Loading...
Answers
MenuWhich level of DoS protection is best to start off with for a startup building a social network from the ground up?
This question has no further details.
Answers
Denial of Service protection is a key component of your perimeter defense along with your firewall, intrusion detection/prevention and continuous monitoring.
There are several managed service providers that you can choose from. The first vendor you should contact is your Internet Service Provider (ISP), they may have DoS services available as a component of your contract or they will have DoS providers they partner with.
Once you have identified the services your provider offers or the DoS protection partners they have you can evaluate which is best for you.
If you have more questions on this or other security, data protection or regulatory requirements, PCI may be important for you, feel free to let me know.
Best of luck in your venture!
-Steven
For a startup, I'd suggest at a minimum you use a CDN like Fastly or Cloudflare in front of your application to prevent basic DDoS attacks. In addition, you'll need to pay particular attention to rate-limiting your login and registration APIs/forms so that you won't have bot attacks and brute-force attacks against your site. The CDN's usually don't provide rate-limiting so you may want to use something like Amazon AWS's functionality for this.
Related Questions
-
How secure is Clarify.fm with content and recordings?
If you feel that Clarity isn’t secure enough for your needs, you’re welcome to use another platform. Also, if you have something that’s extremely private, your welcome to use another platform. Clarity is a great platform with great customer support. I’ve needed them numerous times and they’ve always been super responsive and helpful. I only wish they promoted the platform even more. Good luckAB
-
We need to certify our start up with the best , most advanced healthcare information security vendors. Any ideas of the best start ups or ways to go?
There are many security standards you can "certify" your datacenter with, such as NIST or ISO. You can read more about them here: http://en.wikipedia.org/wiki/Cyber_security_standards In addition there are some SSL and Antivirus vendors who provide "security badges" that can be embedded to your website and prove that your DNS domain and SSL certificate are valid. Having said that, If you are serious about security and want to leverage that as a competitive advantage you would probably have to implement deep security measures. You could then publish these measures in a whitepaper that can be shared with your clients. You can refer to what Amazon have published regarding their AWS product: https://media.amazonwebservices.com/pdf/AWS_Security_Whitepaper.pdf GuyGB
-
What should you do when your business has been hacked and is being defamed online?
In a word: Forensics. Computer forensics is the art of examining a system and determining what happened upon it previously. The examination of file and memory artifacts, especially file timelines, can paint a very clear picture of what the attacker did, when they did it, and what they took. Just as an example - given a memory dump of a Windows system, it is possible to extract not only the command lines typed by an attacker, but also the output that they saw as a result of running those commands. Pretty useful in determining impact, eh? Depending on the freshness of the compromise, it's possible to tell quite a lot about what happened.CF
-
On which platforms can I find a reputable Growth Hacker for hire?
The reality is "reputable" growth hackers - aren't sitting around on freelance sites waiting for you to hire them. If they are good, they are either (very) gainfully employed at a reputable company making very good salaries or more likely using our super powers to create multimillion dollar companies. So the bad news is there is no platform where you can hire reputable growth hackers BUT here is what you can do: You can borrow some of their time on here for just a few dollars a minute and learn what you need to learn to do it yourself (or at least get started) or find courses to learn "growth hacking" yourself. Get the tips, learn the techniques, tons of free resources and sites too. Unfortunately there are no silver bullets and very seldom magic hires that will suddenly get you growth. It's a painful, iterative long process. And the term growth hacker is very broad. Some of us can help you with SEO/SEM, email list building, partnerships and PR (I'm heavily specialized in PR). TL:DR Talk to specialized growth hackers, learn, and apply the techniques yourself.AS
-
We're developing a web product with a team of 10 developers. How can I protect my source code if anyone leaves the company?
If you're using source control, it's easy to track source and control access — or revoke access — if someone leaves the company. Also, your developers should have signed a contract about the project itself that clearly places the source code under your/the client's/the company's control, and if/when they leave, they release all rights to code created under that contract. You can never be 100% sure, but these small steps will at least ensure a legal high ground should anyone steal code. Good luck!JL
the startups.com platform
Copyright © 2025 Startups.com. All rights reserved.