{"id":15640,"date":"2026-05-12T08:00:00","date_gmt":"2026-05-12T12:00:00","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=15640"},"modified":"2026-05-11T15:37:29","modified_gmt":"2026-05-11T19:37:29","slug":"from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/","title":{"rendered":"From Uptime to Trust: The Domain Security Strategy Behind Business Continuity"},"content":{"rendered":"\n<p><em>Domains and the domain name system (DNS) sit at the perimeter of a company\u2019s external attack surface. CSC\u2019s Domain Security Report 2026 shows how Global 2000 companies and top unicorns adopt key domain security measures, where risk concentrates, and why DNS security belongs in business continuity planning.<\/em><\/p>\n\n\n\n<p>Picture this: A bank that doesn\u2019t use registry lock with its domain registrar gets completely hijacked with all its domains and DNS compromised, including its internal email and File Transfer Protocol (FTP) servers. The attackers redirect traffic from the bank\u2019s official website to malicious lookalike sites, securing them with free SSL certificates to look more real with the HTTPS padlock on the address bar.<\/p>\n\n\n\n<p>This leads to a long list of compounding consequences. For the next few hours, customers attempting to access their accounts online not only have their login credentials harvested on the fraudulent site, but also malware installed on their personal computers. Internally, email communications grind to a halt as email servers tied to the affected domain stop working. The bank can\u2019t inform customers or contact their domain and DNS provider as a result.<\/p>\n\n\n\n<p>This isn\u2019t a fictional scenario. It\u2019s based on <a href=\"https:\/\/www.wired.com\/2017\/04\/hackers-hijacked-banks-entire-online-operation\/\">a real incident<\/a> that occurred at a major bank with hundreds of branches in Brazil. Plus, similar incidents have occurred around the world\u2014at many different companies and across many different industries. And they continue to happen regularly\u2014even today.<br \/><br \/>These increasing common incidents underscore the importance of incorporating domain security into business continuity planning. Domains act as the backbone of digital interactions. And breaches in this space have far-reaching consequences that ripple across operations, customer trust, and financial outcomes.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Domains and DNS as business-critical infrastructure<\/strong><\/h2>\n\n\n\n<p>It might not have been the case two decades ago in the early days of e-commerce, but global businesses now rely on the internet for far more than hosting a public website. Email, authentication, voice over IP (VoIP), client and partner portals, supplier applications, and even parts of the supply chain depend on domains and DNS. The internet is no longer just&nbsp; a \u201cmarketing channel.\u201d Instead, it\u2019s now part of operational infrastructure.<\/p>\n\n\n\n<p>Many companies focus on securing their firewalls but neglect domain security and allow attackers to infiltrate systems, just like the bank, through their domains and DNS. CSC\u2019s<em><a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report-2026\/\">Domain Security Report 2026<\/a><\/em> reveals that even among the most reputable companies, domain security adoption is surprisingly low.<br \/><br \/>More than half of the Forbes Global 2000 companies use retail-grade domain registrars, which often lack advanced security controls. This gap exposes them to significant risks, as attackers can exploit these less secure domains to launch phishing campaigns, distribute malware, or disrupt essential online services.<\/p>\n\n\n\n<p>Risk leaders need to turn their attention to domain names, now crucial elements of an organization\u2019s cybersecurity posture, especially as it becomes essential to business infrastructure, continuity, and the emerging AI stack. In other words, domains, DNS, and SSL certificates &nbsp;act as the connective tissue these systems use to function and communicate securely. Once DNS fails or gets manipulated, the business can experience outage, fraud, impersonation, or loss of trust long before a technical root cause gets briefed to the board.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why domain security belongs in leadership-level risk conversations<\/strong><\/h2>\n\n\n\n<p>There exists a galaxy of domain threats tied to business disruption, including phishing attacks, ransomware attacks, impersonation attacks, business email compromise (BEC) and more. Attackers can exploit different parts of a portfolio, not only primary brand domains.<\/p>\n\n\n\n<p>As cited in CSC\u2019s report, examples include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Compromised or hijacked legitimate domains<\/strong>, where cybercriminals target domains left unsecured<\/li>\n\n\n\n<li><strong>Hijacked subdomains<\/strong>, where attackers exploit forgotten DNS records (dangling DNS) to host malicious content<\/li>\n\n\n\n<li><strong>Dormant domain names<\/strong>, which may look inactive, but attackers can still weaponize<\/li>\n\n\n\n<li><strong>Malicious domain registrations<\/strong>, including spoofing permutations and homoglyphs<\/li>\n\n\n\n<li><strong>Newly lapsed branded domains reregistered by a third party<\/strong>, often after cost-driven lapses<\/li>\n<\/ul>\n\n\n\n<p>For these reasons, DNS and domain security shouldn\u2019t sit only in a technical backlog. As the report points out, they map directly to executive concerns, such as consumer safety, intellectual property, supply chains, revenue, and reputation.<\/p>\n\n\n\n<p>The adoption data also signals a governance gap. Our research found that <strong>67% of all Global 2000 companies implemented less than half of eight key security measures used to<\/strong> determine the strength of a company\u2019s domain security posture<strong>.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report-2026\/\"><strong>To benchmark your organization against the Global 2000 findings, download CSC\u2019s full <em>Domain Security Report 2026<\/em>.<\/strong><\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Domains as critical infrastructure: the need for ongoing oversight<\/strong><\/h2>\n\n\n\n<p>Domain names are core infrastructure assets, integral to both cybersecurity and business continuity.And as continuity risk is an ongoing factor, companies shouldn\u2019t treat it as a one-time project. Businesses must maintain continuous DNS monitoring, regular audits and reviews, and proactive issue detection before it impacts customers.