4 Myths UK Telecoms Service Providers Want You to Believe
February 18, 2025
|
6
min read

Highlights
Most ISPs resell legacy infrastructure, unlike Vorboss that has purpose-built its own fibre network for business connectivity. Dispelling the myth that older networks are more secure, Vorboss has security measures integrated into its new network design, ensuring protection against vulnerabilities and offering direct cable connectivity for enhanced security. Vorboss advocates for 10Gbps as the new standard in connectivity, addressing the misconception that businesses don't require such bandwidth.
As technology advances, the connectivity needs of businesses change and grow. Unfortunately, other UK telecoms service providers lack the agility to adapt their services to this ever-changing landscape. They would rather keep customers in the dark about the infrastructure they are using, so they stay complacent with the status quo.
At Vorboss, we think that's wrong, so we'll dive into some of the most common myths that UK telecoms service providers perpetuate. A lack of transparency in the industry prevents businesses from getting the connectivity they deserve—connectivity that will fuel their ambitions.
Misconceptions about UK telecoms service providers
Myth #1: Each ISP has its own fibre network
You may believe that each Internet Service Provider (ISP) has its own dedicated fibre network. In reality, most business ISPs in London resell legacy Openreach infrastructure rather than relying on a network they built. This leads to unreliable connections and slow speeds for their customers.
Vorboss is the only ISP in London that has purpose-built its fibre network from scratch, using the latest technology and design. We are the only vertically integrated ISP dedicated to business in London, owning the network and service end-to-end. This gives us complete control and responsibility over our network, delivery, infrastructure, and customer experience.
Unlike other ISPs, we have no third parties involved at any stage of the process. Our in-house team handles everything from customer service, contracts, billing, installation, network design, and more. Customers deal directly with the engineers who built the network, ensuring quick response times for fault rectification, installations, and bandwidth upgrades.
Because we own the network, we can provide transparent pricing and commercial terms. There are no hidden costs or extra charges; the bandwidth you purchase is the bandwidth you receive.
Myth #2: Legacy networks are the most secure
Another misconception in the telecommunications industry is the belief that legacy networks are inherently more secure than AltNets. Telecoms companies claim that their older networks are more secure than their competitors, but the truth is that the age of a network does not determine its security level.
We understand the importance of network security at Vorboss. We designed our brand-new network with the latest security measures to ensure the highest level of protection for our customers' data.
Unlike legacy fibre networks that use on-street infrastructure, which can be vulnerable to vandalism, weather, power failures, and traffic damage, we deliver direct cable connectivity to eliminate these risks. We have diverse routing options to ensure resilience, and no one is ever more than 20 minutes away from a Vorboss engineer in Central London. We also have 24/7 proactive network monitoring and operational support from experienced network and security operations professionals.
No network is ever 100% secure, regardless of whether it's a legacy network or a newer one. Security is determined by the measures to protect the network, not by age. So, the belief that legacy networks are inherently more secure is a myth.

