{"id":2913,"date":"2021-11-11T10:00:00","date_gmt":"2021-11-11T09:00:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=2913"},"modified":"2026-04-20T22:58:03","modified_gmt":"2026-04-20T20:58:03","slug":"how-can-you-protect-yourself-against-ddos-attacks","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/how-can-you-protect-yourself-against-ddos-attacks\/","title":{"rendered":"How can you protect yourself against (D)DoS attacks?"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns2913_a6a188-5a\"><a class=\"kb-button kt-button button kb-btn2913_f357d4-bb kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading2913_4ca6f9-9a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2913_4ca6f9-9a\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading2913_dbcde0-ca animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2913_dbcde0-ca\">How can you protect yourself against (D)DoS attacks?<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tNov 11, 2021\t<\/span>\r\n<\/div>\n\n\n<div class=\"kt-adv-heading2913_cd8eca-64 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading2913_cd8eca-64\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">2 min <\/span><\/div><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image2913_655551-52 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-1024x536.png\" alt=\"image of DDOS Cyber attack\" class=\"kb-img wp-image-51064\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-1024x536.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-300x157.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-768x402.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-18x9.png 18w, https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png 1201w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-1uw036s is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2913_46cc15-bb wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2913_46cc15-bb\">DDoS Attacks: A Constant in the IT Landscape<\/h2>\n\n\n\n<p class=\"kt-adv-heading2913_4d18b7-ec wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2913_4d18b7-ec\">For those of us that work in the IT industry, (D)DoS attacks are a part of life. And, have been for a number of years. The attacks shift in style just like any other fashion trend and they come and go in intensity and frequency \u2013 but they are always present. Sometimes the trend is to create attacks with large volumes, sometimes it\u2019s more popular to use large amounts of small data packets that can be difficult for an infrastructure to handle, and sometimes a combination. The goal is always the same, to create a disturbance and\/or outage of a service or services. Often there is nothing more to it than that, someone is bored, or doesn\u2019t have anything useful to fill his\/her days with, or maybe just wants to test how it works.<br><br>The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign states seeking information or someone trying to mask the fact that they are actually hacking your system somewhere else while you are occupied. The list goes on and on. Much like in our normal, analogue, life the villains seem to have very good imagination and they are relentless.<\/p>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-12lzvbb is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading2913_7b3912-e6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2913_7b3912-e6\">What can you do to protect yourself?<\/h3>\n\n\n\n<p class=\"kt-adv-heading2913_afc519-47 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2913_afc519-47\">First of all, I argue that you should never succumb to threats, never pay ransom. That\u2019s of course easier said than done in a situation where your business is on the line. However, there is nothing that suggests that these people will stop attacking once they have received the ransom. All that has happened is that they have learned that you are a good target. If they need money again in the future, that\u2019s not a list you want to be on. Also, I recommend reporting all attacks to the authorities, if for nothing else, to be able to show your customers that you take it seriously.<br>Second, you need to look at available concrete countermeasures. If you run an average business you most likely have some or all of your critical IT solutions outsourced in some way. You need to address the issue of Information Security in general and (D)DoS attacks in particular with your service provider. Do they have a (D)DoS protection system in place? Has it been tested? Do they have routines for how to behave in case of an attack?<br><br>Also, a service provider that has a proven track record of dealing with information security is more likely to be able to handle a situation when it occurs. Within Information security we talk about the CIA triad, Confidentiality, Integrity and Availability. By leveraging on the services of a service provider that has (D)DoS mitigation capability, you ensure availability. Additionally, if you want to be safe regarding Confidentiality and Integrity, make sure that your service provider has certifications such as ISO 27001 and PCI DSS, as they are strong indicators that the provider takes matters within information security seriously.<br><br>The sad truth is that (D)DoS attacks, and other malicious activities, will continue to haunt us \u2013 probably forever. All of us, and especially us service providers, need to be prepared. We need to do what we can to minimize the impact that attacks, such as (D)DoS, have on the services we provide. This is not a business issue, this is an issue for society as a whole. If we want to be able to continue using the Internet somewhat like today, we need to figure out how to avoid letting the bad guys win!<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\t\tThe reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence\t\t\t\t<\/p>","protected":false},"author":2,"featured_media":51064,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":2,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,159,164,120],"class_list":["post-2913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-cyber-security","tag-dos","tag-gdpr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How can you protect yourself against (D)DoS attacks? - Complior<\/title>\n<meta name=\"description\" content=\"The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/how-can-you-protect-yourself-against-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How can you protect yourself against (D)DoS attacks? - Complior\" \/>\n<meta property=\"og:description\" content=\"The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/how-can-you-protect-yourself-against-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-11T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T20:58:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"How can you protect yourself against (D)DoS attacks?\",\"datePublished\":\"2021-11-11T09:00:00+00:00\",\"dateModified\":\"2026-04-20T20:58:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/DDOS-attack-blog-03.png\",\"keywords\":[\"Blog\",\"Cyber security\",\"DoS\",\"GDPR\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/\",\"name\":\"How can you protect yourself against (D)DoS attacks? - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/DDOS-attack-blog-03.png\",\"datePublished\":\"2021-11-11T09:00:00+00:00\",\"dateModified\":\"2026-04-20T20:58:03+00:00\",\"description\":\"The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/DDOS-attack-blog-03.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/DDOS-attack-blog-03.png\",\"width\":1201,\"height\":629,\"caption\":\"image of DDOS Cyber attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/how-can-you-protect-yourself-against-ddos-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How can you protect yourself against (D)DoS attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How can you protect yourself against (D)DoS attacks? - Complior","description":"The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/how-can-you-protect-yourself-against-ddos-attacks\/","og_locale":"en_GB","og_type":"article","og_title":"How can you protect yourself against (D)DoS attacks? - Complior","og_description":"The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence","og_url":"https:\/\/complior.se\/en\/how-can-you-protect-yourself-against-ddos-attacks\/","og_site_name":"Complior","article_published_time":"2021-11-11T09:00:00+00:00","article_modified_time":"2026-04-20T20:58:03+00:00","og_image":[{"width":1201,"height":629,"url":"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"How can you protect yourself against (D)DoS attacks?","datePublished":"2021-11-11T09:00:00+00:00","dateModified":"2026-04-20T20:58:03+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/"},"wordCount":625,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png","keywords":["Blog","Cyber security","DoS","GDPR"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/","url":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/","name":"How can you protect yourself against (D)DoS attacks? - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png","datePublished":"2021-11-11T09:00:00+00:00","dateModified":"2026-04-20T20:58:03+00:00","description":"The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence","breadcrumb":{"@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png","width":1201,"height":629,"caption":"image of DDOS Cyber attack"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/how-can-you-protect-yourself-against-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"How can you protect yourself against (D)DoS attacks?"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png",1201,629,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-300x157.png",300,157,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-768x402.png",768,402,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-1024x536.png",1024,536,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png",1201,629,false],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03.png",1201,629,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2021\/11\/DDOS-attack-blog-03-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"The reasons vary as to why someone performs an attack, anything from disruption of a competitor\u2019s business to foreign influence","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=2913"}],"version-history":[{"count":3,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2913\/revisions"}],"predecessor-version":[{"id":80583,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2913\/revisions\/80583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/51064"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=2913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=2913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=2913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}