TNM Protects Customers From Cyber Attacks

Telekom Networks Malawi (TNM) TNM has introduced Distributed Denial of Service (DDoS) protection solutions to provide cyber security to its customers.

TNM’s Managing Executive for Enterprise Services, Vishwajeet Deshmukh said they decided to offer DDoS protection due to the increasing threat of cyber-attacks with potential to negatively impact on service delivery.

“This will grant protection from volumetric DDoS attacks that attempt to consume the bandwidth of the customer, and cause congestion. With TNM DDoS protection, organizations will be able to avoid the DDoS cyber-attacks that can greatly affect their service delivery for their customers,” said Deshmukh.

He observes that key impact of DDoS attack has resulted in brand reputation damage following such incidents as public facing website or application being unavailable, that can lead to angry customers, lost revenue and brand damage.

“DDoS also has the potential to reduce productivity. For instance, when critical applications become unavailable, operations and productivity slowly stop. Internal websites that partners rely on means supply chain and production disruption,” noted Deshmukh.

Deshmukh highlighted that Distributed Denial of Service attacks vary significantly, and there are thousands of different ways an attack can be done but they fall into three broad areas of Volumetric, TCP State-Exhaustion and Application Layer Attacks.

Volumetric attacks attempt to consume the bandwidth either within the target network/service or between the target network/service and the rest of the Internet and results in congestion while TCP State-Exhaustion attacks attempt to consume the connection state tables, which are present in many infrastructure components such as load-balancers, firewalls and the application servers themselves. Application Layer attacks target some aspect of an application or service.

According to IT experts, DDoS represents a significant threat to business continuity as organizations grow more dependent on the Internet and web-based applications and services, availability has become as essential as electricity.

A DDoS attack is an attempt to exhaust the resources available to a network, application or service so that genuine users cannot gain access. Cyber criminals utilize a combination of very high volume attacks, along with more subtle and difficult to detect infiltrations that target applications as well as existing network security infrastructure such as firewalls and IPS.