Jan 4, 2017

Hosting in the Age of DDoS

Distributed Denial of Service (DDoS) attacks have been around for years, but lately the threat potential has risen for a variety of reasons. One of the primary factors is the propagation of minimally secured Internet of Things (IoT) devices. DDoS attacks were initially simple to execute and protect against, but the attacks have become more complex and more challenging than ever. The most sophisticated attacks employ botnets which are vast swarms of zombified systems directed at a specific target. Currently, DDoS attacks can be purchased by the minute on the web, and tools to execute your own attacks are easily found online.

In a study commissioned by Incapsula, the average cost for these attacks was quantified and found to be more significant than many people realize. Consider that half of all attacks last between 6 and 24 hours. If you consider an average hourly cost of $40,000 per hour it’s easy to compute a DDoS attack can quickly become a half-million dollar affair. These DDoS attacks can be a profit killer, and potentially even a business killer.

Guarding information

As a hosting company, these threats are of critical importance – not only for our operations, but also as we provide service for our customers. Protecting customer traffic is an important part of the services we provide, and we utilize the latest in methodology and inline tools to mitigate DDoS efforts in real time. Automated alerting, redundant systems, and expert intervention are essential to our mitigation formula.

There’s another side to the DDoS discussion that relies heavily on design and preparation. The massive DDoS attack that targeted DYN in October was a clear example of why businesses need to have diverse connectivity and diverse resources in their continuity plans. The lesson was less about IoT than about dependence on a single source of DNS services, because those utilizing secondary DNS services experienced less of an impact from that event.

Hosting in the know

Partnering with a hosting company that is up to speed on the latest attacks and threats that exist today is one of the best actions that a company can take. In addition to adding resilient geo-diverse architecture and capabilities to company workloads, the selection of a capable hosting company with great support alleviates the resources a company would otherwise have to muster. A well-designed application delivery system implements great technology, diverse resources, automation, around-the-clock support, and a partner that is there with practical answers to help business in a time of threat.

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedIn

Tags: , , , , , ,