• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Protecting Your Business From DDoS Attacks

May 26, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

A Distributed Denial of Service (DDoS) attack prohibits access to a computer resource. This kind of assault rarely happens alone but rather occurs in waves once an attacker realizes they have been successful in the first attempt.

Using the same method of attack on a business’ computer system, such cyber-attackers can then overwhelm and suppress Internet facing websites and applications, which can greatly hinder the ability to conduct business as normal.

In order to safeguard against DDoS attacks, small businesses must first recognize they’re potential targets, especially since there has been a recent rise of such assaults on small businesses in the past year.

While the motivation behind such an assault can be difficult to understand, they happen for a wide variety of reasons. Attackers may seek to hold systems hostage in an extortion attempt, or the attack may not be motivated by the prospect of financial gain at all.

There have been instances where DDoS attacks were launched by former employees holding grudges or by individuals disagreeing with a particular company’s general policies and practices.

It is in personal attacks, such as those launched by former employees, that the gravest damage can occur because the motivation is purely to harm rather than prohibit access to websites.

In withholding, there is value in preserving the website’s systems for future financial gain in the form of an extortion attempt. Personally motivated attacks, however, don’t mind wreaking permanent havoc.

Cybersecurity experts suggest small businesses look into the systems already in place to protect against DDoS attacks with service providers.

Any safeguards, however, should be taken with a grain of salt because they do not guarantee your protection. If an attack on your business threatens your provider’s servers, your systems may be cut off from theirs as a calculated sacrifice to protect your provider’s systems and other customers.

That leaves two real solutions for small businesses to protect against DDoS attacks: (1) use cloud-based applications or (2) use a DDoS defender that guards against both application and bandwidth attacks.

Cloud-based applications are more difficult for cybercriminals to infiltrate and can also be scaled to meet small business demands.

With specific tools designed to defend against DDoS attacks, look for ones that have both detection and mitigation functions, so dealing with any perceived threats is not put off until later. It is in quick action that DDoS attacks can be thwarted.

Filed Under: DDoS, Security Tagged With: DDoS, Security

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.