This article explains a method of whitelisting one or more devices on your internal network so that pfBlockerNG doesn’t block those devices/servers due to any configured restrictions. For example, you might block a country using pfBlockerNG’s GeoIP filtering, but you may need one of your internal devices to be able
Read moreAGIX Linux Cybersecurity
Cybersecurity is a priority for networks and organizations, especially in industries that handle sensitive information. The certified Linux cybersecurity experts at AGIX are trusted professionals when it comes to keeping networks and systems safe from harm. Whether you need to protect sensitive information from outside interference or just keep hackers out of your network, AGIX has the experience that can help.
Security Experts That You Can Trust
AGIX’s professional team has the experience that you can count on when it comes to cybersecurity. Having worked with organizations in high-security industries such as Defence and Finance, we understand the intricacies of keeping information secure from an unexpected attack. With our years of experience, we can be trusted with the most sensitive information in your network.
We Take Cybersecurity Seriously
Our experienced professionals at AGIX are highly equipped to handle every aspect of cybersecurity. Working with sensitive information requires more than just careful planning and serious oversight; we also conduct extensive testing in every step of the way, and ensure that everything is up-to-date by our clients’ exacting standards. Consult with us and see why our clients trust us with even the most complex security concerns.
Contact our friendly team to get started.
Cyber Insurance Vs General Business Liability Insurance
This content was generated with the assistance of AI. The information has not been validated. AGIX is not an insurance company. Do not use this information to make your insurance decisions. Here is a comparison table highlighting the coverage categories of General Business Liability Insurance versus Cyber Insurance, including categories
Read morepfSense Cannot allocate memory with pfBlockerNG – Firewall Rules Not Working
This article discusses the cause and solution to the error message “Cannot allocate memory” relating to pfBlockerBG. In this scenario, we’re using a Netgate 2100 Base firewall appliance. The firewall was receiving the following error message when reloading the filter rules (in “Status – Filter Reload“). There were error(s) loading
Read moreAdvert Blocking Comparison Between pfBlockerNG & AdBlocker
This article is a quick comparison of advert blocking for web browsing between pfBlockerNG DNS filtering, and the web browser plugin Ad Blocker. This is hardly scientific, but it does give an idea of how effective each are with basic settings. I’m sure with more effort, the impact could be
Read moreDisable Weak TLS Versions on Windows Server 2019
This article explains how to manually disable weak TLS versions on Windows systems. Make sure you have a backup or recovery option as we’re making changes to the Windows Registry. Open the Registry and head to: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols Right click on “Protocols” in the left column, and select “New” -> “Key”.
Read moreDisable Weak Cipher Suites on Windows Server 2019
This article explains how to remove a weak Cipher Suite on a Windows Server 2019 system. There’s other ways such as Power Shell. This is just one way. Make a backup or snapshot first as mistakes could cause issues reconnecting. I organise a maintenance window, take a VM snapshot first,
Read moreProtected: CISM – My Study Notes
There is no excerpt because this is a protected post.
Read moreA Quick Understanding of Cipher Suites
This article explains the structure of a cipher suite. A cipher suite is a description of a combination of cryptographic algorithms that a system supports, expects or proposes. The description includes a means to create and exchange asymmetric keys, the type of symmetric keys to use, and the hashing algorithm
Read moreWindows Built-In VPN to pfSense
This article demonstrates the settings required on Windows and pfSense to get a Windows Built-In VPN to work between the two. It’s actually pretty easy. This article is more a confirmation of settings than a guide. Make sure you have the firewall rules configured on the pfSense WAN interface. We’re
Read moreBackups Are 1% Of The Solution
The title is a little provocative, but hear me out. My argument is that in most situations, resorting to restoring data from backups means the project or business is already in an untenable position. Suppose Kym from the Accounts department overwrites a document and asks for the file to be
Read more