• Latest
  • All
  • How To
ddos security

A Matter of Minutes: Why Time to Mitigation is a Crucial DDoS Concern

April 10, 2018
Axian Telecom Considers Full Acquisition of Jumia

Axian Telecom Considers Full Acquisition of Jumia

July 2, 2025
Cable TV

Kenya’s Cable TV Market Rebounds with 31.5% Growth

July 2, 2025
Premier League and Microsoft Announce Strategic AI Partnership for Enhanced Fan Engagement

EPL Embraces Microsoft AI, Promising Data Insights and Fantasy Football Assistance

July 2, 2025
SMS

Kenyans Ditch SMS in Favor of WhatsApp and Chat Apps

July 1, 2025
DHgate Tablet Cases deals
DeepSeek_vs_ChatGPT

Hackers Build Malware That Tries to Reprogram AI Security Tools

July 1, 2025
Satellite Internet

Satellite Internet in Kenya Records 9.9% Decline in Users

July 1, 2025
Safaricom Ethiopia Celebrates Big Win with 10 Million Customers

Safaricom Ethiopia Celebrates Big Win with 10 Million Customers

July 1, 2025
Mobile Money

Kenya Hits 45 Million Mobile Money Users With M-Pesa in the Lead

July 1, 2025
tackling Bank Fraud, Sextortion, and Ransomware in Kenya

Kenya Facing Rise in Cyberthreats from Bank Fraud, Sextortion, and Ransomware

July 1, 2025
Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

A Matter of Minutes: Why Time to Mitigation is a Crucial DDoS Concern

Techweez by Techweez
April 10, 2018
in Op-ed
Reading Time: 4 mins read
253
1
ddos security

ddos security

What is the value of a single minute? What is sixty seconds worth, precisely? While these may sound like existential questions, the kind that have answers relating to sunsets or a baby’s gap-toothed smile, for many business owners and cyber-security professionals the answer is decidedly less heart-warming, as the value of a single minute can boil down to the damage incurred during a DDoS attack. Considering the cost of one hour of a successful DDoS attack can ring up to anywhere from $20,000 to $100,000, the value of a single minute works out to between $333 and $1,666.

The need for professional DDoS protection hasn’t been lost on many organizations, especially with the onslaught of attacks that have occurred in the last five years. What hasn’t been emphasized nearly enough, however, is time to mitigation.

Damage in the downtime

A DDoS or distributed denial of service attack is a form of cyberassault that uses a network of malware-infected devices being remotely controlled by attackers to take aim at a website or internet service with a blast of malicious traffic. The goal of this influx of traffic is to clog the network in the case of network-layer attacks or consume server-side resources in the case of application layer attacks, leaving the site or service unable to serve legitimate users.

A DDoS attack is considered successful if users are unable to use a site or service. This is most typically caused by DDoS-induced downtime, though DDoS attacks can also stymy users by slowing down a site so much that it’s not worth using – for online gaming, for example, this could be a lag of as little as half a second.

One of the biggest impacts DDoS-caused downtime can have lies in eroded user loyalty. Downtime of any variety is frustrating for users, and with endless options for almost any type of site or service, users can always click away to a competitor. Successful DDoS attacks also raise questions about an organization’s security. If such a well-known attack type can’t be prevented, how seriously is that organization taking security? Additionally, with many DDoS attacks used as red herrings for intrusions and data theft attempts, how safe is the sensitive data users have entrusted to organizations?

While distributed denial of service attacks that last for hours or even days are obviously a major issue for the affected organization and its users, you might be wondering if just a few minutes of downtime really matters. The answer is that it can really, really matter.

Up against the clock

First you have the industries for which those few minutes of downtime can negatively affect users and certainly by extension the organizations suffering the attack. Cryptocurrency exchanges going down for minutes can cost margin traders thousands of dollars, and the same goes for forex trading and other fintech platforms, for example. Short bursts of downtime can also be disastrous for software as a service providers and internet service providers whose services falter for end clients.

