Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.
At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.
What Australia’s proposed digital ID scheme really means
Nov 24, 2022
The Australian government is considering using myGov or the myGovID system to centralise digital identity authentication in the wake of cyber breaches impacting some of the country’s biggest companies like Optus and Medibank. However, a national ID scheme is no silver bullet to Australia’s inadequate cyber defences, and instead presents several cyber security risks of its own.
Are you at risk of identity theft?
Nov 17, 2022
Your data is not safe anywhere ─ that’s the lesson from the spate of cyber breaches impacting Australia’s biggest companies like Optus, Medibank, Australian Clinical Labs, and EnergyAustralia (so far).
Does your business have adequate endpoint security?
Nov 10, 2022
Cloud hosting, software-as-a-service (SaaS), and remote working have become the norm, with more servers and devices (endpoints) connecting to business networks than ever before. This gives hackers more access routes to launch an attack on your enterprise.
What’s a denial-of-service (DoS) attack?
Nov 03, 2022
Of all cyber attacks that occur, none are more difficult to mitigate than denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks. These attacks can bring down even the largest websites (including Google) by overloading servers with traffic requests and sending networks crashing down.
Public Wi-Fi security tips + how to stay safe
Oct 26, 2022
The convenience of free public Wi-Fi is hard to resist but can cost you if you’re not careful. The dangers of using open wireless networks are twofold. Firstly, your connection is not secure (and can therefore be easily compromised) and secondly, your data is often unencrypted – leaving you open to hacking and identity theft.
Are tracking devices a security risk?
Oct 20, 2022
GPS-enabled devices whether that’s apps on our phones, in-car navigation systems, fitness trackers, or shiny new gadgets like Apple’s AirTag were created to make our lives easier, but also pose a security risk for users. We cover everything below.
Optus hacking − Is your telco provider safe?
Oct 13, 2022
The recent Optus data breach debacle has put the personal information of millions of Australians at risk. Although the data spill was the direct result of a sophisticated cyber attack that culminated in a hefty ransomware demand, the breach raises the question of how to best protect people's personal and customer data.
Common online scams to avoid (your little black book)
Oct 06, 2022
Everyone can be duped online, no matter how tech-savvy or shrewd we think ourselves. That’s because online scams are the most opportunistic and deceptive of all frauds – you rarely see one coming until it’s too late. Online scammers often use sophisticated social engineering techniques to trick unsuspecting victims into handing over information or money (or often both).
How to prevent data breaches in your business
Sep 29, 2022
The average cost of a data breach in Australia is $2.92 million per breach, according to the IBM Cost of a Data Breach Report (2022). Data breaches are costly to recover from financially and not to mention reputationally. That’s why it’s critical for businesses big and small to have a data breach prevention plan in place.
Running phishing tests for businesses – best practices & tips
Sep 22, 2022
Nearly one-third of all cyber security breaches involve phishing or human error (or both) and it’s not hard to see why − businesses send and receive millions of emails each year, making phishing attacks hard to catch among a sea of electronic messages. Many employees don't even know what phishing is or how deceptive a seemingly innocent email can be.