{"id":10725,"date":"2022-01-13T07:46:24","date_gmt":"2022-01-13T12:46:24","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=10725"},"modified":"2026-01-15T08:11:24","modified_gmt":"2026-01-15T13:11:24","slug":"les-realites-de-la-securite-du-nom-de-domaine","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/","title":{"rendered":"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine"},"content":{"rendered":"\n<p><strong>Par Stephanie Mitchell, Marketing Manager<\/strong><\/p>\n\n\n\n<p>Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions de s\u00e9curisation du nom de domaine sont adopt\u00e9es par les plus grandes marques mondiales, bien que, malheureusement, le taux d\u2019adoption soit plus faible qu\u2019on ne le pense.<\/p>\n\n\n\n<p>Selon Vincent D\u2019Angelo, la source du probl\u00e8me r\u00e9side dans le fait que 57\u00a0% des entreprises du Forbes Global 2000 font appel \u00e0 des registrars grand public (CGR) plut\u00f4t qu\u2019\u00e0 des registrars de niveau professionnel (ECR). Les ECR mettent l\u2019accent sur la s\u00e9curit\u00e9 du nom de domaine en utilisant des services avanc\u00e9s, y compris les quatre services repris ci-dessous, et proposent \u00e9galement la redondance de l\u2019h\u00e9bergement\u00a0DNS afin de fournir un serveur\u00a0DNS de secours sur lequel basculer en cas de panne, pour davantage de r\u00e9silience. Un r\u00e9cent <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/impact-of-enterprise-class-domain-registrar\/\">livre blanc publi\u00e9 par SecurityScorecard<\/a> montre que les entreprises qui ont recours \u00e0 des ECR sont bien plus s\u00e9curis\u00e9es et ont une note globale de s\u00e9curit\u00e9 en moyenne d\u2019une demi-lettre, voire d\u2019une lettre suppl\u00e9mentaire.<\/p>\n\n\n\n<p> \u00ab&nbsp;La protection des noms de domaine reste la grande oubli\u00e9e des lignes de d\u00e9fense contre les cyber-attaques, y compris contre les tentatives de phishing&nbsp;\u00bb, ajoute Vincent D\u2019Angelo, et la protection avanc\u00e9e du nom de domaine est un service que les CGR n\u2019offrent tout simplement pas.<\/p>\n\n\n\n<p>La CISA (Cybersecurity and Infrastructure Security Agency) signale que la plupart des cyber-attaques, y compris les attaques par ran\u00e7ongiciel et les attaques&nbsp;BEC (Business Email Compromise), commencent par du phishing. Pour y r\u00e9pondre, les entreprises mettent en \u0153uvre des solutions de surveillance, de d\u00e9tection et de mitigation des risques plus sophistiqu\u00e9es, qui sont cependant plus r\u00e9actives que proactives. En effet, elles n\u2019utilisent en g\u00e9n\u00e9ral pas de solutions proactives comme les mesures de s\u00e9curit\u00e9 du nom de domaine, ce qui entra\u00eene des vuln\u00e9rabilit\u00e9s chez les plus grandes entreprises du monde entier.<\/p>\n\n\n\n<p>Le r\u00e9cent <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report\/\">Rapport CSC sur la s\u00e9curit\u00e9 des noms de domaine<\/a> montre que les entreprises du Forbes Global\u00a02000 s\u2019exposent \u00e0 des risques substantiels en raison des failles suivantes dans leurs strat\u00e9gies de pr\u00e9vention du phishing\u00a0:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><p>Seules 19\u00a0% d\u2019entre elles activent le verrouillage du registre de noms de domaine, ce qui permet de s\u00e9curiser les transactions de nom de domaine de bout en bout et d\u2019\u00e9viter les modifications non autoris\u00e9es du syst\u00e8me\u00a0DNS ou le piratage du nom de domaine<\/p><\/li>\n\n\n\n<li><p>Seules 5\u00a0% d\u2019entre elles d\u00e9ploient des extensions de s\u00e9curit\u00e9 du syst\u00e8me de nom de domaine (DNSSEC), qui authentifient les communications entre les serveurs\u00a0DNS et prot\u00e8gent ainsi les organisations contre l\u2019empoisonnement du cache\u00a0DNS<\/p><\/li>\n\n\n\n<li><p>Seules 5\u00a0% des entreprises tirent parti des enregistrements\u00a0CAA (Certificate Authority Authorization), qui permettent aux \u00e9quipes de s\u00e9curit\u00e9 de d\u00e9signer une autorit\u00e9 de certification sp\u00e9cifique comme seule \u00e9mettrice de certificats pour l\u2019ensemble des noms de domaine de l\u2019organisation<\/p><\/li>\n\n\n\n<li><p>Enfin, la moiti\u00e9 seulement des entreprises a recours aux enregistrements\u00a0DMARC (Domain-based message authentication, reporting, and conformance), qui prot\u00e8gent un nom de domaine de messagerie contre le spoofing (usurpation d\u2019identit\u00e9) et le phishing<\/p><\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.securityinfowatch.com\/cybersecurity\/article\/21250614\/the-realities-of-domain-security\">Lire l\u2019article de Vincent D&#8217;Angelo dans son int\u00e9gralit\u00e9<\/a> pour obtenir des recommandations sur le sujet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Par