{"id":2025,"date":"2014-04-21T09:32:18","date_gmt":"2014-04-21T14:32:18","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2025"},"modified":"2015-04-24T16:26:01","modified_gmt":"2015-04-24T21:26:01","slug":"ddos-protection-the-case-for-businesses","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/ddos-protection-the-case-for-businesses\/","title":{"rendered":"DDoS Protection &#8211; The Case for Businesses"},"content":{"rendered":"<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/04\/secure-from-attacks.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Secure from DDoS Attacks\" class=\"alignright size-full wp-image-2028\" height=\"111\" src=\"\/blog\/wp-content\/uploads\/2014\/04\/secure-from-attacks.png\" style=\"\" title=\"Secure from DDoS Attacks\" width=\"138\"><\/a>As DDoS attacks continue to rise, Power Admin takes a look at the stats and what can be done to help prevent such attacks damaging your business in 2014\n<\/p>\n<p>\n\t\u201cDDoS attacks should be a top security concern for organizations in the public and private sector in 2014\u201d\n<\/p>\n<p>\n\t\u201cExpect future campaigns to be even more extensive and to last for extended periods. Organizations, particularly those that operate or have interests in industries that are already prime targets, such as financial services and energy, need to ask themselves, \u2018Can we be resilient against a DDoS attack?\u2019\u201d\u00a0 \u2013 John N. Stewart, senior vice president and chief security officer at Cisco.\n<\/p>\n<p><\/p><center><br>\n\t<iframe loading=\"lazy\" allowfullscreen=\"\" frameborder=\"0\" height=\"486\" marginheight=\"0\" marginwidth=\"0\" scrolling=\"no\" src=\"https:\/\/www.slideshare.net\/slideshow\/embed_code\/33769912\" style=\"border:1px solid #CCC; border-width:1px 1px 0; margin-bottom:5px; max-width: 100%;\" width=\"597\"><\/iframe>\n<div style=\"margin-bottom:5px\">\n\t\t<strong><a href=\"https:\/\/www.slideshare.net\/poweradmin\/the-business-case-for-ddos-protection2\" target=\"_blank\" title=\"The Business Case for DDoS Protection\" rel=\"nofollow\">The Business Case for DDoS Protection<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> <\/strong> from <strong><a href=\"http:\/\/www.slideshare.net\/poweradmin\" target=\"_blank\" rel=\"nofollow\">Power Admin LLC<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/strong>\n\t<\/div>\n<p><\/p><\/center>\n","protected":false},"excerpt":{"rendered":"<p>As DDoS attacks continue to rise, Power Admin takes a look at the stats and what can be done to help prevent such attacks damaging your business in 2014 \u201cDDoS attacks should be a top security concern for organizations in the public and private sector in 2014\u201d \u201cExpect future campaigns to be even more extensive [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2030,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,9],"tags":[],"class_list":["post-2025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-technical"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2025"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2025\/revisions"}],"predecessor-version":[{"id":3517,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2025\/revisions\/3517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2030"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}