{"id":7838,"date":"2021-12-14T11:22:43","date_gmt":"2021-12-14T11:22:43","guid":{"rendered":"https:\/\/cybersmart.com\/?p=7838"},"modified":"2022-01-20T14:28:39","modified_gmt":"2022-01-20T14:28:39","slug":"what-is-a-ddos-attack","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/","title":{"rendered":"What is a DDoS attack?"},"content":{"rendered":"

The cybersecurity industry has long had a reputation for impenetrable jargon, be it tools, threats or solutions. So, in this blog, we\u2019re demystifying another confusing term. What are \u2018DDoS attacks\u2019? Why should you be worried about them? And, most importantly of all, what can you do to stop them?<\/span><\/p>\n

How does a DDoS attack work?<\/b><\/h3>\n

DDoS stands for Distributed Denial of Service. And it\u2019s a very simple but potentially very disruptive premise. Cybercriminals pick a target, then flood its network with so much malicious traffic that it can\u2019t operate as it usually would. The result is that legitimate traffic (such as shoppers or readers) grinds to a halt.\u00a0<\/span><\/p>\n

You\u2019ve probably seen this technique used before without necessarily putting a name to it. Google was hit with the <\/span>largest attack on record in 2017<\/span><\/a>. Meanwhile, Amazon Web Services fell foul of a <\/span>gigantic attack in February 2020<\/span><\/a>.\u00a0<\/span><\/p>\n

How common is this kind of attack?\u00a0<\/b><\/h3>\n

DDoS attacks are more common than you might think and they\u2019re on the rise. 2020 saw a 151% increase in the frequency of attacks in comparison to 2019. And, to make matters worse, cybercriminals are increasingly targeting small businesses with this kind of attack.\u00a0<\/span><\/p>\n

How much damage can a DDoS attack do?\u00a0<\/b><\/h3>\n

A DDoS attack is highly disruptive for any business. But for big corporates, it\u2019s usually something they can swallow. After all, for a multi-billion dollar business, a few days lost revenue and some disgruntled customers don\u2019t have to spell disaster.\u00a0<\/span><\/p>\n

However, for a small business, a DDoS attack can have serious consequences. A successful DDoS attack can take down entire websites and systems. This could mean lost revenue, breached data, reputational damage, dissatisfied customers, and a massive cleanup effort to get systems back up and running. In other words, a potentially critical situation for a small business with limited resources.\u00a0<\/span><\/p>\n

What can you do to protect your business?\u00a0<\/b><\/h3>\n

We\u2019ve painted a pretty scary picture so far. But that doesn\u2019t mean small businesses are defenceless in the face of DDoS attacks. There\u2019s plenty you can do to help your business avoid the worst-case scenario.\u00a0<\/span><\/p>\n

Use a Web Application Firewall (WAF)<\/b><\/h4>\n

A WAF blocks suspicious traffic and prevents DDoS attacks from accessing your business\u2019s servers. And, the best thing about a WAF is that it\u2019s easy to customise for your business. For example, if you mostly do business in the UK, you could configure it to block all non-UK traffic. Or, you could take it a step further and blacklist traffic from markets renowned for attacks. <\/span>
\n<\/span>
\n<\/span>Of course, like all software, you need to ensure you\u2019re <\/span>
patching<\/span><\/a> regularly for it to be most effective.\u00a0<\/span><\/p>\n

Learn to spot the signs<\/b><\/h4>\n

We\u2019re always talking about the importance of security training for your staff and our advice is no different when it comes to preventing DDoS attacks. One of the key reasons that DDoS strikes are so hard to stop is so few people know how to recognise them \u2013 until it\u2019s too late and business systems fail. <\/span>
\n<\/span>
\n<\/span>To give an example of what we mean, did you know a sudden surge in traffic \u2013 even for just a few minutes \u2013 could signal the start of an attack? <\/span>
\n<\/span>
\n<\/span>Even basic cybersecurity knowledge among staff about what the threats are, how to spot them, and what to do in the event of an attack, can help your business get a head start on cybercriminals.<\/span>
\n<\/span>
\n<\/span>For more on security training, <\/span>
read this<\/span><\/a>.\u00a0<\/span><\/p>\n

