Security
How to Protect Your Business or Website from Application Layer Attacks

It's no secret by now that distributed denial of service (DDoS) attacks can wreak havoc on a business or website, using an influx of fake web traffic to take down a server. What a lot of people don't realize, though, is that not all DDoS attacks are carried out in the same way. Specifically, there are three main types of DDoS attacks: volumetric, protocol, and application layer. Recently, there has been an increase in the recorded sizes and instances of application layer attacks. In fact, one study estimated that more than half of reported DDoS attacks in 2017 consisted of this type. By having a better understanding of what an application layer attack is and how it works, you can take the proper measures to protect your site. What Are Application Layer DDoS Attacks? Specifically, an application layer attack refers to a type of DDoS attack that targets domain name servers (DNS),

Read more
DDoS Protection in the Healthcare Industry: Key Considerations

No matter what industry you find yourself in, the fact remains that keeping your data secure and your website up-and-running is important. In the medical industry, however, this is especially vital. Unfortunately, there has been a recent rise in the number of distributed denial of service (DDoS) attacks carried out against healthcare providers, especially on patient portals that users rely on to receive medical information, schedule appointments, and more. By having a better understanding of the unique challenges that healthcare organizations face on the web, you can take steps to protect your own business. Unique Security Challenges for the Healthcare Industry Health records are protected by the Health Insurance Portability and Accountability Act (HIPAA), which was passed and implemented nationwide in 1996. This law requires healthcare organizations to take certain measures to protect their patients' health records and other sensitive data – imposing serious penalties and fines for organizations that fail to

Read more
Key Factors for Maintaining HIPAA Compliance with a Dedicated Server

When you operate a business in the medical field or any other industry that handles sensitive health information, it's no secret that you're required to maintain compliance with the Health Insurance Portability and Accountability Act (HIPAA). This law sets forth several regulations that businesses and organizations are required to follow to keep personal data (including medical records) secure. Having a HIPAA-compliant server is a must if you'll be collecting or transmitting sensitive health data over the web. Shared or cloud-based servers may appear to be an effective option due to their convenience and low cost, but they often lack necessary security features and capabilities. Dedicated servers, on the other hand, offer a variety of security options. Plus, because they are not shared with other users, you’ll have greater peace of mind knowing that your clients’ or patients’ data won’t fall into the wrong hands. Of course, not all dedicated hosting

Read more
DDoS and IoT: How the Internet of Things Amplifies DDoS Risks

Distributed denial of service (DDoS) attacks have been a growing issue in cybersecurity for years. However, few people would have guessed that the increasing use of Internet of Things (IoT) devices would have an impact on DDoS risks. In the last few years, cyber-criminals have discovered that IoT devices can be used to carry out large DDoS attacks, causing all kinds of damage, downtime, and devastation. The Problem with IoT Devices What is an IoT device, anyway? This term generally refers to any product that has its own computer built in, along with the ability to connect to the internet. This can include anything from the smart light bulbs you have in your home to the Wi-Fi baby monitor you use to keep an eye on your little one. The problem with IoT devices is that users often don't take the proper steps to secure them because they don't see them

Read more
Botnet-Driven DDoS Attacks: Why They’re So Dangerous and How to Prevent Them

If you stay on top of web security news, you're probably familiar with the concept of distributed denial of service (DDoS) attacks and the havoc they can wreak on businesses and websites across the globe. Hopefully, you've also taken some measures to protect your site from these increasingly common cyber-threats. Unfortunately, there's another potential risk that you may not be aware of – botnet-driven DDoS attacks. In recent years, there has been a notable increase not only in the number of these attacks but in their size and potential for damage, too. By having a solid understanding of what these attacks are and how they originate, you can take even better measures to protect your site and server. What Is a Botnet-Driven DDoS Attack? A botnet-driven DDoS attack refers to one that utilizes a network of computers or other devices that have been compromised by malware. Hackers essentially use them to build an "army"

Read more
The Dangers of DDoS Attacks That Leverage WSD Protocol

If you stay on top of online security news, you've already heard about distributed denial of service (DDoS) attacks and the impact they can have on a server. However, what you may not be aware of is a new type of DDoS attack that is sweeping the web and leaving destruction in its path. These WS-Discovery-based (WSD) protocol attacks were discovered by researchers back in May of 2019, and have become a growing problem ever since. If you have a website or rely on a server to maintain sensitive information, it’s important to understand what WSD protocol attacks are and how they work. From there, you can take the measures needed to protect yourself. Understanding WSD Protocol Attacks Many network devices use something called WS-Discovery protocol, which allows devices to connect to each other automatically. When used for its intended purpose, WSD is useful and harmless. However, when hackers discovered that this

Read more
How to Set Up a Moving Target Defense Strategy

Are you looking for practical ways to beef up data security on your dedicated server? If you’ve already implemented our basic tips and tricks, it may be time to take things a step further by employing a moving target defense (MTD) strategy. When properly executed, this security plan can reduce your risk of falling victim to data breaches and a host of other cyber-attacks. By having a better understanding of what MTD entails and how to set up this strategy on your own site, you can feel confident knowing that your data is secure. Is a Moving Target Defense Strategy Right for You? Generally, an MTD strategy involves the intentional creation of a dynamic attack surface, which makes it harder for hackers to hone in on what they’re aiming for. This strategy was initially developed by the Department of Homeland Security but is now commonly used by web hosts and administrators all

Read more