TDoS attack prevention best practices for enterprises
Yesterday we discussed how criminals go about creating a TDoS attack. Today, let’s look at some enterprise best practices for dealing with this type of attack.
Before a TDoS Event
- Discuss how to respond to a TDoS event with your service provider
- Ensure that someone has access to the phone number and direct contact information for the service provider
- Consider configuring your telephone system to isolate critical phone lines from administrative and other lines
- Remind employees to protect personally identifying information
During a TDoS Event
- Save the voice recording of suspects who may call before, during, or after the TDoS event
- Record all phone numbers and account information including event start and stop times, number of calls per hour or per day, phone numbers, ANI information, and IP addresses
- Retain all call logs and IP logs
- Work with your PBX provider to attempt to separate the affected phone number from critical trunks
After a TDoS Event
- File a complaint with the Internet Crime COmplaint Cener/FBI
- File a report with your local police department
- Consolidate call logs and IP logs, mark for long-term retention