www.verizon.com Open in urlscan Pro
192.30.31.89  Public Scan

Submitted URL: http://go.verizonenterprise.com/MTU3LUlQVy04NDYAAAGBfA6HoaK8XrKrUBuP1rpg4RKO_6WDvh_K8HTJKj9AV_TaoolEzJsU3uimCUYySp01GjY96eM=
Effective URL: https://www.verizon.com/business/resources/articles/ddos-ransom-attacks/?cmp=emc:vesmkto:ac:ent:security:na&utm_medium=e...
Submission: On December 21 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form action="" id="gnav20-search-form">
  <p class="gnav20-search-para">
    <input type="search" value="" class="gnav20-search-text" name="q" placeholder="Search" autocomplete="off" aria-label="Enter Search Text" spellcheck="false">
    <a class="gnav20-mobile-search-icon" tabindex="0" role="button" href="javascript:void(0);" aria-label="clear search input text"></a>
    <button class="gnav20-close-icon" aria-label="close search results"></button>
  </p>
</form>

<form action="" id="gnav20-search-form-mobile">
  <p class="gnav20-search-para">
    <input type="search" value="" class="gnav20-search-text" name="q" placeholder="Search" autocomplete="off" aria-label="Enter Search Text" spellcheck="false">
    <a class="gnav20-mobile-search-icon" tabindex="0" role="button" href="javascript:void(0);" aria-label="clear search input text"></a>
    <button class="gnav20-close-icon" aria-label="close search results"></button>
  </p>
</form>

Text Content

Accessibility Resource Center Skip to main content
Personal Business
Support
 * Back to support
 * Enterprise Support
 * Fios, Internet and Phone Support
 * Wireless Support

Stores
 * Back to stores
 * Find a Verizon Store
 * Request a Store Appointment

Close
 * USA (eng)
 * Australia (eng)
 * Deutschland (de)
 * France (fr)
 * Great Britain (eng)
 * Netherlands (eng)
 * Singapore (eng)
 * 日本(日本語)

Shop Shop Shop
 * Devices Devices
    * All Devices
    * Smartphones
    * Mobile Hotspots
    * Business Tablets & Laptops
    * Bring Your Own Device
    * Business 5G Devices
    * Certified Pre-Owned

 * Brands Brands
    * Apple
    * Samsung
    * Motorola
    * Google

 * Business Wireless Plans Business Wireless Plans
    * Business Unlimited

 * Deals Deals
    * Shop Deals

 * Business Internet Plans Business Internet Plans
    * Business Internet Solutions
    * Check availability

Products Products Products
 * Overview
   
 * Phones & Devices Phones & Devices
    * Overview
    * Shop Now
    * Devices Devices
      * Smartphones
      * Basic Phones
      * Mobile Hotspots
      * Tablets
      * Certified Pre-Owned
      * Business 5G Devices
      * Public Sector Devices
    * Device Trade-In Program
    * Bring Your Own Device
    * Deals
   
    * Brands Brands
      * Apple
      * Google
      * Samsung
      * Motorola

 * Plans Plans
    * Overview
    * Business Internet Plans Business Internet Plans
      * Overview
      * Fios Internet
      * 5G Business Internet
      * LTE Business Internet
      * Internet Dedicated
    * Business Unlimited Plans Business Unlimited Plans
      * Business Unlimited
   
    * Business Voice, Phone, & Data Plans Business Voice, Phone, & Data Plans
      * One Talk
      * Business Digital Voice (VoIP)
      * Webex Calling
      * Flexible Business Plans
      * International Plans
      * Machine to Machine Plans
      * Bring Your Own Device
      * Verizon Cloud
    * Conferencing Plans Conferencing Plans
      * BlueJeans by Verizon
      * Webex Meetings
   
    * Security Plans Security Plans
      * Mobile Device Management
      * Business Internet Secure
      * Business Mobile Secure
    * Bundles Bundles
      * Fios Business Bundles
      * Complete Business Bundle

