Even after Dyn DDoS attack, businesses shouldn’t ditch DNS providers, analyst says

November 3, 2016
346 Views

Image

Dive Brief:

  • Businesses should not dump their DNS service providers simply because of the massive DDoS attack on Dyn last month, says Gartner analyst Bob Gill in an 

    Image

    Dive Brief:

    Dive Insight:

    DNS service providers are generally still much more reliable than in-house DNS, Gill said. So instead of dumping current providers, companies should instead ensure redundancy measures are put in place. 

    Gill said at least some Dyn customers that used more than one DNS service were able to recover from the attack fairly quickly. For example,Amazon Web Services CEO Andy Jassy said last week that AWS responded to the outages by shutting down its Dyn DNS use shortly after the attack started and rerouting the affected traffic to alternative providers. The move lessened service disruptions to its customers. 

    Doubling up on DNS service providers can be expensive, but could be worth it. The publicity generated by the Dyn attack and the fact that botnet source code was made public means more such attacks are likely.

    People evaluating the attack on Dyn still haven’t uncovered a motive.


    This post originally appeared on our sister publication, CIO Dive. Our mission is to provide busy professionals like you with a bird’s-eye-view of the Information Technology industry in 60 seconds. To subscribe to our daily newsletter click here.