Page 36 - Cyber Warnings
P. 36







4. Ensure You Have Extra Bandwidth


It makes sense to have more bandwidth than you would plausibly need because
overprovisioning your bandwidth provides extra time to identify and deal with the attack.


It also enables the server to accommodate unprecedented spikes in traffic and to some extent
lowers the intensity of the attack.


If you overprovision the bandwidth by 200 percent or 600 percent, it will not stop the DDoS
attack, but it will buy you crucial time before your resources are overwhelmed.


Therefore, when determining the requirement of bandwidth give your business a healthy margin
of error to mitigate the risk of cyberattacks.


5. Train Your Customers On Security


An informed and a trained customer is an asset to your business as they walk with you hand-in-
hand for higher DDoS protection.


Explain to the customers the necessity and dire need of safeguarding their systems because
hackers target computers with weak passwords.

Gone are those days when birthdate or family name was considered as a strong password for a
computer. Urge your customers to keep difficult passwords to protect their privacy.


Furthermore, educate the clients to skip any attachments received from email addresses they
don’t recognize.


Today, customer education is an essential component of any company’s strategy for DDoS
protection. To proactively guard the customers against such cyber bullies, encourage them to
review and follow best practices to secure their device.


6. Set up Secured VPS Hosting


In order to save a few dollars, many businesses opt for the lowest price hosting plans available
in the market. While the initial cost is low, the threat of DDoS is attack is outrageous. Setting up
a secured VPS hosting provides DDoS protection and reduces the probability of an attack.

With a secured VPS, your website has its own portioned space, unique IP address and
operating system, thereby isolating the site from cyberattacks.




36 Cyber Warnings E-Magazine – March 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   31   32   33   34   35   36   37   38   39   40   41