Archives - Firewalls


Choose secure networks

Use internet connections you trust, such as your home service or Long-Term Evolution connection through your wireless carrier. Public networks are not very secure, which makes it easy for others to intercept your data. If you choose to connect to open networks, consider using antivirus and firewall software on your device or using a Virtual […]

What do firewalls do?

Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet. Firewalls can be configured to block data from certain locations (i.e., computer network addresses), applications, or ports while allowing relevant and […]

Set up automatic checking for your firewall

With most firewalls, you can run a quick scan or test, using a few commands or a specialized app, to ensure that it’s still working. Consider doing this from time to time for peace of mind.

Deny requests to bypass your firewall

If you get a message from someone asking to circumvent your firewall, ignore it, even if the sender claims to work for your security provider. It could be a hacker trying to gain access to your network. If you’re unsure of the source’s authenticity, contact the company directly.

Keep your firewall turned on at all times

A firewall is a grouping of filters that protects your computer from harmful traffic from the internet. Disabling your firewall can allow malware to infect any devices connected to the network. Do not disable the firewall from either your operating system or your router/gateway.

Enable and configure your firewall

A firewall is a device that controls the flow of information between your computer and the internet. Most modern operating systems (OSs) include a software firewall. The majority of home routers also have a built-in firewall. Refer to your router’s user guide for instructions on how to enable your firewall and configure the security settings. […]