Use Firewalls to Protect Your Network from Hackers

Your computer network needs to be isolated from the internet. Computers with sensitive information – like financial account numbers and Social Security Numbers – need to be isolated from the rest of the network. Only employees with a need to access non-public Information should have access to it. Firewalls and Routers are the devices that separate your information from the people who want to steal it.

Think of a firewall as a locked door and only the people with a key are allowed to enter through the door. Think of a router as the security guard who determines which rooms can be accessed. Firewalls and routers have rules – access controls – that need to be set, so it knows who and what can enter and go where in your network. For the best protection you want an Application-layer firewall. Their function is to determine if a process should accept a connection. (That’s a little too deep for most of us. That’s why you need to hire an expert.) If the access control rules are not setup correctly either the bad guys can get in or the good guys are kept out. Neither is good.

Above all else, ‘Change the factory default login and password’ and make sure the password is strong – 8 characters or longer with upper and lower case letters, numbers and special characters.

Do not go cheap on the door into your network and lock the door.

About Bruce Demarest

Bruce Demarest is a Identity Theft Protection Specialist. He has designed and taught classes to educate individuals and businesses in identity theft risk management. The individuals have learned how to continuously monitor their financial identities from credit fraud, plus how to monitor their personal identifying information for unauthorized use. His business clients have become compliant with the federal & state privacy laws. He has conducted information security audits to identify their potential problems and has designed security policies, programs, and practices to address those problem areas.
This entry was posted in Business Identity Theft, Identity Theft Protection and tagged , , , , , , , , , , , . Bookmark the permalink.

1 Response to Use Firewalls to Protect Your Network from Hackers

  1. Pingback: Business Culture of Security: Do you audit your vendors? | Bruce Demarest Creating Cultures of Security

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s