Back to Articles

What is DNS and Why Does It Matter for Your Business?

What is DNS and Why Does It Matter for Your Business?

Every time someone in your office opens a web browser, sends an email, connects to a cloud application, or makes a VoIP phone call, a process called DNS resolution takes place behind the scenes. It happens in milliseconds, it is entirely invisible to the user, and yet without it, virtually nothing on your network would work. DNS — the Domain Name System — is one of the most fundamental components of modern business technology, and yet it is also one of the least understood.

For UK business owners and managers, understanding what DNS does, why it matters, and what can go wrong is not merely a technical curiosity. DNS failures can bring your entire business to a halt. DNS misconfigurations can prevent emails from reaching their destination. DNS vulnerabilities can be exploited by cybercriminals to redirect your staff to malicious websites. And poor DNS management can quietly undermine the performance of every internet-connected system in your organisation.

This guide explains DNS in plain language, covers why it matters for your business, and outlines the steps you should take to ensure your DNS is properly configured, secure, and resilient.

4.2 trillion
DNS queries processed globally every day
82%
of UK businesses have experienced DNS-related outages
91%
of cyber attacks begin with a DNS query to a malicious domain
£6,800
Average cost per hour of DNS-related downtime for UK SMEs

What Is DNS? A Plain English Explanation

At its simplest, DNS is the system that translates human-readable domain names into the numerical IP addresses that computers use to communicate with each other. When you type "google.co.uk" into your browser, your computer does not know how to find Google using that name alone. It needs an IP address — a numerical identifier like 142.250.187.99. DNS performs this translation, converting the domain name you typed into the IP address your computer needs.

The analogy most commonly used is a telephone directory. Just as you would look up a person's name in the phone book to find their telephone number, DNS looks up a domain name to find the corresponding IP address. The difference is that DNS does this automatically, in the background, thousands of times a day, for every internet-connected device in your office.

How a DNS Query Works

When a user on your network types a website address into their browser, the following process occurs. First, the device checks its own local cache to see if it already has the IP address for that domain stored from a previous query. If not, it sends the query to the DNS server configured on your network — typically your router or a dedicated DNS server. If that server does not have the answer cached, it forwards the query to external DNS servers, which consult the authoritative DNS server for that domain. The authoritative server responds with the correct IP address, which is then passed back through the chain to the original device. The entire process typically takes between 20 and 100 milliseconds.

DNS Caching: Speeding Up the Process

To avoid repeating the full lookup process for every single request, DNS relies heavily on caching at multiple levels. Your individual device maintains a local DNS cache, storing the results of recent queries so that frequently visited sites can be resolved instantly without contacting any external server. Your office router or local DNS server maintains its own cache, serving results to all devices on the network. And your ISP's recursive DNS servers maintain yet another layer of cache, benefitting all of their customers.

Each cached DNS record has a Time to Live (TTL) value, set by the domain owner, which determines how long the record can be stored before it must be refreshed. TTL values typically range from 300 seconds (five minutes) for records that change frequently to 86400 seconds (24 hours) for stable records. Understanding caching is important for businesses because it explains why DNS changes do not take effect immediately — cached records continue to be served until their TTL expires, which is why a DNS change can appear to work for some users but not others during the propagation period.

Authoritative vs Recursive DNS

There are two main types of DNS server. An authoritative DNS server holds the definitive records for a specific domain — it is the source of truth for that domain's IP addresses, mail servers, and other records. A recursive DNS server does the looking-up on behalf of client devices, querying multiple authoritative servers as needed to resolve a domain name. Your business interacts with both: your domain registrar hosts the authoritative DNS for your company domain, whilst your internal network uses recursive DNS servers to resolve queries from your staff's devices.

Why DNS Matters for Your Business

Understanding DNS at a conceptual level is useful, but the real question for business owners is: why should you care? The answer spans several critical areas.

Business Continuity

If your DNS stops working, your business effectively goes offline. Staff cannot access cloud applications. Email stops flowing. Your website becomes unreachable. VoIP phones stop connecting calls. For a business that depends on internet connectivity — which, in 2026, is virtually every business — a DNS failure is as disruptive as a power cut.

Consider a typical UK professional services firm with 50 employees. If DNS resolution fails at 9am on a Monday morning, staff cannot log into Microsoft 365, access SharePoint documents, use the company's cloud-based accounting system, or even browse the web for research. Customer-facing web applications and email both become inaccessible. The financial impact is not limited to lost productivity — there is the reputational damage of being unreachable by clients, the potential for missed contractual deadlines, and the cost of emergency IT intervention to diagnose and resolve the problem.

