{"id":13954,"date":"2019-02-18T13:50:31","date_gmt":"2019-02-18T18:50:31","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=13954"},"modified":"2025-12-19T15:54:35","modified_gmt":"2025-12-19T20:54:35","slug":"configuration-conundrum","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/","title":{"rendered":"The Configuration Conundrum: When Good Businesses Make Bad Choices on Firewall Configuration"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13954\" class=\"elementor elementor-13954\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-70fff82 e-flex e-con-boxed e-con e-parent\" data-id=\"70fff82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a1c8375 elementor-widget elementor-widget-text-editor\" data-id=\"6a1c8375\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Breaking Down the Common Reasons Why Businesses Skip a Professional Firewall Configuration<\/h3><p>At <a href=\"https:\/\/www.firewalls.com\" target=\"_blank\" rel=\"noopener noreferrer\">Firewalls.com<\/a> we spend each and every day discussing common network security woes, helping partners <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">craft unique solutions<\/a>, and helping to widen <a href=\"https:\/\/www.firewalls.com\/blog\/firewall-buyers-guides\/\" target=\"_blank\" rel=\"noopener noreferrer\">firewall education and expertise for all<\/a>. We\u2019ve heard it all: knee-slapping tales from administrators in sticky situations; never-seen-before security conundrums and, of course, plenty of bad excuses. Any network security engineer worth their salt understands that securing small business networks doesn\u2019t stop at choosing which <a href=\"https:\/\/www.firewalls.com\/category\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">appliance model<\/a> or <a href=\"https:\/\/www.firewalls.com\/licensing.html\" target=\"_blank\" rel=\"noopener noreferrer\">services<\/a> to buy. Even the most modern and impressive hardware is no better than a door stop if administrators don\u2019t understand how to <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">configure, deploy, and maintain<\/a> the complex security systems needed to combat 2019\u2019s most advanced threats.<\/p><p>Our new video series, which we\u2019ve named the Configuration Conundrum, takes a hard look at some of the less-than-solid reasons why businesses choose to configure their own firewall (or, in most cases, attempt to configure their own firewall) instead of having their advanced security appliances configured by a team of experienced, certified engineers. Over the next few episodes, we\u2019re putting the penny-pinchers, security-gamblers, and \u201cI\u2019ll-get-to-it-later\u201d guys on blast! So <a href=\"https:\/\/www.youtube.com\/channel\/UCSrIRjKmlu_X897HdJr0Tlg\" target=\"_blank\" rel=\"noopener noreferrer\">hop over to our YouTube channel and join us<\/a> as we dissect the most common reasons why small businesses risk their security (and your confidential data) by opting for sub-par or non-existent firewall configurations.<\/p><h3>Check Out the Videos<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a97308b elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"a97308b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/U6qnMzLX8MA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-608bc4e elementor-widget elementor-widget-text-editor\" data-id=\"608bc4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>\u201cI\u2019ve got a guy for that!\u201d Ah, yes. We\u2019ve all got our favorite vaguely-titled \u201cbusiness consultant\u201d or \u201cIT solution grower\u201d to fall back on. Whatever title he claims on his LinkedIn profile, he can run cables, register employee MAC addresses, reconnect the printers, and can maybe fix the coffee pot too.<\/em><\/p><p><em>Is he a security expert? Not specifically.<\/em><\/p><p><em>Does he have network experience? He\u2019s got a little experience in a lot of things.<\/em><\/p><p><em>Does he have certifications, manufacturer training, or industry accolades? No, but he\u2019ll cut you a great deal.<\/em><\/p><p><em>Check out this short video to see what can go wrong when your guy accidentally leaves the door open to ransomware on your network.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdb1469 elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"cdb1469\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/_pCbrpB_8TA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91f1c3d elementor-widget elementor-widget-text-editor\" data-id=\"91f1c3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Budget constraints. We get it. That\u2019s our go-to excuse when we\u2019re looking to get off a sales call too! As cyber security threats grow more advanced and more dangerous, the once modest IT budget is encroaching further and further up the P&amp;L, eating up OpEx that you were hoping to carry into next quarter.<\/em><\/p><p><em>A good configuration pays for itself. By eliminating unnecessary services, preventing bottlenecks that slow down business-critical resources, and intelligently restricting network traffic to productive activities, a professional firewall configuration ensures that you\u2019re not wasting resources or, worse, rendering your security investment moot by leaving elusive pinholes and blindspots that persistent threats use to worm their way in.