5 DDoS Myths Debunked

1 | 2 | 3 | 4 | 5 | 6 | 7
Next 5 DDoS Myths Debunked-4 Next

Detecting DDoS Threats

Myth: If DDoS attacks were a problem, someone would have told us.

Fact: You pay your ISP for internet connectivity. It is obligated to maintain your connections and deliver of your traffic – whether this traffic is good or bad. It is not obligated to clean your traffic – unless you are willing to pay for this service. In today's threat landscape, it's essential for any organization that has a service that is reliant upon network availability to have the ability to detect, validate and contain threats as quickly as possible in order to minimize damage.

Yes, some of the largest DDoS attacks recorded have reached over 600Gbps, but what's even more disturbing is that the average attack size is expected to grow to 1.15Gbps by the end of 2016. This becomes especially worrying considering a 1Gbps DDoS attack is large enough to take most organizations completely offline. In other words, don't be so sure you're protected because it doesn't necessarily require a large attack to cause significant damage to your company. This means having the right tools and visibility in place to see what is transpiring on your own network.

Enterprises and service providers worldwide, across every industry, face a never-ending deluge of distributed denial-of-service (DDoS) attacks that continue to rise in size, frequency and complexity. Unfortunately, not all companies realize the danger that DDoS attacks pose, or have insight into their own risk profile. The bottom line is that you first need to understand the facts about both in order to determine the right amount of insurance and risk you're willing to live with. In an effort to shed more light on these issues, Tom Bienkowski of Arbor Networks has outlined the five most common DDoS myths that he's heard from customers and prospects in the field.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.