Archives - Firewalls

Firewalls do not guarantee that your computer will not be attacked

Though properly configured firewalls may effectively block some attacks, do not be lulled into a false sense of security. Firewalls primarily help protect against malicious traffic, not against malicious programs (i.e., malware), and may not protect you if you accidentally install or run malware on your computer. However, using a firewall in conjunction with other […]

Use a two-way firewall on your Mac

The built-in firewall on your Mac only provides inbound protection, which prevents cyberattacks from threats outside of your network. By installing a two-way firewall, you’ll have outbound protection as well, which keeps malware that’s already in your system from being able to connect to the internet.

Choose secure networks

Use internet connections you trust, such as your home service or Long-Term Evolution connection through your wireless carrier. Public networks are not very secure, which makes it easy for others to intercept your data. If you choose to connect to open networks, consider using antivirus and firewall software on your device or using a Virtual […]

What do firewalls do?

Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet. Firewalls can be configured to block data from certain locations (i.e., computer network addresses), applications, or ports while allowing relevant and […]

Set up automatic checking for your firewall

With most firewalls, you can run a quick scan or test, using a few commands or a specialized app, to ensure that it’s still working. Consider doing this from time to time for peace of mind.

Deny requests to bypass your firewall

If you get a message from someone asking to circumvent your firewall, ignore it, even if the sender claims to work for your security provider. It could be a hacker trying to gain access to your network. If you’re unsure of the source’s authenticity, contact the company directly.