• Link to Facebook
  • Link to LinkedIn

Tel: 020 7250 3840

4TC Services
  • Home
  • IT Support
    • About Managed IT
    • Fully Managed
    • Proactive IT Support
    • Ad-Hoc
    • Mac Remote Management
    • Installation and Relocation
  • Backup
    • Direct to Cloud Backup
    • Disaster Recovery
  • Security
    • Digital ID & the Dark Web
    • Anti-Virus
    • Mail Archiving
    • Managed Anti-Spam
  • FileMaker
  • Cloud
    • IT as a Service – IaaS
  • About Us
    • Contact
    • Cookie Policy
    • Privacy Policy
    • GDPR – Statement
  • Telecoms
    • Teams – Voice and Video calling
  • Products
  • Blog
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Get Cyber Essentials certified – Firewalls

Firewall protection is one of the key components required to achieve Cyber Essentials certification. In this article we’ll take a brief look at how firewalls work, the different types that exist and the various ways you can configure firewall protection in order to satisfy the requirements of the Cyber Essentials scheme.

What do Firewalls do?

In basic terms, a Firewall is a filter that applies restriction to traffic travelling between a ‘trusted network’ and an ‘untrusted network.’ ‘Trusted network’ refers to the network the Firewall has been configured to protect, and ‘untrusted network’ refers to an external environment from which threats originate – typically the internet.

Firewalls can be configured in 2 main ways: at the device level (a personal firewall) or at a network’s outer perimeter (boundary firewall).

How do Firewalls work?

Firewalls enforce a series of user-configured ‘rules’ which govern traffic passing in and out of a network. The Firewall’s administrator can monitor activity and introduce new rules to restrict activity that is deemed a threat to the network’s security. Let’s look at the 3 types of filtering used to apply these rules.

Packet Filtering. Data that travels across the web is carried in ‘packets.’ These ‘packets’ contain the information you wish to send (the contents of an email for example) but also feature additional information such as a packet’s destination, origin and the protocol being used for the data transfer. Packet Filtering looks at this additional information and allows the passage of data packets deemed low risk according to a set of pre-determined rules. For example, if the destination and source IP addresses are the same, then the packet is less likely to be a threat. While packet-filters are tried, tested and cheap to implement, they aren’t effective at blocking more advanced Cyber-attacks. It’s therefore not advisable to use packet filtering as your only form network-level protection.

Proxy Server. Without getting too technical, a Proxy Server acts as an intermediary between end-users and the internet. Proxy servers are used to implement Firewall protections in several ways:

  • IP address concealment. Like a VPN, a proxy server hides the IP address of the device making the request. The web server at the other end sees the IP address of the proxy and doesn’t know where in the world the original request was made from.
  • Some proxy servers can encrypt data in transit, again like a VPN although not all proxy servers do this.
  • Web Filtering. Web filtering capabilities make proxy servers a popular choice in environments where administrators wish to block access to inappropriate content – they are used by schools and colleges for this reason. From a security standpoint, such filtering is useful for blocking high-risk website types, such as gambling sites.

Stateful inspection. Somewhat similar in concept to ‘packet filtering’ (but more advanced), a stateful inspection takes a closer look to ensure transiting inbound packets match up to a corresponding outbound request.

How do I go about configuring a Firewall?

The most suitable route to deploying a firewall depends on the size of the network being protected. For small businesses with a handful of endpoint devices, Firewall protections can be implemented using the software at device-level. These personal firewalls combined with other threat prevention measures such as removing unnecessary services, using anti-malware software, and undertaking diligent patch management should be sufficient to ensure network security.

Device-level firewalls alone are impractical and difficult to manage on larger networks, which require the use of boundary firewalls. Such organisations should at very least configure a firewall at router-level or invest in a physical or cloud-hosted firewall server.

