In mid-October, an army of a million hacked Internet-connected smart devices almost broke the Internet.

That’s right. It was not an attack by clever Russian hackers who infiltrated companies through intercepted user names, stolen passwords or pirated information.

It was done by someone connecting smart devices – digital picture frames, baby cams, thermometers, stereos, televisions and million’s more Internet of Things devices that have their own IP addresses.


And they technically didn’t hack the Internet, they just caused a massive headache by a Distributed Denial of Service (DDoS) attack against the popular Domain Name System (DNS) service provider Dyn. DDoS attacks are when the hackers are trying to make an online service unavailable by overwhelming it with traffic from numerous sources. The traffic slows the sites down to a screeching halt so they may not be used.  Think of it like a traffic jam, too many cars on the highway causes slower movement and stoppage.

Sites and services like Twitter, Spotify, PayPal, Airbnb, and Pinterest experienced outages and downtime, either completely or partially. Even gaming networks like Xbox Live and PSN had brief problems.

The question to ask: Could the attack have been avoided?

The answer: Yes

Reports say all those smart devices are sold to homeowners with roughly the same 67 default passwords built in that consumers never changed. So someone trolling those IP addresses merely kept pinging them until the device was hacked and then linked to the bot army that launched the DDoS.


Remember: All those smart devices are built by engineers with one goal in mind: connectivity. The machines just need to talk to each other. They are not designed to be secure, which is why you need to make sure to have a strong password. Computer companies learned that a long time ago when they figured out the favorite, most-hacked and least-protected device in a company was the printer, which was connected to every computer.

While the current hole has mostly been patched there will be many DDoS attacks in the future. There is nothing that a IT wizard can do to protect it, this duty falls to the user. You are the first line of defense. Have you asked yourself if your devices are protected?

The Resource Hub

Get Complete Managed Services Insights

Visit our Resource Center for up-to-date news and stories for technology and business leaders.

Employee Spotlight: Todd Younkin

Employee Spotlight: Todd Younkin

We are excited to shine a light on Todd Younkin, an invaluable member of our team and the Team Lead at Applied Tech. Hailing originally from State College, PA, Todd brings a wealth of experience and leadership to our dynamic environment. Todd's professional journey encompasses diverse roles, from his early days working IT in a hotel to a library. Todd's education has been a blend of hands-on...

Employee Spotlight: Meet Mikaela Norgard

Employee Spotlight: Meet Mikaela Norgard

This month, we are excited to shine the spotlight on Mikaela Norgard, a Systems Technician based in Fargo, North Dakota. Mikaela’s journey in the tech world started with diverse experiences, from bartending in a local downtown bar to teaching music theater to K-12 students. Mikaela’s educational foundation was laid in Fergus Falls, Minnesota, where she graduated from Kennedy Secondary High...

Employee Spotlight: Nick Tesi

Employee Spotlight: Nick Tesi

This month we are shining a spotlight on one of the outstanding members of the Applied Tech team, Nick Tesi. Nick brings a wealth of experience and a diverse skill set to his role, making him an invaluable asset to our organization. Nick’s journey to his current position as vCIO and Account Manager at Applied Tech is nothing short of remarkable. His career path has included various roles such as...

Password Managers: Simple, Necessary Protection For You and Your Business

Password Managers: Simple, Necessary Protection For You and Your Business

The standard internet user will access several websites and applications on any given day. Each one of these different accounts will highlight the importance of not repeating passwords, and many even require a combination of letters, numbers, and symbols. The trouble with this, however, is that if we were to have a unique password for each online account that meets the complexity requirements,...

Three IT Service Techs Working

Move Forward with IT Services for Business

Use managed services for small and mid-sized businesses that help you reach your goals.

Work With Us