handling of information assets and much more.

How do you benefit from ISO 27001 certification?

Why do organizations choose to go for ISO 27001 certification? In this blog article, we will give you our top 5 reasons to get certified. Certification will certainly benefit your security directly, but there are other kind of benefits available too.

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

ISMS implementation: comparison of documents, wikis, ISMS tools and GRC

There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

ISO 27001 certification: What happens in the certification audit?

This blog post gives an overall intro to information security auditing and a detailed go-through of the ISO 27001 certification audit process.

ISO 27001 compliance and certification checklist

Looking to ensure you fill ISO 27001 requirements? This checklist will present clearly ordered key steps that guide your organization in building an ISMS and getting compliant with the ISO 27001 standard.

ISO 27001 standard updated to 2022 version - what changed?

What has changed when comparing 2013 vs. 2022 versions of ISO 27001 and how are these updates visible on Cyberday?‍

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

Infographic: Why is cyber security getting more and more important?

Here's a visual summary of some of the drivers that continue to make cyber security more and more important for all organizations.

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

Information security risk management in Cyberday: Identifying risks, evaluation, treatment and closure

Every cyber security framework highlights risk management in its own way. We summarize in this post, what's essential in information security risk management and what kind of an approach Cyberday offers for it.

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

Most important documents in ISO 27001 certification audit

The ISO 27001 standard does specifically define some key documents, which need to be gathered together and be easily shareable e.g. for the auditor. In this blog, we'll present these most important documents for an ISO 27001 certification audit.

NIS2 & national implementation: which local NIS2 laws are available in Cyberday?

EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.

NIS2 Compliance: Top 5 Reasons for the Manufacturing Sector

The article highlights the critical importance for manufacturers to comply with NIS2 regulations to safeguard their operations and infrastructure from cyber threats.

NIS2 Overview: History, key contents and significance for top management

Get an overview of NIS2's main contents and understand how it makes top management clearly responsible for organization's information security efforts.

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

Password Security: Avoid these 5 common mistakes

Password security is something that no one should underestimate in the face of today's threats. One sensible option for secure password management is to use software designed for this purpose.

Personnel information security training and guidelines in Cyberday

Most data breaches start with human error. Still, investments in technical information security are often made more eagerly. We tell you why staff information security training and guidelines are important and how to implement then efficiently.

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

Recognising growth: move to new offices with Cyberday!

Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.

SOC 2: Working towards compliance

With the help of SOC 2, organisations can provide proof of effectively implemented controls and the use of best practices to protect the data to their customers and stakeholders, which may help to build trust.

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

System acquisition and development in NIS2: Suggested best practices

Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.

TISAX: Understanding the Automotive framework

By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

What is ISO 27001? Intro to the global information security gold standard.

Whether you're new to ISO 27001 or looking to strengthen your current practices, this post will walk you through its essentials, why it matters, and how it can improve your approach to information security.

What is NIS2 directive? Know EU's new cyber security legislation

Learn about the background and reasons behind the EU's new Network and Information Security 2 (NIS2) Directive. How does it affect your company and how should you react to be compliant?

What is Statement of Applicability (SoA) in ISO 27001?

In this blog, we'll cover the main purpose and benefits of a well-working Statement of Applicability document. We'll also explain why SoA is important, and 4 key roles it can play in information security work.

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

Why is ISO 27001 compliance now more important than ever?

Year after year, ISO 27001 standard has remained one of the gold standards for information security. The global standard has remained relevant, but where did ISO 27001 originate? And why is it's popularity just going up?

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.