View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
September 12, 2017

DNS Attacks target unsuspecting UK Universities unaware of the consequences

A growing number of DNS attacks are hitting UK public sector bodies, and they're costing them a lot of money.

By

The UK’s public sector organisations face a future of paying out increasingly large sums of money as they become a target for DNS attacks.

UK councils, schools, and government offices joined the ranks of global organisations that were hit by DNS attacks, with around half of the organisations having to pay out hundreds of thousands of pounds due to having to fix the problem.

According to the 2017 Global DNS Threat Survey Report from EfficientIP 19% of public sector sites and 11% of education bodies affected by DNS attacks say that sensitive information was stolen, but in the UK overall that is 16%.

Read more: Equifax Data Breach: Tech reacts to massive cyber hack

Around 20% of public sector and 12% of educational victims also think that IP data was stolen, compared to 15% for UK organisations as a whole.

According to the report, 76% of all respondents were subjected to at least one DNS attach in the last 12 months, with 28% suffering data theft.

DNS attacksUnfortunately, there’s a number of issues that are exaggerating the problem. Failure to adapt security solutions to protect DNS, a lack of awareness of the variety of attacks, poor responses to vulnerability notifications, all point to a lot of issues that need to be overcome.

“The results once again highlight that despite the evolving threat landscape and the increase in cyber-attacks, organisations across the globe and their IT departments still don’t fully appreciate the consequences of DNS-based attacks,” said David Williamson, CEO EfficientIP.

Content from our partners
Why all businesses must democratise data analytics
How start-ups can take the next step towards scaling up
Unlocking the value of artificial intelligence and machine learning
Read more: CEX data breach: Here’s what the cyber security experts think

The report highlights some key steps that can be undertaken to ensure continuity of service and data protection for all parties involved. It suggests: replacing ineffectual firewalls and load balancers with purpose-built DNS security technology. Keeping DNS security up-to-date by patching DNS servers more often, and enhancing threat visibility by using deep DNS transaction analysis.

The report was conducted by Coleman Parkes from February to March 2017 with 1,000 respondents across APAC, Europe, and North America.

Topics in this article: ,
Websites in our network
NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
I consent to New Statesman Media Group collecting my details provided via this form in accordance with the Privacy Policy
SUBSCRIBED
THANK YOU