Every computer connected to
a network and especially the Internet
should have a software firewall
running on it
Firewalls are designed to keep your privacy and your personal
computer safe. A firewall can either be hardware
or software. Hardware firewalls are
generally used to protect large networks of computers whereas
software firewalls are generally used to protect one computer
at a time. Both types of firewall often work together in a network
environment. Firewalls can greatly increase your protection from
identity and credit card theft.
For Windows users Network Chico recommends the ZoneAlarm
firewall from Zone Labs. The ZoneAlarm free version is excellent
and the ZoneAlarmPro
version offers many additional useful protections and features,
such as the ability to use the firewall
with Windows ICS (Internet connection
sharing). Of course there are many good firewall products on
the market which can protect you and your network.
More than 50% of American computer users are now connecting to
the Internet via broadband (dsl, cable, etc.) connections. Reports
indicate that computers attached to these types of high-speed,
always-on connections will face a possible attack within 30-45
seconds of going online. Every computer
connected to a network and especially the Internet should have
a software firewall running on it.
Download ZoneAlarm Pro and Save $10
Mac OS X users should ensure
that the OS X built in firewall
is turned on by clicking on: System preferences >>
Sharing >> Firewall and then Start
if the firewall is not already running. For more tips and tricks
visit the Mac OS information pages
at Network Chico.
In order to test the functionality of your firewall Network Chico computer and network
consulting services
recommends visiting the Gibson
Research Corporation web site and running ShieldsUp! which attempts to detect security
holes in your Internet connection.
The following guidelines should be observed:
Hardware firewall:
- Keep firmware current
- Keep rules and definitions current
- Consider using an intrusion detection system (IDS)
- Consider using an intrusion prevention
system (IPS)
- Adjust settings to the most restrictive that still allows
useful web browsing or other network
access
Software firewall:
- Keep rules and definitions current
- Keep the application updated per the producer's instructions
- Follow up on high risk threats or unusually high volumes
of blocked activities
- Adjust settings to the most restrictive that still allows
useful web browsing or other network
access
- WAN or Internet connections need the most restrictions and
protection
- Occasionally review log files for unusual blocking activity
and for aid in refining rules
Now available: Download the NIST (National Institute of Standards and
Technology) Guidelines on Firewalls
and Firewall Policy special publication 800-41 (1312 KB PDF)
from Network Chico.
Be sure to check out the Network
Chico Security
resources for links to many good sources of security
information.
For more firewall information Network
Chico suggests reading the Home PC Firewall Guide.
Additional security pages:
| Anti-virus | Browser
cookies | Email | Firewall
| IPS |
| Network | Passwords
| Registry | Server
| Spyware | Terms
| Wireless |
View current Windows security threats from:
|