Every time someone in your office opens a web browser, sends an email, connects to a cloud application, or makes a VoIP phone call, a process called DNS resolution takes place behind the scenes. It happens in milliseconds, it is entirely invisible to the user, and yet without it, virtually nothing on your network would work. DNS — the Domain Name System — is one of the most fundamental components of modern business technology, and yet it is also one of the least understood.
For UK business owners and managers, understanding what DNS does, why it matters, and what can go wrong is not merely a technical curiosity. DNS failures can bring your entire business to a halt. DNS misconfigurations can prevent emails from reaching their destination. DNS vulnerabilities can be exploited by cybercriminals to redirect your staff to malicious websites. And poor DNS management can quietly undermine the performance of every internet-connected system in your organisation.
This guide explains DNS in plain language, covers why it matters for your business, and outlines the steps you should take to ensure your DNS is properly configured, secure, and resilient.
What Is DNS? A Plain English Explanation
At its simplest, DNS is the system that translates human-readable domain names into the numerical IP addresses that computers use to communicate with each other. When you type "google.co.uk" into your browser, your computer does not know how to find Google using that name alone. It needs an IP address — a numerical identifier like 142.250.187.99. DNS performs this translation, converting the domain name you typed into the IP address your computer needs.
The analogy most commonly used is a telephone directory. Just as you would look up a person's name in the phone book to find their telephone number, DNS looks up a domain name to find the corresponding IP address. The difference is that DNS does this automatically, in the background, thousands of times a day, for every internet-connected device in your office.
How a DNS Query Works
When a user on your network types a website address into their browser, the following process occurs. First, the device checks its own local cache to see if it already has the IP address for that domain stored from a previous query. If not, it sends the query to the DNS server configured on your network — typically your router or a dedicated DNS server. If that server does not have the answer cached, it forwards the query to external DNS servers, which consult the authoritative DNS server for that domain. The authoritative server responds with the correct IP address, which is then passed back through the chain to the original device. The entire process typically takes between 20 and 100 milliseconds.
DNS Caching: Speeding Up the Process
To avoid repeating the full lookup process for every single request, DNS relies heavily on caching at multiple levels. Your individual device maintains a local DNS cache, storing the results of recent queries so that frequently visited sites can be resolved instantly without contacting any external server. Your office router or local DNS server maintains its own cache, serving results to all devices on the network. And your ISP's recursive DNS servers maintain yet another layer of cache, benefitting all of their customers.
Each cached DNS record has a Time to Live (TTL) value, set by the domain owner, which determines how long the record can be stored before it must be refreshed. TTL values typically range from 300 seconds (five minutes) for records that change frequently to 86400 seconds (24 hours) for stable records. Understanding caching is important for businesses because it explains why DNS changes do not take effect immediately — cached records continue to be served until their TTL expires, which is why a DNS change can appear to work for some users but not others during the propagation period.
There are two main types of DNS server. An authoritative DNS server holds the definitive records for a specific domain — it is the source of truth for that domain's IP addresses, mail servers, and other records. A recursive DNS server does the looking-up on behalf of client devices, querying multiple authoritative servers as needed to resolve a domain name. Your business interacts with both: your domain registrar hosts the authoritative DNS for your company domain, whilst your internal network uses recursive DNS servers to resolve queries from your staff's devices.
Why DNS Matters for Your Business
Understanding DNS at a conceptual level is useful, but the real question for business owners is: why should you care? The answer spans several critical areas.
Business Continuity
If your DNS stops working, your business effectively goes offline. Staff cannot access cloud applications. Email stops flowing. Your website becomes unreachable. VoIP phones stop connecting calls. For a business that depends on internet connectivity — which, in 2026, is virtually every business — a DNS failure is as disruptive as a power cut.
Consider a typical UK professional services firm with 50 employees. If DNS resolution fails at 9am on a Monday morning, staff cannot log into Microsoft 365, access SharePoint documents, use the company's cloud-based accounting system, or even browse the web for research. Customer-facing web applications and email both become inaccessible. The financial impact is not limited to lost productivity — there is the reputational damage of being unreachable by clients, the potential for missed contractual deadlines, and the cost of emergency IT intervention to diagnose and resolve the problem.
