by Amy Pace, Yaagneshwaran Ganesh - SolarWinds - Friday, 6 September 2013.
Another important step is to ensure your firewalls and network devices are configured
properly and that you have the appropriate rules and filters in place. Configuration and change management plays a vital role in protecting your network from unauthorized and erroneous changes that could leave your critical devices vulnerable.
Following these guidelines can go a long way in protecting your IT infrastructure and services. It’s much better to implement precautionary measures up front to prevent an attack than to try and recover after one has occurred.