itb-au logo
Story image

CompTIA: DDoS attacks growing in scope, size and sophistication

CompTIA is offering IT professionals a free resource guide to help them face the increasing number of Distributed Denial of Service (DDoS) attacks.

The trade association for the global IT industry has launched a “DDoS Guide for IT Pros” - a free resource that provides comprehensive information on the nature and types of DDoS threats. 

The resource explains how to identify organisational vulnerabilities and recognise the warning signs of a potential attack; identifies the tools, best practices and response procedures that can prevent attacks or minimise their damage.

“DDoS attacks have grown in scope, size and sophistication,” says Dr. James Stanger, chief technology evangelist at CompTIA. 

“An organisation that is unprepared for an attack can face devastating consequences – hours of downtime and millions of dollars in lost business and productivity," he explains.

A DDoS attack typically occurs when a network, server or website is flooded with traffic by a malicious actor until the target cannot respond properly or simply crashes. Sometimes, even a few malformed packets can destabilise a system. This prevents legitimate users from accessing email, websites, online accounts, or other services.

According to CompTIA, a recent report estimated that there were more than 175,000 DDoS attacks in the United States in March. But the threat is not limited to the U.S. South Korea experienced nearly 74,000 incidents during the month; Brazil, more than 51,000; China, 45,000; and the United Kingdom, almost 44,000.

“No one is immune, but organisations can minimise their risk by investing in both technologies and personnel,” Stanger says.

“Our guide identifies the steps that any business can take to strengthen their defense against an attack.”

CompTIA’s “DDoS Guide for IT Pro” includes information on:

  • Preventive measures, such as network reconfiguration, exercises and simulations.
  • Identifying warning signs that an attack may be imminent or underway.
  • Response techniques and services to help mitigate potential damage.
  • Best practices to deploy to create a coordinated defense.
  • The cybersecurity skills an IT pro needs to manage a DDoS attack.

“Just as technology advances, so do the cyber-threats we must deal with,” Stanger says.

“That’s why it’s essential for IT professionals to continue to educate themselves through ongoing training and professional certification.

"The standards and practices taught in the industry can help IT pros and their employers respond to DDoS attacks. One way to stay current with the standards and best practices covered by IT certifications is to visit the CompTIA Career Pathway," adds Stranger.

To download a free copy of CompTIA’s “DDoS Guide for IT Pros” visit https://www.comptia.org/content/guides/what-is-ddos-protection-tools-stopping.

The Computing Technology Industry Association (CompTIA) is a voice and advocate for the $5.2 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage, and safeguard the technology that powers the world’s economy. Through education, training, certifications, advocacy, philanthropy, and market research, CompTIA is a hub for advancing the tech industry and its workforce. 

Story image
DigiCert receives top award from Frost & Sullivan thanks to agile approach
DigiCert has received the 2020 Global Company of the Year Award by Frost & Sullivan, with specific focus on its global transport layer security (TLS) certificate market. More
Link image
Revealed: Why CFOs need to embrace emerging tech
Financial technology is advancing rapidly, demanding that businesses advance with it or risk becoming irrelevant. Here's how CFOs can secure success by embracing future-shaping fintech.More
Link image
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.More
Story image
Schneider Electric launches public API for cloud-based software
As the first public API for the software, it enables IT solution providers and end users to integrate a power and critical infrastructure monitoring platform into their preferred management system.More
Story image
Rise in cyberattacks targeting the cloud as use of collaboration tools increase
“While we are seeing a tremendous amount of courage and global goodwill to overcome the COVID-19 pandemic, we also are unfortunately seeing an increase in bad actors looking to exploit the sudden uptick in cloud adoption."More
Story image
Chinks in the armour: Why the post COVID-19 cloud is easy game for cybercriminals
Now’s the time for CIOs to pause and make sure their digital transformation projects are fit for today, and the future.More