82% of the companies involved in the EfficientIP / IDC survey were the target of DNS attacks in 2018.

This figure is up 5 points a year.

Spoofing, Domain Name System (DNS) cache poisoning, distributed denial of service (DDoS), and reflection with amplification DNS attacks are multiplying.

This is reflected in the “Global DNS Threat Report 2019” published by EfficientIP, in partnership with IDC.

IT managers from 904 organizations were interviewed.

82% of the companies involved in the survey were the target of DNS attacks in 2018.

This figure is 5 points higher than in the previous edition of the report.

On average, they were the target of 9.45 DNS attacks per organization in 2018, compared to 7 the previous year.

These attacks most often resulted in the shutdown of internal applications (in 63% of cases of DNS attacks) and/or the compromise of websites (45%).

The overall bill suffers.

Thus, the average cost per DNS attack (service restoration and loss of turnover) increased by 49% to reach $ 1.27 million (€ 1.16 million) for all study regions combined.

In France, the increase is less marked, but it was + 8% all the same to 940,000 euros, according to the report.

Overall, finance is the most targeted (88% of organizations in the sector have suffered DNS attacks).

Education, for its part, is the sector most exposed to phishing.

Zero Trust, the key to enhanced network security?

A minority (38%) consider protecting their DNS as a priority .

“When attacked, companies can not stop all their activity, but they can contain the risk,” said in the columns of DarkReading Ronan David, VP Business Development and Marketing of EfficientIP.

For the French-American provider of network security and automation solutions, “maintaining service, availability, bandwidth and control – all essential to the integrity of the network – is essential. Disaster recovery and avoidance of single points of failure must be part of the mitigation process. To do this, it is essential to adopt a zero trust strategy.”