Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Shadow IT Systems

Shadow IT Systems

Shadow IT Systems The processes that govern IT systems are in place for a number of important reasons. First, they ensure that time and money are allocated. Having duplicate systems to handle the same thing is a waste. Second, they keep systems safe. IT verifies that...

Credit Card Scams and Pop Culture

Credit Card Scams and Pop Culture

Credit Card Scam and Pop Culture: Insights into the Perpetrators Stopping credit card fraud is the mission for countless people and companies. Fraud results in billions lost each year. The funds are lost mostly by the credit card company, banks and merchants that are...

Make Cybersecurity Your Employees’ New Year’s Resolution

Make Cybersecurity Your Employees’ New Year’s Resolution

Make Cybersecurity Your Employees’ New Year’s Resolution Has your organization taken the necessary steps to improve its cybersecurity posture for the New Year? Here are 6 strategies you can deploy throughout your company to strengthen its security for the rest of the...

How the U.N. is Fighting Back Against Cyber Attacks

How the U.N. is Fighting Back Against Cyber Attacks

How the U.N. is Fighting Back Against Cyber Attacks     It is no surprise that hackers have become increasingly sophisticated in recent years. With more cyber attacks than ever, the United Nations Office of Disarmament Affairs (UNODA) has recognized the need for...

2020’s Top Cybersecurity Challenges

2020’s Top Cybersecurity Challenges

2020's Top Cybersecurity Challenges 2020 is around the corner. The end of the year is a time when pundits and writers assess what happened in the past year and look ahead. This blog and our upcoming webinar on December 18 will provide commentary and context on the big...

GDPR vs. CCPA

GDPR vs. CCPA

GDPR vs. CCPA Data drives the world. Everything from starting your car to brushing your teeth can generate a data point that companies eagerly devour. Personal data in the hands of those concerned only with making money despite the consequences have brought about...

California Consumer Privacy Act

California Consumer Privacy Act

California Consumer Privacy Act The European Union's General Data Protection Regulation (GDPR) has been a lightning rod in the debate over online privacy and data security since it went into effect in May of 2018. Another act aimed at privacy and data security has...

Tips for Organizations to Prepare for a Cybersecurity Breach

Tips for Organizations to Prepare for a Cybersecurity Breach

Tips for Organizations to Prepare for a Cybersecurity Breach The primary purpose of this blog to provide considerations for C-Level Executives as they prepare for the potential of a cybersecurity breach.  It may also be useful for IT Directors and/or Managers....

Ponemon Breach Cost Report

Ponemon Breach Cost Report

Ponemon Breach Cost Report 2019 For the past 14 years, Ponemon Institute has released reports on the costs associated with a breach. This information is incredibly valuable for all security practitioners because it informs budget, areas of focus, and return on...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.