What makes DNS failures particularly insidious is that they can be partial rather than total. A misconfigured DNS record might cause your email to fail whilst your website continues to work normally, or it might prevent access to one specific cloud application whilst everything else appears fine. These partial failures are often misdiagnosed as application-specific problems, leading to wasted time troubleshooting the wrong component. Having a clear understanding of DNS and its role in your infrastructure helps IT teams diagnose issues faster and more accurately.

Email Deliverability

DNS plays a critical role in email. Your domain's DNS records include entries called MX records that tell the internet where to deliver email for your domain. If these records are misconfigured, emails sent to your business will bounce or disappear. Additionally, email authentication records such as SPF, DKIM, and DMARC — which are essential for preventing your emails from being flagged as spam — are all stored in DNS. Incorrect configuration of these records can result in your legitimate business emails being rejected by recipients' mail servers.

The consequences of poor email DNS configuration extend beyond simple deliverability. In regulated industries such as financial services, legal, and healthcare, the inability to prove that email communications were sent and received can have compliance implications. Furthermore, if your domain lacks proper DMARC enforcement, cybercriminals can send emails that appear to come from your organisation — a technique known as domain spoofing — potentially defrauding your clients or partners whilst damaging your reputation.

For UK businesses using Microsoft 365 or Google Workspace for email, the DNS configuration required is well-documented but frequently implemented incorrectly. Common mistakes include setting an SPF record that does not include all legitimate sending sources, failing to rotate DKIM keys periodically, or publishing a DMARC record in monitoring mode without ever progressing to an enforcement policy. Each of these oversights creates a gap that sophisticated attackers can exploit.

SPF record configured correctly
68% of UK SMEs
DKIM signing enabled
52% of UK SMEs
DMARC policy in place
34% of UK SMEs
All three correctly configured
21% of UK SMEs

Cyber Security

DNS is increasingly recognised as both a threat vector and a security tool. Cybercriminals use DNS in several ways: DNS hijacking redirects your traffic to malicious servers; DNS tunnelling exfiltrates data from your network through DNS queries; and phishing attacks rely on DNS to resolve the addresses of fake websites designed to steal credentials. Conversely, DNS-based security tools can block access to known malicious domains, preventing malware downloads and phishing attempts before they reach the user.

The National Cyber Security Centre (NCSC) in the United Kingdom operates a Protective DNS service (PDNS) that blocks known malicious domains at the DNS level. Whilst PDNS is primarily available to public sector organisations, the principle it demonstrates — that DNS-level security is an effective layer of defence — applies equally to private businesses.

DNS-Based Threats Facing UK Businesses

The threat landscape for DNS-based attacks continues to evolve rapidly. DNS cache poisoning, where an attacker corrupts the cache of a recursive DNS server to redirect traffic to malicious destinations, remains a significant risk for organisations that have not implemented DNSSEC validation. In a cache poisoning attack, your employees might type the correct URL for your banking portal but be silently redirected to a convincing replica designed to harvest their login credentials.

DNS tunnelling is another increasingly common technique, particularly favoured by advanced persistent threat groups targeting UK businesses. By encoding data within DNS queries and responses, attackers can exfiltrate sensitive information from your network even when all other outbound traffic is blocked by your firewall. Because DNS traffic is rarely inspected by traditional security tools, this method can operate undetected for extended periods. Organisations handling sensitive client data — such as law firms, accountancies, and medical practices — should ensure their security monitoring includes DNS query analysis to detect anomalous patterns that might indicate tunnelling activity.

Distributed Denial of Service attacks targeting DNS infrastructure have also become more frequent and more powerful. By overwhelming your DNS servers with fraudulent queries, attackers can prevent legitimate DNS resolution, effectively taking your entire online presence offline. For businesses that rely on their own authoritative DNS servers rather than a managed DNS service with built-in DDoS protection, this represents a significant and growing risk.

Website and Application Performance

The speed at which DNS queries are resolved directly affects how quickly websites and applications load for your users. If your DNS provider is slow, every web request, API call, and cloud application interaction is delayed. For businesses that operate customer-facing websites, slow DNS resolution can increase page load times and reduce conversion rates. Choosing a fast, reliable DNS provider is a straightforward way to improve performance across the board.

The Impact on Cloud-First Businesses

For organisations that have adopted a cloud-first strategy — and an increasing number of UK businesses fall into this category — DNS performance has a compounding effect on productivity. Every interaction with a cloud application begins with a DNS lookup. When a member of staff opens a document in SharePoint, submits data to a cloud-based CRM, or loads a dashboard in a business intelligence tool, DNS resolution occurs first. If each lookup takes an additional 50 milliseconds due to a slow DNS provider, and a typical user triggers hundreds of DNS queries per hour, the cumulative delay becomes noticeable and frustrating.

Modern DNS providers address this through global anycast networks, where DNS queries are automatically routed to the nearest server location. For a UK business, this means queries are resolved by a server in London or Dublin rather than one in North America or Asia. The difference in latency — often 5ms versus 100ms or more — may seem trivial on a per-query basis, but it adds up to a meaningful improvement in the perceived speed of every cloud-connected application your staff use throughout the working day.

