Jola Cloud Solutions' Blog

DDOS Protection for the channel

Posted by Cherie Howlett on 08-May-2025 17:07:00

According to the Cloudflare DDos Threat report, there were an average of approximately 4,870 DDoS attacks blocked per hour on the Cloudflare network in 2024. This translates to roughly 110,880 attacks per day. In the fourth quarter, over 420 of those attacks were hyper-volumetric, exceeding rates of 1 billion packets per second (pps) and 1 Tbps. Moreover, the amount of attacks exceeding 1 Tbps grew by a staggering 1,885% quarter-over-quarter.

Over the bank holiday high street chains M&S and the Co-op were targeted by ransomware-as-a-service attacks.

For channel partners concerned about the increasing threat, Jola built a fully redundant, highly scalable IP edge network specifically designed to deliver high performance and secure mobile data services. Jola partners’ critical services run over the Cloudflare network. Cloudflare’s 121 Tbps worldwide network blocks an average of 86 billion threats per day, including some of the largest DDoS attacks in history.

Adrian Sunderland, CEO, commented, ‘The Jola network is built on technology from Amazon Web Services, Cloudflare and Cisco and underpins our Fixed IP and Private APN services. Cloudflare protection is included as standard on all Jola's Private APN and Fixed IP services regardless of which mobile network or type of SIM is being used.

We are the first MVNO in the world to partner with Cloudflare to ensure secure, fast delivery across our network. Cloudflare gives Jola partners protection against DDOS attacks but more importantly peace of mind that we are using world-class suppliers to prevent new threats as they emerge.’

Read More

Topics: Cyber Security

Cyber Security

Posted by Cherie Howlett on 22-Nov-2024 14:30:59

There have been some high-profile cybersecurity attacks on IoT and M2M devices. The Bristol Airport's flight information system was hacked and held for ransom and the digital signage in Union Street station was hacked, with the train information screens being used to display pornography at rush hour. These attacks were visible and disruptive, but there are also hidden attacks where IoT devices are hacked to become part of botnets that are then used to power DDOS attacks against whomever the hackers are trying to target. In this scenario, the device owner may not know until their monthly bill arrives and their connectivity consumption has increased dramatically.

Jola provides SIMs that are used in a wide variety of IoT and M2M scenarios. We are acutely aware of the need to protect our resellers and their customers from the consequences of falling victim to a cybersecurity attack. At the foundation of what we do is our Mobile Manager portal which, with its real-time alerts and control, provides visibility of SIM usage before the monthly bill arrives. Our approach goes beyond managing costs. If the application does not need access to the Internet, then why would you expose it online?

Jola offers SIMs that provide secure private access back to a corporate network with no access to the Internet at all. This almost eliminates the ‘attack surface’ completely. Jola has also been involved in some high-profile digital signage deployments where our approach to security has gone beyond just securing connectivity. We have provided secure devices with hardened device operating systems and configurations to deliver a truly secure solution.

Jola is also the first mobile service provider to route all our public fixed IP SIM traffic through Cloudflare to provide best-in-class, always-on, real-time threat protection.  As a result of this, our partners and their end-users are protected from reputational damage, financial impact and data loss that could otherwise result from the 1000s of cyberattack attempts that we block every single month.

Our goal is to enable our channel partners to embrace opportunities and benefit from our experience to deliver unique and differentiated solutions to their customers that are secure from threats that are undeniably out there.

Read More

Topics: Cyber Security

Cyber Security

Posted by Adrian Sunderland on 18-Nov-2021 12:50:54

There have been some high-profile cybersecurity attacks on IoT and M2M devices and deployments. The Bristol Airport's flight information system was hacked and held for ransom, and the digital signage in Union Street station was hacked as well, with the train information screens being used to display hardcore pornography at rush hour. These attacks were obviously highly visible and disruptive, but there are also hidden attacks where IoT devices are hacked to become part of botnets that are then used to power massive DDOS attacks against whomever the hackers are trying to target. In this scenario, the device owner may not be aware of their role until their monthly bill arrives and their connectivity consumption has increased dramatically.


Jola provides SIMs that are used in a wide variety of different IoT and M2M scenarios. We’re acutely aware of the need to protect our resellers and their customers from the consequences of falling victim to a cybersecurity attack. At the foundation of what we do is our Mobile Manager portal, which, with its real-time alerts and control, provides visibility into the SIM usage before the monthly bill arrives. However, our approach goes beyond just managing costs. If the application does not need access to the Internet, then why would you expose it online? Jola offers SIMs that provide secure private access back to a corporate network with no access to the Internet at all. This almost eliminates the ‘attack surface’ completely. Jola has also been involved in some extremely high-profile digital signage deployments where our approach to security has gone beyond just securing connectivity. We have provided secure devices with hardened device operating systems and configurations to deliver a truly secure solution.

Our goal is to enable our channel partners to embrace opportunities and benefit from our experience to deliver unique and differentiated solutions to their customers that are secure from threats that are undeniably out there.

Read More

Topics: Cyber Security

Learn about the latest business communication technologies.

Find out what is available in your area.

This blog contains articles, reviews and interviews about the latest communications technologies for business.Sign up to this blog:

  • Become an expert in business cloud communications
  • Learn about the latest technologies
  • Understand how they can benefit your business

 

Subscribe to Email Updates

Recent Posts