TDoS attack prevention best practices for enterprises
Yesterday we discussed how criminals go about creating a TDoS attack. Today, let’s look at some enterprise best practices for dealing with this type of attack.
Before a TDoS Event
- Discuss how to respond to a TDoS event with your service provider
 - Ensure that someone has access to the phone number and direct contact information for the service provider
 - Consider configuring your telephone system to isolate critical phone lines from administrative and other lines
 - Remind employees to protect personally identifying information
 
During a TDoS Event
- Save the voice recording of suspects who may call before, during, or after the TDoS event
 - Record all phone numbers and account information including event start and stop times, number of calls per hour or per day, phone numbers, ANI information, and IP addresses
 - Retain all call logs and IP logs
 - Work with your PBX provider to attempt to separate the affected phone number from critical trunks
 
After a TDoS Event
- File a complaint with the Internet Crime COmplaint Cener/FBI
 - File a report with your local police department
 - Consolidate call logs and IP logs, mark for long-term retention