After the DNS provider Dyn got hit with a bad DDoS attack last month, it left many people on the fence. Because of the attack, some big-name websites got kicked offline, causing people to be seriously concerned about their own websites and the DNS providers they were using or were thinking about using.
So, when people start to ask whether or not you should stick with Dyn or the current DNS company you are using, the short answer is “Yes.” While cyber security should definitely be taken seriously by everyone, the experts are saying stay loyal to Dy or your own DNS provider, despite the recent attacks. However, there are a few suggestions out there to give you peace of mind.
Some Attacks Are Just Impossible to Avoid
You’re probably wondering why you SHOULDN’T turn your back on your DNS provider when they got attacked so easily. Well, it’s a little more complex than that. The nature of the DDoS attack on Dyn was something that would be nearly impossible to avoid, even after taking all the proper security measures. To be more specific, the attack on Dyn was done by something called Mirai Malware. This type of Malware is capable of DDoS traffic of 1Tbps or more, and affects all devices that fall under the Internet of Things. And, experts say there could be more attacks in the future.
Instead, Use Multiple DNS Providers
Instead of relying on just one DNS provider, like Dyn, you should spread it out. This is to say, don’t put all your eggs in one basket. By making sure you’re backed by more than one DNS provider, you seriously reduce the risk of getting your site kicked offline if a DDoS attack occurs. Just look at the Dyn attack. Those who were back online ten or fifteen minutes after the attack, were probably sites that had a backup DNS provider.
Remember, In-House DNS Isn’t Always Reliable
Lots of companies that are using in-house DNS may feel more comfortable, but are definitely putting themselves at risk. Using an outsourced DNS service is just safer. Imagine if you used in-house DNS and you got attacked to the same level as Dyn did? You would probably have to kiss your business good-bye.
Dyn May Have Been a Special Case
Though any DNS provider could essentially be a target, don’t get yourself too worried. There may have been a reason Dyn got attacked as hard as it did. One of them being how much they advertised their security. Hackers saw that as a challenge to see if they could have taken it down, and they succeeded. A paper was also released a day before the attack, which highlighted the links between DDoS mitigation forms and DDoS attacks. Perhaps revenge was also motive. Or, even more, let’s not forget that Dyn caters to more VIP clients, which may have also been a reason for the attack.
Even though Dyn was a victim of a bad attack, don’t lose trust in your current DNS provider.