Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

6 Questions to Ask About the EU GDPR

6 Questions to Ask About the EU GDPR

6 Questions to Ask About the EU GDPR Businesses and organisations are preparing for the requirements which will soon be imposed through the enactment of the European Union's General Data Protection Regulation (GDPR). In this blog, we share five key questions...

Phishing Schemes Are Nastier Than Ever in 2017

Phishing Schemes Are Nastier Than Ever in 2017

Phishing Schemes Are Nastier Than Ever in 2017 Phishing schemes are a big fraud, and in 2017 the schemes are nastier than ever. It can encompass identity theft in a way, posing as someone or something the sender is not in order to try to trick the recipient into...

5 Effective Ways to Prevent Data Breaches

5 Effective Ways to Prevent Data Breaches

5 Effective Ways to Prevent Data Breaches High-profile data breaches remind us all that data security is a top priority for businesses. If you recently read our security ROI blog, you might have discovered that organizations now face a one in four chance of a data...

Our Experience at the Biggest Cybersecurity Week of 2017

Our Experience at the Biggest Cybersecurity Week of 2017

Our Experience at the Biggest Cybersecurity Week of 2017 The last week of July is special for those enthusiastic about information security as it hosts the biggest events in information security technology, solutions, services, cyber threats, and hacking in the United...

SWIFT Hack

SWIFT Hack

SWIFT Hack You may have seen in the media over the last couple of weeks’ references to hacks and the SWIFT financial network. So for those of you not overly familiar with banking and finance, what is SWIFT and why should it concern you? SWIFT, or to give it its full...

5 High-Value Cyber Security Solutions

5 High-Value Cyber Security Solutions

5 High-Value Cyber Security Solutions Security consulting firms can offer a wealth of knowledge in protecting your business from the latest cybersecurity threats and vulnerabilities. The best security firms provide an array of security consulting services to help...

The Realities of Patch Management Best Practices

The Realities of Patch Management Best Practices

The Realities of Patch Management Best Practices The rise of malware and specifically ransomware attacks are reminding businesses around the world that patching vulnerabilities remains a necessity. However, the culture of patching is bleak when administrators are...

Zero-Day Found in Windows NTLM Security Protocol

Zero-Day Found in Windows NTLM Security Protocol

Zero-Day Found in Windows NTLM Security Protocol Microsoft released an update pack this Tuesday, July 11 to correct a serious privilege escalation breach that affects all Windows versions launched after 2007. The breach compromises the NTLM protocol and allows...

Return on Security Investment: Data Breach Example [Part 2]

Return on Security Investment: Data Breach Example [Part 2]

Return on Security Investment: Data Breach Example [Part 2] In a previous blog post, we showed how Beckstrom’s Law could be applied to measuring a Return On Security Investment (ROSI). Here's a quick recap: Value = Benefit Value – Security Investment – Residual...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.