What makes DNS failures particularly insidious is that they can be partial rather than total. A misconfigured DNS record might cause your email to fail whilst your website continues to work normally, or it might prevent access to one specific cloud application whilst everything else appears fine. These partial failures are often misdiagnosed as application-specific problems, leading to wasted time troubleshooting the wrong component. Having a clear understanding of DNS and its role in your infrastructure helps IT teams diagnose issues faster and more accurately.
Email Deliverability
DNS plays a critical role in email. Your domain's DNS records include entries called MX records that tell the internet where to deliver email for your domain. If these records are misconfigured, emails sent to your business will bounce or disappear. Additionally, email authentication records such as SPF, DKIM, and DMARC — which are essential for preventing your emails from being flagged as spam — are all stored in DNS. Incorrect configuration of these records can result in your legitimate business emails being rejected by recipients' mail servers.
The consequences of poor email DNS configuration extend beyond simple deliverability. In regulated industries such as financial services, legal, and healthcare, the inability to prove that email communications were sent and received can have compliance implications. Furthermore, if your domain lacks proper DMARC enforcement, cybercriminals can send emails that appear to come from your organisation — a technique known as domain spoofing — potentially defrauding your clients or partners whilst damaging your reputation.
For UK businesses using Microsoft 365 or Google Workspace for email, the DNS configuration required is well-documented but frequently implemented incorrectly. Common mistakes include setting an SPF record that does not include all legitimate sending sources, failing to rotate DKIM keys periodically, or publishing a DMARC record in monitoring mode without ever progressing to an enforcement policy. Each of these oversights creates a gap that sophisticated attackers can exploit.
Cyber Security
DNS is increasingly recognised as both a threat vector and a security tool. Cybercriminals use DNS in several ways: DNS hijacking redirects your traffic to malicious servers; DNS tunnelling exfiltrates data from your network through DNS queries; and phishing attacks rely on DNS to resolve the addresses of fake websites designed to steal credentials. Conversely, DNS-based security tools can block access to known malicious domains, preventing malware downloads and phishing attempts before they reach the user.
The National Cyber Security Centre (NCSC) in the United Kingdom operates a Protective DNS service (PDNS) that blocks known malicious domains at the DNS level. Whilst PDNS is primarily available to public sector organisations, the principle it demonstrates — that DNS-level security is an effective layer of defence — applies equally to private businesses.
DNS-Based Threats Facing UK Businesses
The threat landscape for DNS-based attacks continues to evolve rapidly. DNS cache poisoning, where an attacker corrupts the cache of a recursive DNS server to redirect traffic to malicious destinations, remains a significant risk for organisations that have not implemented DNSSEC validation. In a cache poisoning attack, your employees might type the correct URL for your banking portal but be silently redirected to a convincing replica designed to harvest their login credentials.
DNS tunnelling is another increasingly common technique, particularly favoured by advanced persistent threat groups targeting UK businesses. By encoding data within DNS queries and responses, attackers can exfiltrate sensitive information from your network even when all other outbound traffic is blocked by your firewall. Because DNS traffic is rarely inspected by traditional security tools, this method can operate undetected for extended periods. Organisations handling sensitive client data — such as law firms, accountancies, and medical practices — should ensure their security monitoring includes DNS query analysis to detect anomalous patterns that might indicate tunnelling activity.
Distributed Denial of Service attacks targeting DNS infrastructure have also become more frequent and more powerful. By overwhelming your DNS servers with fraudulent queries, attackers can prevent legitimate DNS resolution, effectively taking your entire online presence offline. For businesses that rely on their own authoritative DNS servers rather than a managed DNS service with built-in DDoS protection, this represents a significant and growing risk.
Website and Application Performance
The speed at which DNS queries are resolved directly affects how quickly websites and applications load for your users. If your DNS provider is slow, every web request, API call, and cloud application interaction is delayed. For businesses that operate customer-facing websites, slow DNS resolution can increase page load times and reduce conversion rates. Choosing a fast, reliable DNS provider is a straightforward way to improve performance across the board.
The Impact on Cloud-First Businesses
For organisations that have adopted a cloud-first strategy — and an increasing number of UK businesses fall into this category — DNS performance has a compounding effect on productivity. Every interaction with a cloud application begins with a DNS lookup. When a member of staff opens a document in SharePoint, submits data to a cloud-based CRM, or loads a dashboard in a business intelligence tool, DNS resolution occurs first. If each lookup takes an additional 50 milliseconds due to a slow DNS provider, and a typical user triggers hundreds of DNS queries per hour, the cumulative delay becomes noticeable and frustrating.