 * Security & Protection Security & Protection
    * Overview
    * Mobile Device & Endpoint Security Mobile Device & Endpoint Security
      * Overview
      * Mobile Device Management
      * Mobile Threat Defense
      * Business Mobile Secure
    * Network & Cloud Security Network & Cloud Security
      * Overview
      * DDoS Shield
      * DNS Safeguard
      * Cloud Access Security
      * Business Internet Secure
      * Advanced SASE
    * Identity & Access Management Identity & Access Management
      * Overview
      * Verizon ID
      * Integrated PKI Authentication
      * Identity & Access Management Services
   
    * Cyber Risk Management Cyber Risk Management
      * Overview
      * Cyber Risk Monitoring
      * ICSA Labs
      * Threat Intelligence Services
      * Governance, Risk & Compliance
    * Managed Detection & Response Services Managed Detection & Response
      Services
      * Overview
      * Cyber Security Incident Response Team Services
      * Network Detection and Response
      * Managed Detection and Response
   
    * Advanced Security Operation Center Services Advanced Security Operation
      Center Services
      * Overview
      * Managed Security Incident Event Management
      * Advanced Security Operations Center
    * Incident Response & Investigation Incident Response & Investigation
      * Overview
      * Rapid Response Retainer
      * Incident Response Planning
    * Web Security Web Security
      * Overview
      * Web Application Firewall
      * Bot Management
      * Web Acceleration
    * View All Products

 * Business Internet Business Internet
    * Overview
    * Fios Business Internet
    * Internet Dedicated
    * LTE Business Internet
    * 5G Business Internet
    * Bundles Bundles
      * Fios Business Bundles
      * Complete Business Bundle
   
    * Speed Test
    * Routers and Network Extenders
    * Check Availability Check Availability
      * Business Internet Options

 * Networks Networks
    * Overview
    * Connectivity Connectivity
      * Overview
      * Backup Internet & Failover Solutions
      * Ethernet
      * Private IP
      * Business Broadband
      * LTE Business Internet
      * 5G Business Internet
      * Wavelength Services
      * On Site 5G
      * Internet Dedicated
      * Complete Business Bundle
    * Managed Network Services Managed Network Services
      * Overview
      * Managed SD WAN
      * Software Defined Secure Branch
      * Secure Gateway
   
    * Network Application Enablement Network Application Enablement
      * Overview
      * Secure Cloud Interconnect
      * Multi-Cloud Access Manager
    * Network Consulting Network Consulting
      * Overview
      * Digital Advisory Services
      * Network Infrastructure Services
    * Virtual Network Services Virtual Network Services
      * Overview
      * Network Orchestration
      * VNS – SBCaaS
      * VNS – Routing
   
    * Edge Solutions Edge Solutions
      * Overview
      * CPE Solutions
      * Verizon Care
      * Software & Subscription Services
    * 5G Edge 5G Edge
      * Crowd Analytics
    * View All Products

 * Voice & Collaboration Voice & Collaboration
    * Overview
    * Unified Communications Unified Communications
      * Overview
      * One Talk
      * Unified Communications and Collaboration as a Service
      * Verizon Calling with Microsoft Teams
      * Webex Calling
    * Conferencing Conferencing
      * Overview
      * BlueJeans by Verizon
      * Webex Meetings
      * Pinnaca Managed Video Solutions
      * BlueJeans Telehealth
    * Audio Conferencing
   
    * Collaboration Platforms and Solutions Collaboration Platforms and
      Solutions
      * Overview
      * Ring Central
      * Microsoft Teams
      * Webex Suite
    * VoIP and Phone Services VoIP and Phone Services
      * Overview
      * IP Trunking
      * VoIP: Business Digital Voice
      * Business Phone Service: Preferred Voice
    * Workforce Productivity Workforce Productivity
      * Overview
      * Push to Talk Plus
      * Field Force Manager
      * Business Messaging
   
