It starts with a bit of unusual traffic - a surge of access requests from seemingly-unrelated IPs. Slowly but surely, your servers are overwhelmed. Your network-facing infrastructure starts slowing down, until it eventually grinds to a halt altogether. With a sinking feeling in the pit of your stomach, you realize what this means. You have been targeted by a distributed denial of service attack. And until such time as the attacker decides you are no longer a worthwhile target, all you can do is weather the storm. DDoS attacks are one of the oldest criminal tactics on the web. They are also one of the most enduring. And though tactics have grown increasingly sophisticated over the past decade, at its core, every DDoS attack has the same objective: to overwhelm the targeted product or service with bogus requests until it is no longer operational. The most frightening thing about these attacks is how simple they are to pull off - and, with the growth of the Internet of Things, how massive they have the potential to become. All you need is a big enough botnet and you can bring down the infrastructure of even a massive corporation. And such botnets are more easily obtained than you might think - in the seedy underbelly of the web, there is a growing market for DDoS-as-a-Service. While it is true that botnets have become the weapon of choice for modern hacktivists, not every DDoS attack is perpetrated by a script kiddy with an axe to grind. As a matter of fact, it is rare for disruption of services to be the only objective of a DDoS attack. According to a survey carried out by Kaspersky, as many as 74% of DDoS attacks are little more than a red herring - a smokescreen meant to mask the actual attack. While your security team is distracted mitigating the denial of service attack, the party responsible is free to go after what they actually want - whether it is financial information, intellectual property, or client data. It is the equivalent of driving a bus through the front door of a bank while an associate tunnels into the bank vault from below. If you are targeted by a DDoS attack, you cannot afford to let it distract you. You must remain vigilant, and keep a close watch for any other suspicious network activity that might occur. DDoS protection such as what is offered by Liquid Web is therefore critical. A DDoS attack can be devastating to your company, leading to considerable downtime, significant lost revenue, and a damaged reputation. Unfortunately, this is only the tip of the iceberg. While a small percentage of DDoS attacks are carried out for their own sake, the majority of the time they are used to draw attention away from the actual cyberattack. If you are to protect your data, you must remain aware of this, and protect yourself wherever and however you can.
Most Recent Articles
An Introduction to Using Gutenberg with WooCommerce
On December 6th, 2018 the controversial new editor experience for WordPress dropped and it’s called Gutenberg. We show you how to start using Gutenberg Blocks to power your WooCommerce store.
How Do You Add Custom Fields to WooCommerce Products?
Depending on your store, you might need to add custom fields to your WooCommerce products. Those could be text fields, select boxes, or radio buttons. We show you how to use hooks to make it happen.
Liquid Web Appoints Former Rackspace Executive Taylor Rhodes to Board of Directors
Liquid Web announces the appointment of Taylor Rhodes to the company’s board of directors. Rhodes brings more than 20 years of technology leadership including his previous role as CEO of Rackspace.
How Do I Design An Effective Homepage For My WordPress Blog?
Your homepage represents the first opportunity to make an impression. In mere seconds, visitors need to be able to quickly figure out if they are in the right place. We give you some design tips.
Protecting Your Inbox From The Evolving Threat of Email Spam
Email spam is evolving and becoming more sophisticated, specifically designed to evade policy-based filters and fool the account holder into clicking a link. Find out how to keep your inbox protected.
What’s a Tracking Pixel and How Can I Install and Use It on My WooCommerce Store?
A tracking pixel is a 1x1 pixel graphic that tracks web traffic, site conversions, user behavior, and more on at a site’s server level. This enables eCommerce store owners to understand their visitor.
How Do I Find and Choose a Merchant Service Provider?
A merchant service provider is any business used by merchants to process payments in forms other than cash or check (e.g., credit cards, debit cards, ACH payments). Make sure you find a good one.
Do I Need to Future-Proof My Growing Business With Managed Hosting?
Two-thirds of SMB execs consider tech a primary factor in pursuing business objectives, yet 40% admit they have invested less than they should in IT. Future-proof your business with Managed Hosting.
Project Management Basics for Freelancers
Once you’ve built out an ideal client profile and learned to write good proposals, you should be winning work regularly. Be ready for the increase in workload with a project management system.
Breaking Down HIPAA and HITECH Compliant Hosting
Any company that requires HIPAA compliance also needs to maintain HITECH compliance, which is best achieved by having its servers hosted in an environment certified for HITECH by a third-party audit.
Multiple Payment Gateways: Are There Advantages For Your eCommerce Business?
Having multiple gateways offers a ton of advantages to store owners, the biggest being the convenience of shopping to customers. Find out the pros and cons to single vs multiple payment gateways.
12 Essential Email Examples for Your WooCommerce Business
Email marketing remains a valuable and competitive medium for funneling leads toward purchase of your products. We give you 12 email examples from top eCommerce businesses of today to get you started.
3 Questions You Must Answer for Proactive Security Best Practices
From simple technology such as anti-virus to standardized, regular patching procedures to employee access policies, every little bit can reduce the overall attack surface of your organization.
How To Start A WordPress Blog From Scratch
Have you been thinking about starting a WordPress blog? Does the idea of blogging about something you enjoy and sharing your insights, ideas, and tips get you excited? We show you how to get started.
Security Trends for 2019: DDoS Attacks, Credential Stuffing and Application-Level Attacks
Organizations that keep up-to-date with IT security threat trends are in a better position to ensure they partner with effective, professional service providers. Find out what's in store in 2019.
Building a WooCommerce Marketplace With a Multi-Vendor Plugin
Building a new marketplace using a multi-vendor plugin has never been easier. We show you what plugins to check out and how to install Dokan, one of the best choices for getting a marketplace started.
3 Reasons to Try CloudFlare With Liquid Web
CloudFlare CDN provides additional performance and security benefits to your globally-accessed website, store or application. Try it free with Liquid Web.
The Best Payment Gateways for Digital Downloads
The payment gateway provides a majority of the user experience for digital products. Learn about the best payment gateways and their features for online stores selling digital products and downloads.
8 Ways To Collect Donations On Your WordPress Blog
Whether you’re a non-profit, charity, NGO, club, or other similar organization, you need to be able to collect donations on your WordPress website. Here are 8 WordPress plugins to collect donations.
Hobbies That Make Money: How to Tell If Your Hobby Can Be Profitable