{"id":12834,"date":"2017-12-15T14:20:55","date_gmt":"2017-12-15T19:20:55","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=12834"},"modified":"2026-02-03T11:59:09","modified_gmt":"2026-02-03T16:59:09","slug":"3-questions-smb","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/","title":{"rendered":"Small Business Owners: 3 Questions You Should Ask Before Building Your Own Network"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12834\" class=\"elementor elementor-12834\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d86986c e-flex e-con-boxed e-con e-parent\" data-id=\"d86986c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe00adb elementor-widget elementor-widget-text-editor\" data-id=\"fe00adb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Small business owners often deal with tasks independently, but cybersecurity requires multiple security layers and a team-centric outlook. Getting the best out of your cybersecurity setup can\u2019t rely solely on guesswork or DIY approaches.<\/span><\/p><p><span style=\"font-weight: 400;\">IT infrastructure design and implementation can range from simple to highly complex, depending on the full scope of your business needs. Your organization-specific goals and pain points influence hardware, network design, endpoint protection, choices, and more.<\/span><\/p><p><span style=\"font-weight: 400;\">Before you dive into building network <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/enterprise-network-security-architecture\/\"><span style=\"font-weight: 400;\">infrastructure or architecture<\/span><\/a><span style=\"font-weight: 400;\">, you\u2019ll need to do a bit of planning and strategy. This article focuses on three important questions small business owners should ask before building their own network.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5594bf2 elementor-widget elementor-widget-heading\" data-id=\"5594bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">More Than Just Network and Security Solutions\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f006d94 elementor-widget elementor-widget-text-editor\" data-id=\"f006d94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Cybersecurity involves more than just installing basic network hardware. If you want effective security, you need to understand the importance of a layered system of tools and policies. Modern threats love to target endpoints, user credentials, and any vulnerabilities in configuration.<\/span><\/p><p><span style=\"font-weight: 400;\">Here are a few other details to think about:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security decisions should align with your business operations, data flow, and risk exposure<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your future network plans should account for growth, remote access needs, and cloud usage<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A well-designed security stack reduces downtime, compliance risk, financial loss, and reputational damage<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Asking the right foundational questions is where you start. This is how you end up properly aligning your security tools with business objectives for long-term, scalable support.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4517c32 elementor-widget elementor-widget-heading\" data-id=\"4517c32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. What are My Network Security Goals?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca737d5 elementor-widget elementor-widget-text-editor\" data-id=\"ca737d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The scope of your network security should be tailored to your industry, unique operations, and any relevant compliance requirements. Specific use cases come into play as well. Whether it\u2019s content filtering, PCI compliance, or unrestricted access, all of these points matter when looking for the right network security appliance.<\/span><\/p><p><span style=\"font-weight: 400;\">Businesses will also want to have their daily workflows mapped out pretty well. This helps to identify which network functions are critical for productivity and reliability on a day-to-day basis. If you\u2019re working with a mobile workforce or multiple locations, then there should be a priority on VPNs, email security, and secure remote access.<\/span><\/p><p><span style=\"font-weight: 400;\">At the end of the day, your overall performance needs and security priorities correlate to the type of <\/span><a href=\"https:\/\/www.firewalls.com\/category\/firewalls.html\"><span style=\"font-weight: 400;\">firewall solutions<\/span><\/a><span style=\"font-weight: 400;\"> you end up with. Keep in mind that different firewall platforms are built for varying operational goals. From beginner-friendly to high-performance and advanced configurations, there are a lot of options to choose from.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3ba5cc elementor-widget elementor-widget-heading\" data-id=\"d3ba5cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. What Licenses, Subscriptions, or Services Will I Need?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dce41cf elementor-widget elementor-widget-text-editor\" data-id=\"dce41cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">While the firewall is your foundation, small business owners also need to think about any licenses or subscriptions they might need. You won\u2019t need every add-on out there, but some services are critical compared to others. A few examples of this include the various options behind <\/span><a href=\"https:\/\/www.firewalls.com\/brands\/sophos\/central.html\"><span style=\"font-weight: 400;\">Sophos Central<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall\/sonicwall-cloud-secure-edge-cse.html\"><span style=\"font-weight: 400;\">SonicWall\u2019s Cloud Secure Edge<\/span><\/a><span style=\"font-weight: 400;\"> (CSE).<\/span><\/p><p><span style=\"font-weight: 400;\">Things like email security and phishing protection should always be high up on the list. The attack frequency with phishing scams is only going to get worse as threats continue to evolve. Other services you\u2019ll want to consider are cloud-based sandboxing and AntiSpam services. Both are important in protecting individual users and mail systems as a whole.<\/span><\/p><p><span style=\"font-weight: 400;\">The licenses and services you\u2019re looking into should be chosen based on your organization&#8217;s unique network goals and risks. Outside of choosing firewall hardware and associated services, you also want to put a lot of thought into what configuration.