{"id":12242,"date":"2023-02-09T07:00:00","date_gmt":"2023-02-09T12:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=12242"},"modified":"2026-01-15T05:30:27","modified_gmt":"2026-01-15T10:30:27","slug":"brand-impersonation-online-is-a-multidimensional-cybersecurity-threat","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/","title":{"rendered":"Brand Impersonation Online is a Multidimensional Cybersecurity Threat"},"content":{"rendered":"\n<p>Brand impersonation happens much more often than people realize. In CSC\u2019s latest <a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">Domain Security Report<\/a>, we found that 75% of domains for the Global 2000 that contained more than six characters from the brand names were not actually owned by the brands themselves. The intent of these fake domain registrations is to leverage the trust placed on the targeted brands to launch phishing attacks, other forms of digital brand abuse, or IP infringement that leads to revenue loss, traffic diversion, and a diminished brand reputation. There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.<\/p>\n\n\n\n<p>Below, we include common homoglyphs, as they are one of the most egregious attack methods used by threat actors today:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/DomainSpoofinng.PNG\" alt=\"\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Whose job is it to fix?<\/strong><\/h2>\n\n\n\n<p>Last week, Ericka Chickowski published two articles in <em>Dark Reading<\/em> on brand impersonation. The first\u2014\u201c<a href=\"https:\/\/www.darkreading.com\/cyber-risk\/why-cisos-should-care-about-brand-impersonation-scam-sites\" target=\"_blank\" rel=\"noreferrer noopener\">Why CISOs Should Care About Brand Impersonation Scam Sites<\/a>\u201d\u2014talked about the problem and how companies \u201cdon&#8217;t know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers\u2019 trust, money, and personally identifiable information.\u201d Brand impersonation and lookalike domains can certainly be a legal issue in terms of trademarks, and a marketing issue in terms of consumer trust. But it\u2019s also an issue for chief information security officers (CISOs) and cybersecurity incident response teams. As CSC\u2019s Digital Brand Services chief technology officer (CTO), Ihab Shraim, points out in Chickowski\u2019s first article, incident response teams don\u2019t have the specific data feeds needed to manage the problem. CSC encourages its clients to have a digital brand governance cross-functional team to manage concerns about securing the brand within all digital assets.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Challenges for the cybersecurity incident response teams<\/strong><\/h2>\n\n\n\n<p>Incident response teams receive log data from firewalls, network devices, operating systems, endpoints, and applications within their enterprise, residing in data centers or cloud infrastructures. The data is aggregated in a security information event management (SIEM) or security orchestration, automation, and response (SOAR) platform for SOC personnel to process and analyze critical alerts as fast as possible. According to Shraim:<\/p>\n\n\n<p style=\"padding-left: 40px\">\u201cThe main challenge experienced with SOC personnel is alert fatigue due to the sheer volume of alerts, duplication, and unfiltered events. Moreover, the external attack surface for brand impersonation, such as phishing and domain hijacking attacks, are entirely built and launched by bad actors on the internet. Therefore, the SOC security teams don\u2019t have such data feeds, nor are they trained to mitigate such threat vectors by taking down malicious websites or speaking with a registrar to delete a domain name.\u201d<\/p>\n\n\n<p>The external attack surface for brand impersonation is the entirety of the internet, and security teams need a multidimensional view of various threat vectors outside their firewall targeting specific domains. Additionally, anyone can register an available domain name at any time, at a low cost, making these threats a constant challenge.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How can companies protect themselves?<\/strong><\/h2>\n\n\n\n<p>With corporations owning multiple brands, and hundreds or even thousands of domains within their portfolios, it\u2019s crucial to have a proactive, rapid detection and deactivation solution to manage the threat of domains imitating brands. The second article published in <em>Dark Reading<\/em> last week\u2014\u201c<a href=\"https:\/\/www.darkreading.com\/cyber-risk\/what-cisos-can-do-about-brand-impersonation-scam-sites\" target=\"_blank\" rel=\"noreferrer noopener\">What CISOs Can Do About Brand Impersonation Scam Sites<\/a>\u201d\u2014provides a holistic view of how companies should approach this problem. According to Shraim:<\/p>\n\n\n<p style=\"padding-left: 40px\">\u201cOrganizations should not only be watching and monitoring the domains they own, but also their domain ecosystem. This means understanding the types of domains being registered around them, because domains are a multidimensional cyber threat. Companies need to devise policies and procedures to monitor and mitigate threats associated with all their domains as an integral part of their security posture.