    * Productivity Tools Productivity Tools
      * Overview
      * DoForms
      * Librestream Onsight
      * SYNNEX business process service
      * Google Workspace
      * Microsoft 365
      * GoCanvas
      * Localworks
    * Communications Consulting Communications Consulting
      * Overview
      * Business Communications Design
      * Business Communications Adoption Services

 * Contact Center & CX Solutions Contact Center & CX Solutions
    * Overview
    * Cloud Contact Center Cloud Contact Center
      * Overview
      * Contact Center Hub
      * Virtual Contact Center
      * Genesys Cloud Contact Center
      * Webex Contact Center
      * Hosted Intelligent Contact Routing
      * Unified Customer Experience
    * Contact Center Network Contact Center Network
      * Overview
      * IP Contact Center
      * Toll Free & Inbound Services
      * Network-Based IVR
      * Voice Call Back & Voice Call Back Cloud
      * VoIP Inbound Local Origination
   
    * Customer Engagement Customer Engagement
      * Overview
      * Virtual Agent
      * Knowledge Assist
      * Live Agent
      * Social Engagement
    * Customer Experience Consulting Customer Experience Consulting
      * Overview
      * Contact Center Managed Services
      * Contact Center Edge Solutions
      * CX Design
      * DX Advisory Services
      * Contact Center Technical Services
   
    * Voice Security Voice Security
      * Overview
      * Call Filter
      * Voice Cypher
      * Message Archive
      * VoIP Inbound Anti-Fraud & Authentication
      * STIR/SHAKEN Caller ID Identification
      * SecureLogix

 * Tech Support Services Tech Support Services
    * Overview
    * Total Mobile Protection for Business
    * TechTeam
    * TechTeam for Internet
    * Verizon Service Protection Plan
    * Verizon Protect Business
    * Complete Business Bundle

 * Internet of Things Internet of Things
    * Overview
    * Connected Fleet & Field Service
    * Connected Assets Connected Assets
      * Overview
      * Critical Asset Tracking
      * Critical Asset Sensor
      * Condition Based Maintenance
      * LTE for Category M1 and Narrow Band Technologies
   
    * Connected Smart Cities & Communities Connected Smart Cities & Communities
      * Overview
      * Intelligent Lighting
      * Intelligent Video
      * Traffic Data Services
      * Parking Optimization
      * Real Time Response System
   
    * Connected Commerce Connected Commerce
      * Overview
      * Automated Retail
      * Mobile Payment
    * IoT Security Credentialing
    * ThingSpace Platform for IoT

 * Deals & Bundles Deals & Bundles
    * Overview
    * Deals Deals
      * Fios Internet & Business Unlimited plan discount
      * Wireless Internet & Business Unlimited plan discount
      * Veteran / Military Offer
    * Bundles Bundles
      * Fios Business Bundles
      * Complete Business Bundle
    * Shop all Deals

 * Business TV
   
 * Product Finder
   
 * Featured products for:
   
 * Small Business Small Business
    * Overview
    * Internet & TV Internet & TV
      * Overview
      * Fios Business Internet
      * Fios TV for Business
      * LTE Business Internet
    * Internet of Things Internet of Things
      * Overview
      * Critical Asset Tracking
      * Condition Based Maintenance
      * Connected Smart Cities & Communities
    * Contact Center & CX Solutions Contact Center & CX Solutions
      * Overview
      * Contact Center Hub
   
    * Mobile Phones and Devices Mobile Phones and Devices
      * Overview
      * Apple iPhone SE (2020)
      * Apple iPhone 12
      * Samsung Galaxy Note20 Ultra 5G
      * Galaxy S20 FE 5G
    * Networks Networks
      * Overview
      * Private IP
      * Managed SD WAN
      * Managed Network Services
    * Security & Protection Security & Protection
      * Overview
      * Security Device Monitoring & Management
      * Business Internet Secure
      * Verizon ID
      * DNS Safeguard
   
