Author Archive

Protecting Your Business From Increasingly Sophisticated Cyberattacks

cyberattacksWhether you’re leading a Fortune 500 company or your own small business, cybersecurity must be a fundamental business objective. Several high-profile cyberattacks in the first half of 2017 have affected organizations of all sizes all over the world, and these attacks are only going to become more common and more sophisticated.

As a business leader, it’s important to understand that the threat is constant. Even if you’ve never experienced an attack, your servers are perpetually being scanned by hackers for vulnerabilities — and the damage can be fatal to your business. A cyberattack can result in the loss of critical information, putting the reputation of your brand at stake.

If you suffer a cyberattack and are able to react quickly, it’s certainly possible to mitigate the damage to your business and your customers, though containing an attack can get tremendously expensive. If you have a plan in place, however, you can save yourself a lot of time and money — and protect the future of your business.

Read the rest of this entry »

Prepare Your Business for a DDoS Attack – 5 Recommendations

DDoS AttackDistributed denial of service (DDoS) attacks have become a part of having a presence on the web. While the question used to be if you will be attacked, today it is only a matter of when. Because of this, it is more important than ever to have a defense strategy in place. But, for all the media coverage and attention any DDoS attack may receive, their purpose and how to best defend against them are not always well understood.

According to the 2016 Verizon data breach incident report (DBIR), DDoS and web app attacks have increased substantially over the last year. Successful data breaches of web app attacks where data was stolen increased from 7% to 40% with targeted data including:

  • Credit card data
  • Personal information
  • Financial credentials
  • Passwords

If you want to ensure that your business is ready for a DDoS attack there are a number of best practices you should keep in mind. What follow are 5 recommendations from our 10 years of experience managing over 80,000 servers. If you want an even more in depth overview, as well 5 more recommendations, you can download the full white paper here.

Read the rest of this entry »

DDoS protection – what is a DDoS attack and how to mitigate it?

In today’s hyper-connected world, it has never been more important to address and mitigate security threats to your business. The shift to cloud services has increased substantially over the past few years and it is vital to understand how to reduce the risks that come with the move to this platform. More than 90% of internet traffic will be video within two years. The ratio of connected devices to internet users is projected to be 10:1 by the year 2020. With such a high level of connectivity, outages due to cyber security threats can cost a company up to $100,000 per minute.

The most common threat to cloud users are distributed denial of service (also known as DDoS) attacks. Studies show that targets are not limited to some specific activities but rather that every organization is a potential target. The top four reasons for attacks are:

  • Hacktivism illustrated by Anonymous or Wikileaks organizations.
  • Cyber warfare in order to destabilize a foreign government or an election.
  • Cyber espionage to steal intellectual property of a competitor.
  • Cybercrime in the form of cyberextortion, in which an attack or the threat of an attack is coupled with a demand for money to prevent or stop the attack.

Cybercrime is responsible for over 65% of attacks. It does not matter how large or small your cloud footprint is, everyone is at risk as no segment of activity is immune to attack. With an ever growing array of targets, attacks are becoming more sophisticated. Multi-vector attacks are becoming more aggressive than before with an 84% increase in multi-vector attacks over the past few years. It is also easier than ever to launch an attack due to the availability of tools that do not require special knowledge. One does not need to be a security expert to launch a damaging attack. Events of last week show that the growth of IoT (Internet of Things) is making us more vulnerable as personal devices such as webcams were used as weapons to bombard major sites like Netflix and Twitter with millions of requests. Read the rest of this entry »

Setting up Leaseweb CDN on WordPress

cdn graphSetting up WordPress on LeaseWeb CDN is very easy, as you’ll see. A couple of assumptions before we start:

  • WordPress is installed on the origin server
  • WP Super Cache or similar is installed within WordPress
  • An “Origin” that points to your WordPress installation is already defined within your LeaseWeb CDN control panel.

Configuring the zone itself

First thing you want to do is to configure a Pull Zone. Do this by going to “Manage Zones” -> “Pull Zones” and click the “Add” button.

 

image1

Read the rest of this entry »

Don’t let cyberattacks bring you down

LSW_CloudSecurity_iconThe first half of 2015 saw a 50% increase in DDoS attacks. They are not only becoming more frequent but they are getting more sophisticated too. On average, a DDoS attack will cost an SMB company €45,000 and an enterprise €400,000 – not to mention the damage done to the corporate image or share price. In other words, a DDoS attack might not only paralyze your online presence but could also be disastrous to your overall business continuity.

Diversionary attacks

Data breaches and DDoS attacks are the most common threats to your website. Just take a look at these statistics: according to Kaspersky Labs, 74% of companies that suffer a DDoS attack face another security incident at the same time; 26% of these incidents are data breach attempts or data leaks which means these attacks are not primarily meant to take your website offline but are a diversion to get to your data. These are so-called layer 7 attacks: the hackers divert your attention to get your eye off the ball by disrupting the availability of the website while they quietly try to exploit any vulnerabilities in your web applications.

