{"id":10709,"date":"2022-01-10T09:00:00","date_gmt":"2022-01-10T14:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=10709"},"modified":"2026-01-15T11:08:04","modified_gmt":"2026-01-15T16:08:04","slug":"the-realities-of-domain-security","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/","title":{"rendered":"The Realities of Domain Security"},"content":{"rendered":"\n<p>In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but unfortunately, adoption is lower than one might think.<\/p>\n\n\n\n<p>The root of this issue, says D\u2019Angelo, is because 57% of Forbes Global 2000 companies use consumer-grade registrars (CGRs) instead of enterprise-class registrars (ECRs). ECRs emphasize domain security through advanced services including the four listed below, as well as DNS hosting redundancy to provide a backup DNS to boost resiliency. A recent <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/impact-of-enterprise-class-domain-registrar\/\">whitepaper by SecurityScorecard<\/a> has shown that organizations that use ECRs are more secure and have a total security score that is on average at least one-half to one letter grade higher.<\/p>\n\n\n\n<p>\u201cThe protection of domains remains the missing front line of defense against cyber attacks including phishing,\u201d says D\u2019Angelo, and advanced domain protection is something that CGRs simply do not offer.<\/p>\n\n\n\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) reports that most cyber attacks, including ransomware and business email compromise (BEC), start with phishing. By way of response, organizations are implementing more sophisticated threat monitoring, detection, and mitigation solutions, but these solutions are somewhat reactive. Proactive solutions like domain security measures are not routinely implemented by companies, leading to crippling vulnerabilities for the largest corporate brands in the world.<\/p>\n\n\n\n<p>CSC\u2019s recent <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report\/\">Domain Security Report<\/a> shows that Forbes Global 2000 companies invite substantial risks due to the following gaps in their phishing prevention strategies:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p>Only 19% use domain registry locks, which enable end-to-end domain name transaction security to avoid unauthorized domain name system (DNS) modifications or domain hijacking<\/p><\/li>\n\n\n\n<li><p>A mere 5% deploy domain name system security extensions (DNSSEC), which authenticate communications between DNS servers, defending organizations from DNS cache poisoning<\/p><\/li>\n\n\n\n<li><p>Just 5% of companies take advantage of certificate authority authorization (CAA) records, which allow security teams to designate a specific certificate authority to be the sole issuer of certificates for their organization\u2019s domains<\/p><\/li>\n\n\n\n<li><p>Only one-half use domain-based message authentication, reporting, and conformance (DMARC) records, which protect an email domain from spoofing and phishing<\/p><\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.securityinfowatch.com\/cybersecurity\/article\/21250614\/the-realities-of-domain-security\">Read Vincent\u2019s full article<\/a> for recommendations on how to best deal with these issues.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but unfortunately, adoption is lower than one might think. The root of this issue, says D\u2019Angelo, is because 57% of Forbes Global 2000 companies use consumer-grade registrars (CGRs) instead of enterprise-class registrars (ECRs). ECRs emphasize [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":10451,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548],"tags":[],"class_list":["post-10709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Realities of Domain Security | CSC<\/title>\n<meta name=\"description\" content=\"In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Realities of Domain Security | CSC\" \/>\n<meta property=\"og:description\" content=\"In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-10T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T16:08:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CSC Digital Brand Services\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CSC Digital Brand Services\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/\"},\"author\":{\"name\":\"CSC Digital Brand Services\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\"},\"headline\":\"The Realities of Domain Security\",\"datePublished\":\"2022-01-10T14:00:00+00:00\",\"dateModified\":\"2026-01-15T16:08:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/\"},\"wordCount\":355,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"articleSection\":[\"Domain Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/\",\"name\":\"The Realities of Domain Security | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"datePublished\":\"2022-01-10T14:00:00+00:00\",\"dateModified\":\"2026-01-15T16:08:04+00:00\",\"description\":\"In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/the-realities-of-domain-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Realities of Domain Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\",\"name\":\"CSC Digital Brand Services\",\"sameAs\":[\"https:\\\/\\\/cscdigitalbrand.services\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Realities of Domain Security | CSC","description":"In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/","og_locale":"en_US","og_type":"article","og_title":"The Realities of Domain Security | CSC","og_description":"In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but","og_url":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2022-01-10T14:00:00+00:00","article_modified_time":"2026-01-15T16:08:04+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","type":"image\/jpeg"}],"author":"CSC Digital Brand Services","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"CSC Digital Brand Services","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/"},"author":{"name":"CSC Digital Brand Services","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868"},"headline":"The Realities of Domain Security","datePublished":"2022-01-10T14:00:00+00:00","dateModified":"2026-01-15T16:08:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/"},"wordCount":355,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","articleSection":["Domain Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/","url":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/","name":"The Realities of Domain Security | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","datePublished":"2022-01-10T14:00:00+00:00","dateModified":"2026-01-15T16:08:04+00:00","description":"In a recent article for SecurityInfoWatch.com, CSC\u2019s Vincent D\u2019Angelo discussed how domain security is being adopted by the world\u2019s biggest brands\u2014but","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/the-realities-of-domain-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Realities of Domain Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868","name":"CSC Digital Brand Services","sameAs":["https:\/\/cscdigitalbrand.services\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=10709"}],"version-history":[{"count":7,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10709\/revisions"}],"predecessor-version":[{"id":14791,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10709\/revisions\/14791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10451"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=10709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=10709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=10709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}