Skip to main content
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
N-able
  • Request a Quote
  • Try Now
    • N-able RMM
    • N-able N-central
    • N-able Backup
    • MSP Manager
    • N-able Mail Assure
    • N-able Passportal
    • N-able Risk Intelligence
    • N-able Take Control
Request quote
N-able
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare N-able RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
SolarWinds MSP is becoming Read More
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Security DDoS—What You Need to Know
Security

DDoS—What You Need to Know

By Tim Brown
29 November, 2019

DDoS (or distributed denial of service) attacks have hit the headlines again recently with news that the UK’s Labour Party was attacked twice in the space of two days.

While generally not seen as a sophisticated form of attack, DDoS is a common threat vector and can be the precursor to other much more serious forms of attack. So it’s something managed services providers (MSPs) and SMBs need to aware of, and have a plan for. 

So how do you defend against them? The first thing is you need to know what you’re dealing with.

What are DDOS attacks?

DDoS attacks are designed to slow down or disrupt sites or services, hence, the term “denial of service.” Attackers can succeed in doing this by either drumming up a large number of people to “hit” a site at the same time, or they can technically engineer mass “traffic”—through the use of bot nets—to make the target system think it’s being hit by real users. Whatever route they take, the ultimate goal of the cybercriminal here is to overwhelm the system beyond its capacity so it stops working. The DDoS attempts against the UK Labour Party were a typical example of this type of attack.

How serious are DDoS attacks?

CTA Image

N-able Remote Monitoring and Management

Get the tools you need to manage, secure, and improve all things IT—all within a single web-based dashboard.

Try It Free Learn More

When we think of cyberattacks, we think of three possible impacts involving confidentiality, integrity, and/or availability. DDoS attacks impact the third leg of this stool, availability, and don’t directly involve a loss of data or privacy. While this can be serious if you’re talking about something like an attack against a utility provider, it is typically a less serious system performance disruption. It’s also worth keeping in mind that DDoS attacks can be masks for other attacks. By keeping an MSP or IT department focused on dealing with the DDoS attack, cybercriminals can often launch a more serious and invasive attack in the background.

Part of the impact of DDoS also has to do with timing. In the Labour Party instance, for example, the timing was about a month before the upcoming UK election. Another example of why timing can make a huge difference with DDoS was the attack against Amazon on Prime Day in July of last year. The service was down for approximately an hour, costing the retailer an estimated $75 million USD. 

So the potential seriousness of this attack in the UK is more about the fact that the UK’s Labour Party may now be on someone’s radar. This kind of attack could be an initial attempt to do harm, with more serious attacks to follow.   

“If this is a sign of things to come in this election, I feel very nervous about it all, because a cyberattack against a political party in an election is suspicious and something one is very worried about,” said Labour leader Jeremy Corbyn.

How can businesses prevent DDoS attacks?

We’re living in a world where everything is connected. This means criminals now have many more internet-enabled entry points. Today things like baby monitors, cameras, or even refrigerators can all be compromised and utilized in an attack (as part of a bot net). Businesses that rely on uptime need to put services in place, usually through their ISP or global service provider, that can help them be more resilient to DDoS attacks—for example, in the Labour Party’s case, their hosing provider, Cloudflare, claimed its network capacity was 15 times greater than the biggest DDoS attack ever recorded. 

Locking down internet-connected devices is important, but network security is just as important—even more so when it comes to DDoS protection. Network security should be part of a broader security focus, and here a layered security approach is the best defense to help not only keep the bad guys out, but keep them from doing harm within your specific systems and sites.

Layered security works on the basis that there are multiple ways attackers can get into a business, so you need multiple forms of defense to help protect your data. In your layers, you'll want to include controls like email protection, web protection, firewalls, and endpoint protection to prevent widespread attacks.

Should you fall victim to a DDoS attack, one of the biggest mistakes organizations can make is to create panic, both among themselves and their customers (or constituents). Remember that this attack may be annoying or even debilitating when it comes to service denial, but it is not the same as a breach against privacy or data. Remaining calm and using the appropriate descriptive language is important, and what’s ultimately going to win the day. Otherwise you’ve given the criminals exactly what they want and crave—chaos.

 

Tim Brown is VP of Security for SolarWinds MSP. He has over 20 years of experience developing and implementing security technology, including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security. Tim’s experience has made him an in-demand expert on cybersecurity, and has taken him from meeting with members of Congress and the Senate to the Situation Room in the White House. Additionally, Tim has been central in driving advancements in identity frameworks, has worked with the US government on security initiatives, and holds 18 patents on security-related topics. 

 

Additional reading

A brief history of DDoS… and how to defend yourself and your customers
New DDoS Botnet Chalubo Reminder: Cyberhygiene Matters
Secure DNS Services
You might also like...
Security

DearCry Ransomware Review 

Security

Endpoint security for Mac: What you need to know In 2021

Security

A guide to patch management policies for MSPs

Security

A Beginner's Guide to Unified Endpoint Management

Mail

How to Detect and Prevent Business Email Compromise

Security

Intrusion Detection System (IDS): Signature vs. Anomaly-Based

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • DearCry Ransomware Review 
  • PSA vs ITSM vs ESM: Part 2—Which is the right fit for your MSP?
  • 4 ways PSA software helps MSP businesses
  • PSA vs ITSM vs ESM: Part 1—What do they do? 
  • Endpoint security for Mac: What you need to know In 2021
Categories:
  • Security (252)
  • Tips & Advice (130)
  • Backup & Disaster Recovery (97)
  • Best Practices (97)
  • Managed Services (89)
  • The Head Nerds (88)
  • Business Growth (79)
  • IT Support (43)
  • Business (42)
  • Automation (41)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (37)
  • Remote Management (31)
  • ITSM (26)
  • Data (23)
  • Networking (22)
  • Cloud Computing (21)
  • PSA (16)
  • Marketing (15)
  • Product (11)
  • Service Desk (7)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • Customer Service (3)
  • GDPR (3)
  • Internet of Things (3)
  • Training (2)
  • Research & Trends (2)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
  • Business Risk (1)
Show moreless
N-able

Products
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able EDR
  • N-able MSP Manager
  • N-able Mail Assure
  • N-able Risk Intelligence
  • N-able Take Control
  • N-able Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • COVID-19 Response
Support
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able Mail Assure
  • N-able Take Control
  • N-able MSP Manager
  • N-able Risk Intelligence
  • N-able Threat Monitor
  • N-able Passportal
  • N-able Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© N-able Solutions ULC and N-able Technologies Ltd.
All rights reserved.