DDoS attacks could cost the UK £1bn
The size and scale of Distributed Denial of Service (DDoS) attacks in the UK could cost the country almost £1 billion per year, according to research.
The statistics come from Netscout's Worldwide Infrastructure Security Report, which surveyed service providers and IT decision makers in the UK, US, Canada, France, Germany, Brazil, and Japan.
“The tools to initiate DDoS attacks are cheap, freely available and easily deployed," said Darren Anstee, CTO of security at Netscout.
"As a result, there are more than 10,000 DDoS attacks every day around the world. The size and complexity of attacks continue to grow and businesses must make sure their key resources are adequately protected, including in the cloud, SaaS etc..”
In 2018, the majority (91%) of respondents said they had experienced a DDoS attack that resulted in network downtime. The average amount of downtime stood at 30 minutes or more for nearly half the companies questioned and an unlucky nine percent found their systems were adversely impacted for more than four hours.
For UK businesses, specifically, 86% of respondents said they had been a victim of an attack at least once last year.
A staggering 90% of these UK businesses say they have experienced downtime, with an average of 67 minutes for the year. The cost of this downtime is estimated to be £2,140 per minute - which added up, comes to an eye-watering £1 billion figure.
"If we assume those impacts apply equally to the 8,000 UK companies with more than 250 employees, the total cost equates to approximately £900 million," Anstee summarised.
"However, we know that the wide availability of the required tools has 'democratised' DDoS. Much smaller companies are also under attack and so the true cost to the UK economy is likely to significantly exceed £1 billion per annum."
The findings also show that DDoS attacks have ramifications beyond just service downtime. Respondents cited a series of measurable attack consequences, such as revenue loss (36.2%), increased operational expenses (38.6%), reputational impact (36.2%), surging insurance premiums (31.9%) and loss of customers (30.7%), highlighting the longer-term damage successful attacks can bring.
"If something is important to you, it's important to hackers," Anstee concluded.
Industry: Cyber Security News
- Network Security Engineer
- €550 a day
German- based contract opportunity This is an onsite based position, we would need the Network Security engineer to be able to work on the client site 5 days a week Seeking an experienced Network Security Engineer for a leading technology company. Strong expertise in firewall/IPS solutions, proxy solutions, and certificate management is required. Good hands-on experience in networking and web-related technologies necessary. Strong problem-solving skills and the ability to work under pressure are essential. we are looking for a Network Security Engineer with the following experience: · Expertise in Administration, Management & Troubleshooting of Firewall / IPS solutions / Proxy solutions/Certificate Management Solutions · Good Hands-on Experience on security devices (PaloAlto/ /McAfee Proxy/CISCO ISE/Certificate Management) · Good Hands-on Experience in Networking with skills of switching, routing & wireless Technologies · Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocol · Configuration of NAT / PAT, firewall policies, profiling, objects, AD-Integration, backup – restore · Knowledge of Subnetting TCP/IP Communication, VLSM Configuration of VLAN VTP · Configuration of Routing Protocols e.g. RIPv1 & v2, OSPF, EIGRP, BGP Knowledge of standard and extended ACL 12 month contract
- IAM Consultant
- Upto £110,000 depending on level of position
Identity Access Management (IAM) Consultant Location: Germany We are seeking an experienced IAM consultants in Germany. we are looking for people from consultant through to Architect, The ideal candidate will have previous IAM deployment experience and be fluent in German. Key responsibilities: Design and implement IAM solutions for clients Provide expertise on industry best practices and standards Troubleshoot and resolve IAM-related issues Work closely with clients to understand their business requirements and provide solutions to meet those needs Qualifications: Previous deployment experience with IAM solutions Fluency in German Strong understanding of IAM technologies and principles Excellent communication and project management skills If you are an experienced IAM consultant with a strong track record of delivering successful projects, please apply today.
- ForgeRock Consultant
- Upto €85000 plus benefits
ForgeRock deployment consultant is needed for this expanding IT Services business within Spain, to act as their ForgeRock technical lead, Responsibilities include: High level and low level design, Scoping the techical needs of the project design, configure, develop and test the forgeRock deployment. We are looking for a strong IAM consultant ideally with ForgeRock experience, Must have strong Oauth 2.0, SAML and API experience
- IAM Consultant
- Upto €85000 plus benefits
An Identity & Access Management Consultant is needed for an expanding IT Security consultancy, based in France. (Remote role with monthly office meet-ups) The Identity & Access Management Consultant will be responsible for the technical design and implementation of Identity & Access Management/IAM products for a wide variety of clients. Deliver bespoke end-to-end consultancy service to our clients, from gathering requirements through to implementation. Work in a close team designing, developing, and implementing first-class IAM solutions. Manage client relationships, working closely with key stakeholders to continually evaluate business requirements and ensure the highest quality solution delivery. If you are interested we are looking for an individual with Previous experience working within the IAM or CIAM field is essential, Strong knowledge with SAML and Oauth and ideally OpenID Previous experience from any of these technologies: One Identity, SailPoint, Saviynt, Ubisecure, Ping Identity, would be advantageous