    * Tech Support Services Tech Support Services
      * Overview
      * Total Mobile Protection
      * TechTeam
      * TechTeam for Internet
    * Voice & Collaboration Voice & Collaboration
      * Overview
      * Business Digital Voice
      * One Talk
      * BlueJeans by Verizon
      * Webex Calling
    * Bundles Bundles
      * Fios Business Bundles
      * Complete Business Bundle

 * Enterprise & Medium Business Enterprise & Medium Business
    * Overview
    * Internet & TV Internet & TV
      * Overview
      * Internet Dedicated
    * Internet of Things Internet of Things
      * Overview
      * Critical Asset Sensor
      * Condition Based Maintenance
      * Connected Smart Cities & Communities
    * Contact Center & CX Solutions Contact Center & CX Solutions
      * Overview
      * Virtual Contact Center
      * VoIP Inbound Anti-Fraud & Authentication
      * Virtual Agent
      * IP Contact Center
   
    * Mobile Phones and Devices Mobile Phones and Devices
      * Overview
      * Apple iPhone SE (2020)
      * Apple iPhone 12
      * Apple iPhone XR
      * Galaxy S20 FE 5G
    * Networks Networks
      * Overview
      * Private IP (MPLS)
      * Managed SD WAN
      * Virtual Network Services
   
    * Security & Protection Security & Protection
      * Overview
      * Security Device Monitoring & Management
      * Cyber Risk Monitoring
      * Managed Detection & Response
      * Verizon ID
    * Voice & Collaboration Voice & Collaboration
      * Overview
      * One Talk
      * BlueJeans by Verizon
      * UCCaaS
      * Webex Calling

 * Public Sector Public Sector
    * Overview
    * Education Education
      * Overview
      * BlueJeans for Public Sector
      * DNS Safeguard
      * LTE Business Internet
      * SD WAN
    * Federal Government Federal Government
      * Overview
      * Managed Security Services
      * MTIPS
      * Private IP (MPLS)
      * Virtual Contact Center
   
    * Public Safety Public Safety
      * Overview
      * Backup Internet & Failover Solutions
      * Push to Talk Plus
      * Interoperability
      * Real Time Response System
    * State & Local Government State & Local Government
      * Overview
      * Intelligent Lighting
      * Managed Network Services
      * One Talk
      * Mobile Device Management

Plans Plans Plans
 * See All Plans
   
 * Featured Plans Featured Plans
    * Business Unlimited
    * Fios Business Internet
    * 5G Business Internet
    * One Talk
    * Flexible Business Plans

 * Check Availability Check Availability
    * Business Internet Options

Solutions Solutions Solutions
 * Overview
   
 * By Organization Size By Organization Size
    * Small Business
    * Enterprise & Medium Business
    * Public Sector

 * By Need By Need
    * Harness the Power of 5G
    * Drive Transformation with 5G Edge
    * Adapt & Transform Your Business
    * Enable Business Continuity
    * Secure Your Business
    * Work from Virtually Anywhere

 * By Industry By Industry
    * Healthcare
    * Education
    * Federal Government
    * Manufacturing
    * Public Safety
    * Retail
    * State & Local Government
    * Financial
    * Media & Entertainment
    * Energy & Utilities
    * See All Industries

 * Customer Success Stories Customer Success Stories
    * Tate & Lyle sets course for global network expansion with SD WAN
    * Wright-Hennepin empowers work-from-home employees
    * Bethesda pushes gaming to the network edge
    * See All Success Stories

Resources Resources Resources
 * Overview
   
 * All Resources All Resources
    * Overview
    * All Events & Webinars
    * Enterprise Events & Webinars
    * Small Business Events & Webinars
    * Public Sector Events & Webinars

 * Popular Topics Popular Topics
    * Distance Learning
    * Edge & Why it Matters
    * Healthcare
    * Improving CX
    * Network-as-a-Service
    * New Workplace
    * Public Safety
    * Security Strategy

 * Featured Resources Featured Resources
    * Data Breach Investigations Report
    * Mobile Security Index Report
    * Payment Security Report
    * Cyber Espionage Report
    * 5G Basics
    * Verizon Partner Network

