There’s a silly online video on Youtube that summarises my thoughts in this perfectly. Content warning, there’s some inappropriate themes and some violence

This illustrates my point about a lot of low-end firewalls, and it makes sense, they’re programmed with similar logic. Note: This is not a jab at AI or any similar projects, that space is innovative and exciting, I’m referring to old “if/then” logic”.

Your firewall might work out there’s an intruder, it may be distracted by a decoy attack, or it may be knocked out entirely, any number of things can happen. The immediate consequences are generally pretty obvious, some of your equipment is offline, or worse still, the current admin password doesn’t work. Getting back online and needing to reconfigure devices is a painful experience, hopefully there’s config backups lying around. From there it’s a matter of deciphering the scale of the breach, what’s been accessed, what’s been touched, has anything been modified? Do you need to notify anyone? Customers? Government entities?

All of this is a huge workload for any team, and that’s before you get onto establishing the point of entry, and then securing your network so it doesn’t happen again.

A modern firewall with a threat management engine is in our opinion a requirement for anyone who wants to protect their information & infrastructure. There’s also added benefits of backup internet links and more, that are available out of the box. Proactively manage your security, and put yourself on the front foot to react to any threats as they arise. In the event of any unauthorised access, enable your teams to get back online faster, and simultaneously let us investigate, eliminate and report on the breach.  Get in touch for more info.