Our Blog

image

Firewall Settings – Day 5 – Basic Hardening: Part 1

Welcome, if you are new to the series start with Day 1. For those who are all caught up let’s continue. Today we will spend our time shoring up some basic technical defenses. For those who are not overly fond of technology….You can do this :). First things first let’s make sure we have firewalls to protect our network, servers and workstations. These firewalls are your first line of defense to protect your sensitive data. To check these I’ve found the following guides, for Firewall Settings, which are fairly straightforward:

Firewall Settings

  • Check your windows workstation firewall – should be on by default
  • Check your windows server firewall – For the basics just stick to the first section. If you want to learn more…read on…though don’t say I didn’t warn you :). Note if your server firewalls are not turned on you will want to discuss with your MSP or your IT professional as you may block critical services if you aren’t careful.
  • If you know how, check your network firewall settings or look up the documentation for your brand of firewall. Otherwise, contact your MSP or IT professional with help validating that your network firewall is configured to only allow approved traffic inbound. It can sometimes be wise to hire a security professional to build you a custom firewall ruleset.

You will also want to check that all your employee’s workstations have their firewalls turned on and that they have network firewalls turned on at their home offices if applicable. Most modems have these on by default but that should be verified. For added remote security there are cloud based solutions, available at a moderate monthly charge, which route all your remote employees through a cloud-hosted firewall so they are protected wherever they travel.

Be sure to come back for Day Six / Digital Asset Access / Who can do what? Part 1

CTO / Principal Engineer

 

David Hyde-Volpe

CTO / Principal Engineer

CONTACT
INFORMATION

SECURITY MANAGED.
BACK TO BUSINESS!

COST EFFECTIVE BUSINESS SECURITY

Cyber Risk Reduction

Request A Quote

request A consultation

Request A Quote

LAURA GRINDLEY

Business Operations Manager
Certified: GSEC, CompTIA A+
Education: BA, College of William and Mary
Areas of Focus: Project Management, Accounting, Logistics

DAVID HYDE-VOLPE

CTO / Principal Engineer

Certified: GCIH, GSEC, GMON

Education: BS – Chemistry, Clemson University, Completed PhD coursework in Quantum Theoretical Chemistry – Georgia Institute of Technology, Completed PhD coursework in Statistical Mechanical Theoretical Chemistry – Clemson University.

Areas of Focus: Secure Coding, statistical modeling, penetration testing, security architecture

GLENN JOHNSON

CEO / Principal Engineer
Certified: CISSP, GCIH, PMP, CRISC, CISA, CISM, CCSK; previous certifications include CCNP, CCSP, CCVP, CCDP
Education: University of MD. LaSalle University (BS/MS – Information Systems)
Areas of Focus: BC/DR, Quantitative Risk programs and analysis, 1/CISO and 1/CIO functions, security strategy and architecture

Subscribe to Vizius' newsletter
and access our FREE

Ramsomware Vaccine
Roadmap

Free Impact Assessment