The ugly truth is, these days it only takes a single individual armed with software they can easily buy on hacker trading boards to launch a devastating DDoS attack.
New York, NY (PRWEB) April 05, 2013
Last week was littered with eye-catching headlines about a cyber feud between two companies, Spamhaus and Cyberbunker, that culminated into a massive Distributed Denial Of Service (DDoS) attack - an attack whereby a website is purposefully flooded with enough bogus traffic to substantially slow it down, or even freeze it completely - with collateral damage spilling over to the point it had major news outlets like CNN reporting it may be the "biggest cyber attack in history" with a reach that caused global ramifications. The New York Times painted a vivid picture about an attack so fierce it turned the Internet against itself and then published a more detailed anatomy of the attack a few days later. But now that the dust has settled, it’s obvious the worst fears were not realized; the Internet didn’t “break,” and the collateral slowdown was not as significant as originally thought. That’s a good thing. But an even better thing to come out of it, according to Joe Caruso, founder and CEO/CTO of Global Digital Forensics, which offers state-of-the-art Distributed Denial of Service (DDoS) protection solutions, is that “it made a lot of noise. And on the heels of all that noise, hopefully it will be enough to grab some business owners, managers and executives by the collar and shake them into the realization that a successful DDoS attack could have devastating consequences for their business, with far-reaching repercussions that will not only affect them, but could also seriously affect their clients and vendors as well.”
How can businesses protect themselves for DDoS attacks?
“As with most aspects of cyber security,” Caruso explained, ”the first thing to realize is that there is no such thing as a fully automated, foolproof piece of software or hardware that will protect against every kind of cyber attack, and DDoS attacks are certainly no exception. To be truly effective, there has to be a human element in the loop. It’s like a self-driving car. They may be right on the money every single time on a controlled test track, but when things switch to a live-fire environment, we just don’t have anything yet that could be trusted to decide between hitting a mailbox or a pedestrian in an emergency situation where a real choice with real consequences must be made. Our DDoS protection solutions work on the same principle, automate everything possible, but keep real people, extremely knowledgeable and competent people, in the loop to determine and implement the best course of action should an actual emergency present itself.”
“Our cloud-based DDoS protection solution combines the best of the automated world with the best of the human world. We don’t rely on purpose-built DDoS mitigation devices to stop all attacks. Instead, we leverage years of real-world experience in dealing with DDoS attacks and give our clients a protection system that keeps them safeguarded by coordinating their web traffic through geographically dispersed nodes that not only protect them from DDoS attacks by not keeping all their eggs in one basket, but will also act like a content delivery system, allowing their website to handle unusual bursts of legitimate traffic without any ill effects as well. Every bit of traffic is constantly automatically analyzed for any unusual behavior according to baselines we establish during the initial implementation, and if any abnormalities are revealed, our 24/7 emergency response team will be alerted and will immediately investigate the nature of the disturbance. Then, making smart use of that unbeatable human element, decisions can quickly be made by our experienced team to determine the best course of action befitting the situation and they can apply the appropriate mitigation techniques right then and there. And since there is no interruption in service and no client intervention required, the whole thing will still feel fully automated from the clients perspective. Like I said, the best of both worlds.”
“We also understand how valuable having some control is to many clients, so we embrace that as well by having our own custom built customer access area (DSS) where customers are able to view and make changes to their configurations if they deem it necessary, as well as allowing them to see any attack in real-time. Clients are also able to customize the cache for optimal performance and can fine-tune hundreds of other parameters, allowing a client’s internal IT professionals to further enhance certain elements of their cyber security posture or improve performance as they see fit."
“So, even though this last massive DDoS attack didn’t actually break the Internet, make no mistake about it, a successful DDoS attack can break a business, and the longer you wait to act, the worse your chances become to survive and thrive on the cyber frontier. Because the ugly truth is, these days it only takes a single individual armed with software they can easily buy on hacker trading boards to launch a devastating DDoS attack. That means just one person with a different political or philosophical view, one underhanded competitor, one disgruntled employee, with one finger on one button can bring the rain. But we make it both simple and cost effective for clients to achieve excellent protection against DDoS attacks, so there are really no more good excuses not to act left.”
*Global Digital Forensics is a recognized industry leader in the fields of cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber incident has occurred, so don’t hesitate to get help. For more information, visit http://www.evestigate.com.