CyberPilot blogJoin our +4000 subscribers and sign up for our newsletter.
Phishing simulations and phishing training is a way to make sure your team learns how to spot dangerous e-mails in their inbox. But how do you make good phishing simulations?
Phishing is the most common cyber security attack forms. It cost companies a lot of money. It's important that your employees can spot a phishing mail.
GDPR demands that you do not keep personal data longer than you need. Data destruction is therefore an important topic to consider in your GDPR work.
There's a lot of step you need to take to make sure your company is GDPR compliant. We've listed a lot of them in this guide that can start your GDPR-trip.
Phishing is a dangerous threat but spear phishing is an even bigger threat. Spear phishing is targeted phishing. Read what it is and how to prevent it.
Privacy By Design is a method to make sure that privacy is prioritized every time we are designing products, processes and much more.
You may have heard that cyber-attacks are becoming a regular part of business operations. It takes a lot of time and money to recover from an attack.
Learn what a ISO 27001 certification or a ISAE 3402 security report is and how get started. A comprehensive guide.
You need lawful basis for processing personal data. But what is it and how can do you get it? Here's what you and your colleagues should know.
It is difficulty to get a overview of all the assets and devices in your organisation. Asset management is crucial. Read how to make it easy.
GDPR awareness is important. Everyone in an organisation needs to know how to deal with data on an everyday basis
This blogpost takes you through the biggest GDPR fines from 2020 and why they were given. We also tell you how to avoid them yourself.
5 tips to make you succeed with awareness training in your organisation. It will create better cyber security in your organisation.
A risk analysis is useful for your organisation's IT security. Download our free template and follow our step-by-step guide to get started
Data minimisation is a principle that states you should not keep data for longer than needed. Here's what you need to know.
Malware is malicious software. It is a term for any type of software with a malicious intent. An example of malware could be ransomware.
A strong password needs at least 12 characters. Follow our easy rules to create a strong password you can remember.
The Danish Data Protection Agency has published statistics on GDPR security breaches. Find out what the most common types of breaches are and avoid them.
The Schrems II case makes it impossible for US organisations to use the so called Privacy Shield framework. This will affect organisations.
The Schrems II ruling have been reason for a lot of concern in a lot of companies. Now new guidelines are here. We'll take you through them.
The plan-do-act-check cycle is a method to ensure continues improvements. Here's what it is and how it can improve your cyber security.
What'sAppening with WhatsApp? Read why WhatsApp have been fined and what you can learn from it to avoid making the same mistakes.
Get the free template and read our tutorial which takes you through the Acceptable Use Policy. The AUP helps the security in your company.
You need legal basis for posting pictures and videos online. There are different kind of basises such as consent, contracts and legitimate interest.
Ransomware is a type of malware which is used to blackmail companies. Here's are some concrete tips on how to avoid it.
There are a lot of dangers on the internet. Your employees need to be aware when they browse. Here's what you should do about it .
Email is the biggest reason for security breaches. We attach the wrong files. We send it to the wrong contact. Here's all you should know
Learn what concrete steps you can take to measure the effect of cyber security awareness training in your organisation.
Security breaches can easily occure in video meetings. If you are unaware you might share your screen with personal data on it.
Get our free template for an IT security policy and follow the guide on how to use it. A good policy will strenghten your organisation.c
You can use Mobile Device Management to monitor and secure all your mobile devices. Here is how!
Personal data is any information that relates to an indivdual and therefore can be used to identify the person. Read more to learn more.
Not everybody need to have acces to all personal data. Here are 4 recommendations on how to control the acces of personal data.
A DPO (Data Protection Officer) is responsible for making sure that your company handles personal data as it should. But do you need a DPO?
SIEM can be an automated alarm system for your IT systems. Together with IT Log Management it can be an important cyber security tool
CEO Fraud is a method where hackers manipulates you to either send money or download malware. Here's what it is and what you can do about it.
A new ENISA reports recommends small and medium sized business to take cyber security seriously. They point out 3 areas which need awareness. Here they are
What are the 7 GDPR Principles? The 7 principles can help guide you in the right direction to become GDPR compliant.