Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today

The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.

article

28.3.2024

Information Security Risk Management: A Step-by-step Guide to a Clear Process

This post offers a comprehensive guide on managing information security risks, from pre-steps like asset identification to evaluation, treatment and monitoring. A crucial aspect given the surge of cyber vulnerabilities amid increasing tech advances.

article

21.3.2024

Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️

In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.

article

21.3.2024

Empowering Employees: The Keystone in Incident Detection and Reporting

Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.

article

15.3.2024

Incident reporting in NIS2: Requirements and related ISO 27001 best practices

This post outlines NIS2 incident reporting and further describes ISO 27001 best practices, and their application in crafting successful incident reporting processes for your organization.

article

8.3.2024

Top 7 information security standards, frameworks and laws explained

Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.

article

4.3.2024

ISO 27001 and NIS2: Understanding their Connection

Learn how the ISO 27001 and the NIS2 are "connected" and why they are brought up together pretty often. Understand their differences and synergy with the help of this blog post.

article

1.3.2024

Guide to Incident Detection and Reporting: Prepared for the Worst

In this guide you'll learn to navigate the incident detection and reporting process, explore various mechanisms, understand reporting, documentation, and derive crucial lessons. We also glance at other ingredients for successful incident management.

article

22.2.2024

Krispy Kreme Cyber Attack Disrupted Online Ordering in the US

🍩 US-based doughnut chain has recently experienced a #cyberattack, disrupting online ordering. While in-store purchases and daily deliveries remain unaffected, the incident highlights growing cybersecurity threats. 🛡️

Go to article at
13.12.2024

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Second-hand smartphones are a great way to access premium technology affordably but they come with #cybersecurity risks like outdated software, malware, or missing refurbishment checks. 📲 👀

Go to article at
13.12.2024

Deepfake attacks occur every five minutes

Cybercriminals are leveraging AI to scale fraud to unprecedented levels, as revealed by Entrust's latest report. Organizations must prioritize proactive strategies to counter these emerging threats.🚨 #cybercrime

Go to article at
13.12.2024

Malware delivered via malicious QR codes sent in the post

Cybercriminals are sending physical letters with malicious QR codes, tricking recipients into downloading #malware disguised as a weather app. Don't scan suspicious QR codes or download apps outside official app stores. 📲

Go to article at
13.12.2024

Ford rejects breach allegations, says customer data not impacted

While the allegedly leaked data isn’t highly sensitive, it could still enable phishing and social engineering attacks. Be cautious of unsolicited messages or requests for additional information. 🚙 🛡️ #cybercrime

Go to article at
13.12.2024

A Fifth of UK Enterprises “Not Sure” If NIS2 Applies

A recent study reveals that 22% of UK organizations are unsure if the NIS2 applies to them.💡 As compliance isn’t optional. UK enterprises must act swiftly to align with NIS2 to avoid fines and disruptions. #cybersecurity

Go to article at
13.12.2024

Fake Discount Sites Exploit Black Friday to Hijack Shopper Information

🛍️ Fake websites mimicking trusted brands offer bogus discounts to trick users into entering their cardholder data. The campaign highlights the importance of vigilance during the holiday shopping season.🎄 #phishing

Go to article at
13.12.2024

Exploring the Security Risks of VR and AR

As immersive technologies like VR and AR gain traction across industries, they bring transformative potential—and complex security challenges. To leverage VR and AR effectively, a proactive security strategy is essential. 🧑‍💻 #dataprotection

Go to article at
13.12.2024

The changing face of identity security

🔒 While user security is crucial, attackers also exploit overlooked identities of devices, applications, and service accounts. These can be high-value targets, often granting attackers extensive access if left unmonitored. 🕵️‍♂️ #privacy

Go to article at
13.12.2024