Read the rest of this entry »

Improving our CDN: Four new POP locations – and more on the way

cdn graphGood coverage of our Content Delivery Network (CDN) is key to our customers. The more Points of Presence (PoPs) our CDN has, the better you will be able to serve your end users. As part of our continuous CDN upgrade program, I’m proud to announce that we have opened a further four new PoP locations during the last couple of months.

We have prioritized the following strategic locations:

Read the rest of this entry »

LeaseWeb Application Security introduction

DDoS attacks and other forms of cybercrime are becoming more and more frequent. That’s why we recently launched a new service called LeaseWeb Application Security. Here’s a quick video-tour of the easy-to-use dashboard from which you can adjusts your security situations, monitor suspicious traffic, respond to threats and more.

LeaseWeb Application Security is further augmented by a 24/7 Security Operation Center that reacts to every incoming attack. With the help of the Security Operation Center, you can constantly analyze your vulnerability and mitigate threats with a high degree of customization. For real-time mitigation of spammers, data breaches and DDoS attacks, application security experts are available 24/7.

Want to learn more about how you can protect your data? Visit http://lsw.to/lyA

LeaseWeb CDN Tutorial: Analytics Introduction

LeaseWeb introduces third generation CDN: multi carrier rack

cdn graphAs a CDN operator, we are continually pioneering new technologies in order to improve performance and lower our cost base.

In this context, we have launched several generations of CDN PoPs. The first generation connected the CDN servers to several carriers via LeaseWeb’s routers. The router ports found the best and fastest route available. In September 2014, we introduced a second generation of PoPs, which complemented the first. The second generation connected the CDN directly to one carrier. This saves costs because the LeaseWeb routers are no longer in between. Unfortunately, in this scenario there is no redundancy advantage since we connected to one carrier only. So even though the CDN PoPs complemented our platform and performed well, they did not allow us to grow at the pace we needed to.

CDN-PoP_1

CDN-PoP_2Finally, we can now proudly present our third generation multi-carrier PoP combining the best of both worlds. Using smart, pioneering SDN technologies that we developed in-house, we are exploiting switches that are actually performing routing tasks without the need of using expensive routers.

The multi-carrier PoP routes traffic to either the LeaseWeb network infrastructure (from which we use the peering destinations) or directly to a variety of other carriers available according to their performance. This way, the multi-carrier rack boosts content speed delivery to end users, while at the same time reducing infrastructure and network costs to the bone.
Furthermore, the cherry on top of the cake is that the new multi-carrier PoPs will host our dynamic Anycast DNS platform. The combination of both actions shows improvement by a factor 3 of our content delivery performance both in throughput and latency.

CDN-PoP_3
The multi-carrier rack will first be deployed in Miami this August. The rest of the CDN platform will be fully migrated in the following months. By the end of the year, all of LeaseWeb’s customers worldwide will be able to reap the benefits and get more speed and offload than ever before!

LeaseWeb CDN First Anniversary: We’ve only just begun!

What a year! Successfully launching a brand new CDN service from scratch in such a competitive environment has been a tremendous achievement. And now the LeaseWeb CDN team is looking forward to presenting you with yet more new features next year as we continuously improve it. We’re really excited to see how much we’ve accomplished in such a short period of time and it’s been a thrilling experience to be part the team that made it happen.

Here are just a few of the things we’ve achieved:

Read the rest of this entry »

LeaseWeb on Twitter

TechSummit DC - Catch our insightful speakers from Google, Skillshare, Netlify, Leaseweb and more! lsw.to/lkZ

test Twitter Media - TechSummit DC - Catch our insightful speakers from Google, Skillshare, Netlify, Leaseweb and more! https://t.co/zTJUhw9xxx https://t.co/sFSe3gnWOc

Get 3 months of Acronis Backup for free with no obligation when you sign up before November 30th! Sign up now lsw.to/lkB

test Twitter Media - Get 3 months of Acronis Backup for free with no obligation when you sign up before November 30th! Sign up now https://t.co/L55JqyNoUb https://t.co/ARPmRp6lIa

Don't miss Cloud Expo Asia! Discover DevOps, Containers and come say hi at booth K80 or make an appointment at: lsw.to/lkQ

test Twitter Media - Don't miss Cloud Expo Asia! Discover DevOps, Containers and come say hi at booth K80 or make an appointment at: https://t.co/MwP8jcAW2l https://t.co/f9stgEHshY

Update: Frontend Developer Meetup moved to October 23rd. All information can be found at lsw.to/lkR

test Twitter Media - Update: Frontend Developer Meetup moved to October 23rd. All information can be found at https://t.co/9STVNY8YCN https://t.co/993hkpfkaj