Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

NCSC Guidance On Preparing For A Denial Of Service Attack

Alastair Horner

Distributed Denial of Service or DDoS is an attack where there is an attempt to render an online service unavailable by overwhelming it with traffic from multiple distributed sources.

The National Cyber Security Centre (NCSC) is a pivotal organization in cyber security advice and supports the most critical organizations in the UK, the wider public sector, industry, SMEs and the general public.

more →

Blog

DoH!

Iain Westwood

DoH, or DNS over HTTPS to be precise, has featured in mainstream media in recent weeks. Both Mozilla and Google have confirmed that their Firefox and Chrome browsers will be implementing DoH by default but what exactly is it and why does it have ISP’s worried?

To recap, DNS (or the Domain Name System) is used to translate a human-readable host address such as www.activereach.net to its underlying IP address that your computer can connect to in order to receive content.  

more →

Blog

Why Enterprises Should Consider Moving To Open Source Networking

John Clark

The traditional way of designing and procuring hyper-scale networks has been seen almost as an outmoded concept since the advent of Software Defined Networking (SDN) and Network Function Virtualisation (NFV) but the key part of this wave, the use of open source operating systems for network switches and routers, is allowing a real “sea-change” in the industry.

more →

Blog

Make your Endpoint Protection work smarter not harder with SOAR

Oliver Sears

When we hear the term ‘Endpoint Security’ we often think of making sure your organization is protected from malicious actors and cyberattacks attacking via an endpoint. This involves making sure that all the access points into an organization’s critical systems and physical devices are protected from unauthorized access to prevent damage to the rest of the network.

more →

Blog

20 Years of DDoS attacks

Oliver Sears

1999 marked the first recorded case of a distributed-denial-of-service (DDoS) attack. A small set of computers which were infected with malware attacked, and took offline, the entire network of the University of Minnesota. Fast forward 20 years and DDoS attacks have evolved into a much larger and more significant security threat to today’s organisations.

more →

Blog

Is your ISP keeping up with evolving DDoS threats?

Iain Westwood

How DDoS attacks have evolved

As with most IT security threats, distributed denial of service attacks have evolved over time.  Simple attacks at the network level designed to exhaust target bandwidth capacity have been complemented with more complex and subtle attacks that can bring down websites but leave the network standing, often without triggering DDoS mitigation.

more →