SHARE
Facebook X Pinterest WhatsApp

Preparing for Notorious Cyber Attack Dates: Five Steps to Secure Your Network

Several dates throughout the year are notorious for wreaking havoc on businesses via denial of service (DoS) attacks, data breaches and even malware or botnet assaults. As anniversaries such as September 11th near, rumors about coordinated cyber attacks on American websites increase. Because of these potential risks, it’s imperative that businesses tighten their network security […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Sep 10, 2013

Several dates throughout the year are notorious for wreaking havoc on businesses via denial of service (DoS) attacks, data breaches and even malware or botnet assaults. As anniversaries such as September 11th near, rumors about coordinated cyber attacks on American websites increase. Because of these potential risks, it’s imperative that businesses tighten their network security measures in order to protect themselves from potential intrusion or disruption, which can result in profit-loss and tarnished user confidence.

According to Radware®, a leading provider of application delivery and application security solutions for virtual and cloud data centers, there are two types of dates that hackers target: ideological and business-relevant dates. Ideological dates refer to holidays and anniversaries that have a cultural, religious or secular tie to the adversary. High-risks times for the United States, in addition to September 11th, include Memorial Day, Election Day and Independence Day. Business-relevant dates involve a period of time that companies are particularly vulnerable to attacks, such as Black Friday, Cyber Monday, or even regular business hours.

Additionally, hackers commonly use important dates and holidays to disrupt specific industries. For example, retail and credit card companies see a significant rise in cyber attacks between Thanksgiving and Christmas, whereas government websites may be targeted during Election or Independence Days.

“Timing is an extremely influential risk-factor for cyber attacks throughout the year,” said Carl Herberger, vice president of security solutions for Radware. “Hackers capitalize on overwhelming their target’s environment on days of great importance and look to exploit vulnerabilities that cause the most detriment.

Because these types of assaults show no signs of slowing, it’s crucial that businesses implement anticipatory security measures in preparation of these peak times so that networks and data centers are able to properly detect and defend against sophisticated threats.”

There are five immediate steps that network administrators and security professionals can take to defend and prepare their networks during these at-risk times of the year.

Preparing for Notorious Cyber Attack Dates: Five Steps to Secure Your Network - slide 1

Click through for five steps organizations can take to prepare for high-risk times of the year, as identified by Radware®.

Preparing for Notorious Cyber Attack Dates: Five Steps to Secure Your Network - slide 2

Businesses should recognize which times of the year present excessive levels of risk and develop strategic plans to mitigate issues in the event of a cyber attack.

Preparing for Notorious Cyber Attack Dates: Five Steps to Secure Your Network - slide 3

Once at-risk dates are acknowledged, Radware recommends conducting a detailed risk assessment. Aside from classifying top dates for cyber attacks, companies should also highlight seasons for increased Web traffic and periods for increased vulnerability that have presented an issue in the past or have the potential to be problematic. Through this assessment, a strategic security plan can then be developed.

Preparing for Notorious Cyber Attack Dates: Five Steps to Secure Your Network - slide 4

Companies are also advised to plan ahead of seasonal risk by ensuring the network is properly and reliably protected by a leading network security solution. Because it could take up to six months to prepare in advance of high-risk dates, it is important for IT organizations to plan for at-risk periods ahead of time.

Preparing for Notorious Cyber Attack Dates: Five Steps to Secure Your Network - slide 5

In order to ensure that security solutions are functioning at full capacity, Radware suggests running network simulations using both common and emerging cyber attack approaches. By analyzing potential methods of infiltration and denial of service (DoS) disruptions, network administrators will be able to detect flaws and repair the system before the high-risk season commences.

Preparing for Notorious Cyber Attack Dates: Five Steps to Secure Your Network - slide 6

Employees are often the weakest links in an organization’s cybersecurity plan. Ensure that all staff members are fully aware of the latest tricks and scams that hackers are utilizing to infiltrate networks by providing training and ongoing education on organizational cybersecurity policies and procedures.

By implementing these best practices, businesses can prepare and fortify their networks against heightened times of risk. Regardless of these hypersensitive periods, businesses should employ reliable security solutions to protect their networks year-round.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.