Red Blog Cyber

 

Systems down

Distributed Denial of Service

Distributed denial of service (DDoS) attacks are a very big deal for any business infrastructure, small business e-commerce and private home network as they can stop your system dead in its tracks.


A DDoS attack involves multiple connected online devices, or software collectively known as a botnet, which are used to overwhelm a target website with fake traffic requests.


In doing so overwhelming the target server and forces it offline as the hardware reaches its limitations and crashes.

 

How to prevent a DDoS attack

1. Check your network’s traffic.

By knowing the baseline amount of Internet traffic that your business platform has you will be better informed if the level rises above the normal rate given your cyber security team if you have one or yourself a better chance of confirming if your system is under a Ddos attack.

 

2. Denial of Service Response Plan

Do you know what will happen, when, and if a DDoS attack is happening?

How will you or your organization respond?

By creating a plan, you’ll be able to respond quickly and effectively if you or the team suspects your network is targeted.

The scale of current and planned development of the IT infrastructure requires a plan of action for response and possibly a duel redundant system so one half of the network can be worked on while the other half carries and manages the load enabling the network to fully stay online and for business to carry on as usual.

We recommend having the following in place as a guide to work with.

• A systems checklist,
Knowing what systems you have in place and how they run will help your response team to locate and repair issues.

• A trained response team,
Having a trained cyber security response team normally known as blue team will help keep an eye on the network flow and should be able to defend against malicious attacks.

• Well-defined notification and escalation procedures.
The right chain of command is required so everyone that needs to know is kept up to date.

• A list of internal and external contacts that should be informed about the attack
Keeping your suppliers and customers informed will help maintain transparency and respect as well as alerting them to the situation.

• A communication plan for all other stakeholders, like customers, or vendors
As above keep everyone in the loop as other methods of communication and business may be used like phone direct payments and use of other websites and Internet links for your business.

Always back up your business Infrastructure and keep a backup server that’s kept offline.
Very similar safety protocol to ransomware attacks.


For more information on ransomware please click on the link below for our Red Blog page atRed Team Consultants.
https://chasereality.co/category/security/

Leave a Reply


Notice: ob_end_flush(): Failed to send buffer of zlib output compression (0) in /home2/chaseity/public_html/wp-includes/functions.php on line 5420