This list is relevant to businesses, but the same principles apply to our personal lives. The objective is to not be scammed, obviously. But to do that, we need to identify when we’re the target. This list will help, and is most effective when the key players within your business
Read moreFind our discussion posts on all things Linux and Cybersecurity.
Cyber Insurance Vs General Business Liability Insurance
This content was generated with the assistance of AI. The information has not been validated. AGIX is not an insurance company. Do not use this information to make your insurance decisions. Here is a comparison table highlighting the coverage categories of General Business Liability Insurance versus Cyber Insurance, including categories
Read moreAdvert Blocking Comparison Between pfBlockerNG & AdBlocker
This article is a quick comparison of advert blocking for web browsing between pfBlockerNG DNS filtering, and the web browser plugin Ad Blocker. This is hardly scientific, but it does give an idea of how effective each are with basic settings. I’m sure with more effort, the impact could be
Read moreNighthawk M6 5G Router – Review
While not typical of this tech blog, having just tested 5G for a small business Internet connection, I’m including the experience here to save you the trouble. In this case, we’re reviewing the “Nighthawk M6” 5G Router. There is a “Pro” version but we opted for the standard model. This
Read moreBackups Are 1% Of The Solution
The title is a little provocative, but hear me out. My argument is that in most situations, resorting to restoring data from backups means the project or business is already in an untenable position. Suppose Kym from the Accounts department overwrites a document and asks for the file to be
Read moreCybersecurity Staff Training Session – Part 1
Welcome to the first part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Cybersecurity relates to people as much as organisations, and as such we’ll ensure home and work perspectives are covered. We discuss the methods and solutions, and we discuss what to look
Read moreCybersecurity Staff Training Session – Part 2
Welcome to the second part of the AGIX Cybersecurity training course. This course is focused on staff related matters. Organisationsare under constant attack. Some attacks are “testing the water” while others are organized, local and effective. Organisations are constantly defending against cyber-threats. Targets All organisations are targets: Online businesses. Physical
Read moreOpen letter in response to Strengthening Australia’s cyber security regulations and incentives.
Recently the Australian Government, through the Minister for Home Affairs and the Minister for Industry, Science and Technology put out a request for participation in an open discussion relating to “strengthening Australia’s cyber security regulations and incentives”. This article is my view on how we can respond effectively. You can
Read moreWindows 10 Post Install Setup
We don’t tend to install Windows very often these days. It seems to be far more stable than the old days and it mostly just works. But from time to time we do need to install it fresh and there’s a list of things we need to do to make
Read moreWhat you need in a Firewall
If you’re not filtering your internet traffic, you have a router, not a firewall. The good news is that most firewalls have features that can go a long way to protecting your IT and business resources. Let’s start with the different kinds of firewalls and their use-cases. A “packet filter”
Read more