Myth #3: No one really needs 10Gbps bandwidth
Many mistakenly believe that businesses don't need to have 10Gbps business internet bandwidth. Why, then, are we at Vorboss trying to make 10Gbps the new standard in speed and capacity?
For London to remain a global leader, its businesses must be future-proofed. Bandwidth consumption is constantly growing – data requirements are doubling every two years – so limited bandwidth will quickly start holding back the companies driving our city's economy. They need to be able to use emerging technologies, such as AI and quantum computing, to remain competitive.
Businesses can focus on innovation, transformation, and gaining a competitive edge by removing bandwidth concerns. We understand that some companies may not need that much bandwidth right now, but we provide it on purpose so they will never have to worry about running out in the future. Connectivity should never be a limitation for business growth.
If your business uses 1Gbps, then it uses a legacy product. The network these internet service providers use would need substantial upgrades to provide what Vorboss provides – 10Gbps as a minimum, with the capability to quickly ramp up to 100Gbps business internet on the same network. We invested £250m into a brand-new fibre network designed for forward-thinking organisations' current and future needs.
Selling less than 10Gbps doesn't make sense to us, as it doesn't cost us any less to provide you with less bandwidth. ISPs charging incrementally for bandwidth consumption are exploiting customers to maximise profits. We don't constrain or manufacture bandwidth, and we provide purposeful abundance and transparency in pricing to our customers.
Myth #4: ISPs have the right to throttle your internet speeds
Throttling refers to ISPs temporarily slowing down your internet connection speed to manage their network capacity. This practice is often associated with wireless and mobile ISPs, but even some business fibre providers use throttling. But is that allowed?
Here's the truth – if your ISP is throttling your internet speeds, it should be outlined in your service level agreement (SLA). You have the right to be aware if you're not getting the rate you're paying for all day, every day.
It's important to note that ISPs are required to be transparent in their approach to net neutrality and traffic management. ISPs are prohibited from prioritising certain types of traffic over others and cannot intentionally slow down your connection. If you feel like throttling tactics from your current provider are holding you back, it's time to demand more or consider switching to a reliable ISP.
At Vorboss, we never throttle customer speeds, regardless of the bandwidth package customers choose. We believe in providing reliable and consistent internet speeds to our customers without sneaky tactics to hold them back. Besides, we offer Direct Internet Access (DIA), delivering connectivity to each specific customer via their own direct fibre connection. That means no varying speeds or sharing bandwidth.

Why you should demand more from UK telecoms companies
We have brought a new type of business-only internet and service to London, which is better and different from other UK telecoms companies. We want to lift the lid on industry secrets and call things out for the long-term health of our customers and the city.
We envision a future where the bandwidth for any task is available, allowing businesses to explore new solutions, ways of working, and technologies in the same way unlimited data has changed consumer behaviour with handheld devices. In turn, London will be able to compete at the highest level for years to come.
The telecommunications industry is ever-changing, and customers should always demand the best from their telecoms companies. Don't be fooled by the myths and misconceptions about them—your business deserves better.
If you want to learn more about connecting with us, speak to one of our experts today.
More Articles

“OK. So… exactly what is a DDoS attack?” Unfortunately, it’s a question being asked with increasing regularity by owners and CEOs confronted with the news that their systems have suffered an attack.
DDoS (Distributed Denial-of-Service) attacks pose a constant and escalating threat to all businesses. According to cyber security training platform StationX, between 2020 and 2022 cyber attacks against SMEs surged by 150%, reaching 31,000 attacks per day globally. A 2025 roundup of cyber crime statistics from one of the UK’s leading managed services firms, meanwhile, revealed that enterprise organisations undergo an eyewatering 1700 attacks each day. Regardless of size, it’s important for all businesses to understand how DDoS attacks work, what their impact might be and, most importantly, how to prevent DDoS attacks.
We’ve put together this guide to help you understand the fundamentals of DDoS attacks, the types businesses face, why they are targeted, and the best strategies for prevention and mitigation. And we’ll also look at how Vorboss can help you safeguard your operations and prevent DDoS attacks from succeeding.
What is a DDoS attack?
A DDoS attack aims to overwhelm a system, service, or network with excessive internet traffic, leaving it inaccessible to legitimate users. In business terms, the consequences can be extremely serious, leading to financial loss, reputational damage and substantial disruption to operations.
.png)
So what’s the difference between a DoS and DDoS attack, as both terms are often mentioned when a business has been affected? In a traditional DoS (Denial-of-Service) attack, a single system is usually involved in launching the attack. A DDoS attack, in contrast, leverages multiple compromised computers, often distributed globally, to create a coordinated assault. These devices form what is known as a botnet - an army of infected machines controlled by a malicious actor whose agenda may range from the criminal to the pointlessly disruptive.
Now let’s try to answer the question, “What are DDoS attacks?” at a technical level. Typically, DDoS attacks work by exploiting weaknesses in internet-connected systems, using a range of techniques to flood the target with requests.
Attackers may direct massive amounts of data at a server to exhaust its bandwidth, send malformed network packets to confuse and crash the system, or target vulnerabilities in applications to bring them down. Because the traffic appears to come from many different sources, blocking the attack is much more complex than dealing with a single-source DoS attack.
There are also some common misconceptions about what DDoS attacks are. One of these is that only large companies are really at risk. In reality, businesses of all sizes are targeted all the time, including small and medium enterprises.
Another misconception is that firewalls alone provide adequate protection. While firewalls play an important role in network security, they are not designed to handle the sheer scale of a DDoS attack. People also often assume that a DDoS attack would be immediately noticeable. Many attacks begin subtly, however, gradually increasing in intensity over time. This makes early detection and mitigation a critical part of how to prevent DDoS attacks.
Types of DDoS attacks
DDoS attacks come in several forms, each with its own approach to overwhelming a system. With IBM’s 2024 Cost of a Data Breach Report revealing that the global average cost of a data breach (across both enterprise and SMB targets) had reached $4.88 million, it’s worth being aware of the different attack types, so you can take targeted action to defend against them.
Volumetric Attacks
Volumetric attacks are among the most common and straightforward forms of DDoS attacks. They work by consuming all the available bandwidth between the target system and the rest of the internet, so that the system has no capacity to handle legitimate users or customers.