Modern DNS providers address this through global anycast networks, where DNS queries are automatically routed to the nearest server location. For a UK business, this means queries are resolved by a server in London or Dublin rather than one in North America or Asia. The difference in latency — often 5ms versus 100ms or more — may seem trivial on a per-query basis, but it adds up to a meaningful improvement in the perceived speed of every cloud-connected application your staff use throughout the working day.
Key DNS Record Types Every Business Should Know
| Record Type | Purpose | Example |
|---|---|---|
| A Record | Maps a domain to an IPv4 address | yourcompany.co.uk → 203.0.113.50 |
| AAAA Record | Maps a domain to an IPv6 address | yourcompany.co.uk → 2001:db8::1 |
| MX Record | Directs email to your mail server | Priority 10: mail.yourcompany.co.uk |
| CNAME Record | Creates an alias pointing to another domain | www.yourcompany.co.uk → yourcompany.co.uk |
| TXT Record | Stores text data (SPF, DKIM, DMARC, verification) | v=spf1 include:spf.protection.outlook.com -all |
| NS Record | Specifies the authoritative DNS servers for your domain | ns1.yourdnsprovider.com |
| PTR Record | Reverse DNS — maps IP to domain (used in email verification) | 203.0.113.50 → mail.yourcompany.co.uk |
Common DNS Problems and How to Avoid Them
DNS problems can be frustratingly difficult to diagnose because the symptoms — websites not loading, emails bouncing, applications timing out — can have many other causes. Here are the most common DNS issues that affect UK businesses and how to prevent them.
DNS Propagation Delays
When you change a DNS record, the change does not take effect instantly worldwide. DNS records have a Time to Live (TTL) value that determines how long other DNS servers cache the record before checking for updates. If your TTL is set to 86400 seconds (24 hours), it may take up to a full day for changes to propagate globally. Before making critical DNS changes — such as during a website migration or email provider switch — reduce the TTL well in advance to minimise propagation delays.
Single Point of Failure
If you rely on a single DNS provider and that provider experiences an outage, your entire online presence goes dark. Configuring secondary DNS with a different provider creates redundancy. If your primary DNS provider fails, queries are automatically handled by the secondary, keeping your services accessible.
Misconfigured Email Records
As mentioned earlier, SPF, DKIM, and DMARC records are essential for email deliverability and security. A surprising number of UK businesses have these records misconfigured or missing entirely. The result is that legitimate emails are rejected by recipients, whilst spoofed emails using your domain are not blocked. Regularly auditing your DNS records, particularly email authentication records, should be a standard part of your IT maintenance routine.
Stale and Orphaned DNS Records
Beyond email authentication, another common DNS problem is the accumulation of stale or orphaned records over time. As businesses change web hosting providers, migrate between cloud platforms, retire old services, and add new third-party integrations, DNS records accumulate. Old A records pointing to decommissioned servers, CNAME records referencing services you no longer use, and TXT records for verification challenges long since completed — all of these clutter your DNS zone and create potential security vulnerabilities.
Orphaned DNS records are particularly dangerous when they point to infrastructure you no longer control. If an old CNAME record still references a cloud service you have cancelled, an attacker could potentially claim that service endpoint and serve malicious content from what appears to be your domain — a technique known as subdomain takeover. Regular DNS audits, conducted at least quarterly, should include a review of all records to identify and remove entries that are no longer needed. Maintaining a clean, well-documented DNS zone reduces your attack surface and makes it easier to troubleshoot issues when they arise.
DNS Security: Protecting Your Business
Given the critical role DNS plays in business operations, securing your DNS infrastructure should be a priority. There are several measures your business should implement.
DNS Security Best Practices
- Use DNS-based threat protection to block malicious domains
- Enable DNSSEC to prevent DNS spoofing and cache poisoning
- Configure redundant DNS with multiple providers
- Monitor DNS query logs for unusual patterns
- Implement SPF, DKIM, and DMARC for email security
- Use encrypted DNS (DoH or DoT) where possible
- Restrict DNS zone transfers to authorised servers only
Common DNS Security Gaps
- Using default ISP DNS with no threat filtering
- No DNSSEC validation enabled
- Single DNS provider with no redundancy
- No monitoring of DNS query patterns
- Missing or misconfigured email authentication records
- DNS queries transmitted in plain text
- Unrestricted zone transfers exposing all records
Understanding DNSSEC
DNSSEC (Domain Name System Security Extensions) adds a layer of authentication to DNS responses, ensuring that the answers your devices receive have not been tampered with in transit. Without DNSSEC, there is no built-in mechanism to verify that a DNS response genuinely comes from the authoritative server — an attacker who can intercept or forge DNS responses can redirect your traffic without detection.
