Your browser is out of date

You are currently using Microsoft Internet Explorer. To use this website without problems, we recommend that you install a new browser (e.g. Google Chrome, Mozilla Firefox, Apple Safari or Microsoft Edge).

I am interested in
The “Search” function is not available at the moment, please try again later.
Please get in contact with us. To contact form

DoS attack

A DoS attack can have serious economic consequences for the operator – if it affects an online shop, for example. One way in which Helvetia provides support is with a network of experts. Here are our five tips for prevention.

26 June 2018, author: Natascha Fabian, photo: Helvetia

A man in front of a laptop, in the background are several computers.
A DoS attack on an online shop can have far-reaching consequences. Here are our five tips for prevention.

Case study: Online shops are frequently victims of DoS attacks. The attacks prevent customers from accessing the website and cannot make any purchases or bookings. It can take days or weeks to ward off the attack, during which time all online sales grind to a halt (at worst during the busiest period). The damage caused may overwhelm the company.

Cyber Insurance covers the costs arising from….

  • Additional costs of maintaining operations
  • Loss of earnings due to downtime of online shop and resulting loss of sales
  • A loss analysis including forensics to determine the cause and extent of the insured loss
  • Measures taken to ward off or reduce the threat of reputational damage

In the event of a claim, Helvetia provides access to a network of experts consisting of IT security specialists, PR consultants and others. It is vital to resolve the disruption as quickly as possible and restore customers’ trust.

What is a DoS attack?

A Denial of Service attack is an attack on computer systems with the aim of disrupting their availability. This can have far-reaching economic consequences for the victim.

Five measures for prevention

These five measures can help you minimize the risk of an attack.

  1. Classify your systems (which ones are business-critical?) and derive a defence strategy, block certain regions
  2. Identify the normal volume of data processed by the systems
  3. Prepare fallback solutions with a different provider and draw up an action plan
  4. Install a firewall that only lets the necessary protocols through to the system
  5. Organize business-critical systems via separate IP access
Please check your internet connection