T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360
Relying on your Internet Service Provider (ISP) for DDoS protection is like going to a restaurant known for the freshest, tastiest seafood and ordering beef. Sure, they have it on the menu and they are happy to sell it to you, but the experience is not likely to compare well to what you’d have in a fine steak house.
To be sure, ISPs have good reason to provide their users with DDoS protection services. ISPs with a better track record of mitigating DDoS attacks enjoy a better reputation for security, which improves sales and allows them to charge more. They can then use their increased earnings to invest in better DDoS solutions. The cycle reinforces itself.
This is a simplified version of how things should go. Reality is often vastly different. ISPs are rarely able to provide best-in-class security to their users. As I said, while DDoS protection is an important value-add for ISP providers, cybersecurity is not their core expertise. This leads to understandable compromises that impact the quality of the security they can offer.
The 2021 DDoS Threat Landscape Report shows attacks are constantly evolving in size, volume, frequency, and complexity. What doesn’t change is the attackers’ focus: the infrastructure their targets depend on most. That could be customer-facing applications, cloud services, network infrastructure, or an ISP itself. As organizations continue to pursue digital transformation, the technologies that drive this – cloud services, mobile networks, and IoT devices – are becoming targets for DDoS attacks. New vectors are being weaponized all the time, and ISPs are finding it difficult to stay on top of an ever-changing threat landscape.
In this post, we’ll examine the growing complexity and volume of the DDoS landscape, and explain why organizations should think critically about augmenting the DDoS protection provided by their ISP with technology that secures all assets at the edge and ensures uninterrupted business operations.
All DDoS attacks are not created equal
What if every cyberattacker in the world shared a single DDoS attack strategy and never changed their plan? In this scenario, it would be easy to provide a single DDoS mitigation solution…