Insights > Resources

INSIGHTS > 

> Resources
Whitepapers

MDR 101

No doubt you have heard the term MDR (Managed Detection and Response), but what exactly is it? Cipher’s team of cybersecurity experts have compiled everything you need to know about MDR solutions in 20 informative pages.
> Learn More

6 Reasons to Adopt MSS

We present some reasons why a company should adopt a managed security services model.
> Learn More

Measuring SMB Information Security Maturity

Do you know the maturity of your security operations? This whitepaper provides a detailed overview of how to measure information security maturity.
> Learn More

Build vs Buy: Your Security Operations Center

This whitepaper provides a detailed breakdown of costs and other factors in building versus buying your SOC as a service.
> Learn More

PCI DSS Compliance Guide

In this whitepaper, CIPHER will help you understand the current 12 PCI requirements. You will also learn how to achieve compliance with best practices from our certified Qualifed Security Assessors (QSAs).
> Learn More

Guide to Pentest and Ethical Hacking

In this detailed whitepaper, CIPHER will help you understand all aspects of pentesting and ethical hacking. You will learn about the key phases and types of pentests.
> Learn More

Ransomware: An Overview & How To Protect Your Business

Ransomware is gaining attention around the world for its costly impact to businesses. In this whitepaper, CIPHER explains the various types of ransomware and steps you can take to protect your business.
> Learn More

Everything You Need to Know About Phishing

Cyber criminals continue to succeed in using phishing schemes and attacks on businesses and individuals. This whitepaper explores the various types of phishing schemes and strategies to mitigate those schemes.
> Learn More

The ROI of a Balanced Cyber Security Strategy

In this whitepaper, CIPHER security consulting experts review how a balanced cyber security strategy provides a solid return on security investment.
> Learn More

Risks of Oversharing on Social Media

In this whitepaper, we look at what the risks of oversharing on social media are. LinkedIn Stories are the primary focus of analysis.
> Learn More

Essential Guide to the GDPR

We dive into the core areas of discussion for GDPR, how it relates to your cyber security strategy, and how you can prepare for its arrival in 2018.
> Learn More

Introduction to Server Hardening

In this document, we explain the concept of Hardening and provide examples of policies and implementation
> Learn More
Ebooks

Comprehensive Guide to Cyber Security for Healthcare

In this eBook, CIPHER describes the riskiest threats to healthcare institutions, steps to prevent a data breach within a bank, planning for when a breach does occur, and the regulatory and compliance efforts healthcare organizations should cover in their cyber security strategy.
> Learn More

Comprehensive Guide to Cyber Security for Banking

In this eBook, CIPHER describes the riskiest threats to financial institutions, steps to prevent a data breach within a bank, planning for when a breach does occur, and the regulatory and compliance efforts banks should cover in their cyber security strategy.
> Learn More

Comprehensive Guide to Cyber Security for Law Firms

In this eBook, CIPHER describes the riskiest threats to law firms, steps to prevent a law firm data breach, planning for when a breach does occur, and the regulatory and compliance efforts law firms should cover in their cyber security strategy.
> Learn More

Enterprise Data Protection and Privacy

In this eBook, CIPHER’s delivers over 20+ pages of helpful data privacy and protection best practices and tips. The guide has been developed by our team of global security and privacy experts.
> Learn More

Essential Business Cyber Security Tips

In this eBook, CIPHER’s delivers over 30 pages of helpful cyber security best practices and tips. The guide has been developed by our team of global security experts.
> Learn More

Future Proof Your Ransomware Defenses

In this eBook, CIPHER’s strategic partner Carbon Black offers an enterprise guide to strengthening your endpoints against ransomware attacks.
> Learn More
Streaming Video Sessions

Cyber Intelligence

Topics covered include how to stop attacks before they happen with threat hunting and why companies should monitor their brand’s digital footprint for fraud.
> Watch Now

Top Cybersecurity Skills in Demand

During this live stream, we covered the skills that are most in-demand in the field of cybersecurity.
> Watch Now

MSS vs. MDR Cybersecurity

Determining whether to use and Managed Detection & Response (MDR) or Managed Security Service (MSS) vendor depends on a number of factors. In this stream, we go over the differences.
> Watch Now

Cybersecurity Challenges for the Internet of Things (IoT)

In this streaming session, we looked at how overlooking security of IoT devices can lead to them being compromised.
> Watch Now