Because of their scale, these attacks can be devastating, with the total amount of data being directed at the target system sometimes reaching trillions of bits per second in intensity - far beyond what most networks are designed to handle. The way that attackers achieve this is by generating a massive flood of data requests, often using the botnets described earlier to amplify their impact. Examples of volumetric type attacks include UDP floods, ICMP floods, and DNS amplification attacks.
To combat volumetric attacks, businesses need robust traffic filtering solutions, content delivery networks (CDNs), and scalable network infrastructure that’s capable of absorbing these kinds of sudden surge in demand.
Protocol Attacks
Protocol attacks, which are also known as state-exhaustion attacks, exploit vulnerabilities in network protocols to use up server resources. Unlike volumetric attacks that overwhelm bandwidth, protocol attacks specifically target weaknesses in the way devices and applications handle network connections. SYN floods, Ping of Death and Smurf attacks are all examples of this type of attack.

Protocol attacks can be difficult to detect because they don’t rely on massive traffic spikes. Instead, they stealthily take advantage of standard networking functions, causing a system to become sluggish or unresponsive. A business can mitigate these attacks using firewall rules, rate-limiting strategies and dedicated intrusion detection systems that monitor network activity for unusual patterns.
Application Layer Attacks
Application layer attacks, which are also known as Layer 7 attacks, are the most sophisticated and difficult kind of DDoS to detect. These attacks target the application or service layer of a system, mimicking legitimate requests but at a scale designed to overwhelm backend processes. Because they don’t generate massive volumes of traffic like volumetric attacks, they often outwit traditional detection methods.

One well-known example is the HTTP flood, where attackers send an overwhelming number of HTTP requests to a website, forcing the server to process each request until it becomes overloaded. Another Application Layer DDoS attack example is the Slowloris attack, where an attacker opens multiple connections to a target server and sends partial HTTP requests, keeping them open for as long as possible to consume server resources.
Application layer attacks are particularly dangerous because they target specific functions of a business’s digital services. A well-crafted attack can take down your login pages, API endpoints, or online transaction systems, disrupting essential operations in your business.
“How do I stop DDoS attacks of this kind?” Good question. Mitigation strategies include using web application firewalls (WAFs), traffic analysis tools and bot mitigation services to distinguish between human users and automated threats.
To develop an effective defence strategy, as at Vorboss we routinely do for customers, a business and its security partner need to understand the different types of DDoS attacks. By combining multiple layers of security - such as firewalls, traffic monitoring, and scalable infrastructure - you can significantly reduce your risk of falling victim to these disruptive cyber threats.
Why are businesses targeted by DDoS attacks?

