Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.
At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.
How social media is tracking you & collecting your data
Jul 09, 2022
Ever wondered exactly how Facebook gives you suggestions for products you like and people you may know? If you have a Facebook account—and even if you don't—the platform collects tons of data about you. The same goes for Instagram, Twitter, Google, and pretty much all other platforms and networks you interact with. We explain how and why below.
SSD vs HDD: Which is better?
Jul 05, 2022
When choosing the right type of storage for your computer, it’s important to not only consider capacity and cost, but also performance, power usage, and reliability. The choice will often be between a solid-state drive (SSD) or a hard disk drive (HDD) as the two main storage solutions for laptops and computers. Here’s a quick guide comparing both storage drives.
Is the Metaverse safe?
Jun 28, 2022
Ever since Facebook rebranded itself as Meta and Mark Zuckerberg presented the idea of the ‘Metaverse’ as the ‘successor to mobile internet’, it has suddenly become a major trending topic. So, what exactly is it? What opportunities does it represent for businesses and what are the main cyber security concerns?
Is crypto dead?
Jun 23, 2022
The recent crypto crash has seen the value of most major cryptocurrencies plunge to an 18-month low, with the combined market value of all cryptocurrencies now reportedly less than $US1 trillion ($1.43 trillion). The increasing day-to-day volatility of digital currencies, rising inflation globally, and recent stock market fluctuations have led to speculations we could be heading for our longest crypto winter to date. So, is crypto dead or just bearing down for a comeback?
What is encryption & how does it protect your data?
Jun 17, 2022
Everyone uses encryption technology on a daily basis, whether that’s when surfing the interning, storing data in the cloud, or working for a business that processes tons of private data. While most of us probably don't understand the ‘how’ or ‘why’ − encryption is vital to keeping sensitive information private and out of the hands of unscrupulous actors. This guide explains what encryption is and how it works.
HTTP vs HTTPS: Which is more secure?
Jun 10, 2022
The world of website security abounds with obscure acronyms, and none are more misunderstood than internet protocols like HTTP and HTTPS. While both allow communications between web browsers and web servers, it’s important to understand the basics of how they work and what their differences are.
What is cloud storage & is it safe?
Jun 03, 2022
Chances are you’ve used ‘the cloud’ before – when you’ve been on Instagram, YouTube, or even Gmail − (yes, they all use cloud computing). Although the majority of internet users and businesses use storage space on the internet, cloud storage and how it works is still a mystery for many. Fret not, we cover all the fast facts in this guide.s and photos in the cloud, while businesses use cloud storage for data backup, disaster recovery, archiving, and DevOps projects.
How to stop your phone from listening & tracking you
May 27, 2022
Have you ever been served ads for a product you mentioned in a recent conversation? Like the time you said you’d like to try yoga and were immediately bombarded with pages for yoga mats. Or perhaps you’ve discussed your need for a weekend away and then suddenly got suggestions for hotels and restaurants nearby? Is it a coincidence, or is your phone listening to you? Here’s the lowdown.
Open-source vs proprietary software: Which is better?
May 20, 2022
Whether your business is migrating to a new operating system, design software, or customer relationship management (CRM) platform, you may at some point be faced with choosing between an open-source or proprietary software infrastructure. Both come with benefits and disadvantages for businesses. We cover everything you need to know below.
What is a proxy server? Your complete guide
May 13, 2022
Proxy servers provide a valuable layer of protection to your computers and networks. They act as an intermediary between your servers and the internet to help anonymise your web traffic, control internet usage within your organisation, and increase your internet speed. ‘Proxies’ can be set up as web filters or firewalls (or both), to protect your business and network from cyber threats like malware and ransomware. Here’s everything you need to know about proxy servers.