Blog

Server Hardening

Server Hardening

Server Hardening Digital systems have vulnerabilities. The many ways a server or application can be configured could result in an equal number of possible attack vectors. Hardening them makes them tougher to...

PCI Compliance and Coronavirus (COVID-19)

PCI Compliance and Coronavirus (COVID-19)

PCI Compliance and Coronavirus (COVID-19) Author: Clive Boonzaaier CISM, Director of GRC & Data Protection Officer, UK Payment Card Industry Data Security Standard (PCI DSS) compliance may not seem high on...

Cipher Named a Top MSP

Cipher Named a Top MSP

Cipher Named a Top MSP Cipher was recognized as a Top MSP for the 3rd year in a row by CRN, a brand of The Channel Company. The list that Cipher is featured on is the Security 100. This annual list recognizes...

Apache Tomcat Web Server Vulnerability

Apache Tomcat Web Server Vulnerability

Apache Tomcat Web Server Vulnerability Author: Gabriel Barbosa, Cipher Red Team Services A security flaw recently identified in the Apache Tomcat software allows anyone to access sensitive system information...

Do Not Fall for Coronavirus-Related  Phishing

Do Not Fall for Coronavirus-Related Phishing

Do Not Fall for Coronavirus Phishing Phishing works by playing into the fears or hopes of people. These emotions push people to click an unknown link or share information they should keep secret. Phishing...

3 Ways Bots Contribute to Fraud in Finance

3 Ways Bots Contribute to Fraud in Finance

3 Ways Bots Contribute to Fraud in Finance Internet traffic consists of much more than humans surfing around. A study found that 38% of Internet traffic came from bots in 2018. Of that 38%, 20% had malicious...

Support Ends for Windows 7: What Now?

Support Ends for Windows 7: What Now?

Support Ends for Windows 7: What Now? Guest Blog by Alexandre Armellini - Consultant at Cipher Microsoft has ended support for the Windows 7 platform as of January 14, 2020.   History On October 22, 2009,...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.


Social Media

LinkedIn

LinkedIn


Social Media

Twitter

Hackers are registering domain names associated with "Zoom" in order to facilitate phishing campaigns. The criminals send a link to join a meeting that leads to... malware. #cybersecurity https://bit.ly/3bCZTUg


Social Media

Facebook


Insights

Whitepaper

Dig into the details of cybersecurity and regulations by reading our exclusive white papers. Each paper is written by an expert at Cipher and full of insight and advice.

 Learn more