Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!

So anti-virus software is the answer?
An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution. Previously, the targets of hackers were large institutions, banks and government organisations; now hackers try to steal your personal information, including bank details and passwords directly from your PC on a daily basis.

But perhaps you don't consider that your data is particularly valuable?
You will be the one who suffers the consequences when it is destroyed, and these consequences are usually expressed in economic terms. If you lose your data, you will have to pay someone to try and recover it for you, and if your computer is illegally hijacked and used to attack others, then you will also have to handle any legal issues that may result from this.

What will a firewall do to limit the danger to your systems?
A decent firewall is sometimes referred to as a 'choke-point' or 'bridge'. Every piece of data that comes into your network has to go through the firewall in order that data of undesirable content and unauthorised users cannot gain access to your computer or network.

A good firewall will also hide the fact from others, that you are actually connected to the Internet, stopping software that pings, sniffs and queries IP addresses in the hope of finding a system to attack.

A firewall will cloak me, but which one do I need?
There are two different types of firewall available for you to use; a software firewall that is loaded onto your computer and a hardware firewall. In truth, both types are software, but the hardware one is a dedicated firewall appliance, whose only job is to perform firewall functionality. A clear advantage of a hardware firewall, is that if you happen to install some sort of maleware or virus on your system, it cannot take over your firewall.

Unified Threat Management firewall functionality
Unified Threat Management products are defined as those that act as firewalls, include intrusion detection and protection, and also deal with viruses.

Does your current firewall perform content filtering, spam filtering, intrusion detection and anti-virus duties? All of these functions are usually on a number of different pieces of hardware, taking up valuable space in your server racks. The technology within business grade firewalls has become considerably more robust recently, and paved the way to add these additional, but vital functions to the one appliance.

The administration time has been cut significantly, as there is only one appliance; product selection is quicker and easier, as is product integration and ongoing support. With only one appliance, troubleshooting also becomes a lot less of an issue. If the firewall were to fail, then only one piece of hardware needs to be swapped out; which means that your business can be back up and running faster.

Winding up
In conclusion a good firewall should do the following things:

  • Protect your personal data
  • Protect your computers resources
  • Protect your reputation and that of your business
  • Protect your liability
  • Ideally be capable of Unified Threat Management

Rob Green is the CEO of Century Computing Support Services, a WatchGuard Firewall Expert Partner, who provide both business grade hardware and software firewalls at http://www.firebox.uk.com. Fill in the contact form at http://www.firebox.uk.com/catalog/contact_us .php to sign up for the Century Computing newsletter.

In The News:


pen paper and inkwell


cat break through


Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More