How DDoS Mitigation is about Corporate Social Responsibility

Similar documents
External Supplier Control Obligations. Cyber Security

GDPR Update and ENISA guidelines

How to Create, Deploy, & Operate Secure IoT Applications

Preparing your network for the next wave of innovation

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

THALES DATA THREAT REPORT

AKAMAI CLOUD SECURITY SOLUTIONS

DIGITAL TRUST Making digital work by making digital secure

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

DDoS MITIGATION BEST PRACTICES

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

IBM Cloud Internet Services: Optimizing security to protect your web applications

Governance Ideas Exchange

Security by Default: Enabling Transformation Through Cyber Resilience

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

CYBERCRIME & THE INTERNET OF THREATS 2017

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Security: 3 key areas to lock down now. Ebook

CYBER RESILIENCE & INCIDENT RESPONSE

BIG DATA INDUSTRY PAPER

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Enterprise D/DoS Mitigation Solution offering

Nine Steps to Smart Security for Small Businesses

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

Manchester Metropolitan University Information Security Strategy

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

Garrison Technology HOW SECURE REMOTE BROWSING DELIVERS HIGH SECURITY EVEN FOR MAINSTREAM COMMERCIAL ORGANISATIONS

A (sample) computerized system for publishing the daily currency exchange rates

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Machine-Based Penetration Testing

GOVERNANCE, RISK & COMPLIANCE CPD FOR MEMBERS IN COMMERCE & INDUSTRY AUGUST 2018

IoT & SCADA Cyber Security Services

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Express Monitoring 2019

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

The security challenge in a mobile world

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Device Discovery for Vulnerability Assessment: Automating the Handoff

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

Cisco Connected Factory Accelerator Bundles

Security for SIP-based VoIP Communications Solutions

The Value of Automated Penetration Testing White Paper

Cybersecurity, safety and resilience - Airline perspective

Securing Digital Transformation

Machine-Based Penetration Testing

Disaster Recovery Is A Business Strategy

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

How Network Security Services Work to Protect Your Business

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

THE ACCENTURE CYBER DEFENSE SOLUTION

2018 Cyber Security Predictions

CyBot Suite. Machine-based Penetration Testing

HOSTED SECURITY SERVICES

CyberEdge. End-to-End Cyber Risk Management Solutions

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

THE POWER OF TECH-SAVVY BOARDS:

How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.

Cyber Threat Landscape April 2013

Radware: Anatomy of an IoT Botnet and Economics of Defense

BT Compute. BT Private Compute. Dedicated cloud infrastructure hosting your IT. BT Compute

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Defining cybersecurity.

Cyber Security in Smart Commercial Buildings 2017 to 2021

RSA INCIDENT RESPONSE SERVICES

Cyber Security and Cyber Fraud

Cyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:

Digital Health Cyber Security Centre

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Challenges in Developing National Cyber Security Policy Frameworks

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

6 KEY SECURITY REQUIREMENTS

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention

A new approach to Cyber Security

Cybersecurity and resilience A priority for global enterprise

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

NEXT GENERATION SECURITY OPERATIONS CENTER

CABLE MSO AND TELCO USE CASE HANDBOOK

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Retail Security in a World of Digital Touchpoint Complexity

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Security

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

IBM Next Generation Intrusion Prevention System

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

CYBER SECURITY AND MITIGATING RISKS

A Top US Bank Trusts Neustar SiteProtect for Reliable DDoS Protection Depth

Transcription:

How DDoS Mitigation is about Corporate Social Responsibility We see the Network, we monitor the Network and we can protect your business with automatic DDoS mitigation services from our Network core. Regardless of what internet facing security you may already have, we understand your specific Network traffic profile and defeat DDoS attacks before they reach your defences.

Distributed Denial of Service (DDoS) attacks are on the increase by over 100% year on year Be aware and prepared in the anticipation of a Cyber Security attack Introduction Distributed Denial of Service (DDoS) attacks have been impacting businesses across the world for many years now, and their effectiveness to cause damage to organisations has been well proven. In 2016 there was a huge upsurge in the use of DDoS attacks to cause mayhem and panic, proving the fragility of our belief that we had gone beyond this type of security threat. DDoS does not appear to be going away anytime soon, which is why it is imperative that corporate organisations look to ensure that DDoS Mitigation is part of their Corporate Social Responsibility. Contents Introduction 2 Threats are Constant and Increasingly Sophisticated 3 Internet-connected devices provide another attack vector 3 Serious Cyber Security Threats for Corporates 4 Corporate Social Responsibility (CSR) 5 Exponential-e s Approach 5 WHITEPAPER - How DDoS Mitigation is about Corporate Social Responsibility

