Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.
At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.
Penetration testing for businesses
Jan 25, 2023
Just like playing Monopoly can teach you about investing without risking your own money ─ penetration testing simulates a cyber attack on your business’ IT infrastructure to help you avoid or better prepare for real cyber threats.
The data TikTok is really collecting & what it’s doing with your information
Jan 19, 2023
Unless you’ve been living under a rock, chances are you’ve used or at least heard of TikTok ─ the video-sharing app with billions (yes, billions) of users worldwide. Most people use TikTok to find, share and create viral content, but users of the platform should be aware of its data practices and links to China. Here’s what you need to know about TikTok’s data harvesting, and how to keep your information safe.
Why password managers aren’t as secure as you think
Jan 12, 2023
Password managers are often touted as the best solution to help you generate strong, unique passwords as well as to manage and store all your login details. They even log you into your accounts and websites automatically. But the latest data breach impacting password manager juggernaut LastPass suggests there is still a lot to be desired in terms of data protection.
Vulnerability assessments for businesses
Jan 05, 2023
Identifying potential loopholes and repairing weaknesses in your business’ IT environment is easier than dealing with the consequences of those weaknesses, such as a data breach or full-blown cyber attack like a denial-of-service (DoS) attack. That’s why conducting regular vulnerability assessments is important. This can help your organisation assess hardware and software assets, identify vulnerabilities, and put in place plans to mitigate/eliminate those cyber risks to prevent hackers from c...
Why your business needs Zero Trust security
Dec 29, 2022
In an ideal world, anyone trying to access your business network would be unimpeachable ─ the reality, however, is that you never know when and how hackers might be targeting your sensitive data and information. That’s where Zero Trust security comes in.
How to avoid & deal with a ransomware attack
Dec 22, 2022
If the fallout of the cyber attacks on Optus and Medibank has taught us anything, it’s that many companies (big and small) aren’t adequately prepared to deal with ransomware attacks. The failure of Australia’s second-largest telco and the country’s largest private health insurer to mitigate the risk and impact of those ransomware attacks should be a wake-up call for all enterprises to bolster their cyber intelligence and avoid the same fate.
Application control for businesses
Dec 15, 2022
Application control is one of the most important mitigation strategies in ensuring the security of your business systems from malware and other cyber attacks. Application control can not only prevent the execution and spread of malicious code, but it can also prevent the modification of sensitive files without permission, and the installation or use of unapproved applications.
12 Christmas scams & how to avoid them
Dec 08, 2022
‘Tis the season to be jolly, but keep in mind the festive season is also fraught with many dangers ─ we’re talking about Christmas scams. Scammers are especially active during this time of year, either promoting dodgy deals online or preying on people’s goodwill during the season of giving. To help keep your Christmas merry, we’ve rounded up 12 Christmas scams to watch out, and explain how to avoid them.
The basics of cloud security for businesses
Dec 01, 2022
With most businesses now using cloud solutions to streamline their operations, as well as to store and manage sensitive data, including customer data; cloud services have become attractive targets for hackers. Cloud infrastructures that remain misconfigured or without adequate cloud security protocols in place can put your business and data at risk. We explain why and how below.
What Australia’s proposed digital ID scheme really means
Nov 24, 2022
The Australian government is considering using myGov or the myGovID system to centralise digital identity authentication in the wake of cyber breaches impacting some of the country’s biggest companies like Optus and Medibank. However, a national ID scheme is no silver bullet to Australia’s inadequate cyber defences, and instead presents several cyber security risks of its own.