\u201d<\/p>\n\n\n<p>Companies need to use solutions that leverage domain name monitoring and detection via automated machine learning to accurately identify all newly registered, re-registered, and dropped domain names, and mitigate cyber threats. Moreover, the technology should be capable of identifying active threat vectors such as phishing and malware cyberattacks launched against their brands across all key digital channels\u2014because domains are a multidimensional cyber threat.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CSC has a solution: our 3D Domain Security and Enforcement service<\/strong><\/h2>\n\n\n\n<p>CSC\u2019s 3D Domain Security and Enforcement solution provides a multidimensional view of various threat vectors outside the firewall targeting specific domains. As the world\u2019s largest corporate domain name registrar, we\u2019re able to not only protect and manage core and tactical domain names, but also develop an ongoing and proactive dynamic brand monitoring program for threats outside the domain portfolio. CSC\u2019s unique holistic approach enables companies to protect all online digital assets.<\/p>\n\n\n\n<p>To learn more, visit <a href=\"https:\/\/www.cscdbs.com\/en\/solutions\/brand-monitoring\/\" target=\"_blank\" rel=\"noreferrer noopener\">3D Domain Security and Enforcement<\/a> at cscdbs.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.<\/p>\n","protected":false},"author":17,"featured_media":10472,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,547],"tags":[],"class_list":["post-12242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-brands","category-domain-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Brand Impersonation Online is a Multidimensional Cybersecurity Threat | CSC<\/title>\n<meta name=\"description\" content=\"There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brand Impersonation Online is a Multidimensional Cybersecurity Threat | CSC\" \/>\n<meta property=\"og:description\" content=\"There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-09T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T10:30:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"Brand Impersonation Online is a Multidimensional Cybersecurity Threat\",\"datePublished\":\"2023-02-09T12:00:00+00:00\",\"dateModified\":\"2026-01-15T10:30:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/\"},\"wordCount\":783,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"articleSection\":[\"Brand Protection\",\"Domain Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/\",\"name\":\"Brand Impersonation Online is a Multidimensional Cybersecurity Threat | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"datePublished\":\"2023-02-09T12:00:00+00:00\",\"dateModified\":\"2026-01-15T10:30:27+00:00\",\"description\":\"There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55051.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brand Impersonation Online is a Multidimensional Cybersecurity Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Brand Impersonation Online is a Multidimensional Cybersecurity Threat | CSC","description":"There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/","og_locale":"en_US","og_type":"article","og_title":"Brand Impersonation Online is a Multidimensional Cybersecurity Threat | CSC","og_description":"There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.","og_url":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2023-02-09T12:00:00+00:00","article_modified_time":"2026-01-15T10:30:27+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"Brand Impersonation Online is a Multidimensional Cybersecurity Threat","datePublished":"2023-02-09T12:00:00+00:00","dateModified":"2026-01-15T10:30:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/"},"wordCount":783,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","articleSection":["Brand Protection","Domain Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/","url":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/","name":"Brand Impersonation Online is a Multidimensional Cybersecurity Threat | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","datePublished":"2023-02-09T12:00:00+00:00","dateModified":"2026-01-15T10:30:27+00:00","description":"There are endless domain spoofing tactics and permutations that can be used by phishers and malicious third parties.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55051.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/brand-impersonation-online-is-a-multidimensional-cybersecurity-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Brand Impersonation Online is a Multidimensional Cybersecurity Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=12242"}],"version-history":[{"count":7,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12242\/revisions"}],"predecessor-version":[{"id":14703,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12242\/revisions\/14703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10472"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=12242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=12242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=12242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}