Blog

3 Ways Bots Contribute to Fraud in Finance

3 Ways Bots Contribute to Fraud in Finance

3 Ways Bots Contribute to Fraud in Finance Internet traffic consists of much more than humans surfing around. A study found that 38% of Internet traffic came from bots in 2018. Of that 38%, 20% had malicious...

Support Ends for Windows 7: What Now?

Support Ends for Windows 7: What Now?

Support Ends for Windows 7: What Now? Guest Blog by Alexandre Armellini - Consultant at Cipher Microsoft has ended support for the Windows 7 platform as of January 14, 2020.   History On October 22, 2009,...

ROI of Your Cybersecurity Investment

ROI of Your Cybersecurity Investment

ROI of Your Cybersecurity InvestmentCybersecurity done right is the absence of events. Measuring the return of the investment in cybersecurity is an inverse of the negative impact of an event versus the...

Shadow IT Systems

Shadow IT Systems

Shadow IT Systems The processes that govern IT systems are in place for a number of important reasons. First, they ensure that time and money are allocated. Having duplicate systems to handle the same thing is...

Credit Card Scams and Pop Culture

Credit Card Scams and Pop Culture

Credit Card Scam and Pop Culture: Insights into the Perpetrators Stopping credit card fraud is the mission for countless people and companies. Fraud results in billions lost each year. The funds are lost mostly...

How the U.N. is Fighting Back Against Cyber Attacks

How the U.N. is Fighting Back Against Cyber Attacks

How the U.N. is Fighting Back Against Cyber Attacks     It is no surprise that hackers have become increasingly sophisticated in recent years. With more cyber attacks than ever, the United Nations Office...

2020’s Top Cybersecurity Challenges

2020’s Top Cybersecurity Challenges

2020's Top Cybersecurity Challenges 2020 is around the corner. The end of the year is a time when pundits and writers assess what happened in the past year and look ahead. This blog and our upcoming webinar on...

GDPR vs. CCPA

GDPR vs. CCPA

GDPR vs. CCPA Data drives the world. Everything from starting your car to brushing your teeth can generate a data point that companies eagerly devour. Personal data in the hands of those concerned only with...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.

Are you ready to take your cybersecurity
to the next level?


Social Media

LinkedIn

LinkedIn


Social Media

Twitter

Hackers took advantage of a flaw in PayPal's code to fraudulently make purchases. #cybersecurity https://zd.net/2HWtBa4


Social Media

Facebook


Insights

Whitepaper

Dig into the details of cybersecurity and regulations by reading our exclusive white papers. Each paper is written by an expert at Cipher and full of insight and advice.

 

Learn more

\