The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

Fine Tune Your Firewall Rules – 10

Last but not least, make sure that you are communicating with business leaders and end users about any changes to your firewall rules. Getting input from the business can help make sure that your firewall configuration is meeting end users’ needs. Having open...

Fine Tune Your Firewall Rules – 9

It goes without saying, but as you update your firewall rules, it’s also a good time to make sure that you have installed all the latest patches to your firewall. The greatest list of firewall rules in the world won’t stop an attack if your firewall has a...

Fine Tune Your Firewall Rules – 8

Another way to improve the performance of your firewall is to use your routers to handle some of the traffic-blocking activities. By offloading some work from your firewall, you may be able to eliminate some firewall rules and improve throughput for your network. As...

Fine Tune Your Firewall Rules – 7

It isn’t true of every firewall, but most apply rules in the order that they are listed in your firewall configuration software or rule base. In other words, the firewall will start at the top of the list and keep going down until it reaches rule that would...

Fine Tune Your Firewall Rules – 6

Every firewall comes with built-in reporting tools that provide details about your traffic. Another firewall rules best practice is to audit those logs regularly to look for changes or anomalies that might suggest modifications to your firewall settings. This log data...

Fine Tune Your Firewall Rules – 5

As you go through your list of firewall rules and update your documentation, you may find that you have more than one rule serving the same purpose. If you can eliminate one of those rules or combine some rules to be more effective, that can speed up your network....

Fine Tune Your Firewall Rules – 4

Your network is always changing. You are gaining new users and new devices. Those users and devices are accessing new applications and new services. And applications and devices that once accounted for a high percentage of network traffic may become far less popular...

Office 2019 will be for Windows 10 users only

The next major upgrade to its Office productivity suite, Office 2019, will be available to Windows 10 users only – leaving Mac users and users of Windows 7 out in the cold, or forcing users to upgrade to the cloud-based version, Office 365. The vast majority of...

Fine Tune Your Firewall Rules – 3

One way to make sure that you are following your change procedures is to use an automation solution for any firewall configuration updates. Automation can also help prevent mistakes in the firewall setup process. As 99 percent of firewall breaches are caused by errors...

Fine Tune Your Firewall Rules – 2

Before you begin changing any of your existing firewall rules, you should establish a formal process that you will use for any modifications, if you don’t already have such a process. A typical change procedure might involve the following steps: A change request...

Fine Tune Your Firewall Rules – 1

Document your firewall rules Anyone who works on your IT security team should be able to tell very quickly what each of your firewall rules was intended to do by looking at your documentation. At a minimum, you need to keep track of the following data: – The...

Cloud Security Is a Moving Target

Cloud risks have filled the news cycle of late, but the real cloud security landscape is nothing like the headlines would have you believe. For example, serverside ransomware attacks, despite their high public profile, account for only about 2 percent of recorded...

Windows 10 finally catches up with Windows 7

Windows 10 installations have finally overtaken Windows 7 installations – two-and-a-half years after it was released. That’s according to StatCounter, which regularly provides figures and research covering the desktop operating system sector. Its latest...

Widespread API Use Heightens Cybersecurity Risks

A new Imperva survey showed a heightened concern for CyberSecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot attacks and authentication enforcement for APIs. APIs power the interactive digital experiences...