Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

ISMS implementation: comparison of documents, wikis, ISMS tools and GRC

There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.

article

6.3.2025

What is Statement of Applicability (SoA) in ISO 27001?

In this blog, we'll cover the main purpose and benefits of a well-working Statement of Applicability document. We'll also explain why SoA is important, and 4 key roles it can play in information security work.

article

4.3.2025

Why is ISO 27001 compliance now more important than ever?

Year after year, ISO 27001 standard has remained one of the gold standards for information security. The global standard has remained relevant, but where did ISO 27001 originate? And why is it's popularity just going up?

article

27.2.2025

10 most common non-conformities in ISO 27001 audits

Audits and non-conformities drive organizations toward continuous improvement. But before your first ISO 27001 certification, it's good to be aware of some most common non-conformities, so you can avoid these in your certification audit.

article

18.2.2025

Got an ISO 27001 audit interview request - what should I expect?

In this blog, we will talk about the importance of employee participation in the audit interview process, why auditors value employee insights, and look into possible questions asked in an ISO 27001 interview.

article

13.2.2025

ISO 27001 compliance and certification checklist

Looking to ensure you fill ISO 27001 requirements? This checklist will present clearly ordered key steps that guide your organization in building an ISMS and getting compliant with the ISO 27001 standard.

article

6.2.2025

Most important documents in ISO 27001 certification audit

The ISO 27001 standard does specifically define some key documents, which need to be gathered together and be easily shareable e.g. for the auditor. In this blog, we'll present these most important documents for an ISO 27001 certification audit.

article

30.1.2025

NIS2 & national implementation: which local NIS2 laws are available in Cyberday?

EU Member States are required to adopt NIS2 into national law. Key national decisions include defining local authorities, monitoring mechanisms, and tailoring regulations to meet specific needs.

article

23.1.2025

Mastodon: What you need to know for your security and privacy

After Elon Musk's acquisition of Twitter, Mastodon is becoming hot. Mastodon is a free, ad-free, decentralised, open-source social media, created by a German non-profit organization. If you're interested, check also these related #cybersecurity tips >>

Go to article at
11.11.2022

Australian real estate agency Harcourts suffers a data breach

Harcourts suffered a #cyberattack last month. Rental database incl. lots of sensitive data (photo IDs, signature copies, etc.). ⚡ Harcourts smoothly blames partner: "Breach occurred due to Stafflink employee using own device for work..."

Go to article at
11.11.2022

Having refused to pay ransom, health insurer Medibank sees customer data posted online by hackers

Australia's largest health insurer Medibank announced they won't pay to #ransomware gang. ⚠️ Crooks started releasing client data online, dividing insured customers to "good" & "naughty" depending on e.g. substance abuse or medical issues.

Go to article at
11.11.2022

Parcel delivery scams are on the rise: Do you know what to watch out for?

Parcel delivery scams spoof e.g. DHL / other delivery services, sending #phishing emails / SMS telling something's wrong with delivery to get users to click. 📈 Amounts are soaring as e-commerce has grown and holiday's are coming up.

Go to article at
28.10.2022

Online ticketing company “See” pwned for 2.5 years by attackers

See Tickets is a major global player in the online event ticketing. ⚠️ They suffered a #cybersecurity breach that lasted 2,5 years before spotted, only when an external person notified See Tickets about it. Breach timeline and details >>

Go to article at
28.10.2022

GitLab Adds Governance, Software Supply Chain Enhancements

🛡️ GitLab announced new #cybersecurity and compliance features. "New app security scanners incl. e.g. static application security testing, secret detection, container scanning and dependency scanning..."

Go to article at
28.10.2022

Clearview AI image-scraping face recognition service hit with €20m fine in France

Clearview AI matches faces to a database of 20 billion images. Following an earlier (unaddressed) formal notice, CNIL fined Clearview AI 20 M€ and ordered to stop processing data on individuals in France without a legal basis. #privacy

Go to article at
28.10.2022

Apple Releases Patch For iPhone And iPad Zero Day

On Monday Apple put out a patch for 8th zero-day this year. ⚠️ This high-severity #vulnerability lets attackers remotely execute malicious code that runs with the highest privileges inside the OS kernel of up-to-date iPhones and iPads.

Go to article at
28.10.2022

Gen Z, Millennial Workers Are Bigger Cybersecurity Risks Than Older Employees

"Vast majority of incidents trace back to a single person" EY's Human risk in #cybersecurity survey: ⚠️ 48% protect personal devices better than work devices ☣️ younger workers more likely to re-use passwords / disregard security updates

Go to article at
21.10.2022