Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

How do you benefit from ISO 27001 certification?

Why do organizations choose to go for ISO 27001 certification? In this blog article, we will give you our top 5 reasons to get certified. Certification will certainly benefit your security directly, but there are other kind of benefits available too.

article

25.10.2023

Working towards NIS2 compliance with Cyberday

✈️ You want to lift your cyber security management to a new level & get NIS2 compliant with a smart tool like Cyberday? In this post you'll learn how your organization can achieve NIS2 compliance in a smart way by building an own agile ISMS.

article

23.8.2023

Who does NIS2 apply to? Scope and required security measures explained.

In this post you'll learn about what industries are affected by NIS2, security requirements the directive sets, and the available enforcement methods if an organization is not compliant.

article

23.8.2023

What is NIS2 directive? Know EU's new cyber security legislation

Learn what is the new EU NIS2 directive, why the original NIS was not enough and how it affects your company's compliance requirements.

article

1.8.2023

SOC 2: Working towards compliance

With the help of SOC 2, organisations can provide proof of effectively implemented controls and the use of best practices to protect the data to their customers and stakeholders, which may help to build trust.

article

31.7.2023

Personnel information security training and guidelines in Cyberday

Most data breaches start with human error. Still, investments in technical information security are often made more eagerly. We tell you why staff information security training and guidelines are important and how to implement then efficiently.

article

13.6.2023

Information security risk management in Cyberday: Identifying risks, evaluation, treatment and closure

Every cyber security framework highlights risk management in its own way. We summarize in this post, what's essential in information security risk management and what kind of an approach Cyberday offers for it.

article

13.6.2023

Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%

Cybercriminals target nonprofits’ limited security resources to steal donor data, commit fraud & deploy ransomware. Action is needed—e.g. staff training on #phishing & fraud prevention is crucial to protecting assets & maintaining trust. 🛡️

Go to article at
7.3.2025

Leeds United Supporters Suffer Cyber Attack

⚽️ Leeds United suffered a cyber-attack in February, exposing customer card details. With rising phishing, card skimming & fraud, the sports industry must strengthen #cybersecurity to protect fan data. ⚽️

Go to article at
7.3.2025

Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour

👀 What is MFA Fatigue? Attackers flood users with repeated MFA prompts, hoping they’ll approve one out of frustration or confusion—unknowingly granting access. Read how to defend against MFA fatigue, and stay secure! #cyberattack

Go to article at
28.2.2025

Cybersecurity needs a leader, so let’s stop debating and start deciding

💡 When it comes to #cybersecurity, businesses still struggle with ownership. In today’s threat landscape, this is a serious red flag - Cybersecurity is a business function, not just an IT concern.

Go to article at
28.2.2025

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Over 130,000 compromised devices are actively attempting logins using stolen credentials. To detect and mitigate these threats, security teams must prioritize monitoring Non-Interactive Sign-In logs. 🤖 🔐 #cybercrime

Go to article at
28.2.2025

The compliance illusion: Why your company might be at risk despite passing audits

Often organizations treat passing an audit like the finish line, only to let security controls stagnate once the paperwork is signed. Larger breaches show that being “compliant” doesn’t always prevent real-world #cybersecurity threats 🛡️🚨

Go to article at
27.2.2025

A Gold Standard for Compliance: Why ISO 27001 is More Relevant Than Ever 

Ultimately, ISO 27001 isn’t just about meeting compliance checkboxes—it’s a strategic investment in trust, competitive differentiation, and long-term business growth. ISO 27001 is a powerful place to start to improve your #cybersecurity 🛡️

Go to article at
27.2.2025

Why digital resilience is critical to banks

With rising cyber threats and supply chain risks, financial institutions must move beyond prevention and prepare for disruptions. DORA strengthens digital operational resilience to ensure stability and security. 🛡️ #cybersecurity

Go to article at
21.2.2025

Controlling Shadow AI: Protecting Knowledge Management from Cyber Threats

🤖The next frontier of cybersecurity isn’t just about defending networks—it’s about securing AI-driven decision-making and knowledge management. 🚀 Is your organization prepared? #vulnerability

Go to article at
21.2.2025