Henry Oboro
Henry Oboro Cloud Security Engineer

Distributed denial of service (DDoS) attacks are on the rise globally. In February, DDoS entered the terabit era.

The increase in DDoS attacks – which also affects Nigeria – shows that defences designed to counteract incidents in the 300 Gbps range are no longer adequate since attackers are increasing the availability of weaponry in their DDoS arsenal.

“As organisations implement basic countermeasures, attackers target them with long-lasting attacks. It is difficult to say if the number of attacks will continue to grow, but their complexity is showing no signs of slowing down. We recommend that organisations prepare themselves effectively to withstand sophisticated DDoS attacks,” says Alexey Kiselev, Business Development Manager on the Kaspersky DDoS Protection team.

What is a DDoS attack?

When a DDoS attack is deployed, an attacker tries to make it difficult for a service to be delivered. This is achieved by blocking access to virtually anything from servers, devices, services and networks to applications. To put it into perspective, a DoS attack is when one
system sends out malicious requests, while a DDoS attack is sent from multiple systems.

The attacks work to swamp the system with requests for data – either by sending a web server so many requests to a page that it crashes under the demand or by targeting a database with a high volume of queries. This then overwhelms your bandwidth, CPU and RAM capacity. The impact of the attack could range from a minor annoyance to disrupting your services or even taking your entire business offline.

What’s your best defence?

Nigerian businesses should have the most sophisticated DDoS security solutions in place, but it shouldn’t stop there. The reality is that enterprises can still be hit by a security breach. The trick is to know how to recover when things go wrong and for your business to remain operational even after a DDoS attack.

Put your trust in our managed security

We have been managing and protecting corporate businesses in Africa for over 20 years. With that comes a level of service that’s hard to match.

  • We provide secure and stable releases of security operating systems to protect your network
  • MSS is configured and managed by industry experts
  • The solution provides significant cost efficiencies
  • Easily scale your perimeter security needs according to your security requirements

Read our Enterprise-level security risk assessment to check the vulnerability of your business.

New Call-to-action

Read more blogs below