Be mindful of your supply chain<\/b><\/h4>\n

A huge proportion of cybersecurity attacks now begin in the <\/span>supply chain<\/span><\/a>. And, unfortunately, this includes DDoS attacks. Most SMEs are part of a supply chain and lack the security resources of larger partners, making them an enticing way for cybercriminals to attack more glittering prizes.\u00a0<\/span><\/p>\n

These \u2018attacks through the back door\u2019 are becoming increasingly common. US retail giant <\/span>Target was fined $18.5 million<\/span><\/a> after a breach at its air conditioning partner led to the leak of millions of credit card details.\u00a0<\/span><\/p>\n

So talk to your suppliers and partners about their cybersecurity practices and share experiences and advice. For those below you in the chain, this may mean asking for proof that their cybersecurity is in order. And for the bigger companies you service, this could mean agreeing to shared security practices and transparency in the event of a breach.\u00a0<\/span><\/p>\n

Protecting your business on a budget is tricky. Calling in the experts or investing in the latest tools is expensive. So what can you do? CyberSmart Active Protect secures your business around the clock with no need for costly consultants, tools or an in-house team. Try it today<\/a>.<\/span><\/p>\n

\"Active<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

The cybersecurity industry has long had a reputation for impenetrable jargon, be it tools, threats or solutions. So, in this blog, we\u2019re demystifying another confusing term. What are \u2018DDoS attacks\u2019?…<\/p>\n","protected":false},"author":8,"featured_media":7871,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[188,83,226,27,16,207],"yoast_head":"\nWhat is a DDoS attack? - CyberSmart<\/title>\n<meta name=\"description\" content=\"What is a DDoS attack? How worried should you be about the threat? And what can you do to protect your business?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DDoS attack? - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"What is a DDoS attack? How worried should you be about the threat? And what can you do to protect your business?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-14T11:22:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-20T14:28:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rob S\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob S\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"Rob S\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\"},\"headline\":\"What is a DDoS attack?\",\"datePublished\":\"2021-12-14T11:22:43+00:00\",\"dateModified\":\"2022-01-20T14:28:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png\",\"keywords\":[\"Award-winning cybersecurity\",\"cybersecurity\",\"DDoS attack\",\"firewall\",\"SMEs\",\"supply chains\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/\",\"name\":\"What is a DDoS attack? - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png\",\"datePublished\":\"2021-12-14T11:22:43+00:00\",\"dateModified\":\"2022-01-20T14:28:39+00:00\",\"description\":\"What is a DDoS attack? How worried should you be about the threat? And what can you do to protect your business?\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a DDoS attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\",\"name\":\"Rob S\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"caption\":\"Rob S\"},\"url\":\"https:\/\/cybersmart.com\/author\/rob-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a DDoS attack? - CyberSmart","description":"What is a DDoS attack? How worried should you be about the threat? And what can you do to protect your business?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"What is a DDoS attack? - CyberSmart","og_description":"What is a DDoS attack? How worried should you be about the threat? And what can you do to protect your business?","og_url":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2021-12-14T11:22:43+00:00","article_modified_time":"2022-01-20T14:28:39+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png","type":"image\/png"}],"author":"Rob S","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Rob S","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/"},"author":{"name":"Rob S","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff"},"headline":"What is a DDoS attack?","datePublished":"2021-12-14T11:22:43+00:00","dateModified":"2022-01-20T14:28:39+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/"},"wordCount":776,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png","keywords":["Award-winning cybersecurity","cybersecurity","DDoS attack","firewall","SMEs","supply chains"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/","url":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/","name":"What is a DDoS attack? - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png","datePublished":"2021-12-14T11:22:43+00:00","dateModified":"2022-01-20T14:28:39+00:00","description":"What is a DDoS attack? How worried should you be about the threat? And what can you do to protect your business?","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/12\/Retargeting_V.5-2.png","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"What is a DDoS attack?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff","name":"Rob S","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","caption":"Rob S"},"url":"https:\/\/cybersmart.com\/author\/rob-s\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/7838"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=7838"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/7838\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/7871"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=7838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=7838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=7838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}