main

Attack Types & VectorsDDoSSecurity

At Risk for DDoS Outages? If You Answer Yes to the First Five Questions – WATCH OUT!

March 24, 2016 — by Carl Herberger1

We’ve all seen executives boast after a high profile cyberattack outage that they have done all that they can do when it comes to preventing DDoS attacks or other type of cyberattack outage. They suggest that these DDoS attacks are inevitable and outages, ergo, are inevitable. However, is this true?

Or are there flaws in the corporate structure of these organizations that make it harder for them to combat cyber-attack, such as a lack of qualified security-specific resources in personnel or equipment. The truth is that not all companies are created equal in their risk for outages from cyberattacks.

The truth is not all companies are rendered unserviceable from a cyberattack. We often hear about the problems companies face when they are hit, but there many are unsung heroes who have cleverly crafted environments which are both resilient to cyberattacks and have a strong ability to be resilient when they come under attack. How can you evaluate your exposure to risk?

[You might also like: How to Prepare for a DDoS Attack]

Here is a list of questions focused on architectural structure of your network that you should ask to quickly assess the ‘disposition’ of a company to being rendered unavailable during a cyberattack:

Please feel free to contact me with additional questions you believe need to be included on this list as I will be routinely updating these and would love your input!

My best!

DDoS_Handbook_glow

Download Radware's DDoS Handbook to get expert advice, actionable tools and tips to help detect and stop DDoS attacks.

Download Now

Carl Herberger

Carl is an IT security expert and responsible for Radware’s global security practice. With over a decade of experience, he began his career working at the Pentagon evaluating computer security events affecting daily Air Force operations. Carl also managed critical operational intelligence for computer network attack programs to aid the National Security Council and Secretary of the Air Force with policy and budgetary defense. Carl writes about network security strategy, trends, and implementation.

One comment

Leave a Reply

Your email address will not be published. Required fields are marked *