Beyond that is the reality that a DDoS attack lasts much longer than the downtime it causes as an organization struggles to deal with it. Sales, marketing and communications staff are tasked with the unenviable job of keeping customers and potentially the media informed on the situation. IT and cybersecurity employees will also have to go into overdrive to not just stop the attack but search for signs of intrusions or other related attacks. Back-end networks and systems may have also gone down in the attack, impacting operations and business processes. In rare cases, software and hardware can also be damaged by a DDoS attack. An attack that publicly succeeds for minutes can cause untold havoc behind the curtain.

A timely concern

What this all adds up to is a crucial need for DDoS mitigation that can stop an attack before it takes hold and causes any downtime. This requires immediate detection of attack traffic, analysis of traffic flow that can create scrubbing directives in a matter of milliseconds, and an instant response to those directives from scrubbing servers so they can begin bouncing malicious traffic while allowing legitimate traffic through without impediment.

If this were easy, all DDoS protection providers would offer it. It’s not easy. This level of response requires always-on detection, incredible processing capabilities, and the ability to exchange traffic data in real-time. Only the best of the best mitigation services can boast this, so for many organizations, only the best of the best will do.

Time to mitigation should be specified in the service level agreement a client has with its provider. For organizations in competitive industries, anything over 30 seconds could mean playing with fire. For reference, the leading TTM is currently 10 seconds for both network-layer and application-layer attacks.

With the non-stop crush of distributed denial of service attacks plaguing organizations it may feel like the requirements for mitigation solutions is growing long and complicated. However, the great thing about TTM is that if you have a provider with an excellent TTM, you can be sure you’re working with a leader in the industry and every other aspect of protection will be top-notch. You can go back to measuring the value of a minute by flaps of a butterfly’s wings or laughs from a curly-haired toddler rather than the piles of money figuratively lit on fire.

By Debbie Fletcher

Tags: Cybersecurity
SendShare147Tweet92
Techweez

Techweez

Techweez is an award winning Tech blog, top 100 gadgets blog and leading technology news site in East Africa. Follow us for exclusive interviews and authoritative stories on Technology. Talk to us at [email protected]

Related Posts

DeepSeek_vs_ChatGPT

Hackers Build Malware That Tries to Reprogram AI Security Tools

July 1, 2025
tackling Bank Fraud, Sextortion, and Ransomware in Kenya

Kenya Facing Rise in Cyberthreats from Bank Fraud, Sextortion, and Ransomware

July 1, 2025
Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Iran cyberattacks

Cyber Attacks Soar After US Airstrikes on Iran Sites

June 27, 2025
How to Secure Your Phone and Yourself During Protests

How to Secure Your Phone (and Yourself) During Protests

June 25, 2025
google-chrome

Three Billion Chrome Browser Users at Risk from Zero Day Hack

June 3, 2025

Latest

Axian Telecom Considers Full Acquisition of Jumia

Axian Telecom Considers Full Acquisition of Jumia

July 2, 2025
Cable TV

Kenya’s Cable TV Market Rebounds with 31.5% Growth

July 2, 2025
Premier League and Microsoft Announce Strategic AI Partnership for Enhanced Fan Engagement

EPL Embraces Microsoft AI, Promising Data Insights and Fantasy Football Assistance

July 2, 2025
SMS

Kenyans Ditch SMS in Favor of WhatsApp and Chat Apps

July 1, 2025
DeepSeek_vs_ChatGPT

Hackers Build Malware That Tries to Reprogram AI Security Tools

July 1, 2025
Satellite Internet

Satellite Internet in Kenya Records 9.9% Decline in Users

July 1, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Axian Telecom Considers Full Acquisition of Jumia

July 2, 2025

Kenya’s Cable TV Market Rebounds with 31.5% Growth

July 2, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Safaricom Ethiopia Celebrates Big Win with 10 Million Customers

Kenya Hits 45 Million Mobile Money Users With M-Pesa in the Lead

Kenya Facing Rise in Cyberthreats from Bank Fraud, Sextortion, and Ransomware

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.