Network attacks – Overview,
prevention, monitoring, tips

Preventing network attacks – checklist:

  • Systematize your company’s IT security
  • Stay up to date on “state-of-the-art” technology and new threats
  • Spread awareness amongst employees
  • Use modern and intelligent security technologies
  • Install a network monitoring tool = PRTG


Free Download
  • Unlimited version of PRTG for 30 days
  • After 30 days, PRTG reverts to a free version
  • Or, you can upgrade to a paid license anytime

The threat of network attacks


In May of 2017, WannaCry infected more than 230,000 computers in 150 countries with ransomware. The data of the infected computers was encrypted, and money was demanded to restore it. In 2013, three billion Yahoo user accounts were compromised by a cyberattack that took several years to be detected. Companies have never been as vulnerable to network attacks as they are today.

They operate globally, are connected with the entire world, and generate income across the Internet. Companies have come to realize that life in the digital world is not always easy sailing. As their virtual presence grows, so does the number of gateways in their networks. These interfaces are currently being used by hackers in an increasingly professional manner, creating a problem that only gets worse as a company’s IT infrastructure becomes more complex. 


Network attacks can do considerable damage



  • Sit back, close your eyes, and hope you get lucky? A plan that is not without risks, for a successful attack can do considerable damage:
  • Compromised websites and social media accounts (relatively harmless)
  • Loss of trust due to leaked customer information or credit card data
  • Ransom” payments to regain access to your systems
  • The need to develop new strategies following the theft of business secrets
  • Sales losses due to disrupted company activities following DDoS attacks, flooding, or botnets which diminish computing capacity
  • Extensive property damage, injuries, or even deaths due to the hacking of critical infrastructures
  • Personal liability up to and including the incarceration of management if legal requirements have not been respected

All good reasons to take IT security seriously.

A systematic approach to IT security


With development catapulting during the past few years – from the professionalization of criminal hackers to ever more complex IT infrastructures – IT security is becoming an increasingly important issue when it comes to a company’s business dealings. In order to best meet the dangers posed by network attacks, your security model should take into account the following key objectives:


View IT security as a task that never ends

View IT security as a task that never ends

Technology is in a constant state of development. Software versions have more and more new functions. When one security loophole is closed, another one pops up elsewhere. It seems like whenever new security software is released, there is already a hacker who knows how to crack it. As a result, companies must view IT security as an ongoing process, or a task that never ends.

Create comprehensive security to thwart network attacks

Create comprehensive security to thwart network attacks

A comprehensive approach is vital. In today’s world, you need much more than just virus scanners and firewalls. IT security has expanded to include updates, training sessions, monitoring, intelligent security tools, and even collaboration with other companies in your sector to address current developments surrounding IT security issues.

Reduce complexity

Reduce complexity

By simplifying IT structures and keeping the number of tools you use to a minimum, you will already be doing a great deal to ward off potential attacks. All software creates gateways, either by itself or when run with other programs. By keeping things simple, you will close off potential gateways and thus prevent hackers from finding a way inside. A rule of thumb: the more complex your infrastructure, the more vulnerable your system.

Make IT security a key issue

Make IT security a key issue

IT security should be a major consideration when starting any new project - and not just for those in charge of security and data protection. IT administrators and software developers must also be up to speed. And while management may pass on specific tasks, it should likewise stay informed of all security developments.

Stick to “state-of-the-art” technology

Stick to “state-of-the-art” technology

The law requires that companies use “state-of-the-art” technology, but allows for exceptions in certain situations. Companies must therefore stay up-to-date on all developments with regard to technology. However, because the provisions are quite vague and spread out amongst several different regulations, it is recommended that you seek the advice of a legal professional.

Get employees on the same page

Get employees on the same page

Employee training should also be part of your security model. Your biggest challenge will be to entice employees who have little or no interest in IT security. Because your task is neverending, employee training should become an increasingly proactive part of the model.

