CIPHER Selected as Top 10 Best Performing MSSP

CIPHER is honored to be selected as a Top Managed Security Services Provider (MSSP) by Insights Success Magazine.
Read More

Ways to Protect Your Org from Insider Threats

Data theft and insider threats are a significant problem for organizations of all sizes. Most employees have access to documents and information that they themselves created, ...
Read More

Avoid these Common Security Misconfigurations

Security misconfigurations are still part of OWASP’s Top 10 Security Risk list. This indicates they have been a persistent issue over the years. Security misconfigurations ...
Read More

Tips for Securing Internet-Connected Cameras

Once a digital video camera is connected to the Internet, it immediately gets an IP address and may start sending information about itself. Using this IP-address, any such ...
Read More

The Top Ways Threat Actors Steal Sensitive Data

We all are aware that there’s an almost infinite number of hackers out there whose absolute goal it to steal and misuse any sensitive data they get their hands on by any means,
Read More

5 Essential Data Security Questions for Developers

1. What security features and controls are built into your product? Every software product should include the following aspects:
Read More

All About the Hotspot Honeypots

The Hotspot Honeypot is an illegitimate Wi-Fi access point which can appear as an authorized and secure hotspot. Despite appearances, it is actually set up by black-hat ...
Read More

Top Ways to Mitigate an Insider Threat

Organizations have historically implemented external-facing technologies such as firewalls and proxies to deal with external threats, but with the emerging prominence of ...
Read More