Contact Us Contact Us Contact Us
 * Overview
   
 * Contact Sales
   
 * Request a Store Appointment
   
 * Store Locator
   
 * Fios Order Status
   

Why Verizon Why Verizon Why Verizon
 * Overview
   
 * Executive Briefing Program
   
 * Looking Glass
   

Log In
Close







Log In
Close







Close
Business

Personal
Support
 * Back to support
 * Enterprise Support
 * Fios, Internet and Phone Support
 * Wireless Support

Stores
 * Back to stores
 * Find a Verizon Store
 * Request a Store Appointment

Close
 * USA (eng)
 * Australia (eng)
 * Deutschland (de)
 * France (fr)
 * Great Britain (eng)
 * Netherlands (eng)
 * Singapore (eng)
 * 日本(日本語)




1.833.519.0931
Contact Us


LET'S
CONNECT.

Choose your country to view contact details.

United States
 * Argentina
 * Australia
 * Austria
 * Belgium
 * Brazil
 * Canada
 * Chile
 * China
 * Colombia
 * Costa Rica
 * Denmark
 * Finland
 * France
 * Germany
 * Hong Kong
 * India
 * Ireland
 * Italy
 * Japan
 * Korea
 * Luxembourg
 * Mexico
 * Netherlands
 * New Zealand
 * Norway
 * Panama
 * Portugal
 * Singapore
 * Spain
 * Sweden
 * Switzerland
 * Taiwan
 * United Kingdom
 * United States
 * Venezuela

SALES

Call us at +1.833.519.0931
Contact a rep

SUPPORT

Manage your account or get tools and information.


Sign in
More info
Share
LinkedIn
Twitter
Facebook
Copy link
Email link
Link copied to clipboard
...
Share:






Link copied to clipboard


 *  
   
   
   DDOS ATTACKS
   THAT ALSO DEMAND
   A RANSOM
   ADD NEW TWIST
   TO AN OLD CYBERCRIME

 * Author: David Grady



Distributed Denial of Service (DDoS) attacks used to be simple: a cybercriminal
would overwhelm a website with a tsunami of fake page requests and then laugh
like a comic book villain when the website crashed.  But as network architecture
has evolved, DDoS ransom attacks have evolved, too – leaving not just public
facing websites vulnerable but critical applications and business processes
dependent on communication networks also susceptible to disruption.   

And now many cybercriminals are demanding a ransom payment to stop their DDoS
attacks – a new twist on an old attack method, likely inspired by the success of
recent high-profile ransomware attacks.

Ransomware and DDoS are two very different kinds of attacks, each demanding a
specific set of capabilities to mitigate. So when a DDoS attack that features
the additional element of a ransom demand occurs, security leaders must combine
the best practices for mitigating those two types of attacks into a whole new
way of fighting back.

DDOS IS A PERSISTENT THREAT

The merging of DDoS attacks and demands for ransom payments should not come as a
surprise, according to Alex Pinto, who leads the team of researchers that
creates the annual Verizon Data Breach Investigations Report (DBIR).  

Pinto says the 2021 DBIR – published in May -- shows that DDoS attacks were the
most common type of security incident among the nearly 60,000 global incidents
it studied for the report. The frequency of DDoS attacks have been growing
steadily in the 14 years Verizon has published the report.  And the frequency of
ransomware attacks – which maliciously encrypts data so as to hold IT systems
hostage -- also rose significantly last year, according to Verizon.  Ransomware
attacks where data is encrypted and stolen are now the third-leading cause of
data breaches.   

Clearly, cybercriminals have seen the potential upside of combining these two
attack methods.  Cheap “DDoS as a Service” tools -- readily available on the
dark web – are accelerating the pace and size of such attacks.  

“DDoS attacks are extremely difficult to predict,” Pinto explains, “so it’s
important for organizations to be able to detect and remediate them as fast as
they can.  And if the attack includes an extortion element, that makes the task
at hand even more challenging.  That kind of situation requires specific
technical capabilities -- and a strong incident response plan.”

