Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

PCI Compliance and Coronavirus (COVID-19)

PCI Compliance and Coronavirus (COVID-19)

PCI Compliance and Coronavirus (COVID-19) Author: Clive Boonzaaier CISM, Director of GRC & Data Protection Officer, UK Payment Card Industry Data Security Standard (PCI DSS) compliance may not seem high on many people's radar in these challenging times due to...

Cipher Named a Top MSP

Cipher Named a Top MSP

Cipher Named a Top MSP Cipher was recognized as a Top MSP for the 3rd year in a row by CRN, a brand of The Channel Company. The list that Cipher is featured on is the Security 100. This annual list recognizes North American solution providers with cutting-edge...

Webinar Recap: Cybersecurity Considerations and Coronavirus

Webinar Recap: Cybersecurity Considerations and Coronavirus

Webinar Recap: Cybersecurity Considerations and Coronavirus We held a webinar on cybersecurity items companies should consider as a result of the impact of coronavirus on businesses and employees. During the webinar, we covered phishing, supply chain disruptions, the...

Apache Tomcat Web Server Vulnerability

Apache Tomcat Web Server Vulnerability

Apache Tomcat Web Server Vulnerability Author: Gabriel Barbosa, Cipher Red Team Services A security flaw recently identified in the Apache Tomcat software allows anyone to access sensitive system information even without authentication. Apache Tomcat is a widely used...

Cybersecurity Considerations in Response to Coronavirus (COVID-19)

Cybersecurity Considerations in Response to Coronavirus (COVID-19)

Cybersecurity Considerations in Response to Coronavirus What executives need to know as the world reacts to an emerging health risk. As the world reacts to the rapidly evolving Coronavirus situation, many company executives are faced with important decisions to...

Do Not Fall for Coronavirus-Related Phishing

Do Not Fall for Coronavirus-Related Phishing

Do Not Fall for Coronavirus Phishing Phishing works by playing into the fears or hopes of people. These emotions push people to click an unknown link or share information they should keep secret. Phishing emails cover a range of themes, from impersonating the IRS to...

3 Ways Bots Contribute to Fraud in Finance

3 Ways Bots Contribute to Fraud in Finance

3 Ways Bots Contribute to Fraud in Finance Internet traffic consists of much more than humans surfing around. A study found that 38% of Internet traffic came from bots in 2018. Of that 38%, 20% had malicious purposes while the remainder was for benign purposes....

Support Ends for Windows 7: What Now?

Support Ends for Windows 7: What Now?

Support Ends for Windows 7: What Now? Guest Blog by Alexandre Armellini - Consultant at Cipher Microsoft has ended support for the Windows 7 platform as of January 14, 2020.   History On October 22, 2009, Windows 7 was launched and went on to become part of the...

ROI of Your Cybersecurity Investment

ROI of Your Cybersecurity Investment

ROI of Your Cybersecurity Investment Cybersecurity done right is the absence of events. Measuring the return of the investment in cybersecurity is an inverse of the negative impact of an event versus the resources to prevent it. What is the return on investment for...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.