Blogs & Media

Xiph Cyber brings you the latest industry news and views.

Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.

At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.

Browse categories: Case Studies , Security

The basics of cloud security for businesses

Dec 01, 2022

With most businesses now using cloud solutions to streamline their operations, as well as to store and manage sensitive data, including customer data; cloud services have become attractive targets for hackers. Cloud infrastructures that remain misconfigured or without adequate cloud security protocols in place can put your business and data at risk. We explain why and how below.

What Australia’s proposed digital ID scheme really means

Nov 24, 2022

The Australian government is considering using myGov or the myGovID system to centralise digital identity authentication in the wake of cyber breaches impacting some of the country’s biggest companies like Optus and Medibank. However, a national ID scheme is no silver bullet to Australia’s inadequate cyber defences, and instead presents several cyber security risks of its own.

Are you at risk of identity theft?

Nov 17, 2022

Your data is not safe anywhere ─ that’s the lesson from the spate of cyber breaches impacting Australia’s biggest companies like Optus, Medibank, Australian Clinical Labs, and EnergyAustralia (so far).

Does your business have adequate endpoint security?

Nov 10, 2022

Cloud hosting, software-as-a-service (SaaS), and remote working have become the norm, with more servers and devices (endpoints) connecting to business networks than ever before. This gives hackers more access routes to launch an attack on your enterprise.

What’s a denial-of-service (DoS) attack?

Nov 03, 2022

Of all cyber attacks that occur, none are more difficult to mitigate than denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks. These attacks can bring down even the largest websites (including Google) by overloading servers with traffic requests and sending networks crashing down.

Public Wi-Fi security tips + how to stay safe

Oct 26, 2022

The convenience of free public Wi-Fi is hard to resist but can cost you if you’re not careful. The dangers of using open wireless networks are twofold. Firstly, your connection is not secure (and can therefore be easily compromised) and secondly, your data is often unencrypted – leaving you open to hacking and identity theft.

Are tracking devices a security risk?

Oct 20, 2022

GPS-enabled devices whether that’s apps on our phones, in-car navigation systems, fitness trackers, or shiny new gadgets like Apple’s AirTag were created to make our lives easier, but also pose a security risk for users. We cover everything below.

Optus hacking − Is your telco provider safe?

Oct 13, 2022

The recent Optus data breach debacle has put the personal information of millions of Australians at risk. Although the data spill was the direct result of a sophisticated cyber attack that culminated in a hefty ransomware demand, the breach raises the question of how to best protect people's personal and customer data.

Common online scams to avoid (your little black book)

Oct 06, 2022

Everyone can be duped online, no matter how tech-savvy or shrewd we think ourselves. That’s because online scams are the most opportunistic and deceptive of all frauds – you rarely see one coming until it’s too late. Online scammers often use sophisticated social engineering techniques to trick unsuspecting victims into handing over information or money (or often both).

How to prevent data breaches in your business

Sep 29, 2022

The average cost of a data breach in Australia is $2.92 million per breach, according to the IBM Cost of a Data Breach Report (2022). Data breaches are costly to recover from financially and not to mention reputationally. That’s why it’s critical for businesses big and small to have a data breach prevention plan in place.

Free resources

When you need more information on industry changes and developments, click on our Free Resources