Blogs & Media

Xiph Cyber brings you the latest industry news and views.

Every day a new threat is manufactured, and every day an innovative counter to that threat is created. Our industry moves quickly, and those that can't or won't keep up are fast left behind in high-risk territory.

At Xiph Cyber, our commitment to protecting your privacy and the sovereignty of your data means we invest a lot of time and effort in maintaining up-to-the-minute awareness of the shifts in our industry. You'll find the latest news and our own blogs right here.

Browse categories: Case Studies , Security

Is the Metaverse safe?

Jun 28, 2022

Ever since Facebook rebranded itself as Meta and Mark Zuckerberg presented the idea of the ‘Metaverse’ as the ‘successor to mobile internet’, it has suddenly become a major trending topic. So, what exactly is it? What opportunities does it represent for businesses and what are the main cyber security concerns?

Is crypto dead?

Jun 23, 2022

The recent crypto crash has seen the value of most major cryptocurrencies plunge to an 18-month low, with the combined market value of all cryptocurrencies now reportedly less than $US1 trillion ($1.43 trillion). The increasing day-to-day volatility of digital currencies, rising inflation globally, and recent stock market fluctuations have led to speculations we could be heading for our longest crypto winter to date. So, is crypto dead or just bearing down for a comeback? 

What is encryption & how does it protect your data?

Jun 17, 2022

Everyone uses encryption technology on a daily basis, whether that’s when surfing the interning, storing data in the cloud, or working for a business that processes tons of private data. While most of us probably don't understand the ‘how’ or ‘why’ − encryption is vital to keeping sensitive information private and out of the hands of unscrupulous actors. This guide explains what encryption is and how it works.

HTTP vs HTTPS: Which is more secure?

Jun 10, 2022

The world of website security abounds with obscure acronyms, and none are more misunderstood than internet protocols like HTTP and HTTPS. While both allow communications between web browsers and web servers, it’s important to understand the basics of how they work and what their differences are.

What is cloud storage & is it safe?

Jun 03, 2022

Chances are you’ve used ‘the cloud’ before – when you’ve been on Instagram, YouTube, or even Gmail − (yes, they all use cloud computing). Although the majority of internet users and businesses use storage space on the internet, cloud storage and how it works is still a mystery for many. Fret not, we cover all the fast facts in this guide.s and photos in the cloud, while businesses use cloud storage for data backup, disaster recovery, archiving, and DevOps projects.

How to stop your phone from listening & tracking you

May 27, 2022

Have you ever been served ads for a product you mentioned in a recent conversation? Like the time you said you’d like to try yoga and were immediately bombarded with pages for yoga mats. Or perhaps you’ve discussed your need for a weekend away and then suddenly got suggestions for hotels and restaurants nearby? Is it a coincidence, or is your phone listening to you? Here’s the lowdown.

Open-source vs proprietary software: Which is better?

May 20, 2022

Whether your business is migrating to a new operating system, design software, or customer relationship management (CRM) platform, you may at some point be faced with choosing between an open-source or proprietary software infrastructure. Both come with benefits and disadvantages for businesses. We cover everything you need to know below.

What is a proxy server? Your complete guide

May 13, 2022

Proxy servers provide a valuable layer of protection to your computers and networks. They act as an intermediary between your servers and the internet to help anonymise your web traffic, control internet usage within your organisation, and increase your internet speed. ‘Proxies’ can be set up as web filters or firewalls (or both), to protect your business and network from cyber threats like malware and ransomware. Here’s everything you need to know about proxy servers.

8 easy tips on how to stay anonymous online

May 06, 2022

The internet and your privacy don’t co-exist. You can have one or the other, but never both. For example, did you know the websites you visit track all kinds of data about you? We’re not just talking about your geographic location, but everything you see, do, watch, and touch online, the device(s) you're using, and more. Plus, anytime you’re on the web, third parties and search engines are tracking your online activity and collecting your data and IP address to serve you targeted ads. If the ...

What is a firewall & do you need one?

Apr 29, 2022

How do you keep uninvited guests and hackers from browsing your network? Enter the humble – firewall. It’s been the first frontline defence in network security for decades and is still used today to gatekeep traffic to digital devices and systems. But, how does a firewall work? Do businesses and home users need one? What’s the best type of firewall? Here’s everything you need to know.

Free resources

When you need more information on industry changes and developments, click on our Free Resources