Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way

Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.

article

22.8.2024

ISMS Essentials: Mastering a Data System Inventory for Your Organization

This post provides essential insights for maintaining a data system inventory within your organization's ISMS, detailing key processes, asset types, and tackling common challenges.

article

15.8.2024

Incident Detection: Building, Nurturing, and Continuously Improving a Proactive Environment

Shift from reactive to proactive incident detection. Use advanced tools, continuous learning, and customised strategies to anticipate and prevent issues. Focus on constant improvement and innovation to boost security and resilience.

article

15.8.2024

ISO 27001 and ISO 9001: Differences, how they work together and benefits of combining

Learn about the synergy between ISO 27001 and ISO 9001. Learn how integrating these standards enhances information security, quality management, and overall operational efficiency, using case examples and actionable insights.

article

6.6.2024

Security Considerations for a Blended Workforce

A blended workforce consisting of external organizations, traditional workers and non-traditional workers such as freelancers, remote workers, temporary workers and independent contractors (ICs) can provide an organization with the added potential for collaboration, innovation and timely responses to shifting demands. While the integration of a blended workforce can provide exceptional benefits, there are also unique.. The post Security Considerations for a Blended Workforce appeared first on Security Boulevard.

Go to article at
15.5.2020
Employee Negligence

Microsoft: 44 Million User Passwords Have Been Breached

Redmond urges users to switch on MFA

Go to article at
15.5.2020
Password Attacks

SG: Public healthcare cluster NHG fined $6,000 for not securing personal data

Hariz Baharudin reports: Public healthcare cluster National Healthcare Group (NHG) has been fined $6,000 for failing to...

Go to article at
15.5.2020
Illegal Personal Data Processing

Ransomware Locks Medical Records at Great Plains Health

Patient data likely safe On Tuesday, GPHealth announced that it was canceling a large number of non-emergent patient appointments and procedures. Mel McNea, GPHealth chief executive officer, says that there is no reason to suspect that patient data was accessed but the organization will do a full audit, nevertheless. Ransomware encrypts files on affected systems and is not typically associated with data theft. The group behind Maze ransomware carried out such an attack and threatened the victim company that they would leak the stolen data unless they paid 300 bitcoin ($2.3 million at the time) for the decryption key. Well on its way to recovery A statement on Facebook from GPHealth informs that there is no reason to believe that patient information was accessed during the attack on their systems. At this moment, it is unclear what ransomware strain was used in the attack or if the ransom was paid to restore the encrypted data.

Go to article at
15.5.2020
Ransomware

Cybersecurity experts told how to protect yourself when working from home

Go to article at
15.5.2020
Employee Negligence

Cloud-Based vs. On-Prem IAM

Organizations across the globe are wondering whether identity management has evolved into the battle of cloud-based vs. on-prem IAM. The post Cloud-Based vs. On-Prem IAM appeared first on JumpCloud. The post Cloud-Based vs. On-Prem IAM appeared first on Security Boulevard.

Go to article at
15.5.2020
Outdated Access Rights

Some Hackers Take the Ransom and Run: Researchers

Paying off hackers after a ransomware infection could end up being a total loss, according to a study released Thursday which finds some attackers just take the money and run. read more

Go to article at
15.5.2020
Ransomware

Are ransom payers fueling ransomware?

A new CyberEdge Group report uncovered two trends that are stimulating record-setting ransomware attacks: More ransom payers are successfully recovering their data. In 2018, only 49 percent of ransom payers successfully recovered their data. That number rose to 61 percent in 2019. Today, 67 percent of ransom payers have recovered their data. More payments are incentivizing the ransomware industry. In 2018, only 39 percent of ransomware victims actually paid the ransom. In 2019, that number … More → The post Are ransom payers fueling ransomware? appeared first on Help Net Security.

Go to article at
15.5.2020
Ransomware

LifeLabs Pays Hackers Who Accessed 15M Customers’ Lab Test Results

The data breach disclosure was met with ire from customers whose lab test results, health card numbers and more were accessed.

Go to article at
15.5.2020
Illegal Personal Data Processing