Jack up expenses for hackers

Jack up expenses for hackers

Professional hackers have expenses and seek to make profits. They’re always on the lookout for lucrative targets that cost little to infiltrate. Companies can reduce attacks by using encryption, access control systems, and modern security solutions to boost the expenses hackers have to pay to get through.

Preventive measures against network attacks

The best way to prevent network attacks is by reducing the number of weak spots in your network.
Weak spots not only include software flaws, runtime errors, and complex IT infrastructures, but also careless employees.

Addressing software flaws

Addressing software flaws

Nowadays, you have to assume that software is faulty, and that bugs will create gateways. Exploits use weak spots to gain access to external computers and install malware. These exploits are saved in “exploit kits” and sold to interested parties with convenient user interfaces. As a result, weak spots can be “exploited” during attacks with little or no expense at all.

If you discover a weak spot and see that a patch or update is available, you should install the latter as quickly as possible, preferably by way of an automated update distributor that covers all the workstations in your company. By doing so, you’ll minimize the risks posed by software flaws, even if such glitches cannot be eliminated entirely. A company always runs the risk that a hacker will learn of a bug before its software developers.

Addressing human vulnerability

Addressing human vulnerability

A particularly insidious form of malevolent conduct is social manipulation (“social engineering”). Social engineering is defined as the manipulation of others with the aim of eliciting certain behaviors, such as the disclosure of confidential information or the clicking of a link.

It can take place on a direct level, e.g. as a call by a “service technician” who allegedly needs someone’s login details, or indirectly by coaxing a person to open a certain website or an email which the hacker can then use to access login data or infect a computer. Phishing – especially spear phishing – is extremely dangerous. Phishing targets the masses (with a success rate of around 0.1%), while spear phishing goes after a specific group by sending emails that look authentic.

To be prepared for such attacks, employees must first be trained on topics such as password security, phishing, and security practices at the workplace, which include enabling a computer’s lock screen while away from one’s computer. This preparation can take the form of mandatory courses or educational games. As an administrator, it is likely you will have to continually come up with new ideas for keeping employees on the front line of the battle against network attacks.

Intelligent protection against a variety of network attacks

Network attack routes

Network attack routes

Other routes for network attacks include open ports, conventional email attachments with viruses, and Trojan horses or drive-by attacks when visiting malware-infected websites. Firewalls and antivirus software are recommended for blocking these routes. Gone are the days when you could just scan for signatures. Simple pattern matching no longer cuts it in the fight against network attacks.

Prevention of security loopholes

Prevention of security loopholes

Today’s antivirus programs search for similarities to previous intrusions, shut down software suspected of dangerous activity, and allow for the safe encapsulation of malware. Clouds should also be checked on a regular basis. Automated behavior analysis is a must, for the speed with which new threats arise can no longer be matched by humans on their own resources. But even machine learning tools require human know-how. Nowadays, firewalls may also come with prevention components that search for suspicious patterns.

The need for technical instruments

The need for technical instruments

But with systems continually gaining in complexity and attack vectors becoming more and more intelligent, even modern virus scanners and firewalls are no longer sufficient. Above all else, negligent workers offer hackers the possibility to bypass security programs and access the company network directly. Special technical instruments are therefore required to root out malware that has made its way into the network undetected.

Intrusion Detection System

Intrusion detection system

Intrusion detection systems (IDSs) are used to identify suspicious network traffic. These systems may start with switches (for example), where they will skim through data traffic and check for malware. Intrusion prevention systems (IPSs) can also be used to remove malware. The downside of these systems is that they must connect to your system to function. An IPS itself can therefore become an attractive target for hackers. To avoid false alarms during the detection process, the IDS should be incorporated into the company’s security strategy.

Network monitoring as a basis for protection against network attacks


fundamental tool for IT security

A fundamental tool for IT security

Comprehensive network monitoring is vital for maintaining the security of your network, for what good is a firewall that crashes or backup software that malfunctions? With network monitoring software, you can keep a constant eye on firewalls, antivirus software, and backup software, and automatically be warned in the event of trouble.