Cyber Risk Management

We are covered hot topics related to GDPR, PCI DSS, NIST CSF, ISO 27001 and more. Every company is different, so their processes and risk tolerance should be suited to their unique situations. Tune in to get tips on what your company should do to manage risk, follow the law and stay compliant.
> Watch Now

COVID-19 Dark Web Investigation

A first-hand investigation into what COVID-19 related scams are appearing on the Dark Web takes place in this episode.
> Watch Now
Checklists

Information Security Best Practices

In this FREE checklist document, CIPHER packs 15 essential cyber security best practices and tips from our team of global security consulting experts.
> Learn More

Information Security Maturity

In these FREE checklists, CIPHER helps CISOs and Security Directors ask the right questions when measuring the maturity of their security operations.
> Learn More
Self-Assessment Tool

Information Security Maturity

In this Self-Assessment Survey, CIPHER helps CISOs and Security Directors gauge the level of maturity in their security operations across 5 core domains (Govern, Identify, Protect, Detect, and Respond).
> Learn More

PCI DSS Maturity

In this Self-Assessment Survey, CIPHER helps CISOs and Security Directors gauge the level of PCI DSS maturity in their security operations across 5 core domains (Govern, Identify, Protect, Detect, and Respond).
> Learn More

HIPAA Maturity

In this Self-Assessment Survey, CIPHER helps CISOs and Security Directors gauge the level of HIPAA maturity in their security operations across 5 core domains (Govern, Identify, Protect, Detect, and Respond).
> Learn More

GLBA & FFIEC Maturity

In this Self-Assessment Survey, CIPHER helps CISOs and Security Directors gauge the level of GLBA & FFIEC maturity in their security operations across 5 core domains (Govern, Identify, Protect, Detect, and Respond).
> Learn More

NIST Maturity

In this Self-Assessment Survey, CIPHER helps CISOs and Security Directors gauge the level of their NIST maturity in their security operations across 5 core domains (Govern, Identify, Protect, Detect, and Respond).
> Learn More
Webinar

Flexible Cybersecurity for Uncertain Times

During our webinar, looked at how companies can maintain a flexible yet secure cyber posture.
> Watch Now

Protect Your Remote Workers’ Endpoints

Protect your workers’ devices using EDR software combined with MSS monitoring. The webinar was held in conjunction with FireEye. It includes helpful tips and a live demonstration.
> Watch Now

Cybersecurity Considerations and Coronavirus

We held a webinar on cybersecurity items companies should consider as a result of the impact of coronavirus on businesses and employees.
> Watch Now

Cybersecurity for Credit Unions

During our webinar, we looked at the key items credit unions should pay attention to with regards to cybersecurity.
> Watch Now

Managed Security Services Overview

In this webinar, CIPHER shares their insight on how a Managed Security Services Provider (MSSP) can minimize costs, maximize efficiencies, offer in-depth intelligence, and manage your compliance.
> Learn More

Enable Cloud Cybersecurity

More and more devices and tools are relying on Cloud technology to work. During our webinar, we went into the cybersecurity and tips for mitigating them. Learn how to prevent password spraying attacks and other malicious techniques.
> Watch Now

Top Cybersecurity Challenges of 2020

During the webinar, Global Chief Security Officer Scott Croskey first covered the top trends and challenges for 2020. Then he explained how Cipher can help companies confront them.
> Watch Now

Security Consulting Services Overview

In this webinar, CIPHER shares their insight on how a Security Consulting Services can eliminate vulnerabilities, optimize resources, offer extended expertise, and manage your compliance.
> Learn More

Life Before & After Managed Security Services

In this webinar, CIPHER will explore the current security landscape, the importance of having a security operations center, the efforts required to build and staff a SOC, the MSSP model and its benefits compared to running your own SOC.
> Learn More

Addressing Ongoing GDPR Requirements After May 25

In this webinar, CIPHER security experts will demonstrate how the GDPR requires a thorough approach to monitoring, detection, and alerting to support ongoing compliance.
> Watch Now

Opportunities in SIEM Analytics

In this webinar, CIPHER will explore how SIEM can improve your MTTD and MTTR as well as improve your overall security posture.
> Learn More

Strategies for Information Security Maturity

In this webinar, industry security experts share their strategies for building mature security operations in an environment where threats and vulnerabilities are growing daily.
> Learn More
Infographics

MSSP vs. MSP

> Learn More

Preparing for the EU GDPR

> Learn More

The Cost of Data Breaches

> Learn More

No-Tech Hacking

> Learn More

Top Reasons to Choose CIPHER

> Learn More

10 Personal Cyber Security Tips

> Learn More