SIZE IS NOT THE PRIMARY CONCERN IN DDOS ATTACKS

A prolonged and unmitigated DDoS ransom attack can lead to revenue loss,
reputational damage and -- when aimed at critical infrastructure -- potential
harm to public safety.  Some headline-grabbing DDoS attacks in recent years
featured massive amounts of disruptive traffic being aimed at victims, Verizon’s
research shows that most DDoS attacks are of a size that can easily overwhelm
customer bandwidth or on premises equipment but are almost always manageable
with a cloud based DDoS mitigation service.   Last October, for example, a
well-known technology company reported mitigating a 2.54 terabyte attack – one
of the largest DDoS attacks ever recorded yet according to Verizon’s DBIR
research, and yet ninety-five percent of (DDoS) incidents fell between 13 Mbps
and 99 Gbps.  These types of attacks can not be mitigated without the use of a
cloud based, carrier-agnostic DDoS mitigation service like Verizon’s DDoS
Shield.

An effective DDoS mitigation service is able to discern bad traffic from good
and can redirect that traffic away from critical systems.  Because DDoS attacks
target both the network and application layer, in addition to needing a strong
DDoS solution, many organizations can also benefit by employing a cloud based
Web Application Firewall (WAF) service to extend their protection.  Verizon’s
Web Security, which offers a WAF feature, helps businesses protect their
website, user applications and data by filtering, monitoring and blocking bad
HTTP traffic on a near real-time basis.

“If you receive a DDoS attack threat, Verizon recommends that you do not
pay.  Immediately ensure your DDoS mitigation and cyber resiliency plans are
tested and notify your ISP,” says Wes Sobbott, Vice President, Network Security
at Verizon.  “Attackers are also still targeting Authoritative DNS services, as
these types of attacks are easy to launch and defense if much more
difficult.   “We recommend that organizations do not host public-facing
authoritative DNS services within their environment, but instead rely on
third-party cloud providers to provide this service” says Sobbett.

ARE YOU READY FOR A RANSOMWARE ATTACK?

Using data provided by the FBI Internet Criminal Complaint Center (IC3), the
Verizon DBIR team reported that for ransomware attacks, the median amount of
money lost by the victim as a result of the attack was $11,150. The range of
losses in 95% of the ransomware cases fell between $69 and $1.2 million.

Defending an organization against the growing threat of ransomware means knowing
how the ransomware gets in in the first place, and which controls – from
technology and business process refinement to employee training – are needed. 

The 2021 DBIR explains that ransomware attacks have some variety in terms of how
the ransomware gets on the system, with threat actors using stolen credentials
or ‘brute force’ tactics.  Nearly 60 percent of the ransomware cases the Verizon
team studied involved direct install of ransomware or installation through
desktop sharing apps. According to the report, the rest of the vectors were
split between email, network propagation and downloaded by other malware.  “For
these types of incidents and breaches, we largely see servers being targeted,
which makes sense considering that’s where the data is located,” the DBIR
states.

Preventing ransomware attacks may be very difficult, but there are still ways to
protect systems and reduce the risk. To help organizations combat ransomware,
the DBIR links its findings to a series of security controls from the Center for
Internet Security that can be enacted by an organization and are considered
industry-standard for building an effective security program.

INCIDENT PLANNING CAN LESSEN THE IMPACT OF AN ATTACK

If ransomware does strike, your organization had better have a plan in place to
manage the crisis, the experts say.

“A ransomware attack forces organizations to make some very tough decisions,”
says Jim Meehan, Senior Investigations Manager in Verizon’s cybersecurity
practice.  Meehan, who fought crime and cybercrimes as a member of the United
States Secret Service for more than two decades, explains: “Should we pay? How
much is too much?  Who approves the payment, and where do we get the money from?
And what if the hacker takes the payment but leaks our data anyway?  You have to
have a specific ransomware contingency plan and policy in place, well before
such an attack, because you don’t want to be making those decisions in real
time.  The longer an incident goes on, the more damage it will do to the
company.” Meehan advises business leaders and security teams to collaborate
regularly to ensure their ransomware response plans are up to date.