Key DNS Record Types Every Business Should Know

Record Type Purpose Example
A Record Maps a domain to an IPv4 address yourcompany.co.uk → 203.0.113.50
AAAA Record Maps a domain to an IPv6 address yourcompany.co.uk → 2001:db8::1
MX Record Directs email to your mail server Priority 10: mail.yourcompany.co.uk
CNAME Record Creates an alias pointing to another domain www.yourcompany.co.uk → yourcompany.co.uk
TXT Record Stores text data (SPF, DKIM, DMARC, verification) v=spf1 include:spf.protection.outlook.com -all
NS Record Specifies the authoritative DNS servers for your domain ns1.yourdnsprovider.com
PTR Record Reverse DNS — maps IP to domain (used in email verification) 203.0.113.50 → mail.yourcompany.co.uk

Common DNS Problems and How to Avoid Them

DNS problems can be frustratingly difficult to diagnose because the symptoms — websites not loading, emails bouncing, applications timing out — can have many other causes. Here are the most common DNS issues that affect UK businesses and how to prevent them.

DNS Propagation Delays

When you change a DNS record, the change does not take effect instantly worldwide. DNS records have a Time to Live (TTL) value that determines how long other DNS servers cache the record before checking for updates. If your TTL is set to 86400 seconds (24 hours), it may take up to a full day for changes to propagate globally. Before making critical DNS changes — such as during a website migration or email provider switch — reduce the TTL well in advance to minimise propagation delays.

Single Point of Failure

If you rely on a single DNS provider and that provider experiences an outage, your entire online presence goes dark. Configuring secondary DNS with a different provider creates redundancy. If your primary DNS provider fails, queries are automatically handled by the secondary, keeping your services accessible.

Businesses with redundant DNS28%
Businesses monitoring DNS health19%
Businesses with DNS security filtering35%

Misconfigured Email Records

As mentioned earlier, SPF, DKIM, and DMARC records are essential for email deliverability and security. A surprising number of UK businesses have these records misconfigured or missing entirely. The result is that legitimate emails are rejected by recipients, whilst spoofed emails using your domain are not blocked. Regularly auditing your DNS records, particularly email authentication records, should be a standard part of your IT maintenance routine.

Stale and Orphaned DNS Records

Beyond email authentication, another common DNS problem is the accumulation of stale or orphaned records over time. As businesses change web hosting providers, migrate between cloud platforms, retire old services, and add new third-party integrations, DNS records accumulate. Old A records pointing to decommissioned servers, CNAME records referencing services you no longer use, and TXT records for verification challenges long since completed — all of these clutter your DNS zone and create potential security vulnerabilities.

Orphaned DNS records are particularly dangerous when they point to infrastructure you no longer control. If an old CNAME record still references a cloud service you have cancelled, an attacker could potentially claim that service endpoint and serve malicious content from what appears to be your domain — a technique known as subdomain takeover. Regular DNS audits, conducted at least quarterly, should include a review of all records to identify and remove entries that are no longer needed. Maintaining a clean, well-documented DNS zone reduces your attack surface and makes it easier to troubleshoot issues when they arise.

DNS Security: Protecting Your Business

Given the critical role DNS plays in business operations, securing your DNS infrastructure should be a priority. There are several measures your business should implement.

DNS Security Best Practices

  • Use DNS-based threat protection to block malicious domains
  • Enable DNSSEC to prevent DNS spoofing and cache poisoning
  • Configure redundant DNS with multiple providers
  • Monitor DNS query logs for unusual patterns
  • Implement SPF, DKIM, and DMARC for email security
  • Use encrypted DNS (DoH or DoT) where possible
  • Restrict DNS zone transfers to authorised servers only

Common DNS Security Gaps

  • Using default ISP DNS with no threat filtering
  • No DNSSEC validation enabled
  • Single DNS provider with no redundancy
  • No monitoring of DNS query patterns
  • Missing or misconfigured email authentication records
  • DNS queries transmitted in plain text
  • Unrestricted zone transfers exposing all records

Understanding DNSSEC

DNSSEC (Domain Name System Security Extensions) adds a layer of authentication to DNS responses, ensuring that the answers your devices receive have not been tampered with in transit. Without DNSSEC, there is no built-in mechanism to verify that a DNS response genuinely comes from the authoritative server — an attacker who can intercept or forge DNS responses can redirect your traffic without detection.

DNSSEC works by digitally signing DNS records. When your recursive DNS server receives a response, it can verify the digital signature against the domain's published public key, confirming that the record is authentic and has not been modified. If the signature does not match, the response is rejected and the query fails safely rather than directing users to a potentially malicious destination.

