Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.
At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.
Mobile device security guide
Apr 12, 2023
Mobile devices have a much bigger attack surface than desktops, making them a more significant threat to corporate security. That’s because smartphones, laptops, and tablets are a treasure trove of information. We also use them for personal purposes like doing our online banking, shopping, and sharing personal photos – making them an attractive target to cyber criminals and a double whammy for users. That’s why it’s important to properly secure them.
Could the UK’s Online Safety Bill spell the end of privacy?
Apr 06, 2023
The United Kingdom’s Online Safety Bill has some genuinely good intentions to better protect children and others online, but as it stands, it also threatens basic privacy and introduces the prospect of ever-creeping censorship and blanket surveillance.
How to check your business email security
Mar 29, 2023
More than 300 billion emails are sent and received daily worldwide – it’s no wonder email accounts are a common target for hackers. Business email compromise attacks can be severe and lead to huge data losses, and reputational damage. Here’s how to protect your email security.
What is a spoofing attack?
Mar 22, 2023
Believe it or not, you may already have been a victim of spoofing. For example, have you ever received an email or text message purporting to be from your bank or telco provider, asking you to confirm your credentials by clicking on a link? Just like that, you’ve been spoofed.
Everything you need to know about ChatGPT & Open AI
Mar 16, 2023
Unless you’ve been living under a rock, chances are you’ve heard of ChatGPT – the powerful new artificial intelligence (AI) chatbot from OpenAI. It’s taking the internet by storm with its eerily human ways, and knack for bad poems and terrible jokes, but how does it work? And more importantly, can we rely on it? Here’s everything you need to know.
Government to reform Australia’s shaky metadata retention laws
Mar 08, 2023
The Government will finally overhaul Australia's murky metadata retention laws which allowed stated-based agencies like local councils, Australia Post, and even the RSPCA to access the telecommunications data of everyday people.
Network security for businesses
Mar 01, 2023
Whether it’s implementing Zero Trust security, penetration testing, access controls, or regularly conducting vulnerability assessments ─ one thing is for sure, businesses big or small ─ should use every tool in their cyber arsenal to protect their network and data.
What’s a SQL injection?
Feb 22, 2023
In our modern world, cyber threats and hacking techniques are aplenty and always evolving, especially ones that can exploit data applications, such as SQL injection attacks.
Business attack surfaces & cyber risks
Feb 15, 2023
Reducing your business’ attack surface is a basic, but critical cyber security measure. While many small and medium-sized businesses (SMBs) may think they’re too small to be attractive targets to hackers, the reality is quite the opposite as smaller organisations tend to have overall weaker cyber security aka a larger attack surface. This makes them more susceptible to data breaches and more attractive to cyber criminals.
5 common cyber threats to small businesses
Feb 09, 2023
In the eyes of cyber hackers, bigger fish aren’t always the best. Small and medium-sized businesses (SMBs) often prove to be the golden goose due to their lack of resources and expertise to fight cyber threats, compared to large enterprises. Small businesses tend to have less robust technological defences, less awareness of threats and less time and money to dedicate to cyber security ─ making them easier targets for hackers.