<\/em><\/p><p><em>Check out this Budget video to see why prevention is ALWAYS cheaper than remediation.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acfd3b9 elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"acfd3b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/DPVoucEQrIs&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf7ffdc elementor-widget elementor-widget-text-editor\" data-id=\"bf7ffdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Some people can\u2019t resist a good puzzle. For the enterprising DIY master a complex firewall configuration seems like tempting sport. Unfortunately, they rarely have the expensive virtual labs needed to stress-test their results with simulated traffic, pre-staged attacks, and benchmarking platforms.<\/em><\/p><p><em>What that means is that their first real attack is a live-fire assessment of how well they did. Like testing out a boat design by shipping out to sea, configuration-hobbyists often find themselves frantically patching holes, bailing water, and holding bulkheads in place as they gradually slip beneath the waves.<\/em><\/p><p><em>60% of small businesses that experience a data breach shutter their doors within 6 months. This video outlines why you should never gamble your life\u2019s work on a weekend project.<\/em><\/p><h3>How to Ensure a High-Quality, Professional Firewall Configuration<\/h3><p>Don\u2019t deploy top-dollar hardware with bottom of the barrel settings. <a href=\"https:\/\/www.firewalls.com\/blog\/configuration-checklist\/\" target=\"_blank\" rel=\"noopener noreferrer\">Look behind the curtain of the setup wizard<\/a> and you\u2019ll see that the cyber threats of 2019 can\u2019t be whisked away with a magic wand. If you want to make the very most of your security investment; if you want to take advantage of <a href=\"https:\/\/www.firewalls.com\/blog\/sophos-security-heartbeat\/\" target=\"_blank\" rel=\"noopener noreferrer\">cutting-edge technologies working in perfectly-integrated harmony<\/a>; if you want personalized solutions with 1-on-1 considerations designed to address your unique needs and demands, you deserve a <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">professional firewall configuration<\/a>.<\/p><p>You should seek out a professional services team with an on-site Security Operations Center, a multitude of certifications, and tangible experience earned through on-going education and a rich history of security expertise.<\/p><p>Still want to take a crack at DIY? We wish you the best of luck and recommend you check out the <a href=\"http:\/\/firewalls.com\/pub\/media\/wysiwyg\/datasheets\/FirewallConfigurationQuickStartChecklist.pdf\" target=\"_blank\" rel=\"noopener\">Configuration QuickStart Checklist<\/a>.<\/p><p>Our configuration checklist guides you through the steps of the configuration process and helps you keep your settings, rules, and hierarchies organized. It\u2019s in-depth and <strong>completely free to download<\/strong>!<\/p><p><a href=\"http:\/\/firewalls.com\/pub\/media\/wysiwyg\/datasheets\/FirewallConfigurationQuickStartChecklist.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"btn btn-primary\">Get the Configuration QuickStart Checklist<\/button><\/a><\/p><p>Stay tuned for our second installment where we\u2019ll cover even more of the common excuses that business use to skip out on professional firewall configurations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Whether its underestimating advanced threats or just refusing to part with another penny, there are a handful of common reasons why otherwise good businesses make poor choices when it comes to firewall configuration. 99% of network breaches can be blamed on a misconfigured firewall. So why is it still so common?<\/p>\n","protected":false},"author":5,"featured_media":13959,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[597],"tags":[],"class_list":["post-13954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-firewalls"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Config Conundrum: 3 Reasons SMBs Neglect Firewall Configuration<\/title>\n<meta name=\"description\" content=\"Whether its underestimating advanced threats or just refusing to part with another penny, there are a handful of common reasons why otherwise good businesses make poor choices when it comes to firewall configuration. 99% of network breaches can be blamed on a misconfigured firewall. So why is it still so common?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Config Conundrum: 3 Reasons SMBs Neglect Firewall Configuration\" \/>\n<meta property=\"og:description\" content=\"Whether its underestimating advanced threats or just refusing to part with another penny, there are a handful of common reasons why otherwise good businesses make poor choices when it comes to firewall configuration. 99% of network breaches can be blamed on a misconfigured firewall. So why is it still so common?