Security in Plain English: What is a DDoS Attack? Part 2

Back to Blog
June 22, 2018
Mike Talon

 

Last week we talked about what DDos attacks are and the lengths attackers go to to try and breach your network. So, what can you do to defend against DDoS attacks, and should you be worried about them? The short answer is that following standard online safety rules will help make sure your machine doesn’t become a zombie. Don’t open email attachments unless you know exactly what they are and why you are getting them. Call or email the sender to confirm before you open it. Don’t open links in emails or text messages – instead go to the website directly and find the information you need. Keep your operating system, browsers, and other software updated regularly; and use an anti-malware system and keep it updated as well.

If you are trying to reach a site that’s being hit with a DDoS attack, there isn’t much you can do on your own. The site owners will need to mitigate the attack in order to free up their servers to serve legitimate users once again. The good news is that most sites have very effective DDoS mitigation methods available to them and can get themselves back online quickly. Try the site again in an hour, and you’ll probably find that the site is back up and working properly. If your company is experiencing a DDoS attack you may find you cannot effectively use the internet, or that company systems you use are not responding.  Your company’s IT team will take the appropriate steps to mitigate the attack, and will usually do so quite quickly.

As for your home machine, it’s highly unlikely that you will be the target of a DDoS attack.  Bad actors target sites and services used by large numbers of people – either as an act of hacktivism, or a threat to the company in question. Attacking your home network doesn’t really get them anything. If, however, your Internet Service Provider is attacked, you will need to wait for them to mitigate the problem before your service can be fully restored.  As with the other examples, most ISP’s have methods in place and ready to go to clear up the problem quickly, so you won’t be waiting very long.

DDoS attacks may be used to send a message to a company, may be an act of revenge or a threat to gain a ransom payment, or might just be done for bragging rights.  No matter why they happen, though, you should take steps to make sure your machine isn’t part of the zombie army that makes them possible. Other than that, all you’ll have to do is give the site owners some time to clean things up; and then the site or service will soon be back to normal.

Want to learn more about Identity Access and Management (IAM) solutions? Learn more on our Adaptive Authentication page or contact us today! 

Never Miss a Beat
Subscribe to Our Blog

SecureAuth Identity Platform Adaptative Authentication

Identity and Access Management

Empower your digital initiatives with secure access for everyone and everything connecting to your business

Product Features

Adaptive Authentication

Extend verification of a user identity with contextual risk checks

Multi-Factor Authentication

Leverage a broad portfolio of authentication factors for desktop and mobile

Intelligent Risk Engine

Protect your identities with advanced risk profiling analytics

Single Sign-On

Provide app discovery and one-click login through portal or desktop SSO

User Lifecycle Management

Enable admins with strong CRUD capabilities and users with self-service tools

Secure All Identities

CIAM

Customer Identities

Deliver a frictionless customer experience safeguarding user data and privacy

B2E

Workforce Identities

Govern and control access rights for employees, partners, and contractors

Moving Beyond Passwords

Learn how passwords alone no longer provide the appropriate level of protection, nor confidence, required to secure valuable resources

Initiatives

Passwordless Authentication

Reduce the risk of breaches by eliminating passwords

2FA is Not Enough

Block popular phishing and brute force attacks used by bad actors

Protecting Office 365

Extend adaptive authentication and flexible MFA to all apps including Office 365

Securing Portals and Web Apps

Balance strong security and an exceptional user experience

RSA Migration

Transition to a modern identity and access management solution

Industries

Healthcare

Financial Services

Retail

Energy and Utilities

Public Sector

Resources

White Papers

eBooks

Recorded Webinars

Analyst Reports

Innovation Labs

Documentation

Support Portal

Events & Webinars

Events

Webinars

Calculate Your Savings

Lower support costs by enabling your users the control to reset passwords, account unlocks, device enrollment and update profiles

Meet SecureAuth

About SecureAuth

Leadership

Newsroom

Careers

Contact