In the event that someone breaks into your network and accesses client’s data you are legally liable to your clients for this breach. A firewall is the first line of defense in preventing malicious access to your network. There are any industries and professional organization that require you protect your network and data with a firewall.

In a computer network, a firewall’s primary task is to prevent unauthorized connections and viruses from entering your network. If an outside network, user, or program wants to access your computer, it sends a request. If you have a firewall, the firewall evaluates the request, compares it to a list of authorized connectors, and takes an action based on the status of the request and the firewall’s specific programming.

Devices connected to the internet are vulnerable to a wide array of threats including trojans, malicious scripts, key loggers, and exploits that attack unpatched security vulnerabilities. If your network is not protected from these threats you are vulnerable to identity theft, malicious attacks and theft of your data. Your office is constantly sending and receiving data packets when devices are connected to the internet. Having a firewall means that these data packets will be filtered before they reach the PC on your network to ensure that they are safe and no malicious data exists. A firewall serves as a filter that prevents hackers from getting inside your organizations network and stealing your confidential information, passwords, account numbers and client data. You can’t afford to operate your business without a firewall.

Many industries have regulations requiring a firewall to protect your data.

  • Medical/Dental – HIPPA, HITECH
  • Banking/Finance/Accounting – SAX (Sarbanes-Oxley), FINRA, GLH (Gramm-Leach-Bliley)
  • Credit Card Processing – PCI Compliance

Suggested Firewalls: Dell Sonicwall, Cisco ASA, Microtik

VPN – Virtual Private Network

Access to your network from outside of your office and between offices should only be done on a completely private network or through VPN access. A VPN will establish a secure connection between a remote computer or office with the main office and encrypt all traffic keeping the connection private and secure.

We strongly advise that any remote access be done through a VPN.

PCI Compliance – Credit Card Processing

If your business processes credit cards your credit card processor will require that your network is secure and meets PCI compliance requirements. The requirements are very confusing and complex. We can assist you in achieving PCI compliance for your organization.

HIPPA Security Audit

We have many years of experience conducting HIPPA security audits. These audits are required for MIPS/Meaningful Use attestation.

Call Us Today! (435) 656-4660