Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Best Practices and Common Challenges of ISMS Implementation

No matter if you are an IT professional, a cyber security expert, or in a management role, this post will provide you with valuable insights into the best practices for a successful ISMS implementation and how to navigate common challenges.

article

14.2.2024

ISMS Guide: Top 10 ISMS Implementation Benefits

What is an ISMS and why does your organization benefit from its implementation in the long run? This blog post will give you a short guide about all the basics you need to know about an ISMS and its top 10 benefits.

article

9.2.2024

Intro to Incident Management: Definitions, benefits and best practices

Learn how an incident management process improves communication, documentation, and continuous improvement for IT organisations.

article

6.2.2024

5 Efficient Ways for Involving People in Your Security Work

Discover how teamwork, education, reporting, and risk assessments empower ISMS. Explore 5 ways to engage people for a secure, collaborative digital space.

article

1.2.2024

AI Act, cyber risks and breaches: Cyberday product and news roundup 1/2024 🛡️

In January's summary, development themes include reporting updates, improved report sharing and upgraded Academy. On the news side talk about AI Act, cyber risks and breaches.

article

30.1.2024

10 most important tasks for a CISO and tips for being successful

This article provides an insight into the main responsibilities of a CISO, from implementing security principles to fostering collaboration. It also presents valuable tips for successful performance, emphasizing constant learning as a key ingredient.

article

24.1.2024

The Human Firewall Effect: Tips for Securing Your Organization from Within

This blog post emphasizes the critical role employees play in bolstering an organization's cyber security. It discusses developing clear guidelines, employee training, and monitoring progress to create a strong human firewall.

article

19.1.2024

Encryption, RaaS, supply chain attacks: Monthly Cyberday product and news roundup 12/2023 🛡️

In December's summary, development themes include UI updates and information security statements. On the news side talk about encryption, RaaS and supply chain attacks.

article

15.12.2023

New stealthy techniques let hackers gain Windows SYSTEM privileges

⚠️ Researchers at #cybersecurity company Deep Instinct developed new attacks to elevate privileges on Windows machines without leaving much evidence or being detected by numerous security products. Details in the article >>

Go to article at
25.8.2023

Chrome will soon start removing extensions that may be unsafe

Chrome 117 will start “proactively notifying users when an extension they have is no longer in the store”. ✅ This will be a way to prompt users to e.g. remove extensions identified as malicious. #malware

Go to article at
25.8.2023

Most Impactful Ransomware Attacks of 2023

☣️ #Ransomware is still one of the most vicious and costly forms of cybercrime. 2023 looks to be another record-breaking year. 1st half saw 49% increase in publicized attacks. Big part is still not reported. List of top breaches >>

Go to article at
18.8.2023

File sharing site Anonfiles shuts down due to overwhelming abuse

Anonfiles is a file-sharing site that lets people to share files without activity being logged. ⚠️ #Cybercrime actors soon took over to share e.g. stolen data or credentials and copyrighted material. Service was now shutdown due to abuse.

Go to article at
18.8.2023

Public Sector Hit in Sudden Surge, Reveals New Report

BlackBerry Threat Intelligence report shows a 40% increase in #cyberattack's against public services, e.g. transit, education and other government services. ℹ️ See other key findings from the article >>

Go to article at
18.8.2023

LinkedIn accounts hacked in widespread hijacking campaign

⚠️ LinkedIn users report account takeover attacks / lockouts and poor help from support. Attackers use leaked credentials or brute-forcing to steal accounts en masse. Make sure you are protected by a good password and MFA. #cybersecurity

Go to article at
18.8.2023

Google Introduces First Quantum Resilient FIDO2 Security Key Implementation

Google is bracing for the quantum computing impact on #cybersecurity. 🔑 On Tue it announced the 1st quantum-resilient FIDO2 security key. This follows previous plan to support quantum-resilient encryption algorithms in Chrome 116.

Go to article at
18.8.2023

Temporary Phone Number: An Essential Tool for Privacy Protection

📲 Looking for more ways to safeguard your #privacy? Temporary phone number acts as intermediary between your phone and e.g. apps requiring number verification. They're a convenient way to maintain privacy and control over personal data.

Go to article at
16.6.2023

Cyber insurance: What is it and does my company need it?

#Cybersecurity insurance to be a $64 billion industry by 2029 They provide e.g.: ✅ pre-breach assessments 🕵️ assistance with breach investigation 💰 cover for incident costs / support for damage claims More details in the article >>

Go to article at
16.6.2023