A new study published by international consulting firm KPMG and telecoms group BT found that only 22% of businesses said they were “fully prepared” to combat security breaches. The study is a clarion call for law enforcement agencies, corporations and security experts to collaborate in order to prevent cybercrime. According to fedscoop, the report further states:
“Businesses in all sectors have a common and aligned interest in fighting digital crime…By working together they can exchange intelligence, fund innovation, share best practices and develop common strategies. They should also work with telecom companies, Internet Service Providers, banks, credit-card providers, insurers and the security industry ‘in a concerted effort’ to make it harder and more costly for cyber criminals to pursue their objectives.
Corero agrees that Internet Service Providers (ISPs), Hosting and Telecom companies play a crucial role in cybersecurity. One of the most effective ways to defend a network is to ensure that telecoms and ISPs deliver “clean” traffic to their downstream customers. That’s why Corero's anti-DDoS solution enables improved security at Internet gateways, the top of the funnel. With the Corero SmartWall® Threat Defense System, ISPs and telecoms can automatically detect and block distributed denial of service (DDoS) traffic at the network perimeter, before it reaches any customers downstream.
Why DDoS Traffic Is a Major Threat
One might ask, what does DDoS have to do with security breaches? People often associate DDoS with a crippled website or application. On its own, a DDoS attack is not an actual security breach because the hackers aren’t stealing anything, they’re just crashing the party, so to speak. However, the vast majority of DDoS attacks are not large enough to cripple a website; rather, they are low-threshold, sub-saturating attacks.
During a “Dark DDoS” attack, IT security staff are distracted by troubleshooting the “noise” on the network; meanwhile, the hackers can map the network for vulnerabilities, steal sensitive information (email addresses, credit card info, etc.) or install malware or ransomware that can be leveraged at a later time for cyber extortion. Hackers need only a few seconds or minutes to map or infect a network.
Of course, we at Corero realize that DDoS attacks are just one of many cyber threats. Nonetheless, IT security professionals should prioritize DDoS protection because DDoS attacks are a favorite tool for hackers to use as a springboard for the more nefarious and damaging cyber threats. Today most IT security professionals must worry about the pervasive and growing problem of DDoS attacks. But in the future—as more and more ISPs and telecoms take appropriate steps—IT security pros won’t have to worry about DDoS attacks; they’ll be able to devote more time to preventing or dealing with the plethora of other cyber security threats they face.
For more information, contact us.