Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Agendium Ltd is now Cyberday Inc.!

We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.

article

24.10.2024

10 compliance traps & how to avoid them

Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.

article

18.10.2024

ISO 9001 standard: A peek inside the Quality framework

This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.

article

8.10.2024

Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001

Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.

article

3.10.2024

Corporate Security Alert: Identifying Dangerous Apps on Employee Phones

This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.

article

20.9.2024

NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️

This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.

article

20.9.2024

IT and OT Cyber Security: Different Environments, Different Priorities

This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.

article

4.9.2024

Cyber Security in Supply Chain Risk Management

Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.

article

22.8.2024

How remote work strengthens cybersecurity teams

Can remote work be used as strategic advantage? 🔋 The shift to remote work isn’t just a challenge—it’s a possibility. CISOs and professionals can leverage global talent, enhance security practices, and boost resilience. #cybersecurity

Go to article at
14.3.2025

How to prevent data leakage in collaboration tools like Slack and Teams

🛡️ Collaboration shouldn’t compromise security. Tools like Slack and Teams have become essential but they also introduce risks, so proactive actions e.g. access control, and employee training are key. 🔐 #dataprotection

Go to article at
7.3.2025

Six Critical Infrastructure Sectors Failing on NIS2 Compliance

⭐️ ENISA has noted six sectors struggling to comply with the NIS2. It's been almost 5 months since NIS2 came into action, but implementation is still taking place, e.g. national laws are still in progress in some countries. #cybersecurity

Go to article at
7.3.2025

The 5 stages of incident response grief

This article explores incident response from a new angle. Beyond technical fixes, good incident management requires clear detection & response tasks, systematic documentation, and proactive employee reporting.🚨 #cybersecurity

Go to article at
7.3.2025

Nonprofits Face Surge in Cyber-Attacks as Email Threats Rise 35%

Cybercriminals target nonprofits’ limited security resources to steal donor data, commit fraud & deploy ransomware. Action is needed—e.g. staff training on #phishing & fraud prevention is crucial to protecting assets & maintaining trust. 🛡️

Go to article at
7.3.2025

Leeds United Supporters Suffer Cyber Attack

⚽️ Leeds United suffered a cyber-attack in February, exposing customer card details. With rising phishing, card skimming & fraud, the sports industry must strengthen #cybersecurity to protect fan data. ⚽️

Go to article at
7.3.2025

Understanding MFA Fatigue: Why Cybercriminals Are Exploiting Human Behaviour

👀 What is MFA Fatigue? Attackers flood users with repeated MFA prompts, hoping they’ll approve one out of frustration or confusion—unknowingly granting access. Read how to defend against MFA fatigue, and stay secure! #cyberattack

Go to article at
28.2.2025

Cybersecurity needs a leader, so let’s stop debating and start deciding

💡 When it comes to #cybersecurity, businesses still struggle with ownership. In today’s threat landscape, this is a serious red flag - Cybersecurity is a business function, not just an IT concern.

Go to article at
28.2.2025

Chinese Botnet Bypasses MFA in Microsoft 365 Attacks

Over 130,000 compromised devices are actively attempting logins using stolen credentials. To detect and mitigate these threats, security teams must prioritize monitoring Non-Interactive Sign-In logs. 🤖 🔐 #cybercrime

Go to article at
28.2.2025