What the DDos attack on Dyn taught us

For those who haven’t heard yet, there was a DDoS attack against Dyn on October 21st. Hackers had used the I0T (Internet of Things) to take over a huge number of devices, such as Internet-connected cameras. With those devices under their control, thanks to the malware program Mirai, the hackers used them to send a flood of traffic that overwhelmed Dyn’s servers. The attack resulted in the slowdown of many, many big name websites such as Amazon and Netflix.

So what is there to learn from Dyn’s experience? Mirai worked by guessing the default login credentials of Internet-connected devices. Those usernames and passwords should, as a matter of course, have been changed when the devices were set up. They should, as well, be changed periodically in order to prevent brute force attacks.

We recommend people use a password manager, e.g. LastPass or DashLane, to create and manage complex passwords. Two-factor authentication should be wherever possible.

DataHive assures its clientele that we incorporate good practices to keep our data centre safe.

Protect your data, learn more, and have a confidential consultation with one of our DataHive professionals about your needs. datahive.ca