Blog

5 Ways Cities Can Prevent Ransomware

5 Ways Cities Can Prevent Ransomware

5 Ways Cities Can Prevent Ransomware Ransomware has frustrated IT professionals and end-users since the '90s. In recent months, the technique has victimized government organizations. Ransomware is typically...

Which Country is #1 in Cybersecurity?

Which Country is #1 in Cybersecurity?

Which Country is #1 in Cybersecurity? Last week was Independence Day in the United States and Canada Day. These holidays celebrate freedom and independence. Security is a key component of independence. If a...

10 Most Secure Methods of Communication

10 Most Secure Methods of Communication

10 Most Secure Methods of Communication Communicating in a fast and modern way brings with it the possibility of privacy invasion and security concerns. Whether it be a large technology company snooping for...

Biometric Hacking

Biometric Hacking

Biometric Hacking Biometric identification is in the palm of every modern smart phone users' hands. People can unlock their devices with their face, eyes or fingerprints. Businesses have adopted biometric...

How Blockchain Can Be Hacked: The 51% Rule and More

How Blockchain Can Be Hacked: The 51% Rule and More

How Blockchain Can Be Hacked: The 51% Rule and More The infamous criminal Willie Sutton was once asked why he robbed banks, and his response was "because that’s where the money is." Blockchain technology...

How SIM Card Hijacking Works

How SIM Card Hijacking Works

How SIM Card Hijacking Works Last month a hacker who stole $5 million resulting from SIM Hijacking was sentenced to 10 years in jail. In the end, SIM Hijacking or SIM Swapping results in your phone number being...

Top 4 Things to Tell New Hires About Cybersecurity

Top 4 Things to Tell New Hires About Cybersecurity

Top 4 Things to Tell New Hires About Cybersecurity   The start of employment is the time to give new hires a run down on security measures for your company. Ideally, a formal training session should occur...

10 Cybersecurity Metrics You Should Be Monitoring

10 Cybersecurity Metrics You Should Be Monitoring

Effective management of varying performance indices in information security can mean the difference between a practical and efficient project and a complete waste of money. Although managers have been following...

5 Helpful Incident Response Checklists

5 Helpful Incident Response Checklists

5 Helpful Incident Response Checklists Once you have a good understanding of the phases of incident response, it’s time to start developing and implementing incident response checklists that are customized for...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.

Are you ready to take your cybersecurity
to the next level?


Social Media

LinkedIn

LinkedIn


Social Media

Twitter

Why are musicians rapping about committing credit card fraud? Read all about it in our latest blog. http://bit.ly/30kjrIA


Social Media

Facebook


Insights

Whitepaper

Dig into the details of cybersecurity and regulations by reading our exclusive white papers. Each paper is written by an expert at Cipher and full of insight and advice.

 

Learn more

\