What is the purpose of a DDoS attack? DDoS attacks happen for a variety of reasons, and you can find your business targeted no matter what industry it is in. Some attacks are financially motivated, while others are designed to cause disruption or make a statement.
Cybercriminals sometimes use DDoS attacks as a form of extortion. In what’s known as a ransom DDoS (RDoS) attack, the attacker demands payment in exchange for stopping or preventing the attack. Businesses that rely on uptime to generate revenue, such as e-commerce platforms or online services, may make the decision to comply rather than risk prolonged downtime.
As is always the case with blackmail, however, paying the ransom does not guarantee protection, and it can even mark the company out as a fruitful ‘repeat’ target for the future.
In some industries, businesses face attacks from competitors looking to cause disruption. A well-timed DDoS attack can take down a rival’s website or online services during a crucial period, such as a product launch or seasonal sales event. While this kind of corporate sabotage is both unethical and, in the UK under Section 3 of the Computer Misuse Act 1990, illegal, it’s certainly not unheard of - particularly in high-competition markets.
DDoS attacks are also used by what are known as ‘Hacktivist’ groups to target organisations they disagree with politically, socially, or ethically. These attacks are often launched against government departments, financial institutions, or businesses associated with controversial industries. Unlike financially motivated attacks, ideological attacks are typically intended to send a message rather than extract ransom.
To complicate things further, not all DDoS attacks have any clear purpose. ‘Random Opportunity Attacks’ are usually carried out simply because an attacker finds an easy target. Automated scripts and botnets constantly scan the internet for vulnerable systems, and if a business lacks proper security measures it can find itself victim of an attack for no real reason whatsoever. While such attacks may not have a specific goal, they can still cause serious damage to your business by disrupting operations, costing both time and money.
Impact of DDoS attacks on businesses

The consequences of a DDoS attack can be devastating. They can affect not only the immediate operational capacity of your business, but also its long-term stability and reputation.

Downtime and resultant loss of revenue are of primary concern if your business relies heavily on its online presence. If, for example, you run an e-commerce platform or are a financial institution or cloud service provider, disruptions can quickly translate into significant financial losses. Customers unable to access your services may seek alternatives, leading to lost sales and, potentially, long-term customer attrition.
DDoS attacks can also cause damage to your brand reputation. If you repeatedly experience outages your business can quickly gain a reputation for unreliability. In highly competitive markets, this can damage customer confidence and result in reduced market share, as clients and partners begin to view you as insecure or unstable.
Another significant possible impact is the breach of customer trust. Even if no data is stolen, customers expect services to be available when needed. Prolonged disruptions can create doubt in your company’s ability to protect its infrastructure and maintain security, making it harder both to retain existing customers and attract new ones.
Finally, the costs of recovery after a DDoS attack can be extensive. You may find yourselves needing to invest in forensic analysis, security upgrades, and potentially even legal compliance measures if an attack exposes weaknesses that lead to regulatory scrutiny. On top of this, there could be costs associated with customer compensation, public relations efforts and enhanced security infrastructure to prevent future attacks.
How to detect a DDoS attack?
Detecting a DDoS attack early is crucial if you are to minimise its impact. The first sign of an attack is often a sudden slowdown in the performance of your systems or an unexplained spike in traffic. You should be alert to signs such as your website taking longer than expected to load, your services becoming intermittently unavailable, or customers complaining about accessibility issues.
Using monitoring tools and techniques can help distinguish between normal fluctuations in traffic and a potential DDoS attack. Network monitoring solutions can analyse incoming traffic for unusual patterns, such as an unexpected influx of requests from unfamiliar regions or spikes in traffic targeting a specific part of a service. Some businesses implement ‘anomaly detection’ systems that use artificial intelligence to differentiate between legitimate and malicious traffic automatically.

