This article discussed key vital infrastructure components, the threats they face, and the measures that can be taken to remediate the risk. The three components are: SIEM, Virtual Infrastructure, and Backups. All three are targets for Hackers and Ransomware. Consider the scenario where an administrative domain account has been compromised
Read moreFind our discussion posts on all things Linux and Cybersecurity.
The Case Against Threat Intelligence in Business
Threat intelligence as a function of a regular business returns little to no value to the organisation. The skill-sets could be better used for threat hunting and analysis which are proactive approaches to cybersecurity and have a direct positive impact to the business. I should clarify that threat intelligence in
Read moreA SIEM as a Process
This article explores the concept of a SIEM as part of a process, and without a process, you don’t have a SIEM. A SIEM is a security information and event management system. In it’s full capacity, it accepts logs from a variety of sources and via a variety of protocols,
Read moreTop Tips To Avoid Being Scammed (Business Focused)
This list is relevant to businesses, but the same principles apply to our personal lives. The objective is to not be scammed, obviously. But to do that, we need to identify when we’re the target. This list will help, and is most effective when the key players within your business
Read moreCyber Insurance Vs General Business Liability Insurance
This content was generated with the assistance of AI. The information has not been validated. AGIX is not an insurance company. Do not use this information to make your insurance decisions. Here is a comparison table highlighting the coverage categories of General Business Liability Insurance versus Cyber Insurance, including categories
Read more
Advert Blocking Comparison Between pfBlockerNG & AdBlocker
This article is a quick comparison of advert blocking for web browsing between pfBlockerNG DNS filtering, and the web browser plugin Ad Blocker. This is hardly scientific, but it does give an idea of how effective each are with basic settings. I’m sure with more effort, the impact could be
Read moreNighthawk M6 5G Router – Review
While not typical of this tech blog, having just tested 5G for a small business Internet connection, I’m including the experience here to save you the trouble. In this case, we’re reviewing the “Nighthawk M6” 5G Router. There is a “Pro” version but we opted for the standard model. This
Read moreBackups Are 1% Of The Solution
The title is a little provocative, but hear me out. My argument is that in most situations, resorting to restoring data from backups means the project or business is already in an untenable position. Suppose Kym from the Accounts department overwrites a document and asks for the file to be
Read moreCybersecurity Staff Training Session – Part 1
Welcome to the first part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Cybersecurity relates to people as much as organisations, and as such we’ll ensure home and work perspectives are covered. We discuss the methods and solutions, and we discuss what to look
Read moreCybersecurity Staff Training Session – Part 2
Welcome to the second part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Organisationsare under constant attack. Some attacks are “testing the water” while others are organized, local and effective. Organisations are constantly defending against cyber-threats. Targets All organisations are targets: Online businesses. Physical
Read more