Stephanie Mitchell, Marketing Manager Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions de s\u00e9curisation du nom de domaine sont adopt\u00e9es par les plus grandes marques mondiales, bien que, malheureusement, le taux d\u2019adoption soit plus faible qu\u2019on ne le pense. Selon Vincent D\u2019Angelo, la source du probl\u00e8me r\u00e9side dans [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":10451,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[545],"tags":[],"class_list":["post-10725","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine | CSC<\/title>\n<meta name=\"description\" content=\"Par Stephanie Mitchell, Marketing Manager Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine | CSC\" \/>\n<meta property=\"og:description\" content=\"Par Stephanie Mitchell, Marketing Manager Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T12:46:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T13:11:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CSC Digital Brand Services\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CSC Digital Brand Services\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/\"},\"author\":{\"name\":\"CSC Digital Brand Services\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\"},\"headline\":\"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine\",\"datePublished\":\"2022-01-13T12:46:24+00:00\",\"dateModified\":\"2026-01-15T13:11:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/\"},\"wordCount\":575,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"articleSection\":[\"Fran\u00e7ais\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/\",\"name\":\"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"datePublished\":\"2022-01-13T12:46:24+00:00\",\"dateModified\":\"2026-01-15T13:11:24+00:00\",\"description\":\"Par Stephanie Mitchell, Marketing Manager Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55031.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/les-realites-de-la-securite-du-nom-de-domaine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\",\"name\":\"CSC Digital Brand Services\",\"sameAs\":[\"https:\\\/\\\/cscdigitalbrand.services\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine | CSC","description":"Par Stephanie Mitchell, Marketing Manager Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/","og_locale":"en_US","og_type":"article","og_title":"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine | CSC","og_description":"Par Stephanie Mitchell, Marketing Manager Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions","og_url":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2022-01-13T12:46:24+00:00","article_modified_time":"2026-01-15T13:11:24+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","type":"image\/jpeg"}],"author":"CSC Digital Brand Services","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"CSC Digital Brand Services","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/"},"author":{"name":"CSC Digital Brand Services","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868"},"headline":"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine","datePublished":"2022-01-13T12:46:24+00:00","dateModified":"2026-01-15T13:11:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/"},"wordCount":575,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","articleSection":["Fran\u00e7ais"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/","url":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/","name":"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","datePublished":"2022-01-13T12:46:24+00:00","dateModified":"2026-01-15T13:11:24+00:00","description":"Par Stephanie Mitchell, Marketing Manager Dans un article r\u00e9cent publi\u00e9 sur SecurityInfoWatch.com, Vincent D\u2019Angelo (CSC) explique comment des solutions","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55031.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/les-realites-de-la-securite-du-nom-de-domaine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Les r\u00e9alit\u00e9s de la s\u00e9curit\u00e9 du nom de domaine"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868","name":"CSC Digital Brand Services","sameAs":["https:\/\/cscdigitalbrand.services\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=10725"}],"version-history":[{"count":6,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10725\/revisions"}],"predecessor-version":[{"id":14758,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/10725\/revisions\/14758"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10451"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=10725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=10725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=10725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}