A border firewall separates your network from the internet and should prevent an attacker from having access to a computer on the network the place you store delicate information. Set “access controls”—settings that decide which units and traffic get by way of the firewall—to permit only trusted devices with a respectable business have to access the network. Since the safety a firewall offers is only as efficient as its entry controls, review them periodically. If a laptop computer contains sensitive data, encrypt it and configure it so users can’t obtain any software or change the security settings without approval from …