CIPHER's Cyber Security Blog

Welcome to our Blog!

In the CIPHER cyber security blog, you will find the helpful information security articles, trends in cyber security, and insights on cyber threats and cyber attacks. Our team of security experts, a multidisciplinary group of professionals, are dedicated to addressing security incidents and failures in this blog discussion.
 
If you want more information about one of the posts published here or contact the author, send an email to contact@cipher.com.
 

         
5 Secrets to Finding Your Next Penetration Testing Company

5 Secrets to Finding Your Next Penetration Testing Company

It’s no secret that finding a penetration testing company can be a challenge. You want to make sure they have a solid background and the experience of...

read more
The 7 Types of Pentests You Must Know About

The 7 Types of Pentests You Must Know About

Penetration testers are hired to compromise your security, identify vulnerabilities, and provide you solid recommendations for hardening your security...

read more
Cloud Security Checklist & Secure Migration Tips

Cloud Security Checklist & Secure Migration Tips

If your plans in 2018 involve migrating to or expanding the use of cloud services and applications, it's important to be aware of the challenges. The...

read more
The Top 25 Reasons Why You Should Pentest

The Top 25 Reasons Why You Should Pentest

Penetration testing or pen testing is an essential aspect of any security program. It involves a team (Red Team) that actively attempts to penetrate...

read more
The Cost of Data Breaches in 2017 & What's Ahead

The Cost of Data Breaches in 2017 & What's Ahead

With the average cost of data breaches rising – including per-record costs of each breach – it's high time most enterprises are going to have to get...

read more
Managing IoT Security and Privacy Challenges

Managing IoT Security and Privacy Challenges

Organizations and individuals now rely on the Internet of Things to power their everyday lives. By 2020, more than 20 billion IoT devices will be in...

read more
25 Tips for Protecting PII and Sensitive Data

25 Tips for Protecting PII and Sensitive Data

We’re inundated  with requests for our personally identifable information (PII) and even sensitive data yet we sometimes don’t put in the right...

read more
The Key Factors & Best Practices of Data Backups in the Age of Cybercrime

The Key Factors & Best Practices of Data Backups in the Age of Cybercrime

Organizational data can be as (or more) valuable than the equity within the firm. However, despite the risks of data loss, surveys show that most...

read more
Why Managed Security Services Aligns Perfectly with Security Frameworks

Why Managed Security Services Aligns Perfectly with Security Frameworks

Leveraging a well-known cybersecurity framework is typically best practice to creating your overall security strategy. Countless security professionals...

read more