{"id":9672,"date":"2025-11-21T11:34:09","date_gmt":"2025-11-21T11:34:09","guid":{"rendered":"https:\/\/partnernews.sophos.com\/es-es\/?p=9672"},"modified":"2025-11-21T11:34:09","modified_gmt":"2025-11-21T11:34:09","slug":"securing-your-customers-network-for-the-holidays","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/es-es\/2025\/11\/products\/securing-your-customers-network-for-the-holidays\/","title":{"rendered":"Securing your customers\u2019 network for the holidays"},"content":{"rendered":"<p>It\u2019s that time of year when many IT teams \u2014 and their trusted partners \u2014 are preparing to spend more time with family and friends and less time monitoring dashboards and consoles.<\/p>\n<p>Unfortunately, the holiday season is also a peak period for cyberattacks. To help ensure your customers\u2019 networks remain secure and resilient, here are a few quick best practices you can share and implement.<\/p>\n<p>For a full list of recommendations to protect against ransomware and other attacks, be sure to <a href=\"https:\/\/www.sophos.com\/en-us\/content\/secure-your-network-from-ransomware\" target=\"_blank\" rel=\"noopener\">download our white paper on this topic<\/a>.<\/p>\n<h2><strong>Update Firmware and Shut Down Unnecessary Systems<\/strong><\/h2>\n<p>Before the holidays, make sure your customers\u2019 network infrastructure is fully updated with the latest firmware, and that any non-essential systems are taken offline. Any system exposed to the internet \u2014 either directly or indirectly (via NAT) \u2014 represents a potential vulnerability. Reduce that attack surface by disabling unnecessary services and updating everything that remains active.<\/p>\n<p>Firmware updates often include critical security patches and hardening enhancements that improve overall protection.<br \/>\nIf your customers use <a href=\"https:\/\/www.sophos.com\/en-us\/products\/next-gen-firewall\" target=\"_blank\" rel=\"noopener\">Sophos Firewall<\/a>, ensure they\u2019re running the latest firmware and consider enrolling them in the <a href=\"https:\/\/partnernews.sophos.com\/en-us\/2025\/10\/products\/sophos-firewall-v22-early-access\/\" target=\"_blank\" rel=\"noopener\">early access program for Sophos Firewall v22<\/a>, which introduces enhanced security hardening features and a new Health Check to validate firewall configuration.<\/p>\n<p>If your customers have other internet-facing infrastructure such as VPN concentrators or WAFs, verify those systems are also up to date or temporarily shut down.<\/p>\n<h2><strong>Check Configuration Against Best Practices<\/strong><\/h2>\n<p>Confirm that all access controls, portals, NAT rules, networked applications, IoT devices, and administration systems are either disabled or fully secured.<\/p>\n<p>Sophos Firewall v22 introduces <a href=\"https:\/\/partnernews.sophos.com\/en-us\/2025\/11\/products\/sophos-firewall-v22-security-enhancements\/\" target=\"_blank\" rel=\"noopener\">new security hardening capabilities<\/a> and a built-in <a href=\"https:\/\/partnernews.sophos.com\/en-us\/2025\/10\/products\/sophos-firewall-v22-health-check\/\" target=\"_blank\" rel=\"noopener\">Health Check feature<\/a> that compares configurations against best practices \u2014 making it easier for you to identify and address potential risks before they become issues.<\/p>\n<p><iframe loading=\"lazy\" class=\"vidyard_iframe\" title=\"Sophos Firewall v22: Firewall health check overview\" src=\"\/\/play.vidyard.com\/YCR2f2SRgf6eTJfAVVpbum.html?\" width=\"640\" height=\"360\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h2><strong>Ensure All Systems Use Strong Authentication with MFA<\/strong><\/h2>\n<p>Encourage customers to protect all admin consoles and remote access systems with multi-factor authentication (MFA) \u2014 or shut them down entirely when not in use.<\/p>\n<p>Sophos solutions including Sophos Central, Sophos Firewall, and ZTNA support MFA to defend against brute-force attacks and compromised credentials.<br \/>\nSophos Firewall v22 also adds new MFA support for the Web Application Firewall, one of the <a href=\"https:\/\/partnernews.sophos.com\/en-us\/2025\/11\/products\/sophos-firewall-v22-your-top-requested-features\/\" target=\"_blank\" rel=\"noopener\">top requested features<\/a> in this release.<\/p>\n<p>In short, make sure MFA is enabled across all systems to minimize the risk of unauthorized access.<\/p>\n<h2><strong>If a Customer Is Attacked, We Can Help<\/strong><\/h2>\n<p>If one of your customers experiences an emergency incident during the holidays (or at any time), you can immediately engage the <a href=\"https:\/\/www.sophos.com\/en-us\/products\/incident-response-services\/emergency-response\" target=\"_blank\" rel=\"noopener\">Sophos Emergency Incident Service<\/a>.<\/p>\n<p>Our expert incident response team will triage, contain, and eliminate active threats \u2014 removing all traces of the attackers and restoring systems to a safe state. Whether it\u2019s an infection, compromise, or unauthorized access attempt, we\u2019ve seen and stopped it all.<\/p>\n<p>Sophos Emergency Incident Response is available 24\/7\/365, including throughout the holiday period.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tips to help your customers stay protected during the holiday season<\/p>\n","protected":false},"author":19,"featured_media":3000009865,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[72],"tags":[287,114],"coauthors":[44],"class_list":["post-9672","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-sfos-v22","tag-sophos-firewall"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2025\/10\/featured-image-sophos-firewall-v22-partner-blog-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/9672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/comments?post=9672"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/9672\/revisions"}],"predecessor-version":[{"id":9677,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/9672\/revisions\/9677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/media?parent=9672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/categories?post=9672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/tags?post=9672"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/coauthors?post=9672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}