Thursday, August 31, 2017

FRAILTY, THY NAME IS DATA! – MASTERING DISASTER RECOVERY


Mastering Disaster

From a busted pipe to a fire, your data is vulnerable during a disaster. This is a serious problem, considering that half of businesses that lose data for 10 days or more end up filing for bankruptcy within 6 months. You can avoid this issue by having a data center disaster recovery plan in place. The right disaster recovery strategy will safeguard your data and get you back up and running quickly.

Run Mock Drills

Your data center disaster recovery strategy must include drills. Mock drills prepare your team for a disaster so they can handle the stress during the real thing. This prevents people from panicking, ensuring that they respond effectively. The more drills you run, the better off you will be. Practice turns into habit, so you can build effective habits with mock drills.

Use Advanced Planning and a Clear Chain of Communication

Advanced planning and communication are also essential for your data center recovery. Start with a clear chain of communication so people know exactly who to communicate with during a disaster. You should run mock drills so everyone can practice communicating. In addition, update the chain when staff changes or new technology emerges.

In regards to planning, you must consider what could potentially fail during a disaster and keep spare parts on hand to fix the problem before it occurs. If an emergency occurs, your vendors won’t be able to rush out to you, so having those parts available is essential to getting up and running. In addition, keep up with your maintenance schedule to reduce the chance of failure during a disaster.  Click here to visit original source....

Contact Details:
Telehouse America
7 Teleport Drive,
Staten Island,
New York, USA 10311
Phone No: 718–355–2500
Email: gregory.grant@telehouse.com

Monday, August 28, 2017

WREAKING HAVOC: DDOS ATTACKS ARE GROWING MORE FREQUENT, SOPHISTICATED AND COSTLY

9:02 AM Posted by Unknown No comments

Distributed Denial-of-Service (DDoS) attacks, which do not discriminate, have been used to target financial services, healthcare, technology, media and entertainment, software, gaming and a host of other industry sectors. According to Neustar’s Worldwide DDoS Attacks and Protection Report, 73 percent of organizations have suffered a DDoS attack, and 85 percent of attacked businesses have been victims of multiple assaults. Almost half of all DDoS targets run the risk of losing more than $100,000 per hour, with one-third exposed to potential losses of more than $250,000 per hour.

How do those numbers add up over the duration of an attack? According to research by the Ponemon Institute, the average cost of a DDoS attack last year was $4.7 million. Moreover, greater than half of all targets have also suffered a cybersecurity breach while undergoing a DDoS attack.


While the number and severity of DDoS attacks has risen every year, this past year has seen the rise of mega attacks targeting major sites. Twelve attacks have been recorded achieving greater than 100 Gbps throughput, of which five exceeded 200 Gbps.

The most notorious and largest of recent attacks were executed by the Mirai botnet, a collection of more than 100,000 compromised Internet-connected video cameras, consumer routers and other devices that occurred in the fall of 2016. Mirai’s victims included the Republic of Liberia’s Internet infrastructure, as well as U.S. DNS service provider Dyn, which resulted in the inaccessibility of several high-profile websites such as Netflix, Spotify and Airbnb. When one can’t binge-watch their favorite show, listen to R&B classica, or book an affordable room in Paris or Barcelona, something has to change. More on that later.

Cybercriminals have many DDoS-enabled weapons in their quiver. While the Mirai attack directly targeted Dyn’s DNS service, DNS services can also be interrupted by a method known as spoofing, or cache poisoning, whereby corrupt DNS data is used to divert Internet traffic away from the correct server. In fact, one in five DDoS attacks last year were DNS-based.

DNS servers can also be used to generate DDoS traffic with DNS amplification. The cybercriminal sends a DNS query with a forged IP address. The DNS server responds to the forged IP address belonging to the target of the attack. The result is that small queries trigger large responses that can overwhelm the target of the attack.

So, how do companies solve the challenge of quickly detecting and mitigating the pernicious threat of DDoS attacks?  Continue reading....

Contact Details:
Telehouse America
7 Teleport Drive,
Staten Island,
New York, USA 10311
Phone No: 718–355–2500
Email: gregory.grant@telehouse.com