Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How to protect against DDoS attacks in a distributed workforce model

By Samir Desai
ddos-distributed-denial-service freepik
August 3, 2021

As we begin to come out of the coronavirus pandemic in the U.S., we enter a new world of business in many facets. One area of profound change is the pandemic’s impact on the conventional work model. Over the past year, the way we work has moved at an accelerated rate into the digital space as organizations adapted their operations to enable a distributed workforce and maintain productivity. This shift placed increased reliance on connectivity and the performance and security of enterprise networks – not just to drive business performance but to protect against malicious actors attempting to profit from business disruption.

Distributed Denial of Service (DDoS) attacks are among the most common and most serious threats to any business that operates with a distributed workforce model, and they are growing ever larger and more frequent. According to a recent study from Corero, a DDoS mitigation technology platform provider, larger attacks ranging from 10 to hundreds of Gbps increased by 50% in 2020. What’s more, these attacks are also being actively weaponized in the growing wave of cyber extortion and ransomware, as evidence by the recent Colonial Pipeline attack. According to the U.S. Department of Homeland Security, the number of ransomware attacks increased by more than 300% from the previous year.

As much or more than the cost associated with direct ransom attempts, however, is the ongoing business impact of a DDoS attack. In our digitally focused world, any downtime or increased latency can negatively impact brand reputation, customer trust, and, ultimately, revenue generation. It’s important that businesses understand that DDoS attacks aren’t just a blip on the radar; if not handled properly, they can be devastating to the long-term prospects of a business.

 

Progression of DDoS Attacks

DDoS attacks have grown and evolved right alongside the internet itself for more than 20 years. While they may have once been executed by the stereotypical lone hacker operating out of some dark room, they are now advanced campaigns deployed by sophisticated cybercriminals who are armed with funding, resources, and advanced technical skills.

This means that the days of a single direct method of attack are gone. Today it’s multi-vector attacks that are performed in quick succession and often simultaneously targeting multiple layers of the Open Systems Interconnection (OSI) model in planned attempts to evade security and protection methods. In many cases, these attacks are so advanced and well-designed that businesses will not even realize that they’ve been attacked until a website application slows to a halt or crashes altogether.

As the attackers have become more skilled, DDoS campaigns have risen in volume and frequency. In some instances, even the largest internet organizations in the world are being targeted, including AWS, which reported that it had mitigated a massive 2.3 Tbps attack in February 2020.

However, it would be misguided for smaller enterprises to believe that cybercriminals are only targeting the biggest players. In fact, the increasing volume of attacks is focused largely on the extortion of smaller targets. Consequently, while the largest attacks get the headlines, the security threat posed by frequently occurring, smaller-volume attacks can not be underestimated.

 

The Quiet Majority of DDoS Attacks

Despite the increase in large DDoS attacks uncovered by Corero and cited above, the same report found that 95% of all attacks are actually 5 Gbps or less. To the layman, this may seem like the equivalent of a run-of-the-mill, workaday internet service issue. But in reality, this level of attack is entirely capable of making server and network resources inaccessible, resulting in totally blocked internet access.

The changing business landscape only compounds the issue. An increasingly remote workforce relies on cloud-based applications and tools, and also means that businesses are now forced to expose enterprise services to the internet that would otherwise be within their secure LAN environment. The remote VPN access platforms businesses now use to deliver these services to their employees are often extremely vulnerable to DDoS attacks and, if impacted, can result in almost complete productivity loss for the duration of the attack.

Compounding these negatives effects is the high likelihood that attacks will return. While 84% of DDoS attacks last less than 10 minutes, according to the same Corero study, this is often by design as multi-vector attacks are deployed in quick succession in order to evade protection measures. Ultimately, there is a one-in-four probability of a repeat attack within the first 24 hours.

With this risk of continual attacks, businesses must have a pre-defined plan they are ready to implement as soon as a DDoS attack occurs. Best practice procedure includes activating a response team, launching notification and escalation procedures, and informing key stakeholders of the situation. Similarly, businesses must have pre-installed protection strategies working in parallel to mitigate network threats, just as attackers take a multi-vector approach to infiltrate the network.

But alone, these steps are not enough.

Advanced intrusion prevention and threat response systems – which combine firewalls, VPN, anti-spam, content filtering, and network security with DDoS mitigation solutions – offer some degree of network protection against a DDoS attack, but ultimately businesses need a partner at the network service provider level. By going to the root of the DDoS attack target and working with a provider that can divert day-to-day attacks away from their network infrastructure, businesses are able to best avoid downtime and disruption to their online operations.

 

The ISP Protector

Manual mitigation and protection efforts at the enterprise level simply cannot be effective in today’s threat environment. As attacks continue their evolution from large-scale and infrequent to daily and sophisticated, automated ‘always on’ mitigation is at the core of DDoS defense, and that starts at the ISP (internet service provider) level.

Beyond just delivering connectivity, ISPs support businesses via their security capabilities – chief among them in today’s environment, their ability to handle ever-evolving DDoS threats. DDoS mitigation solutions integrated into the ISP’s core network means attacks are handled upstream before they have the chance to affect a business’s internet connectivity. The ISP should be able to counter DDoS activity across key peering points by scrubbing out and intercepting any ‘bad’ traffic at the edge of the network, allowing the ‘good’ traffic to pass through with minimal impact on the network latency.

This automated, real-time mitigation at the core is not only more effective than the individual enterprise relying on its own security features alone, but it’s a more cost-effective method for the business to protect its own network infrastructure while maximizing network performance.

The transition to a hybrid workforce creates new network requirements and potentially new opportunities for DDoS attackers. As businesses wade into this new territory, preparation for a changing threat landscape at the enterprise level is key, but so too is their ISP selection. With a partner that is dedicated to providing integrated, always-on and automated DDoS protection, the enterprise can operate with confidence that its increasingly internet-based business can operate without disruption and with full focus on executing its strategy and achieving its business objectives rather than a preoccupation on defending its network.

KEYWORDS: cyber security DDoS information security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Samir Desai is Director of Product Management at GTT.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • Cyber Liability Insurance: Moving from Insurance to Assurance; cyber security news

    How to protect businesses against the threat of ransomware attacks and the role of cyber insurance

    See More
  • cyber

    Bringing BEC home: How to protect against BEC attacks while remote

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!