Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Understanding Physical Security in Cybersecurity: Insights from ISO 27001 and Best Practices

Physical security controls are essential, but often undervalued, in safeguarding information systems from unauthorized access, which might otherwise lead to data breaches or business disruptions.

article

22.11.2024

DORA essentials: Introduction, Scope and key requirements

In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!

article

14.11.2024

Cyberday goes Cyber Security Nordic 2024!

Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.

article

31.10.2024

From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration

Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust. 

article

25.10.2024

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Deepfake attacks occur every five minutes

Cybercriminals are leveraging AI to scale fraud to unprecedented levels, as revealed by Entrust's latest report. Organizations must prioritize proactive strategies to counter these emerging threats.🚨 #cybercrime

Go to article at
22.11.2024

Malware delivered via malicious QR codes sent in the post

Cybercriminals are sending physical letters with malicious QR codes, tricking recipients into downloading #malware disguised as a weather app. Don't scan suspicious QR codes or download apps outside official app stores. 📲

Go to article at
22.11.2024

Ford rejects breach allegations, says customer data not impacted

While the allegedly leaked data isn’t highly sensitive, it could still enable phishing and social engineering attacks. Be cautious of unsolicited messages or requests for additional information. 🚙 🛡️ #cybercrime

Go to article at
22.11.2024

A Fifth of UK Enterprises “Not Sure” If NIS2 Applies

A recent study reveals that 22% of UK organizations are unsure if the NIS2 applies to them.💡 As compliance isn’t optional. UK enterprises must act swiftly to align with NIS2 to avoid fines and disruptions. #cybersecurity

Go to article at
22.11.2024

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information

🛍️ Fake websites mimicking trusted brands offer bogus discounts to trick users into entering their cardholder data. The campaign highlights the importance of vigilance during the holiday shopping season.🎄 #phishing

Go to article at
22.11.2024

Exploring the Security Risks of VR and AR

As immersive technologies like VR and AR gain traction across industries, they bring transformative potential—and complex security challenges. To leverage VR and AR effectively, a proactive security strategy is essential. 🧑‍💻 #dataprotection

Go to article at
15.11.2024

Expert Insight: The digital pandemic: How cyber threats are threatening life as we know it

🛡️ Cyber threats are escalating, with 50% of businesses experiencing breaches and experts observing an increase in attacks. In today’s interconnected world, a single vulnerability can spread rapidly, affecting millions. 🦠 #vulnerability

Go to article at
15.11.2024

The changing face of identity security

🔒 While user security is crucial, attackers also exploit overlooked identities of devices, applications, and service accounts. These can be high-value targets, often granting attackers extensive access if left unmonitored. 🕵️‍♂️ #privacy

Go to article at
15.11.2024

Amazon confirms employee data breach after vendor hack

Amazon confirmed a data breach impacting its employee contact info following the attacks in 2023. Incident underscores the need for robust third-party security practices as cyber threats continue to target enterprise ecosystems.🚨 #cyberattack

Go to article at
15.11.2024