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0101829 elementor-widget elementor-widget-image\" data-id=\"0101829\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.firewalls.com\/category\/firewalls.html\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"107\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality.jpg\" class=\"attachment-large size-large wp-image-18860\" alt=\"Blog-Banner-General-Buy-Now-Red-High-Quality\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality.jpg 900w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality-300x50.jpg 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality-768x128.jpg 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-877b3e8 elementor-widget elementor-widget-heading\" data-id=\"877b3e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. How Hard is it to Configure a Firewall?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-767b1d2 elementor-widget elementor-widget-text-editor\" data-id=\"767b1d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The reality is that firewall configuration is often the most complex and time-consuming step. Proper setup requires steps like network diagramming, policy planning, and rule creation. In addition to that, NAT rules, traffic handling, and user segmentation require a bit of consideration of their own.<\/span><\/p><p><span style=\"font-weight: 400;\">Even if you\u2019re working with the perfect hardware and license setup, misconfiguration can completely undermine your network security. It\u2019s also vital not to rely on DIY resources, as this could just end up creating more problems than intended.<\/span><\/p><p><span style=\"font-weight: 400;\">Utilizing professional <\/span><a href=\"https:\/\/www.firewalls.com\/professional-services.html\"><span style=\"font-weight: 400;\">configuration and management<\/span><\/a><span style=\"font-weight: 400;\"> services guarantees accuracy, performance reliability, and saves businesses from a lot of wear and tear. That\u2019s why working with experts on the matter can be so helpful. Not only can they point you toward the right network security appliance, but they can also walk you through proper setup as well.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec6c466 elementor-widget elementor-widget-heading\" data-id=\"ec6c466\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The Final Word\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e949ec elementor-widget elementor-widget-text-editor\" data-id=\"2e949ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Building a business network is a strategic decision, one that affects security, productivity, and scalability. Defining your goals, requirements, and configuration needs are all core parts of IT infrastructure best practices here.<\/span><\/p><p><span style=\"font-weight: 400;\">Small business owners tend to be frequent targets of evolving cyber threats, highlighting the crucial need for a layered security stack. Avoid the trial and error and come have a <\/span><a href=\"https:\/\/www.firewalls.com\/contact\"><span style=\"font-weight: 400;\">talk with us<\/span><\/a><span style=\"font-weight: 400;\"> at Firewalls.com about how we can help you find the right network and security solutions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-311d367 elementor-widget elementor-widget-button\" data-id=\"311d367\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:3172254117\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Call Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f235c3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6f235c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbf7b37 elementor-widget elementor-widget-heading\" data-id=\"dbf7b37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76b237c elementor-widget elementor-widget-n-accordion\" data-id=\"76b237c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1240\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1240\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why Can\u2019t Small Business Owners Rely on a DIY Approach for Network Security? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1240\" class=\"elementor-element elementor-element-08df670 e-con-full e-flex e-con e-child\" data-id=\"08df670\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3df3255 elementor-widget elementor-widget-text-editor\" data-id=\"3df3255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Cybersecurity requires layered protection, proper configuration, and ongoing management. A DIY approach will leave gaps that advanced threats can easily exploit.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1241\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1241\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How do I Determine the Right Network Security Goals for My Business? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1241\" class=\"elementor-element elementor-element-7dd87e0 e-con-full e-flex e-con e-child\" data-id=\"7dd87e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b787b6d elementor-widget elementor-widget-text-editor\" data-id=\"b787b6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Start by evaluating your industry, daily workflows, and compliance requirements. Also consider whether you need support for remote users or multiple locations. These factors define the level of performance, access control, and protection you\u2019ll need.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1242\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1242\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Are Firewall Licenses and Subscriptions Really Necessary? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1242\" class=\"elementor-element elementor-element-1185d6c e-con-full e-flex e-con e-child\" data-id=\"1185d6c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a5525e elementor-widget elementor-widget-text-editor\" data-id=\"8a5525e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Yes, many critical protections, such as email security, phishing prevention, and sandboxing, are delivered through licenses and subscriptions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1243\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1243\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What Makes Firewall Configurations so Challenging? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1243\" class=\"elementor-element elementor-element-0b661bb e-flex e-con-boxed e-con e-child\" data-id=\"0b661bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe7328 elementor-widget elementor-widget-text-editor\" data-id=\"cfe7328\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Firewall setup involves network diagramming, rule creation, NAT policies, and user segmentation. A single misconfiguration can make for a vulnerable network.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1244\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1244\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> When Should a Small Business Owner Consider Professional Network Configuration? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1244\" class=\"elementor-element elementor-element-412d53b e-flex e-con-boxed e-con e-child\" data-id=\"412d53b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12abbbc elementor-widget elementor-widget-text-editor\" data-id=\"12abbbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">If your network deals with sensitive data, remote access, or compliance requirements, professional configuration guarantees reliability, reduces risk, and helps you avoid a ton of trial and error.