YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?Is your business prepared in case of a DDoS or Cyber...

6
YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT? YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?

Transcript of YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?Is your business prepared in case of a DDoS or Cyber...

Page 1: YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?Is your business prepared in case of a DDoS or Cyber Security attack? Download our free checklist and resource guides. . Your Business

YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?YOUR BUSINESS IS UNDER

A DDOS ATTACK-NOW WHAT?

Page 2: YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?Is your business prepared in case of a DDoS or Cyber Security attack? Download our free checklist and resource guides. . Your Business
Page 3: YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?Is your business prepared in case of a DDoS or Cyber Security attack? Download our free checklist and resource guides. . Your Business

Prepare for DDoSAttacks in Advance

If you fall victim to one of these attacks, make sure you take the following steps to rebound as quickly as possible.

6JG� ƒTUV� NKPG� QH� FGHGPUG� HQT� C� &&Q5� CVVCEM� KU�ensuring you have a prevention and mitigation plan in place prior to an attack. Having a plan will reduce panic and will help your business rebound faster. Consider including the following as part of your strategy:

Ensure your business is equipped with the right technology that has the bandwidth to scale with VTCHƒE�CU�PGGFGF�

Make sure your hardware, software and other security safeguards are up-to-date and monitored regularly.

Appoint a DDoS leader who would take charge and lead the process in the event an attack occurs.

Know the risks associated with DDoS attacks and practice the steps you would take if an attack YQWNF� QEEWT� NKMG� C� ƒTG� FTKNN��� 6JKU�YKNN� JGNR� [QW�identify gaps in your response plan that you can adjust before an attack even occurs. This will also ensure your staff is trained to recognize the signs of a DDoS attack.

www.coxbusiness.com

Your Business Is Under A DDoS Attack—Now What?

%W� QSVI� FYWMRIWWIW� ZIRXYVI� MRXS� XLI�HMKMXEP� [SVPH� XLI�WSTLMWXMGEXMSR� ERH� JVIUYIRG]� SJ� G]FIV�EXXEGOW�MW� MRGVIEWMRK� EPSRK� [MXL� MX�� 3J� XLI� QER]� X]TIW�SJ� G]FIV� EXXEGOW�� ((S7� MW� KEMRMRK� TSTYPEVMX]�FIGEYWI� MXŭW� IEW]� ERH� MRI\TIRWMZI� JSV�LEGOIVW� XS� MQTPIQIRX� ŪERH� I\TIRWMZI� JSV�]SY�XS�SZIVGSQI�

Simply put, a DDoS attack is an attempt to make an online service unavailable, most commonly by QXGTYJGNOKPI� KV� YKVJ� VTCHƒE� HTQO� OWNVKRNG�sources. This can cause immediate, severe, and long-lasting damage that can take anywhere from several hours to several weeks to repair. In extreme circumstances, the system may never fully recover. Kaspersky reports that a single DDoS attack can cost companies anywhere from $52,000 to $440,000 in lost business and IT spending, and this doesn’t even account for the reputational harm these attacks can cause.

Unfortunately, no business or industry is immune VQ� &&Q5� CVVCEMU�� 5RGEKƒECNN[�� VJG� HQNNQYKPI�industries are becoming increasingly dependent on digital business processes and are becoming more at risk to attacks because of it:

01

Page 4: YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?Is your business prepared in case of a DDoS or Cyber Security attack? Download our free checklist and resource guides. . Your Business

02

Even if you’ve done everything you can to prevent DDoS attacks, you are still susceptible to them. Keep the following in mind if you fall victim to an attack.

If your business is under attack, it’s imperative that you work to resolve the issue immediately. When a system is down, it doesn’t just attack your IT department; it attacks everybody involved with your business operations. Additionally, the longer your site is down, the QSVI� PMOIP]� MX� MW� XLI�GSRJMHIRGI�ERH�XVYWX�TPEGIH�MR�]SYV�SVKERM^EXMSR�[MPP�IVSHI�

It’s important that you and your staff have a solid understanding of what DDoS attacks look like so that you can identify them quickly. Know what your V[RKECN� VTCHƒE� NGXGNU�CTG�UQ� VJCV�[QW�ECP� TGEQIPK\G�GZVTGOG�URKMGU�KP�VTCHƒE�VJCV�EQWNF�KORN[�CP�CVVCEM�is happening. Make a note of anything that might ECWUG� C� JGCNVJ[� DQQUV� KP� VTCHƒE� CU� YGNN�� NKMG�launching a new patient portal, so that you don’t mistake something positive for an attack.

Once you realize you’re under attack, it’s important to gather as much information as possible prior to calling in the experts so that they can help you more effectively. While this may be easier said than done, try to identify the type of DDoS attack, the source if possible, which part of your system is being targeted, and the potential reason for the attack (it’s not uncommon for businesses to have an inkling as to why they were VCTIGVGF��

Continue to check all systems as the attack is occurring so that you can ensure it’s not being used as a smokescreen for another cyber attack on your business.

Identify an Attack Early

www.coxbusiness.com

Your Business Is Under A DDoS Attack—Now What?

Gather as Much Information as You Can About the Attack

ariley
greater the impact to your customers resulting in confusion and potentially doing business with someone else.
Page 5: YOUR BUSINESS IS UNDER A DDOS ATTACK-NOW WHAT?Is your business prepared in case of a DDoS or Cyber Security attack? Download our free checklist and resource guides. . Your Business

03

A DDoS attack can be an exhausting and overwhelming experience for the people involved, but it’s important that you audit the experience afterward. Create a prevention plan for future attacks while everything is fresh in your mind in order to best learn from what happened.

Review the documentation and notes you took during the attack and review what went well in the recovery process, what could have been improved, and overall learnings from the event. You don’t need to do all of this alone. Work with your ISP to identify as much information about the attack as possible. From there, call and report the attack to your local

police department who can help you identify the source and cause if you and your ISP were unsuccessful in doing so.

Once everything is seemingly back to normal, it’s important that you review every system thoroughly to ensure it’s operating as it’s supposed to be.

/CMG� UWTG� [QW�JCXG� ƒZGF� GXGT[VJKPI� RTQRGTN[� CPF�that you didn’t simply put a band-aid on the situation.

If your system is under attack, don’t panic. By following the steps above, you’ll set yourself up to mitigate the situation successfully and will be fully prepared should an attack occur again in the future.

Is your business prepared in case of a DDoS or Cyber Security attack? Download our free checklist and resource guides.

www.coxbusiness.com

Your Business Is Under A DDoS Attack—Now What?

After the DDoS Attack

Contact Your InternetService Provider

Once you’ve gathered the most important information, call your KPVGTPGV�UGTXKEG�RTQXKFGT� +52��CPF�tell them you need help.

Your ISP will have procedures in place to help you start the recovery process. They should have the ECRCDKNKV[�VQ�TGFKTGEV�QT�UVQR�VTCHƒE�from entering the network. They’ll then use various tools to get a better understanding of how the VTCHƒE� VQ� [QWT� UKVG� EJCPIGF� CPF�attempt to identify the malicious packets involved.