article thumbnail

How to Perform a Firewall Audit in 11 Steps (+Free Checklist)

eSecurity Planet

A firewall audit is a procedure for reviewing and reconfiguring firewalls as needed so they still suit your organization’s security goals. Auditing your firewall is one of the most important steps to ensuring it’s still equipped to protect the perimeter of your business’ network.

article thumbnail

What Is Packet Filtering? Definition, Advantages & How It Works

eSecurity Planet

Packet filtering is a firewall feature that allows or drops data packets based on simple, pre-defined rules regarding IP addresses, ports, or protocols. Once a type of firewall, packet filtering now provides a fundamental feature of nearly all firewalls and some network equipment (routers, smart switches, etc.).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Stateful Inspection in Network Security? Ultimate Guide

eSecurity Planet

Stateful inspection is a firewall feature that filters data packets based on the context of previous data packets. This important feature uses header information from established communication connections to improve overall security. Table of Contents Toggle How Does Stateful Inspection Work? Stateless protocols (UDP, HTTP, etc.)

article thumbnail

Why BYOD Is the Favored Ransomware Backdoor

eSecurity Planet

When remote workers connect bring-your-own-device (BYOD) laptops, desktops, tablets, and phones to corporate assets, risk dramatically increases. Ransomware remains just one of many different threats and as security teams eliminate key vectors of attack, adversaries will shift tactics.

article thumbnail

Weekly Vulnerability Recap – December 18, 2023 – JetBrains TeamCity Exploits Continue

eSecurity Planet

Before your IT and security teams log off for the holidays, make sure to check for any outstanding updates or patches. December 11, 2023 Sonar Finds Three Vulnerabilities in Open-Source Firewall pfSense Type of vulnerability: Cross-site scripting and command injection.

Backups 89
article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Infrastructure as a service security is a concept that assures the safety of organizations’ data, applications, and networks in the cloud. Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud.

article thumbnail

What Are Firewall Rules? Ultimate Guide & Best Practices

eSecurity Planet

Firewall rules are preconfigured, logical computing controls that give a firewall instructions for permitting and blocking network traffic. They help IT and security teams manage the traffic that flows to and from their private network. Order of Firewall Rules Firewall rules are typically followed in order of restrictiveness.