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-18T18:50:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T20:54:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/02\/Depositphotos_51148427_l-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1291\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"The Configuration Conundrum: When Good Businesses Make Bad Choices on Firewall Configuration\",\"datePublished\":\"2019-02-18T18:50:31+00:00\",\"dateModified\":\"2025-12-19T20:54:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/\"},\"wordCount\":838,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_51148427_l-2015.jpg\",\"articleSection\":[\"Firewalls\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/\",\"name\":\"Config Conundrum: 3 Reasons SMBs Neglect Firewall Configuration\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_51148427_l-2015.jpg\",\"datePublished\":\"2019-02-18T18:50:31+00:00\",\"dateModified\":\"2025-12-19T20:54:35+00:00\",\"description\":\"Whether its underestimating advanced threats or just refusing to part with another penny, there are a handful of common reasons why otherwise good businesses make poor choices when it comes to firewall configuration. 99% of network breaches can be blamed on a misconfigured firewall. So why is it still so common?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_51148427_l-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Depositphotos_51148427_l-2015.jpg\",\"width\":2000,\"height\":1291,\"caption\":\"Making the right choice when it comes to firewall configuration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/configuration-conundrum\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Configuration Conundrum: When Good Businesses Make Bad Choices on Firewall Configuration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Config Conundrum: 3 Reasons SMBs Neglect Firewall Configuration","description":"Whether its underestimating advanced threats or just refusing to part with another penny, there are a handful of common reasons why otherwise good businesses make poor choices when it comes to firewall configuration. 99% of network breaches can be blamed on a misconfigured firewall. So why is it still so common?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/","og_locale":"en_US","og_type":"article","og_title":"Config Conundrum: 3 Reasons SMBs Neglect Firewall Configuration","og_description":"Whether its underestimating advanced threats or just refusing to part with another penny, there are a handful of common reasons why otherwise good businesses make poor choices when it comes to firewall configuration. 99% of network breaches can be blamed on a misconfigured firewall. So why is it still so common?","og_url":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2019-02-18T18:50:31+00:00","article_modified_time":"2025-12-19T20:54:35+00:00","og_image":[{"width":2000,"height":1291,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/02\/Depositphotos_51148427_l-2015.jpg","type":"image\/jpeg"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"The Configuration Conundrum: When Good Businesses Make Bad Choices on Firewall Configuration","datePublished":"2019-02-18T18:50:31+00:00","dateModified":"2025-12-19T20:54:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/"},"wordCount":838,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/02\/Depositphotos_51148427_l-2015.jpg","articleSection":["Firewalls"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/","url":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/","name":"Config Conundrum: 3 Reasons SMBs Neglect Firewall Configuration","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/02\/Depositphotos_51148427_l-2015.jpg","datePublished":"2019-02-18T18:50:31+00:00","dateModified":"2025-12-19T20:54:35+00:00","description":"Whether its underestimating advanced threats or just refusing to part with another penny, there are a handful of common reasons why otherwise good businesses make poor choices when it comes to firewall configuration. 99% of network breaches can be blamed on a misconfigured firewall. So why is it still so common?","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/02\/Depositphotos_51148427_l-2015.jpg","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/02\/Depositphotos_51148427_l-2015.jpg","width":2000,"height":1291,"caption":"Making the right choice when it comes to firewall configuration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Configuration Conundrum: When Good Businesses Make Bad Choices on Firewall Configuration"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/13954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=13954"}],"version-history":[{"count":28,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/13954\/revisions"}],"predecessor-version":[{"id":27521,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/13954\/revisions\/27521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/13959"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=13954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=13954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=13954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}