Blogs & Media

Xiph Cyber brings you the latest industry news and views.

Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.

At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.

Browse categories: Case Studies , Security

Could the UK’s Online Safety Bill spell the end of privacy?

Apr 06, 2023

The United Kingdom’s Online Safety Bill has some genuinely good intentions to better protect children and others online, but as it stands, it also threatens basic privacy and introduces the prospect of ever-creeping censorship and blanket surveillance.

How to check your business email security

Mar 29, 2023

More than 300 billion emails are sent and received daily worldwide – it’s no wonder email accounts are a common target for hackers. Business email compromise attacks can be severe and lead to huge data losses, and reputational damage. Here’s how to protect your email security.

What is a spoofing attack?

Mar 22, 2023

Believe it or not, you may already have been a victim of spoofing. For example, have you ever received an email or text message purporting to be from your bank or telco provider, asking you to confirm your credentials by clicking on a link? Just like that, you’ve been spoofed.

Everything you need to know about ChatGPT & Open AI

Mar 16, 2023

Unless you’ve been living under a rock, chances are you’ve heard of ChatGPT – the powerful new artificial intelligence (AI) chatbot from OpenAI. It’s taking the internet by storm with its eerily human ways, and knack for bad poems and terrible jokes, but how does it work? And more importantly, can we rely on it? Here’s everything you need to know.

Government to reform Australia’s shaky metadata retention laws

Mar 08, 2023

The Government will finally overhaul Australia's murky metadata retention laws which allowed stated-based agencies like local councils, Australia Post, and even the RSPCA to access the telecommunications data of everyday people.

Network security for businesses

Mar 01, 2023

Whether it’s implementing Zero Trust security, penetration testing, access controls, or regularly conducting vulnerability assessments ─ one thing is for sure, businesses big or small ─ should use every tool in their cyber arsenal to protect their network and data.

What’s a SQL injection?

Feb 22, 2023

In our modern world, cyber threats and hacking techniques are aplenty and always evolving, especially ones that can exploit data applications, such as SQL injection attacks.

Business attack surfaces & cyber risks

Feb 15, 2023

Reducing your business’ attack surface is a basic, but critical cyber security measure. While many small and medium-sized businesses (SMBs) may think they’re too small to be attractive targets to hackers, the reality is quite the opposite as smaller organisations tend to have overall weaker cyber security aka a larger attack surface. This makes them more susceptible to data breaches and more attractive to cyber criminals.

5 common cyber threats to small businesses

Feb 09, 2023

In the eyes of cyber hackers, bigger fish aren’t always the best. Small and medium-sized businesses (SMBs) often prove to be the golden goose due to their lack of resources and expertise to fight cyber threats, compared to large enterprises. Small businesses tend to have less robust technological defences, less awareness of threats and less time and money to dedicate to cyber security ─ making them easier targets for hackers.

How secure is single sign-on (SSO) for businesses?

Feb 02, 2023

Single sign-on (SSO) makes it easy for your employees to access all their applications with only one username and password instead of dozens – but how secure is it?