Be Cyber Aware: Firewalls
This article is about firewalls and how they can help in your plan towards being cyber resilient.
What is a firewall? Think of a firewall as an intruder detection system for your organisation's network. It is a virtual barrier between your computer or network and the internet. Its role is to keep an eye on all the incoming and outgoing data, like a security guard watching the entrance to your house or office. The main purpose of a firewall is to protect your computer or network from harm. It helps to prevent unauthorised access, like hackers. It also helps to stop viruses, malware or other malicious software from infecting your system. It acts as a shield, keeping your personal and sensitive information safe.
Your firewall may be managed by your IT or internet provider. Often they will be at default settings, so it is good to ask your provider about the following:
- Have functions, accounts and services not needed been disabled or removed?
- Has the default password been changed and only shared with authorised personnel?
- Has access to the admin interface from the internet been prevented - unless there is a clear and documented business need?
- Is the admin interface protected by multi factor authentication?
Setting up a firewall can be a complex task but is often provided by your IT support or internet provider.
What kind of rules should be set?
- Outgoing connections should be allowed - this allows you to browse the internet.
- Unauthenticated inbound connections should be blocked.
- Firewall rules should be approved and documented by the authorised individual for specific services which should be regularly reviewed.
- Permissive firewall rules should be removed or disabled when they are no longer needed.
- Access should be restricted to certain ports and regularly reviewed.
- Specific IP addresses or ranges should be filtered and regularly reviewed.
- Logging should be enabled.
Further guidance for schools can be found in the DFE document: Cyber Security Standards for Schools and Colleges. The document discusses the importance of firewalls and how they make scanning for suitable hacking targets much harder - hackers will always try to find the easiest route for an attack so making it difficult makes an attack less likely.
Further help and advice can be found in our Information & Cyber Security Best Practice Library and further questions to ask can be found in our Information/Cyber Security Checklist. The checklist covers the following areas:
- Governance and policies
- IT checks
- Physical Checks
Firewalls also have vulnerabilities and hackers will always try to exploit vulnerabilities as discussed in this Computing article: Major firewall maker alerts customers to vulnerabilities.
Consider the use of secure methods and organisational devices for staff required to work from home. Review our Work out of school Best Practice Area. Ensure that there is secure remote access, especially if a school server needs to be accessed.
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to
