CyberPilot blogJoin our +4000 subscribers and sign up for our newsletter.
The NIS2 strengthens cyber security requrements for companies across the EU. It establishes a framework and sets a baseline for future cyber security
Angler phishing is a type of phishing that occurs on social media. Cyber criminals disguise themselves as a customer service agent and tries to trick you.
Awareness training works. The research says so. We've also asked some of our customers what they have to say about our training. Find out what they said!
2FA protects your online data by adding an extra layer of security to your accounts. It should be an essential part of your IT-security
We improve our courses all the time, but sometimes we forget to tell people how. Here's what we've been working on for the last year.
Data privacy is often seen as a human right. But what does it exactly mean for you and your company? Read about data privacy and get 5 tips on what you can do.
Password managers is a great way to keep track of all of your passwords. You only need to remember one password to access all of your passwords. Read more.
Ransomware is a type of malware which is used to blackmail companies. Here's are some concrete tips on how to avoid it.
Training your colleagues on IT-security topics is essential. See how you can make a training program with phishing and social engineering courses.
The Plan Do Check Act cycle (PDCA) is a method to ensure continuous improvements. Here's what it is and how it can improve your cyber security.
A risk analysis is useful for your organisation's IT security. Download our free risk analysis template and follow our step-by-step guide to get started.
GDPR training for employees helps keep your organisation secure. It also helps you meet the GDPR training requirements for compliance.
Get the free template and read our tutorial, which takes you through an Acceptable Use Policy example. The AUP helps your company’s cyber security.
Barrel phishing is a type of phishing attack where the criminals tries to start a conversation with you before they send the malicious link. Read about it here.
Get our free IT security policy template and follow the guide on how to use it. A good information security policy will strengthen your organisation.
Pharming is a type of phishing but it's nothing like normal phishing attacks. Read what it is and how your company can avoid be victims of pharming.
Security awareness training prepares your team for cyber threats. But how do you make people care? Use these tips for engaging cyber security training.
Strong passwords are a security must-have. Our guide will give you good password ideas, so you can learn how to make a strong password you can remember.
Awareness training is all about creating awareness among your employees on important topics. It can be done with e-learning, posters and many other methods
The ISAE 3000 can help your GDPR work. But it's not for everyone as it also takes a lot of work. Here's a quick introduction to what the ISAE 3000 is and how it can be useful.
You need to know your role as a data controller and as a data processor as it plays a big part of responsibility when it comes to the GDPR. Here's what you need to know.
What are the biggest GDPR fines? How do you avoid making the same mistakes as the companies who were fined? We've run through DLA Pipers new report about fines.
Vishing and smishing is phishing attacks which happens over your phone either through calls or SMS. We like to trust people who call us, but sometimes we shouldn't.
This is how to spot a phishing mail. 7 tips for you and your colleagues to strengthen your awareness and cyber security.
Whaling is a type of phishing attacks which aims to get you to send huge amounts of money to the criminals. But how do you see through the scams?
Phishing simulations and phishing training is a way to make sure your team learns how to spot dangerous e-mails in their inbox. But how do you make good phishing simulations?
Phishing is the most common cyber security attack forms. It cost companies a lot of money. It's important that your employees can spot a phishing mail.
GDPR demands that you do not keep personal data longer than you need. Data destruction is therefore an important topic to consider in your GDPR work.
There's a lot of step you need to take to make sure your company is GDPR compliant. We've listed a lot of them in this guide that can start your GDPR-trip.
Phishing is a dangerous threat but spear phishing is an even bigger threat. Spear phishing is targeted phishing. Read what it is and how to prevent it.
Privacy By Design is a method to make sure that privacy is prioritized every time we are designing products, processes and much more.
You may have heard that cyber-attacks are becoming a regular part of business operations. It takes a lot of time and money to recover from an attack.
Learn what a ISO 27001 certification or a ISAE 3402 security report is and how get started. A comprehensive guide.
You need lawful basis for processing personal data. But what is it and how can do you get it? Here's what you and your colleagues should know.
It is difficulty to get a overview of all the assets and devices in your organisation. Asset management is crucial. Read how to make it easy.
Data minimisation is a principle that states you should not keep data for longer than needed. Here's what you need to know.
Malware is malicious software. It is a term for any type of software with a malicious intent. An example of malware could be ransomware.
The Danish Data Protection Agency has published statistics on GDPR security breaches. Find out what the most common types of breaches are and avoid them.
The Schrems II case makes it impossible for US organisations to use the so-called Privacy Shield framework. This will affect how organisations share data.
The Schrems II ruling have been reason for a lot of concern in a lot of companies. Now new guidelines are here. We'll take you through them.
What'sAppening with WhatsApp? Read why WhatsApp have been fined and what you can learn from it to avoid making the same mistakes.
You need legal basis for posting pictures and videos online. There are different kind of basises such as consent, contracts and legitimate interest.
There are a lot of dangers on the internet. Your employees need to be aware when they browse. Here's what you should do about it .
Email is the biggest reason for security breaches. We attach the wrong files. We send it to the wrong contact. Here's all you should know
Learn what concrete steps you can take to measure the effect of cyber security awareness training in your organisation.
Security breaches can easily occure in video meetings. If you are unaware you might share your screen with personal data on it.
You can use Mobile Device Management to monitor and secure all your mobile devices. Here is how!
Personal data is any information that relates to an indivdual and therefore can be used to identify the person. Read more to learn more.
Not everybody need to have acces to all personal data. Here are 4 recommendations on how to control the acces of personal data.
A DPO (Data Protection Officer) is responsible for making sure that your company handles personal data as it should. But do you need a DPO?
SIEM can be an automated alarm system for your IT systems. Together with IT Log Management it can be an important cyber security tool
CEO Fraud is a method where hackers manipulates you to either send money or download malware. Here's what it is and what you can do about it.
A new ENISA reports recommends small and medium sized business to take cyber security seriously. They point out 3 areas which need awareness. Here they are
What are the 7 GDPR Principles? The 7 principles can help guide you in the right direction to become GDPR compliant.