How Default Firewall Settings Put Your Business at Risk

Why Default Firewall Settings Are Putting Your Business at Risk

And here I am — third cup of coffee in, typing away, thinking about firewalls once more. You know, there’s one thing that blows my mind 30+ years into networking and cybersecurity (yes, I mean it, I started doing my sysadmin chores back in ’93 when dial-up was king). How often you see businesses run with their firewalls on default settings. I have seen this firsthand, from fighting off the Slammer worm nearly two decades ago to assisting three large banks to upgrade their zero-trust architecture just recently. And believe me, not understanding firewall basics is about as bad as not locking the front door then being surprised that you got robbed.

Default Settings? Sounds Innocent, but Dangerous

These are designed to be a fast start, right? But here’s the rub—default doesn’t mean secure. It means vulnerable. And that’s an open house for attackers. Let me explain to you why those settings are so important, why default firewall settings are making your business vulnerable, and what you can do about it.

1. Default Passwords

Oh, boy — this could be a whole rant. Default passwords are the easy pickings for hackers. Really, you buy a classy sports car and then leave the keys in the ignition and a sign taped to the windshield that reads COME TAKE ME OUT FOR A SPIN. That’s your firewall, using default credentials.

Back in the ‘90s, when I was starting up, I found one incident where someone in the company left a firewall with the default admin/admin password during a maintenance window. A couple hours later—boom! — an external IP was trying to get in without permission. It was a pain in the butt and cost the company a lot in downtime.

Here’s how we prevent this no-brainer mistake at PJ Networks:

Password rules can be dull, but they prevent you from having nightmares.

2. Open Management Interfaces

This is the one that haunts me at night. Management interfaces—think SSH, web GUIs and SNMP—tend to be exposed to the internet by default. And guess what? Attackers scan entire IP ranges to find exactly these open doors.

At DefCon recently (seriously, still giddy from the hardware hacking village, why haven’t you been, go), they had this really cool demo about how you can compromise an open management port in x number of minutes. It’s not sci-fi; it’s real.

The fix?

3. Weak Default Rules

Firewall rules out of the box usually go for convenient rather than secure. It’s like having a restaurant kitchen with the back door open all the time the restaurant is open. Some of the traffic is allowed in/out unfiltered, providing an easy way through for attackers.

I came upon a customer (one of those 3 banks we just upgraded) many years ago working for a bank where on their firewall there were out-of-the-box allowed a lot of inbound protocols they didn’t need to have. Closing those gaps was a game changer in terms of mitigating their risk.

Here’s the bottom line:

4. Disabled Security Features

Occasionally settings may come out the box with certain security features disabled to make things easier e.g. you may need to enable some security features or set a password. Threat detection, deep packet inspection, intrusion prevention systems (IPS) are all essential, but usually turned off by default.

I confess—even I ignored some of these things, years back, in the hopes of a clean setup and better performance. Big mistake. And after watching malware slip through gaps I hadn’t known were there, I learned the hard way.

Don’t be that guy.

5. No Multi-Factor Authentication

If you believe that a password is all that stands between your firewall’s management interface and the entire rest of the internet, you must also think Capital One has the best security. Your guard, when credentials are stolen, is multi-factor authentication (MFA).

Just recently, at PJ Networks, we assisted a bank in retrofitting MFA over their firewall control in an overhaul they call zero trust. Result? Vastly lower risk of unauthorized access — even if passwords were phished.

Quick facts:

Quick Take

I don’t have to remind you that cyber threats are constantly changing, however, you would do as well to be satisfied that default firewall settings will keep them at bay, as you would if you parked your car in a bad neighborhood left the doors unlocked. It’s asking for trouble.

Here’s what matters:

Don’t wait for a breach. Guard your business as if your life depends on it — because it does.

Some Final Thoughts

Cybersecurity isn’t what you get when you buy the next shiny thing in tech, or when you deploy whatever solution incorporates the most commonly recurring words at CES in a particular year. It’s about hard work, best practices and sometimes just straight-up common sense. I see companies surprised every day by these realities because they ignored these basics. And yes, it’s frustrating — it’s as if you handed the keys to a Ferrari to someone and left it unlocked.

But here’s the good news: Firewall security is manageable. Here at PJ Networks we’ve been setting up secure network firewalls from day 1 for like forever! Whether you’re a bank, an SMB, or a small startup — it can make an enormous difference to go through this process.

So, when next you’re reviewing your firewall setup – remember – default doesn’t mean safe. Change your defaults. Harden your security. And for the love of Mike don’t skip your third coffee before you check those config files. You’ll thank me later.

Exit mobile version