We have always advocated DDoS testing your systems on a regular basis on the premise that it is no good waiting until you experience a DDoS attack to find out that the mitigation that you so diligently put in place doesn’t provide the protection you need. But we know that many companies struggle to find the time to be able to run such tests.more →
This month we are sharing a blog from our partner Radware who explain why DDoS protection is so important.
DDoS protection can easily be compared to a car’s airbag system: it’s hard to appreciate its true value until it’s needed. Like airbags, DDoS protection provides invaluable peace-of-mind and a constant safeguard against the lurking threats that no one wants to think about, but must always prepare for.more →
In the previous article in this series, we looked at the business case for DDoS (Distributed Denial of Service) testing. If you read this last post, you will probably agree that there are a number of features of DDoS attacks and DDoS mitigation systems that make DDoS attack testing particularly important.more →
Why conduct a DDoS Test?
Historically, security specialists have never placed DDoS testing high on the IT agenda, relying mainly on vulnerability assessment and penetration testing as a means of security validation. However, things are changing. DDoS attacks are no longer simply a risk to the availability of an IT system or service.more →
The IT Industry is full of terms and acronyms (see our DDoS Dictionary) and one that I have seen a lot of recently is DDoS Pen Testing, usually where Pen Testers are looking to include DDoS Testing as well. I wrote an article a while back on Penetration Testing and DDoS Testing and how these work together.more →
On my way home from visiting a customer last week, I was thinking about a question that he had raised. He asked me “What is the best way to prepare for a DDoS attack?”
A DDoS attack is a special type of Denial of Service attack. Malicious traffic is generated from a multitude of sources and orchestrated from one central point.more →
Resilient Firewalls, DDoS Mitigation, Multi-factor Authentication are the sexy parts of IT but can be easily brought down if the small things are ignored. By ‘small’ things I really mean the more mundane tasks linked to good IT security;
- Admin Rights
- SSL Certificates
If your AV is not up-to-date and a network user accidentally clicks on a
link, opens an attachment or falls for a phishing scam, it could result in
a destructive virus spreading around the network, locking users out of
important data or destroying the data.
IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network. The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025. Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.more →