1999 marked the first recorded case of a distributed-denial-of-service (DDoS) attack. A small set of computers which were infected with malware attacked, and took offline, the entire network of the University of Minnesota. Fast forward 20 years and DDoS attacks have evolved into a much larger and more significant security threat to today’s organisations.more →
On my way home from visiting a customer last week, I was thinking about a question that he had raised. He asked me “What is the best way to prepare for a DDoS attack?”
A DDoS attack is a special type of Denial of Service attack. Malicious traffic is generated from a multitude of sources and orchestrated from one central point.more →
Protecting UK energy and utility companies from cyber and distributed denial of service (DDoS) attacks is a top priority for the government. Organizations responsible for critical national infrastructure have become a prime target for denial-of-service events; a DDoS attack is designed to overwhelm networks with bogus traffic and has the potential to cause massive utility outages and service disruption.more →
Resilient Firewalls, DDoS Mitigation, Multi-factor Authentication are the sexy parts of IT but can be easily brought down if the small things are ignored. By ‘small’ things I really mean the more mundane tasks linked to good IT security;
- Admin Rights
- SSL Certificates
If your AV is not up-to-date and a network user accidentally clicks on a
link, opens an attachment or falls for a phishing scam, it could result in
a destructive virus spreading around the network, locking users out of
important data or destroying the data.
IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network. The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025. Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.more →
This month we are sharing a blog from our security partner Oracle Dyn that takes a look at dealing with DDoS attacks.
If a DDoS attack hasn’t happened to your organization yet, odds are one will eventually. So it’s crucial to familiarize yourself with DDoS attack mitigation best practices.more →
This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.
A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.more →
With the prevalence of massive cyber-attacks in recent years, it is no wonder that cyber insurance is a growing industry. See our blog on the types of cyber insurance available.
Some companies are weighing the pros and cons of cyber insurance versus DDoS protection. However perhaps it is not the answer that we should look at, but the question.more →