• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Search
Search
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Security
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Security for Chromebook
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella and Cisco Secure Access Packages
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
      • Cisco Umbrella for Government Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Your SSE journey with Cisco
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
      • Umbrella and Duo Layered Protection
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
        • – FTC Safeguards Rule Compliance 2023
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
      • Cybersecurity Webinars
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is DNS Security
      • What is a Secure Web Gateway
      • What is a Cloud Access Security Broker (CASB)
      • What is Security Service Edge (SSE)
      • What is Secure Access Service Edge (SASE)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Free Trial Quick Start Guide
      • Free Trial Help and Tips
  • Trends & Threats
    • Market Trends
      • Generative AI Cybersecurity Risks and Rewards
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Clearing search keywords
Spotlight

Should You Use DNS Data to Drive Better Security Decisions?

Author avatar of Nada MacKinneyNada MacKinney
Updated — February 27, 2023 • 2 minute read
View blog >

We face hundreds of decisions every day. From choosing vendors to partner with to equipping employees for handling hybrid work, decisions are the everyday work of our lives. Teams depend on their leaders to choose wisely.

One of the toughest decisions that modern organizations make is about how to secure their investments, assets, data, and more from cyber criminals. Securing organizations isn’t getting easier – it’s getting more difficult. As organizations become more distributed, the risk goes up and the decisions about to protect an organization at scale only multiply.

Using data to make decisions – particularly when it comes to making the right choice about how to secure what powers our businesses – is key to reducing risk to your organization. DNS data can be a key part of understanding how to shape your security strategy, as well as helping to prevent common DNS attacks.

The data on the damage of cyberthreats is daunting

Cybersecurity Ventures estimated that expects global cybercrime will reach $10.5 trillion USD annually by 2025. They went on to note that “If it were measured as a country, then cybercrime…would be the world’s third-largest economy after the U.S. and China.”

The costs to businesses specifically? The National Bureau of Economic Research wrote, “After suffering a breach of customers’ personal data, the average attacked firm loses 1.1 percent of its market value and experiences a 3.2 percentage point drop in its year-on-year sales growth rate.”

Cybercrime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.

Cybercrime Magazine

But preparing for and protecting against cybersecurity threats can feel like fighting an invisible, unknown enemy. You know the threat is present and that anything is possible, but it’s unclear that the real and immediate danger might be. This makes data-gathering and analysis an important aspect of modern cybersecurity. And when it comes to getting eyes on the threats facing your network, it makes sense to start with DNS data.

Using DNS data to defend your network

Domain name server (DNS) data can give more insight into what kind of attacks are being staged and where. Because DNS is used to point an incoming website domain toward the IP address of the server, DNS records hold information about every single website on the internet.

Ultimately, using your own DNS data records will uncover information about the servers your network users are connecting to and information about unusual DNS activity occurring in your network. With that information, you can configure your recursive DNS servers’ policies and limit risk by restricting or filtering the kinds of websites users can visit, the kinds of files they can download, or the kinds of on-network activity that gets permitted.

The Cisco Umbrella global network handles 200+ billion DNS requests daily, and that data reveals a lot about most-seen attacks across the internet, as well as the evolution and growing sophistication of cyberthreats.

You can use our most recent DNS data analysis to help shape your security strategy. Download our new report – 2022 DNS Discoveries – to find out what you need to know about internet-based threats and how to stop them.

2022 DNS Discoveries

Find out which cybersecurity threats you’re most at risk for.

Get the report

Using data to make decisions...is key to reducing risk to your organization. DNS data can be a key part of understanding how to shape your security strategy, as well as helping to prevent common DNS attacks.

Post this quote

Additional Resources

  • Report: What can our DNS data help you discover?
  • Get a free 14-day trial of Cisco Umbrella

Suggested Blogs

  • Where Do I Start With SASE Evaluations? Gartner® Report September 10, 2024 3 minute read
  • Cisco Umbrella: A Leader in the GigaOm Radar for DNS Security June 26, 2024 3 minute read
  • The Perfect Blend: Qdoba’s SASE Transformation May 30, 2023 2 minute read

Share this blog

FacebookTweetLinkedIn
Subscribe to the Cisco Umbrella blog Subscribe

Follow Us

Facebook X LinkedIn Youtube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2025 Cisco Umbrella