Protecting yourself from DDoS attacks

Issue 7 2022 Information Security, Security Services & Risk Management


Tarquin Rohlandt.

Picture this: it’s Black Friday and it’s time to take advantage of the massive sale on your favourite online shop. You’ve been receiving emails all month in the run-up to the day and you’ve bookmarked several items that you just have to have, and their prices for one day only are ridiculously low. You open the browser, head to the store and...

You find yourself staring at a blank page. The service is unavailable. You refresh. You close the browser and reopen it. You clear your cache. You restart your modem. Rinse, repeat. Still nothing. The site is down.

You phone the site’s customer service call centre and are placed in a queue. After waiting for 20 minutes, you know something is wrong. The queue for a call centre employee is huge. What’s going on?

You check on social media and find that posts about the Black Friday sale on this retailer’s site are exploding with rage. You’re clearly not the only one having this problem. You are finally able to talk to one of the store’s employees and they say the site is down due to a Distributed Denial of Service (DDoS) attack. You ask how long the site will be down. They don’t know.

This site could be down for hours. It could be down for days. Glumly you go searching on other retail sites for the items you want. They’re not as cheap, but they’re available. As you make your first purchase, you angrily vow never to visit that other online retailer ever again.

DDoS attacks are on the rise

If this scenario sounds frustrating for a customer, imagine what it must sound like if you are the owner of a retail site under the same circumstances. A DDoS attack, which is what happens when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can cost you untold damage in both earnings and reputation.

Retail sites are not alone; DDoS attacks can be targeted at any enterprise that operates in the online space, including corporations, financial institutions, NGOs, gaming networks, ISPs and even governments.

In the last year, cybercriminals launched over 9 million DDoS attacks, with around 4,4 million occurring in the second half of 2021. Simply put, no business can afford to be without protection against such attacks. They are a vital part of any cybersecurity conversation.

Protect your networks

Businesses can guard against DDoS attacks by purchasing a service that can function as a barrier to any attempt to overload their network with traffic. One such service, Liquid’s recently launched DDoS Secure, mitigates attacks by scrubbing traffic and blocking known attackers or hostile traffic. On top of this, this service can give clients a line of sight into an attempted disruption by providing reports on any attacks.

Services such as these provide businesses with a crucial layer of protection. They ensure work is not interrupted by DDoS attacks, prevent revenue loss and safeguard the reputation of their clients. Beyond this, they increase businesses’ potential for growth through tenders and partnerships by granting them DDoS compliance – more opportunities open up once an enterprise can demonstrate that its network and day-to-day operations are secured against attacks of this type.

With DDoS attacks constantly on the rise, it pays to have higher visibility of potential attacks, to be able to automatically mitigate threats and secure your business’s reputation, compliance and its bottom-line. DDoS protection is essential for businesses operating in our ever-increasingly connected world.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.