Network traffic recording

Network traffic recording

Network traffic recording lets you monitor and check network traffic for unusual behavior. It also helps you determine which data and computers are affected by network attacks that have already taken place. By evaluating data archives, downtime can be reduced substantially, as was even the case for the “WannaCry” ransomware attack.

How PRTG can help

PRTG as an early warning system

PRTG as an early warning system

PRTG network monitoring software acts as an early warning system against suspicious activity and anomalies in your network traffic. PRTG seeks to prevent malware which has already infiltrated a network from doing any further damage. While PRTG cannot be used a substitute for an intrusion detection system, it comes with many functions that help to protect against network attacks:

  • PRTG monitors your entire network: servers, storage devices, connected devices such as routers, computers, and printers, traffic, etc.
  • An “all-in-one” solution, PRTG lets you do away with the weak spots which tend to crop up when using a variety of different programs
  • Network recording lets you check your data for anomalies
  • The recorded data serves as a database for IT security systems
  • PRTG checks the functionality of firewalls, virus scanners, security software, and backups, as well as access rights to server rooms and other spaces.

Identify network bottleneckswidth=

Identify network bottlenecks

To measure network traffic, PRTG uses SNMP, packet sniffing, and NetFlow. SNMP makes it possible to monitor all the traffic in your network, and to sort this traffic by port. Packet sniffing and NetFlow/sFlow/jFlow offer a more detailed analysis of your network traffic. These methods allow you to sort network traffic by IP address or protocol. As a result, you will be able to quickly identify potential network bottlenecks, spot unusual spikes in activity, and shut down applications and computers.

Custom notifications

Custom notifications

Network traffic recording makes it easier to determine if a computer is affected by malware. It can help out, for example, when you know what you are looking for but don't exactly know which computer is affected. PRTG warns you in the event of downtime that may be putting the security of your network at risk. Faulty backups are also recorded. Thanks to custom PRTG notifications, you can intervene before further damage occurs.

The PRTG approach to preventing network attacks:

Traffic Monitoring

Traffic monitoring

Firewall Monitoring

Firewall monitoring

Virus scanner Monitoring

Virus scanner monitoring

Backup Monitoring

Backup monitoring

Server Monitoring

Server monitoring

Serverraum Monitoring

Server room monitoring

PRTG for preventing network attacks
– scenarios and solutions


Network recording

Network recording –
what got hit?

  • Determine the details of the attack
  • Retrieve the network traffic recording history
  • Search for specific attack patterns
  • Shut down the affected computer and/or applications

Check traffic for anomalies

Check traffic for anomalies

  • Enable traffic monitoring sensors
  • Set up notifications and threshold values for traffic parameters
  • Search for unusual patterns such as inexplicable load peaks or abnormally heavy traffic
  • Introduce countermeasures

  • Unlimited version of PRTG for 30 days
  • After 30 days, PRTG reverts to a free version
  • Or, you can upgrade to a paid license anytime

7 reasons why network monitoring with PRTG increases security


iWhat is a sensor?

In PRTG, “Sensors” are the basic monitoring elements. One sensor usually monitors one measured value in your network, e.g. the traffic of a switch port, the CPU load of a server, the free space of a disk drive. On average you need about 5-10 sensors per device or one sensor per switch port.

View video (3:26 min.)

 Keep an eye on your network data and IT infrastructure

Keep an eye on your network data and IT infrastructure

An easy-to-read dashboard provides an overview of your monitoring data. You can also have interrelated data displayed on your dashboard to establish correlations and draw conclusions.

Customize sensors to detect threats

Customize sensors to detect threats

The powerful PRTG API provides monitoring that is tailormade for your network’s infrastructure. Sensors can be added with just a few clicks. Thanks to PRTG alerts, you'll be prepared for potential threats to the company network.

All-in-one software provides for high-performance monitoring

All-in-one software provides for high-performance monitoring

PRTG effectively monitors all the parameters in your monitoring environment. As a result, problems can be found faster, and prevented in the future proactively. This saves both time and money.