Firewall ‘Good Practice’

For Cyber Essentials compliance you should protect every device in your network with Firewall protection. Additionally, make sure you’re managing your Firewall controls effectively, in a way that further minimises risk. Consider the following.

Configure software firewalls on mobile devices. If a device is likely to be used outside your business’ network, it must feature the added protection of a software firewall. Such devices might include mobile phones, tablets and laptops used to permit remote working. Often such devices will be used in high-risk networks such as public WiFi, making the deployment of technical security measures more important.

Apply ‘rules’ to block untrusted activity. Having firewall capabilities is not enough, you’ll have to prove that it is set up to restrict certain traffic deemed ‘high risk.’

Withdraw ‘rules’ when they are no longer needed. As business requires the use of more services over time, the Firewall administrator configures new rules to permit access. However, as certain services fall out of favour, it is important that these rules are then removed to close a loophole that could be exploited by cybercriminals.

Enforce effective password protection for administrators. Make sure Firewall configuration is safeguarded by strong password protection. Administrators should use long, complex passwords.

Limit administrative access to the bare minimum. Only grant administrative permissions to members of your team based on a demonstrable business need. If a number of individuals require Firewall management permissions, consider introducing additional access controls such as:

  • Two-factor authentications
  • IP address limits – restrict administrative access to a small number of computers.

Record all approved Firewall rules. Assign rule management responsibilities to an individual in your team. They should document and record rules as they are added and removed so an inventory of ‘active’ rules can be sought at any given time.

A Firewall acts as the first line of defence for your network and all the devices that reside within it. Cyber Essentials requires blanket Firewall protection for your network, so contact your IT partner or liaise with your IT department to make sure your Firewall protection is up to the job.

Here at 4TC, we can help your business with all aspects of cybersecurity.

Our expertise covers a wide range of bases, from proactive maintenance and Backups to full-network anti-virus and managed anti-spam solutions.  We provide managed services, project management and advice to ensure the businesses we work with remain out-of-bounds to Cybercriminals.

We’re 4tc Managed IT Services

4TC can support you with all the services you need to run your business effectively, from email and domain hosting to fully managing your whole IT infrastructure.

Setting up a great IT infrastructure is just the first step.  Keeping it up to date, safe and performing at its peak requires consistent attention.

So we can act as either your IT department or to supplement an existing IT department. We pride ourselves in developing long term relationships that add value to your business with high quality managed support, expert strategic advice, and professional project management.

Search Search

Recent Posts

  • The Power of Proactive IT Support: Why Prevention Beats Cure
  • Understanding the Dark Web: How Digital ID Services Safeguard Your Company
  • How to Protect Your Business from Cyber Threats with Digital ID Monitoring
  • 10 Game-Changing Strategies to Boost Productivity and Optimise Your Business Operations
  • How to Work Smarter, Not Harder: The Ultimate Guide to Business Efficiency

Recent Comments

    Archives

    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • May 2017
    • June 2015

    Categories

    • 4TC
    • Anti-Spam
    • Blogs
    • Cyber Security
    • Data Science
    • Disaster recovery
    • IT Services
    • News
    • Services
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    4TC Services

    Email: support@4tc.co.uk

    Tel: 020 7250 3840

    London Office

    5th Floor, 167‑169 Great Portland Street
    London
    W1W 5PF

    Essex Office

    Dew Gates The Street
    High Roding
    Essex
    CM6 1NT

    Signup for IT News!



      © Copyright - 4TC Services
      • Link to Facebook
      • Link to LinkedIn
      Link to: Protect your business from Cyber Crime – Get Cyber Essentials certified Link to: Protect your business from Cyber Crime – Get Cyber Essentials certified Protect your business from Cyber Crime – Get Cyber Essentials certifiedLink to: Get Cyber Essentials Certified – Secure Configuration Link to: Get Cyber Essentials Certified – Secure Configuration Get Cyber Essentials Certified – Secure Configuration
      Scroll to top Scroll to top Scroll to top