Syndicated Blog

Cipher Cyber Security Blog
In the CIPHER cyber security blog, you will find helpful information security articles, trends in cybersecurity, and info on cyber threats and cyber attacks.

Use these Critical Security Controls for a Better Security Posture

|
As we near the end of 2018, technology professionals and businesses alike are looking back on the last 12 months and evaluating highs and lows. For businesses, this can be an essential ...
The Key Components to an Information Security Policy

The Key Components to an Information Security Policy

|
Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide by the prescriptions ...

Consider These Factors When Calculating the Cost of a Data Breach

|
Data breaches are one of the most common types of security incidents. It is quite possible, although it may be hard to prove, that every company around the globe was at some ...

Ways to Reduce the Exorbitant Costs of a Data Breach

|
Reducing the cost of data breaches is a vital consideration for any good security strategy. In fact, when a breach occurs, many factors can influence its cost, either increasing or decreasing the ...
Ten Ways Your Healthcare Org May Be Violating HIPAA

Ten Ways Your Healthcare Org May Be Violating HIPAA

|
HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient health information. It has implemented national requirements ...

The Pros and Cons to Outsourcing Incident Response

|
Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results if an incident occurs. Many ...

Stretching Your Security Budget Dollars

|
An excessive security budget isn’t the only way to build strong security ...

Training Ideas for Machine Learning in Security

| | Machine Learning security
If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, security systems included. Thus, it appears ...
CIPHER Security Named to 2018 MSSP Alert Top 100 Managed Security Services Providers List

CIPHER Security Named to 2018 MSSP Alert Top 100 Managed Security Services Providers List

| | awards
Second Annual List Honors Leading MSSPs and Cyber Security Companies that Safeguard Customers’ Digital Assets MSSP Alert, published by After Nines Inc, has named CIPHER Security to the Top 100 MSSPs list ...

Placing More Importance on Data Security

|
The amount of data companies use and store has become so large and cumbersome that it is more difficult to correlate and control. Organizations are too often careless in their behavior surrounding ...
Loading...