当前位置:网站首页>The company is worried about customer frustration and brand damage caused by DDoS Attacks
The company is worried about customer frustration and brand damage caused by DDoS Attacks
2022-06-24 05:55:00 【zy18165754120】
This year, 2 I was investigated in May Of 1,000 name IT What professionals care about most is DDoS The impact of the attack on customer service , among 51% List it as their top concern .
exceed 300 Respondents said they were DDoS The victim of the attack , among 35% Your attack lasts longer than 24 Hours ,11% The attack lasted more than a week .
“ You have a one-third chance of being DDoS attack . This is a IT What teams and companies need to be prepared for ”,Neustar Director of security operation center Ted Swearingen Say .
For the retail industry IT For professionals ,67% My experience DDoS The attacker believes that the cost of website interruption is more than per hour 100,000 dollar , Equivalent to a daily loss of 200 Thousands of dollars .
“ This is a considerable sum of money . People don't realize that DDoS Many other costs associated , For example, brand damage ”,Swearingen tell Infosecurity. He added :“ People see you as a potential provider of certain services , They found that you suffered DDoS Attack and your service fails , They may look elsewhere ”.
Overall speaking , The survey shows that a large number of companies face DDoS Risk of attack , But few solutions are designed to counter these attacks , Many companies rely only on firewalls and intrusion detection systems . Investigation found , Less than 5% Of the respondents had a specially constructed DDoS Mitigation products .
“ We've seen firewalls become bottlenecks . They can't handle that type of volume and so many connections per second . So eventually they fell . Just one of the weakest links is needed to close your site ”, He said .
This explains why there have been so many attacks in recent days . If there is not enough protection , The company cannot prevent losses from increasing . Investigation found , Although many respondents are aware that their customer experience and public trust are at risk , But they haven't taken the next step to protect their reputation .
Swearingen say :“DDoS The attack is getting bigger and bigger , More and more , More and more complex , And it lasts longer and longer .” “ An attacker will not attack you with a vector , Instead, attack you with three or four vectors . You may be able to lighten one , But you can't alleviate all four ”, He added .
边栏推荐
- Idea2020 latest activation tutorial, continuously updated
- Is the prospect of cloud computing in the security industry worth being optimistic about?
- Malicious software packages are found in pypi code base. Tencent security threat intelligence has been included. Experts remind coders to be careful of supply chain attacks
- "Yi Jian Xing" was "Internet stormed". What countermeasures does the game company have other than "rather be broken jade"?
- Flutter - date of birth calculation age tool class
- Increase the dynamic port range to solve TCPIP alarm
- Detailed explanation of IPv6 theory and concept
- Build ZABBIX on Tencent ECS
- How to resolve computer domain name resolution errors how to select a good domain name
- Confirm the importance of requirements at the initial stage of EDI project
猜你喜欢
随机推荐
What are the stages from tradition to Tencent cloud
Adobe international certification wants to design! Understanding the style guide is your best introduction design
A power modem that can adjust the bending range of cable
A plate processing device of network separator which can adapt to different line port positions
How to buy a website domain name? How to select a website domain name?
Cloud studio 2.0: the beginning of cloud
Kubernetes Chapter 1: Foundation
What is the website domain name and how to register the secondary domain name?
How do users in the insurance upgrade industry choose?
Tencent cloud ceontos server patrol script
How about the XYZ domain name? What are the advantages over other domain names?
A high-end router antenna connection mechanism that can simultaneously deploy and store antennas
Kubesphere manages multi tke clusters
Malicious software packages are found in pypi code base. Tencent security threat intelligence has been included. Experts remind coders to be careful of supply chain attacks
What if the domain name is blocked? What can I do to quickly unseal?
How to make a secondary domain name? What is the purpose of a secondary domain name?
What is the meaning of domain name being walled and what is the solution
Build ZABBIX on Tencent ECS
Mysql database backup under Windows Environment
Typora software installation