Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Results of Survey on Healthcare Cybersecurity

Results of Survey on Healthcare Cybersecurity

Results of Survey on Healthcare Cybersecurity Cipher has conducted a survey of IT and cybersecurity leaders at different healthcare organizations. We present the results of the survey in the video below.   Video Transcript Greetings my name is Bill Bowman. I'm...

+ Learn more
Cipher Recognized as a Cybersecurity Leader

Cipher Recognized as a Cybersecurity Leader

Cipher Recognized as a Cybersecurity Leader Cipher was recognized as a top cybersecurity by The Channel Company for 2021. The annual list showcases the Top 500 Managed Service Providers (MSPs) in North America. The company says the list features forward-thinking...

+ Learn more
Impact of Illicit Employee Activity at Financial Companies

Impact of Illicit Employee Activity at Financial Companies

Impact of Illicit Employee Activity at Financial Companies Online communities focused on the stock market have brought a new force into the financial world. Professional investors employed by financial companies are dipping their toes into these communities. As a...

+ Learn more
Cybersecurity and Romance Scams

Cybersecurity and Romance Scams

Cybersecurity and Romance Scams Valentine's Day is this weekend. Individuals and their related organizations should be aware of scams that are using romance as a theme to facilitate attacks. Deception under the auspices of romance is a timeless technique for...

+ Learn more
Dangers of Posting Your COVID-19 Vaccine Card

Dangers of Posting Your COVID-19 Vaccine Card

Dangers of Posting Your COVID-19 Vaccine Card The COVID-19 vaccine is being rolled out. The fortunate people that receive it are understandably grateful and happy. In this celebratory spirit, they snap a smiling picture with the evidence of the vaccine in hand. What...

+ Learn more
The Different Players in Social Engineering

The Different Players in Social Engineering

The Different Players in Social Engineering Most people inherently trust others, unless given a reason not to. This element of human nature makes it possible for social engineering to occur. Social engineering occurs when a person uses psychology and persuasion to...

+ Learn more
Three Ways You Can Unknowingly Get Hacked

Three Ways You Can Unknowingly Get Hacked

Three Ways You Can Unknowingly Get Hacked Email, text messaging, and phone calls are common and known vectors for attacks. Nowadays, humans engage with each other through countless channels. In certain situations, people might drop their guard and do activities that...

+ Learn more
A Vishing Scam Explored

A Vishing Scam Explored

A Vishing Scam Explored Author: Bill Bowman is Director of Marketing, North America at Cipher Phishing is the term for fooling someone into giving sensitive information or credentials via email. This blog, and many others, have written on the topic extensively. Scams...

+ Learn more

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.