Blog October 12, 2016

DDoS Protection and Attack Prevention

Distributed denial of service (DDoS) attacks are increasingly prevalent, and can be time consuming and costly. These attacks have become stronger and more difficult to detect, and can be disastrous for any organization with a network that uses the Internet for business success.

A DDoS attack makes it almost impossible for an organization to service incoming requests on their network because attackers externally find a way to overwhelm the network connection and exhaust all resources to block all legitimate requests. When a network is running smoothly, Internet services take requests from the network, perform work, and send back the result. However, a DDoS attack makes large number of requests to a network service, usually using compromised computers in multiple places, to clog up the network connection. This generates more traffic than the receiving site can deal with.

There are multiple reasons why a DDoS attack can occur. The attacker could use it as a “smokescreen” to distract the targeted organization from other malicious activities, including viruses, ransomware, and other malware. It could also be a tactic for extortion or retaliation. These DDoS attacks are getting stronger and faster; malware code could allow attackers to harness the bandwidth of devices making up the internet of things (IoT) to deliver DDoS attacks up to one terabit or 1,000Gbps.

Since the prevalence of these attacks is increasing and could have a significant impact on a business, it is ideal to defend against DDoS before it starts. DDoS attacks are time-consuming and expensive, and it can take hours to detect and mitigate a DDoS attack. Therefore, having a DDoS solution in place is essential.

At Connectria, Relentless Security™ is an instilled mindset. All customers get 3Mbps of “clean” traffic. However, if a customer is using more than that amount, they could be susceptible to a DDoS attack. We work with all customers to determine the level of protection that is needed for their environments, from assisting in protecting and mitigating DDoS attacks to scanning for operating system vulnerabilities and correcting them.  We have a knowledgeable staff to help in understanding the risk associated with the maintaining private data and to be able to wrap the proper controls and safe guards around the systems that host the data. If you have any questions or concerns regarding the security of your network, please contact us.

Related Resources

Burnout in Technology Leadership (and what to do about it)
For all the ways in which technology dominates business news and business blogs, it’s surprising that people are not talking more about a very pervasive…
It’s Time to Add Social Media to Your HIPAA Compliance Checklist
Whether they’re not-for-profits or more commercially focused operations, healthcare providers are in the business of healthcare. That means they care about developing relationships with their…
Know Your Audit Reports! More Advice on Vetting Cloud Providers
In a recent post, we discussed four ways to vet a cloud provider before trusting them with your mission-critical workloads. If you missed that post,…