Reduce risks and complexity with centralized monitoring

Reduce risks and complexity with centralized monitoring

When it comes to monitoring network traffic, PRTG is more effective at reducing risks and complexity than several individual tools working together. Risks arising from weak spots and compatibility problems between tools therefore become obsolete.

Monitoring as an early warning system in the event of suspicious activity

Monitoring as an early warning system in the event of suspicious activity

With PRTG, network traffic anomalies are recorded and traced. Furthermore, hackers who have already infiltrated the network are prevented from causing additional damage.

Identify affected computers more easily

Identify affected computers more easily

Thanks to the recorded network traffic data, it is easier to identify computers that have been affected by an attack, and to recover these computers one-by-one via countermeasures or the restoring of a backup or image.

Protect your security tools

Protect your security tools

By monitoring firewalls, antivirus software, and other security tools, PRTG can warn you in the event of downtime that may be posing a security risk to your network. Faulty backups are also recorded. You can therefore take action before things go awry. 

A sneak peek at network security monitoring with PRTG


“The greatest advantage of PRTG? You get to rest easy.“

Steffen Ille, Bauhaus-University of Weimar, Germany

PRTG simplifies your day

Our monitoring software works for you and promptly notifies you of potential issues.
It frees you to concentrate on your day-to-day tasks with peace of mind.


PRTG saves time

With PRTG, you get one central monitoring tool for your servers and entire network. Enjoy a quick overview of your whole infrastructure via our dashboard and app.

PRTG saves worry

Customizing PRTG is a breeze. Getting started or switching from another network monitoring tool is easy thanks to the PRTG auto-discovery and pre-configured device templates.

PRTG saves money

80% of our customers report substantial or even exceptional cost savings in the area of network monitoring. The experience shows that the costs for licenses have paid for themselves within a matter of weeks.


Your network security at a glance –
even while on the go

PRTG can be started within minutes and it's compatible with many mobile devices.


PRTG comes with all the features you need, plus more your IT infrastructure won't want to live without.


PRTG monitors these vendors and applications, and more, in one view!



Award winning solution

We work hard on making our software as powerful and easy-to-use
as possible for our customers each and every day.
Of course it makes us proud when we get awards for that.



PRTG: The swiss army knife for sys admins

Adapt PRTG individually and dynamically to your needs relying on a strong API:

  • HTTP API: Access monitoring data and manipulate monitoring objects using HTTP requests
  • Custom Sensors: Create your own sensors for customized monitoring
  • Custom Notifications: Create your own notifications to send alarms to external systems
  • New REST API Sensor: Monitor almost everything that provides XML or JSON

German quality

Free Download
  • Unlimited version of PRTG for 30 days
  • After 30 days, PRTG reverts to a free version
  • Or, you can upgrade to a paid license anytime


Most administrators want to test a tool for free before deciding to make an investment.

The many advantages of PRTG:

1. Free trial version: Take the time to explore PRTG so you can determine if it satisfies your needs and meets your expectations. Once the trial is over, it’s easy to upgrade your already configured version of PRTG, which means you’re much less likely to make an incorrect purchase.

2. One tool, one overview: Administrators often use a variety of monitoring solutions for their network or for the individual components of their infrastructure. But using several different tools every time you want to create an overview costs time and energy. PRTG is an “all-in-one” solution. Our dashboard and app provide a comprehensive overview, whenever you want it.

3. Quick customer support: Got a question? Stuck on a problem and need a hand? PRTG is backed by a dedicated development and support team. We do our utmost to answer every customer inquiry within 24 hours (on business days). Browse all our support topics here.

Configure your PRTG today. The trial version is free of charge. Save time, worry, and money with our monitoring tool designed for your network and entire infrastructure.


Network Monitoring Software - Version (October 10th, 2019)


Download for Windows and hosted version available


English, German, Spanish, French, Portuguese, Dutch, Russian, Japanese, and Simplified Chinese


Up to 100 sensors for free (Price List)

Unified Monitoring

Network devices, bandwidth, servers, applications, virtual environments, remote systems, IoT, and more

Supported Vendors & Applications