{"id":12434,"date":"2023-04-18T07:00:00","date_gmt":"2023-04-18T11:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=12434"},"modified":"2023-10-16T09:48:12","modified_gmt":"2023-10-16T13:48:12","slug":"how-you-can-be-hijacked-without-actually-being-hacked","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/","title":{"rendered":"How You Can Be Hijacked Without Actually Being Hacked"},"content":{"rendered":"\n<p>Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as <a><strong><u>subdomain hijacking<\/u><\/strong><\/a>, or subdomain takeover. A web user\u2019s private information is then traded on the dark web and cybercriminals profit, further fueling the expansion of identity theft in the online world.<\/p>\n\n\n\n<p>In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft. In the past, this has been known as a lame delegation or dangling DNS.&nbsp; Cybercriminals monitor the internet for publicly available information, including DNS zone records, that point to destinations no longer used by a brand. By hosting content on cloud providers who don\u2019t run verification checks, criminals can request a previously used zone destination and start to again receive web users landing on these subdomains loaded with their own illegitimate content, all without infiltrating an organization\u2019s infrastructure or third-party service account. Aside from reputation damage and loss in consumer confidence, the fraudulent web pages and associated emails could be used in phishing campaigns and malware distribution, leading to more damaging data and security breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is a subdomain hijack?<\/strong><\/h3>\n\n\n\n<p>A subdomain hijack is a cyber threat where an attacker gains control of a legitimate subdomain that\u2019s no longer in use to host their own fraudulent or malicious content. They can do this by cleverly exploiting forgotten DNS records to point to their own content.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"video\">Video<\/h3>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What is Subdomain Hijacking\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/87OplZ5QV40?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>A result of poor housekeeping<\/strong><\/h3>\n\n\n\n<p>Subdomain hijacking is a result of poor housekeeping or life cycle management of DNS records. DNS records housekeeping is one of the worst managed tasks in business due to 20 plus years of history with different owners, policies, and vendors.<\/p>\n\n\n\n<p>Companies promptly take down websites with a paid hosting provider when a brand is retired or a campaign is no longer running, but sometimes leave the associated DNS records intact. Over time, there\u2019s an accumulation of DNS records that become unaccounted for. Administrators, unaware of its history, hesitate to delete these legacy records fearing they may be tied to critical infrastructure that will inadvertently bring down operations.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>One in five DNS records point to content that does not resolve<\/strong><\/h3>\n\n\n\n<p>In our latest report, we analyzed over six million DNS records from our database and further filtered the set to just over 440,000 DNS records by looking at A records and CNAMEs pointing to cloud infrastructure where there is potential for compromise by subdomain hijacking. We found that many companies are susceptible to subdomain hijacking.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/images\/subdomain%20example.png\" alt=\"\" \/><\/figure>\n<\/div>\n\n\n<p>We further observed a trend where companies with large portfolios may not have centralized management of their cloud providers, making it a challenge for them to have good oversight into all their DNS records.<\/p>\n\n\n\n<p><strong>Read more: <u><a href=\"https:\/\/www.cscdbs.com\/en\/resources-news\/subdomain-hijacking-vulnerabilities-report\" target=\"_blank\" rel=\"noreferrer noopener\">Subdomain Hijacking Vulnerabilities Report<\/a><\/u><\/strong><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Adhering to cyber hygiene<\/strong><\/h3>\n\n\n\n<p>Organizations could have decentralized management, staff turnover, and extensive web properties. Without proper oversight of digital records and administration, organizations accumulate \u201cnoise\u201d that makes it difficult for them to maintain good cyber hygiene, resulting in easy exploits for cybercriminals.<\/p>\n\n\n\n<p>At CSC, we recognize these challenges, and the threat a subdomain hijack could pose for companies. Additionally, subdomain hijacking is one of many domain security threats that exists today, including domain and DNS hijacking, domain shadowing, and cache poisoning. These threats often serve as enabling attacks to launch more egregious phishing and ransomware attacks, along with business email compromise (BEC), email spoofing, or even data breaches.<\/p>\n\n\n\n<p>We recommend all companies adopt a subdomain monitoring solution that not only alerts you when changes to your DNS records are detected, but also provides you context so you can make informed decisions and take appropriate action to prevent a subdomain hijack.<\/p>\n\n\n\n<p><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.cscdbs.com\/en\/domain-security\/subdomain-monitoring\/#inlineLeadCollector\" target=\"_blank\">Contact us to learn more about our Subdomain Monitoring solution. &gt;&gt;<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft.<\/p>\n","protected":false},"author":13,"featured_media":10816,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[547,548,521],"tags":[],"class_list":["post-12434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-management","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How You Can Be Hijacked Without Actually Being Hacked | CSC<\/title>\n<meta name=\"description\" content=\"In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How You Can Be Hijacked Without Actually Being Hacked | CSC\" \/>\n<meta property=\"og:description\" content=\"In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-18T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-16T13:48:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/01\/domainsec_blog_1000x550.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"How You Can Be Hijacked Without Actually Being Hacked\",\"datePublished\":\"2023-04-18T11:00:00+00:00\",\"dateModified\":\"2023-10-16T13:48:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/\"},\"wordCount\":674,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2022\\\/01\\\/domainsec_blog_1000x550.jpg\",\"articleSection\":[\"Domain Management\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/\",\"name\":\"How You Can Be Hijacked Without Actually Being Hacked | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2022\\\/01\\\/domainsec_blog_1000x550.jpg\",\"datePublished\":\"2023-04-18T11:00:00+00:00\",\"dateModified\":\"2023-10-16T13:48:12+00:00\",\"description\":\"In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2022\\\/01\\\/domainsec_blog_1000x550.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2022\\\/01\\\/domainsec_blog_1000x550.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-you-can-be-hijacked-without-actually-being-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How You Can Be Hijacked Without Actually Being Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How You Can Be Hijacked Without Actually Being Hacked | CSC","description":"In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/","og_locale":"en_US","og_type":"article","og_title":"How You Can Be Hijacked Without Actually Being Hacked | CSC","og_description":"In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft.","og_url":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2023-04-18T11:00:00+00:00","article_modified_time":"2023-10-16T13:48:12+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/01\/domainsec_blog_1000x550.jpg","type":"image\/jpeg"}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"How You Can Be Hijacked Without Actually Being Hacked","datePublished":"2023-04-18T11:00:00+00:00","dateModified":"2023-10-16T13:48:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/"},"wordCount":674,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/01\/domainsec_blog_1000x550.jpg","articleSection":["Domain Management","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/","url":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/","name":"How You Can Be Hijacked Without Actually Being Hacked | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/01\/domainsec_blog_1000x550.jpg","datePublished":"2023-04-18T11:00:00+00:00","dateModified":"2023-10-16T13:48:12+00:00","description":"In a space shrouded by anonymity by design, the brands and organizations targeted may not be directly compromised, however, they likely forgot about domain name system (DNS) records that were left behind or misconfigured, leaving their customers open to theft.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/01\/domainsec_blog_1000x550.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/01\/domainsec_blog_1000x550.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/how-you-can-be-hijacked-without-actually-being-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How You Can Be Hijacked Without Actually Being Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=12434"}],"version-history":[{"count":17,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12434\/revisions"}],"predecessor-version":[{"id":12536,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/12434\/revisions\/12536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10816"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=12434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=12434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=12434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}