On June 2, 2021, Anne Neuberger, cybersecurity adviser at the National Security
Council released an open letter to “corporate executive and business leaders”
urging them to strengthen their ransomware protections by following a series of
recommendations that include incident response planning and backing up sensitive
data. 

"The threats are serious and they are increasing,” the White House letter
stated.  “We urge you to take these critical steps to protect your organizations
and the American public.”

Learn how Verizon can help your organization enhance its protection
against DDoS and ransomware attacks.

David Grady is an ISACA-Certified Information Security Manager (CISM) and Chief
Cybersecurity Evangelist at Verizon Business Group.





LET'S
CONNECT.

Choose your country to view contact details.

United States
 * Argentina
 * Australia
 * Austria
 * Belgium
 * Brazil
 * Canada
 * Chile
 * China
 * Colombia
 * Costa Rica
 * Denmark
 * Finland
 * France
 * Germany
 * Hong Kong
 * India
 * Ireland
 * Italy
 * Japan
 * Korea
 * Luxembourg
 * Mexico
 * Netherlands
 * New Zealand
 * Norway
 * Panama
 * Portugal
 * Singapore
 * Spain
 * Sweden
 * Switzerland
 * Taiwan
 * United Kingdom
 * United States
 * Venezuela

SALES

Call us at +1.833.519.0931
Contact a rep

SUPPORT

Manage your account or get tools and information.


Sign in
More info

 * Popular
 * COVID-19 Response
 * News
 * Executive Briefing Program
 * Small & Medium Business
 * Wireless for Small Business
 * Verizon Partner Program
 * Wholesale
 * Careers
 * Events
 * Verizon Foundation
 * My Verizon for Enterprise App

 * Discover
 * About Us
 * Solutions
 * Public Sector
 * Next Gen Network
 * Wireless Deals & Offers
 * Industries
 * Products
 * Resources
 * Why Verizon
 * Connect with Us

 * Support
 * Contact Us
 * Sign In / Manage Account
 * Internet and Wired
 * Wireless
 * WEA Compatibility
 * Customer Enablement Tools
 * Service Guide
 * Federal Contract Vehicles
 * Small & Medium Business
 * Report a Security Vulnerability
 * Analytics
 * Cookies Settings

 * QUICK TASKS
   
   Select a task...
   * Add to your services
   * Change a service
   * Create a billing inquiry
   * Create a repair ticket
   * Disconnect a service
   * Move a service
   * Check billing inquiry status
   * Check repair ticket status

 * FOLLOW

 * USA (eng)
   * USA (eng)
   * Australia (eng)
   * Deutschland (de)
   * France (fr)
   * Great Britain (eng)
   * Netherlands (eng)
   * Singapore (eng)
   * 日本(日本語)

AWSFE120213818
About Us Privacy Policy Do Not Sell My Personal Information Legal Notices Open
Internet Verizon.com © 2021 Verizon



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. We use both
third party and first party cookies for this purpose. All information these
cookies collect is aggregated and therefore anonymous. If you do not allow these
cookies we will not know when you have visited our site, and will not be able to
monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIE

Targeting Cookie

These cookies may be set through our site by Verizon and third parties. They are
used to present Verizon advertising on third party sites that you may visit.
They do not store directly personal information, but are based on uniquely
identifying your browser and internet device. If you do not allow these cookies,
you will experience less targeted advertising from Verizon.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES

Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
Select All Hosts


 * 33ACROSS
   
   HOST DESCRIPTION
   
   VIEW COOKIES
   
   
   REPLACE-WITH-DYANMIC-HOST-ID
    * Name
      cookie name

Confirm My Choices



MANAGE COOKIES

By clicking “Accept All”, you agree to the storing of cookies on your device to
enhance site navigation, analyze site usage, and assist in our marketing
efforts. Privacy Policy

Disable All Accept All
Cookies Settings
↑