As we have spoken about previously, cybersecurity is the protection of computer systems from theft or damage to the hardware or data.

Cybersecurity is an issue in practically every person’s life in the modern world. With 70.7% of the population of the Philippines using the internet last year¹, along with the advancements of technology, our lives and personal information have become more accessible to potentially dangerous strangers than ever before. This in turn should make your cybersecurity at the forefront of concerns within your daily life and business.

With the correct Form of cybersecurity, you will not only be protected from what I mentioned above, but you will also appear more credible on a business level if companies and customers know you are doing everything possible to keep their information safe and secure at all times.

Here is a key element of cybersecurity in more detail.



Defining a ‘Firewall’

A ‘Firewall’ enables the enforcement of ‘security rules’ which protect users on the ‘trusted’ network from cyber threats originating typically from the internet (‘untrusted’ networks).

Firewalls can be divided into two distinct types based on where they sit within a network:


Boundary firewalls

Boundary firewalls are implemented at a network’s outer limits, resulting in all the devices within the network being subject to its protection.

Personal firewalls

Personal firewalls are installed software by individuals’ for devices.


How do firewalls work

Firewalls have predetermined rules they adhere to whilst policing traffic passing across a network. The firewall administrator manages these ‘rules’, configuring the firewall to block high-risk actions while allowing access to services online needed by users. Firewalls use several methods to ‘filter’ data. Here are three of the most common examples.


Deploying a Firewall

The size of your network will play a role in deciding the best way to install firewall protections. In very small networks featuring a handful of software firewalls installed on each device may offer sufficient protection provided they are managed effectively.


Safeguard administrative accounts – strong passwords and authentication protocols

Use strong passwords

As tempting as a short repetitive password is, accounts should be accessed using long, complex passwords featuring a series of numbers, special characters, and letters in upper and lower case.


> Restrict access to a small number of devices

Make access limited only to a small number of ‘trusted’ IP addresses. These could be PC’s configured with limited functionality to reduce cyber risk.


> Use two-factor authentication

Use additional access criteria to verify the identity of those accessing administrative accounts.


> Carefully record and manage Firewall rules

You should appoint someone to oversee the running of the firewall and also the implementation of rules as and when needed.


We’re Blazon

At Blazon Technologies, we specialized in protecting our clients’ network and data, ensuring they can keep running their business even if disaster strikes them.

To find out how we can help you with your security and protection, contact us for more information.