The Top 5 Insider Threat Behaviors You Need to Monitor

Have you overlooked insider threats in your organization? It’s probably time to take a hard look at this area. Believe it or not, insider threats often pose a greater threat to ...
Read More

5 data protection policies your employees must know in the post-GDPR era

Here are the policies that businesses must have in place to remain GDPR compliant, and meet best practices for data privacy. The EU's General Data Protection Regulation (GDPR) ...
Read More

Tackling the Cyber Kill Chain with Managed Security Services

Historically, IT organizations focus on prevention within information security. However, this focus puts the organization at risk with today’s rapidly evolving threat ...
Read More

CIPHER Ranked as #1 Pure Play MSSP by Channel Futures

CIPHER ranks as the top pure play managed security service provider (MSSP) among the world’s 501 most strategic and innovative managed service providers (MSPs), according to ...
Read More

The Biggest Mistakes to Avoid with Incident Response

Incident response is a critical component to containing and remediating security incidents and events. It can also be an incredibly detailed and difficult process to manage ...
Read More

5 Helpful Incident Response Checklists

Once you have a good understanding of the phases of incident response, it’s time to start developing and implementing incident response checklists that are customized for your ...
Read More

3 Reasons Why You Need an Incident Response Plan

When reputation, revenue, and customer trust is at stake, it’s critical that an organization can identify and respond to security incidents and events. Whether a breach is ...
Read More

The Core Phases of Incident Response & Remediation

Planning and preparing for unexpected security incidents is perhaps one of the most difficult challenges for security practitioners. With a robust incident response (IR) plan, ...
Read More