We work to ensure that your firewall is properly configured and that all rules are regularly audited. We secure remote access points and users, block any unused or unneeded open network ports, disable and remove unnecessary protocols and services, implement access lists and encrypt network traffic.