Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

IT security pros and network operators view DDoS attacks as an increased concern in 2017

by The Gurus
June 5, 2020
in Editor's News
Share on FacebookShare on Twitter

DDoS attacks are a greater security threat to businesses in 2017 than ever before, and Internet Service Providers (ISPs) need to do something about it according to a new survey of IT security professionals and network operators released today from Corero Network Security.
The annual study, the Corero DDoS Impact Survey 2017, polled top technology decision makers and security experts at the 2017 RSA Security Conference last month in San Francisco, CA. This year’s survey found that the majority (56 percent) of the nearly 100 respondents view DDoS attacks as greater and graver concern in 2017 than in previous years.
This elevation of risk comes at a time when DDoS attacks continue to increase in frequency, scale and sophistication over the last year. 31 percent of IT security professional and network operators polled in this year’s survey experienced more DDoS attacks than usual in recent months, with 40 percent now experiencing attacks on a monthly, weekly or even daily basis. To alleviate this problem, 85 percent are now demanding additional help from their ISPs to block DDoS traffic before it reaches them.
The findings follow reports in the UK that Britain’s National Cyber Security Centre (NCSC) is putting pressure on ISPs to rewrite Internet standards around spoofing, in order to reduce the volume of DDoS attack traffic on their networks.  Dr Ian Levy, technical director at NCSC, has called for ISPs to make changes to the Border Gateway Protocol (BGP) and Signalling System 7 (SS7) standards, in order to halt the re-routing of traffic used in simple, volumetric DDoS attacks.
“Organizations that once had DDoS protection projects on the back burner are now re-prioritizing their security strategies to place DDoS mitigation at the forefront in 2017. As new, large scale attacks have come online leveraging IoT devices, the DDoS threat has become top of mind for CISOs. This shift in precedence puts increased pressure on Internet and cloud providers to enable this protection for their customers, and eliminate DDoS threats closer to the source.” said Rob Ayoub, Research Director at IDC. 
 Ashley Stephenson, CEO at Corero Network Security, said, “ISPs have long carried the burden of defending their own network against DDoS attacks, but as the threat landscape has changed, so must their response. Providers will likely find themselves at an important crossroads during the next year, as pressure builds on them from both customers and governments to address the growing DDoS problem. By accepting a greater responsibility for defending their customers and networks against DDoS attacks, ISPs could modernize their security service offerings and increase customer satisfaction – in contrast, ignoring this call to action could open up the possibility of future regulatory controls related to DDoS protection.”
The Corero study found that a worrying 58 percent of security professionals are still relying on ‘home grown’ open source solutions, or traditional security infrastructure like firewalls, to protect themselves against DDoS attacks. Just more than a third (36 percent) are adopting cloud-based solutions, including scrubbing centers, and an additional 35 percent are using on-premises DDoS mitigation products.
While the vast majority (85 percent) believe their ISP should be dealing with the DDoS problem for them, as part of their service, almost half (46 percent) indicated they would be prepared to pay an additional fee to have DDoS traffic removed before it reaches their network. Of those who were willing to pay their ISP for such a premium service, almost three quarters (74 percent) would consider spending up to a quarter of their total ISP spend to eliminate this threat.
Stephenson continues: “There is clearly a valuable business benefit for ISPs to position themselves as leading the charge against DDoS attacks, both in protecting their own infrastructure and enabling them to offer more comprehensive security solutions to their customers, as a paid-for managed service. DDoS attacks are becoming more frequent, more complex and more significant, so it is not surprising that so many security teams would rather outsource the solution to this important problem to their ISP.”
The Corero study also examined what was perceived to be the most worrying impact of DDoS attacks on victim organizations. The biggest risk factor, which was cited by almost half of the respondents (45 percent), was the potential for loss of customer trust and confidence. Lost revenues were also a serious concern (cited by 17 percent), while malware infection (15 percent) and lost revenues (13 percent) were also seen as potential problems. To view the Infographic, Measuring the DDoS Threat and Opportunity, visit https://www.corero.com/resources/2017-ddos-survey-infographic.html

FacebookTweetLinkedIn
Tags: attackCybernetworkssecurity
ShareTweetShare
Previous Post

When is a phishing email not a phishing email? The taxonomy of malicious emails

Next Post

Hackers: we will remotely wipe iPhones unless Apple pays ransom

Recent News

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023
Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information