Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

No room for error: Don’t get stung by these common Booking.com scams

As vacation season is here it's good time to remember, cybercriminals don't take breaks. Popular travel platform has seen a significant increase in travel scams. Be aware of #phishing and other scams, let's have safe vacation season. ☀️🏝️

Go to article at
13.12.2024

Cyber-Unsafe Employees Increasingly Put Orgs at Risk

As workplaces embrace new tools and technologies, organizations must prioritize #cybersecurity awareness among staff and enforce stricter controls to mitigate the risk of data breaches. 📚🛡️

Go to article at
5.12.2024

Scams to look out for this holiday season

A topic that can't be discussed enough during the busiest shopping season 🔔 As the festive season kicks off, it's not just shoppers gearing up—scammers are too. Find out what to look out for to avoid scams 🎄 #cybercrime

Go to article at
5.12.2024

Decade-Old Cisco Vulnerability Under Active Exploit

This case highlights a critical challenge in #cybersecurity: legacy vulnerabilities often persist in environments where prioritization of patches is difficult. ⚒️ Regularly review and update your systems to address old vulnerabilities.

Go to article at
5.12.2024

What Are Computer Worms?

💻 In our increasingly interconnected world, computer worms remain one of the most silent yet dangerous cyber threats. But what are worms and how they work? Staying informed and proactive is key to protecting your systems.🪱 #malware

Go to article at
5.12.2024

Another 'major cyber incident' at a UK hospital, outpatients asked to stay away

Cyberattacks on healthcare are increasing, highlighting the urgent need for robust cybersecurity measures. Protecting patient data and ensuring operational continuity must be a top priority for healthcare providers. 🏥 #cyberattack

Go to article at
29.11.2024

Starbucks, grocery stores impacted by Blue Yonder ransomware attack

A ransomware attack has disrupted employee scheduling and payroll systems at Starbucks. The ripple effects extend beyond Starbucks, affecting major retailers like the UK's Morrisons and Sainsbury's. ☕️ #ransomware

Go to article at
29.11.2024

Tips and Tools for Social Media Safety

📲 Social media connects us, but it can also expose us to privacy and security risks. Check tips how to stay secure and share awareness to your colleagues, friends and family. 🛡️ #cybersecurity

Go to article at
29.11.2024

Automating Data Encryption and Security Audits for Continuous Protection

The global cost of cyberattacks is projected to reach $9.5 trillion in 2024.💰 Automation empowers businesses to proactively defend against cyber threats, ensuring robust, consistent, and adaptive data security. #cybercrime

Go to article at
29.11.2024