sb-as logo
Story image

CompTIA: DDoS attacks growing in scope, size and sophistication

CompTIA is offering IT professionals a free resource guide to help them face the increasing number of Distributed Denial of Service (DDoS) attacks.

The trade association for the global IT industry has launched a “DDoS Guide for IT Pros” - a free resource that provides comprehensive information on the nature and types of DDoS threats. 

The resource explains how to identify organisational vulnerabilities and recognise the warning signs of a potential attack; identifies the tools, best practices and response procedures that can prevent attacks or minimise their damage.

“DDoS attacks have grown in scope, size and sophistication,” says Dr. James Stanger, chief technology evangelist at CompTIA. 

“An organisation that is unprepared for an attack can face devastating consequences – hours of downtime and millions of dollars in lost business and productivity," he explains.

A DDoS attack typically occurs when a network, server or website is flooded with traffic by a malicious actor until the target cannot respond properly or simply crashes. Sometimes, even a few malformed packets can destabilise a system. This prevents legitimate users from accessing email, websites, online accounts, or other services.

According to CompTIA, a recent report estimated that there were more than 175,000 DDoS attacks in the United States in March. But the threat is not limited to the U.S. South Korea experienced nearly 74,000 incidents during the month; Brazil, more than 51,000; China, 45,000; and the United Kingdom, almost 44,000.

“No one is immune, but organisations can minimise their risk by investing in both technologies and personnel,” Stanger says.

“Our guide identifies the steps that any business can take to strengthen their defense against an attack.”

CompTIA’s “DDoS Guide for IT Pro” includes information on:

  • Preventive measures, such as network reconfiguration, exercises and simulations.
  • Identifying warning signs that an attack may be imminent or underway.
  • Response techniques and services to help mitigate potential damage.
  • Best practices to deploy to create a coordinated defense.
  • The cybersecurity skills an IT pro needs to manage a DDoS attack.

“Just as technology advances, so do the cyber-threats we must deal with,” Stanger says.

“That’s why it’s essential for IT professionals to continue to educate themselves through ongoing training and professional certification.

"The standards and practices taught in the industry can help IT pros and their employers respond to DDoS attacks. One way to stay current with the standards and best practices covered by IT certifications is to visit the CompTIA Career Pathway," adds Stranger.

To download a free copy of CompTIA’s “DDoS Guide for IT Pros” visit https://www.comptia.org/content/guides/what-is-ddos-protection-tools-stopping.

The Computing Technology Industry Association (CompTIA) is a voice and advocate for the $5.2 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage, and safeguard the technology that powers the world’s economy. Through education, training, certifications, advocacy, philanthropy, and market research, CompTIA is a hub for advancing the tech industry and its workforce. 

Link image
Why the threat of ransomware requires quality resources to keep it at bay
With this ransomware prevention kit, learn actionable tactics for IT departments on how to manage backups and enable staff so that ransomware is a managed and controlled risk.More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
NordVPN upgrades infrastructure with launch of colocated servers
"The greatest advantage of having colocated servers is their complete ownership, which guarantees access only by our authorised people."More
Story image
Report: Power utilities increasingly at risk of devastating cyber-attacks
“Utilities’ existing systems are becoming increasingly connected through sensors and networks, and, due to their dispersed nature, are even more difficult to control.”More
Story image
Financial institutions in APAC region to invest millions in fraud prevention
"The pandemic is creating a lot of uncertainty, but the majority of FIs in APAC recognise that an end to end fraud management platform is strategic to differentiating themselves from the highly disruptive landscape they are playing in."More
Story image
Security and operations collaboration key to success post COVID-19
“We are in an ultra-hybrid world with multi-everything, and in order to successfully navigate this landscape, ITOps, DevOps, and SecOps teams need to more closely align."More