Firewalls: When disabling the ports is not enough

December 16, 2020

With more and more clients run out checkup tool,,  the more we are asked a question of, “I have really good antivirus, why is your tool showing that we are not protected?”

The answer is that the vast majority of perimeter security devices we come across are configured to just block ports, with the theory that if the door is locked, you’re protected. The reason for that is simple. In order for an organization to function in the modern world, they need to have bidirectional internet access, which opens up the two internet access ports on the device: port 80 for unsecured internet (HTTP) and port 443 for secured internet access (HTTPS).

Most of the modern attacks are designed to permeate through those two ports, which is why most of new firewall appliances have the capabilities of advanced scanning options to protect against these types of attacks. This, however, requires a purchase of a license to enable these advanced features and intimate knowledge of how to properly configure them so as not to impact daily business functionality.

When malware, ransomware, or a virus get stopped by your antivurs/anti-malware software on your PC, it is already too late. That is because these nefarious are already within your network and are providing an access point to an attacker. A firewall that has been properly configured with application and web protection will prevent that from happening. In the coming months we will be providing guides on how to properly implement perimeter security using devices from different manufacturers, in the meantime, feel free to reach out if you need some advice or if you would like to explore some of our cybersecurity options

Recent Posts

Why are you still buying network and system hardware?

Learn More >

Dark Web Monitoring: Why, Do’s and Dont’s

Learn More >

Firewalls: When disabling the ports is not enough

Learn More >

Are you looking for a reliable managed IT and Cyber Security Solutions Partner?

We can help you get the most out of your budget without sacrificing quality of service and protection.

Schedule a CallText Us Now
Schedule a CallText Us Now

Client voices

"As a medical data company, compliance and data security are extremely important to our organization. The team at Aegis IT Solutions was instrumental in ensuring that our clients’ data is properly safeguarded while providing strategic advice and helping us navigate through complicated compliance challenges associated with an international enterprise providing and managing access to personal confidential data."

Yelena Kadeykina, MBA, CMO, eRequest, Inc.

"We do data analytics for many large corporate clients, both in the cloud and on premises. Security was a sore topic for us until we retained services of Aegis IT Solutions. Ilya was very responsive, professional and knowledgeable. With his help and leadership, we improved our processes, properly planning for security-related activities and professionally communicating with clients for the best mutually acceptable security approach."

Eugene Shilmayster, VP, Solution Delivery

"Client service is the ethos of Aegis IT Solutions. Ilya and his team never fail to provide the most up-to-date insight on technology and system upgrades. They always take time to meet our law firm’s never ending IT needs. We considered Aegis IT Solutions as one of the most essential assets to the function of our busy practice. I am grateful for having formed this lasting relationship."

Massey K. Mayo, Esq., DOLAN LAW, LLC.

© 2021. Aegis IT Solutions. All rights reserved.