Domain name system attacks hit The New York Times and Twitter hard last month. Here are five ways to make your DNS records harder to hack and easier to recover if they’re compromised.
In light of the recent domain name system (DNS) hijacking attacks on The New York Times, Twitter and Huffington Post, it’s important for CIOs to take a closer look at their DNS security strategy — and to be able to respond quickly if their company is attacked.
DNS records are basically sets of instructions that help connect your website to the outside world. The following five practices make these records harder to hijack and easier to recover if they are compromised, thereby reducing the damage attackers can cause. When DNS records are hijacked, a company must be able to get them back as quickly as possible because once the malicious records hit the caching servers, it becomes much harder to undo the damage.