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Learn about the three questions every small business owner should ask before building their own network to avoid unnecessary trial and error.<\/p>\n","protected":false},"author":13,"featured_media":27104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[597],"tags":[],"class_list":["post-12834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-firewalls"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Firewall Questions Every Small Business Owner Should Ask<\/title>\n<meta name=\"description\" content=\"Learn about the three questions every small business owner should ask before building their own network to avoid unnecessary trial and error.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Firewall Questions Every Small Business Owner Should Ask\" \/>\n<meta property=\"og:description\" content=\"Learn about the three questions every small business owner should ask before building their own network to avoid unnecessary trial and error.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-15T19:20:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-03T16:59:09+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/12\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lucas Modrall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucas Modrall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/\"},\"author\":{\"name\":\"Lucas Modrall\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/cc1ba4fb3acd1d71c1c04434567b3f53\"},\"headline\":\"Small Business Owners: 3 Questions You Should Ask Before Building Your Own Network\",\"datePublished\":\"2017-12-15T19:20:55+00:00\",\"dateModified\":\"2026-02-03T16:59:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/\"},\"wordCount\":1104,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png\",\"articleSection\":[\"Firewalls\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/\",\"name\":\"3 Firewall Questions Every Small Business Owner Should Ask\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png\",\"datePublished\":\"2017-12-15T19:20:55+00:00\",\"dateModified\":\"2026-02-03T16:59:09+00:00\",\"description\":\"Learn about the three questions every small business owner should ask before building their own network to avoid unnecessary trial and error.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png\",\"width\":1120,\"height\":630,\"caption\":\"3 Questions Every Small Business Owner Should Ask Before Building Their Own Network\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/3-questions-smb\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Small Business Owners: 3 Questions You Should Ask Before Building Your Own Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/cc1ba4fb3acd1d71c1c04434567b3f53\",\"name\":\"Lucas Modrall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"caption\":\"Lucas Modrall\"},\"description\":\"Lucas is a Content Writer for Firewalls.com. He copywrites all of our short and long-form blog content.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/lucas-m-5b4106186\\\/\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/lucasm\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Firewall Questions Every Small Business Owner Should Ask","description":"Learn about the three questions every small business owner should ask before building their own network to avoid unnecessary trial and error.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/","og_locale":"en_US","og_type":"article","og_title":"3 Firewall Questions Every Small Business Owner Should Ask","og_description":"Learn about the three questions every small business owner should ask before building their own network to avoid unnecessary trial and error.","og_url":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2017-12-15T19:20:55+00:00","article_modified_time":"2026-02-03T16:59:09+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/12\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png","type":"image\/png"}],"author":"Lucas Modrall","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Lucas Modrall","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/"},"author":{"name":"Lucas Modrall","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/cc1ba4fb3acd1d71c1c04434567b3f53"},"headline":"Small Business Owners: 3 Questions You Should Ask Before Building Your Own Network","datePublished":"2017-12-15T19:20:55+00:00","dateModified":"2026-02-03T16:59:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/"},"wordCount":1104,"commentCount":0,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/12\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png","articleSection":["Firewalls"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/","url":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/","name":"3 Firewall Questions Every Small Business Owner Should Ask","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/12\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png","datePublished":"2017-12-15T19:20:55+00:00","dateModified":"2026-02-03T16:59:09+00:00","description":"Learn about the three questions every small business owner should ask before building their own network to avoid unnecessary trial and error.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/3-questions-smb\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/12\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/12\/3-Questions-Every-Small-Business-Owner-Should-Ask-Before-Building-Their-Own-Network.png","width":1120,"height":630,"caption":"3 Questions Every Small Business Owner Should Ask Before Building Their Own Network"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/3-questions-smb\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Small Business Owners: 3 Questions You Should Ask Before Building Your Own Network"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/cc1ba4fb3acd1d71c1c04434567b3f53","name":"Lucas Modrall","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","caption":"Lucas Modrall"},"description":"Lucas is a Content Writer for Firewalls.com. He copywrites all of our short and long-form blog content.","sameAs":["https:\/\/www.linkedin.com\/in\/lucas-m-5b4106186\/"],"url":"https:\/\/www.firewalls.com\/blog\/author\/lucasm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=12834"}],"version-history":[{"count":35,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12834\/revisions"}],"predecessor-version":[{"id":28067,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12834\/revisions\/28067"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27104"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=12834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=12834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=12834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}