Jaheer Abbas, Regional Director SE Asia & ANZ, Limelight Networks
It’s clear that people today are spending more time online every day. In fact, according to a study by Limelight Networks, nearly half of adult consumers in Southeast Asia are online 16 hours or more each week. As digital grows in importance, however, it’s also becoming an increasingly bigger target for attacks.
The impact of a DDoS attack is greater than you’d think. Not only do these attacks diminish website performance, but there is the risk of long-term damage to brand reputation. Furthermore, DDoS attacks can also result in significant costs for a company – the obvious example is lost revenue, but what businesses may not realize is that they’re paying for the ‘bad traffic’ that’s attacking them, which can add up quickly and become very expensive.
Therefore, it’s important that businesses have the right technologies and infrastructure in place to protect themselves against DDoS attacks. Specifically, by implementing a layered defence that quickly identifies and mitigates these attacks, brands can protect their websites and reputations, while also ensuring they are only paying for the delivered clean traffic.
Even if a business’ website is scalable, it’s crucial to have a back-up plan in place so they can be prepared for unexpected traffic spikes and ensure the website is secure in any situation. At a bare minimum, businesses should utilize a CDN, as it can scale with traffic spikes and allow websites to effectively absorb traffic. And if a business isn’t quite ready for DDoS protection, they should at least look to set up DDoS detection as a first step – this way they can understand issues within their network and work to respond to an attack as quickly as possible.
Where to start? Safeguarding digital content often involves multiple techniques and layers of security. However, there are some easy-to-implement ways to protect your content.
HTTPS: The most fundamental level of protection is delivering digital content over HTTPS. HTTPS, or HTTP-Secured, refers to the encryption of communication between a single client (typically a device with a web-browser) and the destination, such as a website, through a trusted certificate that verifies ownership of the destination. When a successful HTTPS connection is established, any data that passes over that is encrypted. That way, you can be assured that you’re protected from anyone who might intercept the transmission.
User Authentication: Many organizations today also use two-factor authentication to access specific areas of type of content. It requires users to enter a randomly-generated, single use-number each time they log in. This ensures that even if a password is guessed or discovered, the perpetrator would still need to enter the code in order to gain access.
Encryption: Today’s websites integrate with third-party services such as Facebook and Twitter, include targeted advertisements, and can even be reshaped based on user history. Some of that data can be “personally-identifiable information” (PII) such as names, addresses, emails, and credit card numbers. These types of data need to be protected and encrypted. Using server-side scripting, for example, you can code part of your web pages to do the encrypting and decrypting on the fly, ensuring that data placed into the database, especially PII, is secured even if a breach does occur.
Mask Locations: Organizations should store URLs to content in a database rather than had coding them directly on to a page with a link. That way, if someone views the code on your page, the won’t be able to find the content location. Storing sensitive content such as media files above your www directory will also prevent anyone from crawling the website to find the location of your content.
WAF: The sophistication of cyberattacks sometimes warrants a layering of security technologies in front of a website. For example, where DDoS protection can help prevent a flood of malicious traffic, a web application firewall (WAF) can help filter traffic against a set of rules the prevent more targeted activity such as cross-site scripting (XSS) and SQL injections. The bottom line? Safeguarding your digital content is now more important than ever as digital experiences become the focal point for consumer engagement and commerce. Implementing these methods and technologies will protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor.
It’s clear that people today are spending more time online every day. In fact, according to a study by Limelight Networks, nearly half of adult consumers in Southeast Asia are online 16 hours or more each week. As digital grows in importance, however, it’s also becoming an increasingly bigger target for attacks.
The impact of a DDoS attack is greater than you’d think. Not only do these attacks diminish website performance, but there is the risk of long-term damage to brand reputation. Furthermore, DDoS attacks can also result in significant costs for a company – the obvious example is lost revenue, but what businesses may not realize is that they’re paying for the ‘bad traffic’ that’s attacking them, which can add up quickly and become very expensive.
Therefore, it’s important that businesses have the right technologies and infrastructure in place to protect themselves against DDoS attacks. Specifically, by implementing a layered defence that quickly identifies and mitigates these attacks, brands can protect their websites and reputations, while also ensuring they are only paying for the delivered clean traffic.
Jaheer Abbas |
Even if a business’ website is scalable, it’s crucial to have a back-up plan in place so they can be prepared for unexpected traffic spikes and ensure the website is secure in any situation. At a bare minimum, businesses should utilize a CDN, as it can scale with traffic spikes and allow websites to effectively absorb traffic. And if a business isn’t quite ready for DDoS protection, they should at least look to set up DDoS detection as a first step – this way they can understand issues within their network and work to respond to an attack as quickly as possible.
Where to start? Safeguarding digital content often involves multiple techniques and layers of security. However, there are some easy-to-implement ways to protect your content.
HTTPS: The most fundamental level of protection is delivering digital content over HTTPS. HTTPS, or HTTP-Secured, refers to the encryption of communication between a single client (typically a device with a web-browser) and the destination, such as a website, through a trusted certificate that verifies ownership of the destination. When a successful HTTPS connection is established, any data that passes over that is encrypted. That way, you can be assured that you’re protected from anyone who might intercept the transmission.
User Authentication: Many organizations today also use two-factor authentication to access specific areas of type of content. It requires users to enter a randomly-generated, single use-number each time they log in. This ensures that even if a password is guessed or discovered, the perpetrator would still need to enter the code in order to gain access.
Encryption: Today’s websites integrate with third-party services such as Facebook and Twitter, include targeted advertisements, and can even be reshaped based on user history. Some of that data can be “personally-identifiable information” (PII) such as names, addresses, emails, and credit card numbers. These types of data need to be protected and encrypted. Using server-side scripting, for example, you can code part of your web pages to do the encrypting and decrypting on the fly, ensuring that data placed into the database, especially PII, is secured even if a breach does occur.
Mask Locations: Organizations should store URLs to content in a database rather than had coding them directly on to a page with a link. That way, if someone views the code on your page, the won’t be able to find the content location. Storing sensitive content such as media files above your www directory will also prevent anyone from crawling the website to find the location of your content.
WAF: The sophistication of cyberattacks sometimes warrants a layering of security technologies in front of a website. For example, where DDoS protection can help prevent a flood of malicious traffic, a web application firewall (WAF) can help filter traffic against a set of rules the prevent more targeted activity such as cross-site scripting (XSS) and SQL injections. The bottom line? Safeguarding your digital content is now more important than ever as digital experiences become the focal point for consumer engagement and commerce. Implementing these methods and technologies will protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor.
Comments