DNSSEC works by digitally signing DNS records. When your recursive DNS server receives a response, it can verify the digital signature against the domain's published public key, confirming that the record is authentic and has not been modified. If the signature does not match, the response is rejected and the query fails safely rather than directing users to a potentially malicious destination.
For UK businesses, enabling DNSSEC on your domain is a relatively straightforward process that your DNS provider can facilitate. However, it is worth noting that DNSSEC protects the integrity of DNS responses but does not encrypt them — DNS queries and responses are still visible to anyone monitoring network traffic. For full privacy, encrypted DNS protocols such as DNS over HTTPS (DoH) or DNS over TLS (DoT) should be used alongside DNSSEC to provide both authenticity and confidentiality.
Choosing the Right DNS Provider
For your authoritative DNS — the DNS that controls your domain's records — you should choose a provider that offers high availability with a globally distributed network, fast query response times, DNSSEC support, an intuitive management interface, API access for automation, reasonable TTL options, and strong security practices. Popular enterprise DNS providers include Cloudflare, AWS Route 53, Azure DNS, and Google Cloud DNS. For many UK SMEs, Cloudflare offers an excellent balance of performance, security, and ease of use, with a generous free tier for basic DNS hosting.
Evaluating DNS Provider Reliability
When assessing DNS providers, look beyond headline features and examine their track record for uptime and incident response. A provider's historical uptime percentage, published SLA commitments, and the transparency of their status page all indicate how seriously they treat reliability. For UK businesses in regulated sectors, it is also worth considering where the provider's DNS servers are physically located and whether their data processing practices comply with UK GDPR requirements.
Many businesses overlook the importance of their DNS provider's management interface. The ability to quickly and accurately modify DNS records, set up redirects, manage subdomains, and configure DNSSEC should be straightforward and well-documented. A confusing or unreliable management interface increases the risk of misconfiguration, which — as discussed throughout this guide — can have serious consequences for your business operations.
Internal DNS for Your Office Network
Alongside your authoritative and recursive DNS choices, businesses with on-premises servers or hybrid cloud environments should consider their internal DNS configuration. Internal DNS allows you to create private records that resolve only within your local network — for example, mapping friendly names like intranet.yourcompany.local to internal server IP addresses. This simplifies access to internal resources, improves security by keeping internal addressing private, and provides a foundation for more advanced network segmentation and access control policies.
For businesses running Windows Server environments, Active Directory relies heavily on DNS for service discovery, domain controller location, and Kerberos authentication. Misconfigured internal DNS in an Active Directory environment can cause login failures, Group Policy processing errors, and replication problems between domain controllers. Ensuring your internal DNS is properly maintained is therefore not merely a convenience — it is essential for the stability of your core infrastructure.
For your recursive DNS — the DNS servers your network devices use to resolve queries — consider using a security-focused provider such as Cisco Umbrella, Cloudflare Gateway, or similar DNS filtering services. These providers not only resolve DNS queries but also block access to known malicious domains, providing an additional layer of security for your network.
How Cloudswitched Manages DNS for UK Businesses
At Cloudswitched, DNS management is a core component of our managed IT service. We ensure your domain's DNS records are correctly configured, your email authentication records are properly set up and regularly audited, your DNS infrastructure is redundant and resilient, and DNS-based security filtering is in place to protect your network from malicious domains.
We monitor your DNS health continuously and respond immediately to any issues that could affect your business operations. Whether you need help migrating your DNS to a new provider, configuring email authentication to improve deliverability, or implementing DNS security to protect against cyber threats, our team has the expertise to ensure your DNS is working for your business rather than against it.
Need Help With Your DNS Configuration?
Cloudswitched provides comprehensive DNS management for UK businesses, including configuration, security, monitoring, and email authentication setup. If you are unsure whether your DNS is correctly configured or want to improve your email deliverability and security posture, get in touch with our team today.
GET IN TOUCH