One of the key challenges is distinguishing legitimate traffic surges from DDoS attacks. Seasonal sales, marketing campaigns or viral content can generate large amounts of desirable traffic that may look similar to an attack at first glance. However, legitimate traffic typically shows a natural pattern, while a DDoS attack often appears as a sustained and unnatural surge. Analysing traffic sources, request types, and behavioural patterns can help a business determine whether it’s under attack, or simply experiencing a welcome spike in customer activity.

How to protect your business from DDoS attacks
Vorboss has huge experience in providing businesses of every size with robust protection. So, having looked at what is a DDoS attack, and at how to detect when your business is being targeted, the most important questions are how to prevent DDoS attacks and mitigate their impact?
- The first line of defence is always a robust firewall, filtering incoming traffic to block malicious requests before they reach the network.
- Load balancing and content delivery networks (CDNs) help distribute traffic across multiple servers, preventing single points of failure. This approach enhances resilience against high-volume attacks.
- Conducting regular security audits ensures that vulnerabilities are identified and addressed before they can be exploited.
- It’s also good to develop and maintain an incident response plan, outlining the steps to be taken in the event that you are subject to an attack.
- Working with a trusted internet service provider like Vorboss can enhance protection, as many providers (Vorboss included) offer built-in DDoS mitigation services.
- If your ISP does not offer this, you can safeguard yourselves by using dedicated DDoS mitigation services, which provide real-time traffic analysis and automatic threat neutralisation.
- Finally, you should consider the benefits of automatic mitigation over manual mitigation. Automated systems use AI-driven detection and response, providing faster and more effective defence against attacks, whereas manual mitigation requires human intervention and can be slower to react
How Vorboss in safeguarding against DDoS attacks
When procuring business internet, London companies have a wide range of providers to choose from, but Vorboss provides robust security solutions designed to protect business customers from the growing threat of DDoS attacks. We leverage advanced threat detection and mitigation technologies to make sure customers maintain network uptime and security even in the face of large-scale attacks.
We employ real-time traffic monitoring and intelligent filtering to identify and block malicious traffic before it reaches our customers’ networks. Our automated DDoS mitigation systems detect unusual patterns and respond instantly, reducing downtime and preventing prolonged disruptions. Unlike traditional reactive approaches, Vorboss’s security solutions actively learn from each attempted attack, enhancing protection over time.
Choosing Vorboss as your security partner is a smart answer to the question of, “How do I stop DDoS attacks?”
Vorboss provides your business with enterprise-grade DDoS protection backed by a team of experienced cybersecurity experts. Our services include scalable mitigation solutions, ensuring you receive tailored protection no matter what the size of your business or infrastructure. As we integrate our DDoS protection with Vorboss’s high-performance internet services, this results in a seamless solution for any business that’s reliant on fast and uninterrupted connectivity.
By partnering with Vorboss, you gain peace of mind, knowing that your critical online infrastructure is protected from DDoS attacks, no matter what form they take.
Be Proactive. The answer to how to prevent a DDoS attack
DDoS attacks are a pressing issue, and a clear and present danger, for businesses of all sizes. Proactive measures such as implementing robust security solutions, conducting regular audits, and partnering with a reliable provider like Vorboss are the best way to minimise the risk and mitigate the impact of these threats. An effective defence strategy is not so much about recovering from an attack as about preventing it in the first place, protecting both your operations and reputation.
If your business is looking for comprehensive DDoS protection and uninterrupted network performance, get in touch with us. Contact Vorboss to learn how we can help protect your business from DDoS attacks with reliable and secure solutions.

Vorboss is disrupting the telecoms status quo as we build London’s only dedicated fibre network for businesses. We are growing a team as diverse as the communities we serve.
Our annual gender pay gap report gives us a moment to take stock—celebrating the progress we’ve made towards equity and sharpening our focus on where we still need to go, especially when it comes to equal representation of women at every level of the business.
In an industry that has long lacked diversity, we’ve spent years raising the bar. Equity, inclusion, and diversity are embedded in how we operate—from opening doors through our in-house academy, to designing tools, kit, and PPE with real comfort and usability in mind.
Read the full report here.