Integrated and Managed DDoS Protection within your Network Threats are Constant and Increasingly Sophisticated With a growth this year of 100% in DDoS attacks it looks like DDoS is not only here to stay but also in growth mode. What is interesting is that the types of DDoS attack have not changed but what has changed is the type of device that is making these attacks. DDoS attacks have increased by over 100% year on year. Historically it was the command and control server communicating with a botnet, composed of compromised computers, under which DDoS attacks were initiated. The compromised machine, turned into a zombie when joining the botnet, made the attack. But recent attacks have been performed using high volumes of native internet devices. In an attack in September 2016 the payload reached 1Tbps at the height of the attack, the whole attack is attributed to IP CCTV cameras in their thousands. These cameras are the forefathers of what we now describe as the Internet of Things (IoT). Internet-connected devices provide another attack vector The whole concept of the Internet of Things (IoT) is to enable and enhance our world with devices native and enabled for the internet that provide everyday services. In suppliers rush to bring these devices to market they have provided threat actors with the perfect platform for attack and potential extortion. In their haste suppliers have missed a key requirement when doing anything on the internet and that is security! These devices are able to be compromised and controlled to bring attacks on any target without danger of retribution or identification. Calls from authorities in the US to attack back will do little in this scenario and certainly not restrict an attack as just more IoT devices can be recruited. These IoT devices are quite dumb and unable to register when they have been compromised or note differences to their environment. Hackers can attack any target without danger of identification. 3

There will be over 20 billion IoT devices by 2020. Gartner Investment in securing IoT devices will increase five fold over the next five years as adoption of these devices picks up. Business Insider All this means that not only do IoT vendors need to deeply consider how they protect their machines but that there is already a considerable botnet army in place that it is available and easy to mobilise. Another interesting facet to this is that the availability of botnet DDoS attack vendors on the Darknet has increased significantly. Traditional IT security practices like network monitoring and segmentation will become even more critical as businesses and governments deploy IoT devices. Business Insider Serious Cyber Security Threats for Corporates For corporate organisations this manifests itself as an additional vector for consideration when protecting the IT estate. In recent years many businesses had taken to using their Firewalls or DDoS endpoint devices as being the way of looking at mitigating DDoS attacks. On the face of it this seems like excellent economic sense. However, with attacks reaching such high volumes it becomes obvious that these types of devices would be very quickly inundated and the attack would become successful. No matter how clever an enterprise s cyber security device is, the sheer volume of these attacks prove that threats need to be mitigated elsewhere. WHITEPAPER - How DDoS Mitigation is about Corporate Social Responsibility

With IoT vendors not even aware of the situation they have created it would be difficult to envisage that stopping the initiation of the attack will happen any time soon. Corporate organisations also typically look at these types of attacks as being initiated from outside of their environment, but with these new exploitable IoT devices that may no longer be the case. Corporate Social Responsibility (CSR) Exponential-e believe that the only true way to effectively protect a corporate from a DDoS attack is to mitigate the attack at the core of the network So, how do corporate organisations avoid becoming the victim of a DDoS attack and stop devices within their estate from being exploited? The first thing is to realise that DDoS attacks are often a way to disguise activities looking for other weaknesses that can be exploited. Very often devices such as IP CCTV cameras are less than protected unlike the corporate core. The second thing is that corporate organisations need to realise that no matter how much money they have invested in the security devices that live in their data centres and on-site, the potential volume of these DDoS attacks dwarfs any capability they believe they may have at the delivery point of the attack. Ultimately they are vulnerable to being taken offline, which will damage their reputation and have additional financial implications. In a recent survey by Tech Pro Research, 69% of tech leaders said they ll be focusing on improving security for IT systems in 2017. http://www.techrepublic.com/article/infographic-2017-itbudgets-are-increasing-and-spending-priorities-are-on-security/ From a Corporate Social Responsibility perspective it is in all corporate organisation s interest to ensure that they do not allow their devices to become tomorrow s botnet DDoS attack and that they protect otheir services and the customer information they have from any risk. The enterprise should ensure that compliance and monitoring plays an active role in regulating cyber security to protect critical information. Security and data privacy measures are necessary requirements to strengthen reputation with consumers. A robust strategy including services such as advanced DDoS Mitigation is essential to providing true value to users and stakeholders. Exponential-e s Approach Exponential-e believe that the only true way to effectively protect a corporate from a DDoS attack is to mitigate the attack at the core of the network and therefore before the threat traffic can come anywhere near the corporate network and devices. Exponential-e s Primary DDoS Mitigation service provides our customers with protection on the internet by diverting threat traffic automatically when our network sensors first see it, meaning we are able to provide an effective response to any DDoS attack. Our service offers the ability to focus particularly on the key elements of the corporate enterprise that are critical to performance and profitability. This means we can also protect the corporate assets that may be targeted by an attack. The Exponential-e Primary DDoS Mitigation service does not require any additional equipment and is provided to our corporate customers in conjunction with their internet services. This means that the investment already made in the protection of the corporate estate is not wasted, but supported by our service. By using this service, corporate organisations are assured that they will save themselves from potential web outage if they were to be attacked, protect themselves from potential compromise concealed within a DDoS attack and maintain an expected level of Corporate Social Responsibility in the way they manage their Cyber Security. MITIGATION EDD INTERNET CUSTOMER SITE SCANNING, MONITORING, SCRUBBING & REPORTING 5

www.exponential-e.com Telephone +44 (0) 845 470 4001 Visit the website www.exponential-e.com