Cloudflare Stops Largest DDoS Attack on Record

Cloudflare Stops Largest DDoS Attack on Record

Cloudflare has foiled the plans of yet another major hacking attack, a record-breaking DDoS attack of the likes we have never before seen. Let’s examine what goes into such an attack and what you can do to keep your business safe from their influence.

First Off, What’s a DDoS Attack?

DDoS stands for Distributed Denial of Service, and it specializes in overloading your network with more traffic than it can handle. Your business’ network can only handle so much traffic at a time, and when it receives too much, it shuts down entirely. It typically doesn’t need to process so many requests at a time, unless it’s under extenuating circumstances, like with a DDoS attack.

Your server has its limits, and the DDoS attack exploits those limits. You have a finite amount of bandwidth with which to go about your business–bandwidth that is already being used by your communications infrastructure and Internet. DDoS attacks use the resources of countless infected computers, typically referred to as a “botnet,” to ping your network with so much traffic that it is forced to collapse under duress.

In essence, the DDoS attacks literally “deny you service” by preventing you from accessing the tools and resources you need to go about your daily operations.

This is What Cloudflare Stopped

Cloudflare specializes in content delivery, along with SSL certificates and DDoS mitigation, so it stands to reason that they would have contingencies in place to put a halt to this attack. This particular attack reached a point where 26 million requests were being made each second, using only 5,607 infected Internet of Things devices across 121 countries.

There Are a Few Things You Should Do to Protect Your Business

We always, always recommend that you provide your team with a baseline understanding of network security issues, including password security, phishing awareness, and other best practices to prevent your devices from becoming a part of another botnet. You can also add and maintain a firewall to limit traffic into and out of your network.

Of course, it’s not always this simple. You might also need to ensure that your firewall doesn’t fail. Be sure to keep your systems updated and to keep a comprehensive DDoS response system in place with your business continuity plan.

It also helps to use the cloud for more parts of your business operations. The cloud is generally better equipped to handle these types of attacks, as it has greater bandwidth to minimize the impact of DDoS attacks.

We Can Help You Put All This in Place

If this all sounds overwhelming, don’t worry—we’ve got your back. To learn more about how we can protect your business, reach out to us at 603-889-0800.

Related Posts

With countless threats out there waiting for IT professionals to slip up, it’s no small wonder that many of these professionals are opting into what is called a zero-trust policy for their security standards. So, what exactly is a zero-trust policy, ...
We aren’t going to try and pretend that the investments necessary to preserve your business’ data security are small ones. Especially at first glance, you may very well start to question if such an investment is truly necessary. The simple fact of th...
No matter how big your business is, you’ll always have technology expenses. It’s just a fact of the current workplace, and your profits will be inexorably tied to how well your IT works for you. Furthermore, the more IT costs rise, the more impact sm...
When it comes to your business’ cybersecurity, it can be too tempting to operate under the assumption that the few cybersecurity events you hear about on the news are all that happen. Unfortunately, this is far from actual fact. Let’s review some of ...
Sometimes the worst scams out there are the simplest ones. Hackers don’t need a fancy or complicated malware or algorithm to create chaos for your organization; all they have to do is convince you that the email you’ve received in your inbox is from ...
No matter how well you protect your network, chances are you’ll suffer from some vulnerability or another. That said, you can take considerable measures toward protecting your business so you don’t have to worry so much about them. Let’s discuss how ...
Due to the almost faceless nature of many cybercrime acts, it can be easy to see them as nothing more than the acts themselves, which is of course not true in the slightest. Behind these attacks are people, and where people performing illegal acts ar...
While we typically focus on how various technologies can be used in business applications as a way to boost a small or medium-sized organization’s capabilities, we occasionally come across a topic that is just undeniably cool (and that we can bring b...
Imagine this scenario: you’re going about your daily tasks when you receive an email from a cybersecurity company claiming that you have become the target of a hacking attack. Now, you don’t work in IT, so you’re not sure what your security agency is...
Mobile devices have become a key part of our daily lives, to the point that many of us openly feel undressed without our phones. As a result, our phones go everywhere with us. However, it’s important to remember that some applications have requested ...
User authentication is a critical security feature for a business, specifically because it helps to minimize a significant threat to your business. This is why we’re so adamant that you should require multi-factor authentication wherever it is availa...
There is always the possibility that you have been involved with a data breach and you simply have not been contacted by the affected party. Plus, if a hacker has managed to crack a website or service without being detected, you wouldn’t be notified ...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem NH and Portsmouth NH area.

White Mountain IT Services


33 Main St, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Client Help Desk


Open Positions