Richard Muthua
Richard Muthua Head of Business Consulting

As technology and connectivity solutions evolve and become more sophisticated, so do the techniques used by cyberattackers to compromise devices and systems.

In Kenya, there has been a whopping 10% increase in the incidence of cyberattacks in the first quarter of 2019 compared with the same period in 2018.

A research report by cybersecurity firm Kaspersky Lab highlights this uptick and the global surge of DDoS attacks. SYN flooding increased by 84% in the first quarter of 2019 compared with the fourth quarter of 2018. This looks set to be overtaken as attacks will increase with 5G becoming more common and as attackers increase the availability of weaponry in the DDoS arsenal.

According to the report, it appears that new DDoS attack methods have replaced those that have been shut down by law enforcement agencies. Companies implement basic countermeasures and attackers retaliate by deploying long-lasting attacks. It is difficult at this stage to predict the rate at which the attacks will continue to grow, but what is certain is that the complexity of DDoS attacks is showing no signs of abating. We highly recommend that companies in Kenya should prepare themselves adequately.

What is a DDoS attack?

When a distributed denial of service (DDoS) attack is launched, an attacker tries to make it difficult for a service to be delivered. This is achieved by blocking access to virtually anything from servers, devices, services and networks to applications. To put it into perspective, a DoS attack is when one system sends out malicious requests, while a DDoS attack is sent from multiple systems.

The attacks work to swamp the system with requests for data – either by sending a web server so many requests to a page that it crashes under the demand or by targeting a database with a large volume of queries. This then overwhelms your bandwidth, CPU and RAM capacity. The impact of the attack can range from a minor annoyance to disrupting your services or even taking your entire business offline.

What’s your best defence?

Kenyan businesses should have the most sophisticated DDoS security solutions in place, but it shouldn’t stop there. The reality is that they can still be hit by a security breach. The trick is to know how to recover when things go wrong and for your business to remain operational even after a DDoS attack.

Our solution, DDoS Protection and Mitigation , takes a proactive approach to DDoS defences.

This service instantly analyses the type and scale of the attack and quickly redirects network traffic through our scrubbing centre, which puts you in a strong position to combat these large-scale attacks.

If the attack is successful, the service will provide different options for managing traffic under a threat so you can manage the risk of network downtime. By being able to redirect traffic when the network is under threat, you can safely continue operations and will not be at risk of a total shutdown.

Migration options:

Cloud Blackhole Mitigation: Sends the host server requests to a black hole.

Cloud Scrubbing Mitigation: Scrubs all traffic so only clean traffic gets through.

Hybrid Cloud Mitigation: Automatically detects application, TCP-state and volumetric attacks, and combines a cloud-based scrubbing service with an on-site CPE solution.

Find out exactly how vulnerable your business is by reading our e-book on Enterprise-level security risk assessment .

New Call-to-action