Even after Dyn DDoS attack, businesses shouldn’t ditch DNS providers, analyst says

BlogBusiness IntelligenceEven after Dyn DDoS attack, bu...

Share on facebook
Share on twitter
Share on pinterest
Share on linkedin


Dive Brief:

  • Businesses should not dump their DNS service providers simply because of the massive DDoS attack on Dyn last month, says Gartner analyst Bob Gill in an 


    Dive Brief:

    Dive Insight:

    DNS service providers are generally still much more reliable than in-house DNS, Gill said. So instead of dumping current providers, companies should instead ensure redundancy measures are put in place. 

    Gill said at least some Dyn customers that used more than one DNS service were able to recover from the attack fairly quickly. For example,Amazon Web Services CEO Andy Jassy said last week that AWS responded to the outages by shutting down its Dyn DNS use shortly after the attack started and rerouting the affected traffic to alternative providers. The move lessened service disruptions to its customers. 

    Doubling up on DNS service providers can be expensive, but could be worth it. The publicity generated by the Dyn attack and the fact that botnet source code was made public means more such attacks are likely.

    People evaluating the attack on Dyn still haven’t uncovered a motive.

    This post originally appeared on our sister publication, CIO Dive. Our mission is to provide busy professionals like you with a bird’s-eye-view of the Information Technology industry in 60 seconds. To subscribe to our daily newsletter click here.

Don't Miss Reading ...

Official Social Media Pages

Most Popular