For UK businesses, enabling DNSSEC on your domain is a relatively straightforward process that your DNS provider can facilitate. However, it is worth noting that DNSSEC protects the integrity of DNS responses but does not encrypt them — DNS queries and responses are still visible to anyone monitoring network traffic. For full privacy, encrypted DNS protocols such as DNS over HTTPS (DoH) or DNS over TLS (DoT) should be used alongside DNSSEC to provide both authenticity and confidentiality.

Choosing the Right DNS Provider

For your authoritative DNS — the DNS that controls your domain's records — you should choose a provider that offers high availability with a globally distributed network, fast query response times, DNSSEC support, an intuitive management interface, API access for automation, reasonable TTL options, and strong security practices. Popular enterprise DNS providers include Cloudflare, AWS Route 53, Azure DNS, and Google Cloud DNS. For many UK SMEs, Cloudflare offers an excellent balance of performance, security, and ease of use, with a generous free tier for basic DNS hosting.

Evaluating DNS Provider Reliability

When assessing DNS providers, look beyond headline features and examine their track record for uptime and incident response. A provider's historical uptime percentage, published SLA commitments, and the transparency of their status page all indicate how seriously they treat reliability. For UK businesses in regulated sectors, it is also worth considering where the provider's DNS servers are physically located and whether their data processing practices comply with UK GDPR requirements.

Many businesses overlook the importance of their DNS provider's management interface. The ability to quickly and accurately modify DNS records, set up redirects, manage subdomains, and configure DNSSEC should be straightforward and well-documented. A confusing or unreliable management interface increases the risk of misconfiguration, which — as discussed throughout this guide — can have serious consequences for your business operations.

Internal DNS for Your Office Network

Alongside your authoritative and recursive DNS choices, businesses with on-premises servers or hybrid cloud environments should consider their internal DNS configuration. Internal DNS allows you to create private records that resolve only within your local network — for example, mapping friendly names like intranet.yourcompany.local to internal server IP addresses. This simplifies access to internal resources, improves security by keeping internal addressing private, and provides a foundation for more advanced network segmentation and access control policies.

For businesses running Windows Server environments, Active Directory relies heavily on DNS for service discovery, domain controller location, and Kerberos authentication. Misconfigured internal DNS in an Active Directory environment can cause login failures, Group Policy processing errors, and replication problems between domain controllers. Ensuring your internal DNS is properly maintained is therefore not merely a convenience — it is essential for the stability of your core infrastructure.

For your recursive DNS — the DNS servers your network devices use to resolve queries — consider using a security-focused provider such as Cisco Umbrella, Cloudflare Gateway, or similar DNS filtering services. These providers not only resolve DNS queries but also block access to known malicious domains, providing an additional layer of security for your network.

How Cloudswitched Manages DNS for UK Businesses

At Cloudswitched, DNS management is a core component of our managed IT service. We ensure your domain's DNS records are correctly configured, your email authentication records are properly set up and regularly audited, your DNS infrastructure is redundant and resilient, and DNS-based security filtering is in place to protect your network from malicious domains.

We monitor your DNS health continuously and respond immediately to any issues that could affect your business operations. Whether you need help migrating your DNS to a new provider, configuring email authentication to improve deliverability, or implementing DNS security to protect against cyber threats, our team has the expertise to ensure your DNS is working for your business rather than against it.

Need Help With Your DNS Configuration?

Cloudswitched provides comprehensive DNS management for UK businesses, including configuration, security, monitoring, and email authentication setup. If you are unsure whether your DNS is correctly configured or want to improve your email deliverability and security posture, get in touch with our team today.

GET IN TOUCH
Tags:Network Admin
CloudSwitched

London-based managed IT services provider offering support, cloud solutions and cybersecurity for SMEs.

CloudSwitched Service

Network Administration

Design, deployment and management of secure, high-performance business networks

Learn More
CloudSwitchedNetwork Administration
Explore Service

Technology Stack

Powered by industry-leading technologies including SolarWinds, Cloudflare, BitDefender, AWS, Microsoft Azure, and Cisco Meraki to deliver secure, scalable, and reliable IT solutions.

SolarWinds
Cloudflare
BitDefender
AWS
Hono
Opus
Office 365
Microsoft
Cisco Meraki
Microsoft Azure

Latest Articles

10
  • Cloud Networking

Understanding Meraki Auto VPN for Site-to-Site Connectivity

10 Aug, 2025

Read more
18
  • Internet & Connectivity

How to Monitor Your Business Network Performance

18 Mar, 2026

Read more
12
  • VoIP & Phone Systems

Microsoft Teams Direct Routing & Calling: A UK Business Guide

12 Apr, 2026

Read more

Enquiry Received!

Thank you for getting in touch. A member of our team will review your enquiry and get back to you within 24 hours.