<\/p>\n\n\n\n<p>A governance tradeoff also risks more cost and consolidation pressures. Many companies now turn to a single infrastructure on the cloud for cost savings, scalability, and data accessibility. However, this method lets in potential threats if attackers take parts of the system offline. The only way to truly mitigate DNS risks is therefore implementing a dual infrastructure, or two independent networks, for redundancy.<\/p>\n\n\n\n<p>External monitoring is also key to a robust strategy. Our research found that brands don\u2019t own suspicious or malicious domains containing Global 2000 brand names. Instead, third parties own 88% of homoglyph domains. Moreover, 32% of third-party domains are inactive but contain Mail Exchange (MX) records, meaning they can be used for email activity even without a live website.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How domain security strategy connects to the big picture<\/strong><\/h2>\n\n\n\n<p>CSC\u2019s <em>Domain Security Report 2026<\/em> frames domains and DNS as operational infrastructure that sits directly on the external attack surface. The adoption trends show progress in some controls, like Domain-Based Message Authentication, Reporting, and Conformance (DMARC) growth to 80% in 2025. But they show persistent gaps in others, like Domain Name System Security Extensions (DNSSEC) at 11% and declining DNS redundancy. Risk leaders focused on continuity must begin to treat domain security as a business resilience dependency and govern it accordingly.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/en\/resources\/domain-security-report-2026\/\"><strong>To see the full findings across regions as well as industries and unicorn comparisons, download CSC\u2019s full <em>Domain Security Report 2026<\/em><\/strong>.<\/a><strong><\/strong><\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>This document is provided by CSC for information purposes only and does not constitute an offer, invitation, or inducement to contract. The information herein does not constitute legal, tax, regulatory, accounting, or other professional advice, and therefore one should seek appropriate professional advice before considering a transaction as described in this document. No liability is accepted whatsoever for any direct or consequential loss arising from the use of this document.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how DNS security and domain strategy protect uptime, reduce cyber risk, and support business continuity across your digital infrastructure.<\/p>\n","protected":false},"author":17,"featured_media":10447,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548,7,521,549],"tags":[],"class_list":["post-15640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-security","category-domains","category-send-email","category-top-post"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Uptime to Trust: Domain Security for Business Continuity<\/title>\n<meta name=\"description\" content=\"Learn how DNS security and domain strategy protect uptime, reduce cyber risk, and support business continuity across your digital infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Uptime to Trust: Domain Security for Business Continuity\" \/>\n<meta property=\"og:description\" content=\"Learn how DNS security and domain strategy protect uptime, reduce cyber risk, and support business continuity across your digital infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-12T12:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55027.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"From Uptime to Trust: The Domain Security Strategy Behind Business Continuity\",\"datePublished\":\"2026-05-12T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/\"},\"wordCount\":1094,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55027.jpg\",\"articleSection\":[\"Domain Security\",\"Domains\",\"Send email\",\"Top Post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/\",\"name\":\"From Uptime to Trust: Domain Security for Business Continuity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55027.jpg\",\"datePublished\":\"2026-05-12T12:00:00+00:00\",\"description\":\"Learn how DNS security and domain strategy protect uptime, reduce cyber risk, and support business continuity across your digital infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55027.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55027.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Uptime to Trust: The Domain Security Strategy Behind Business Continuity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Uptime to Trust: Domain Security for Business Continuity","description":"Learn how DNS security and domain strategy protect uptime, reduce cyber risk, and support business continuity across your digital infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/","og_locale":"en_US","og_type":"article","og_title":"From Uptime to Trust: Domain Security for Business Continuity","og_description":"Learn how DNS security and domain strategy protect uptime, reduce cyber risk, and support business continuity across your digital infrastructure.","og_url":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2026-05-12T12:00:00+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55027.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"From Uptime to Trust: The Domain Security Strategy Behind Business Continuity","datePublished":"2026-05-12T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/"},"wordCount":1094,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55027.jpg","articleSection":["Domain Security","Domains","Send email","Top Post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/","url":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/","name":"From Uptime to Trust: Domain Security for Business Continuity","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55027.jpg","datePublished":"2026-05-12T12:00:00+00:00","description":"Learn how DNS security and domain strategy protect uptime, reduce cyber risk, and support business continuity across your digital infrastructure.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55027.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55027.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/from-uptime-to-trust-the-domain-security-strategy-behind-business-continuity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"From Uptime to Trust: The Domain Security Strategy Behind Business Continuity"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/15640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=15640"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/15640\/revisions"}],"predecessor-version":[{"id":15645,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/15640\/revisions\/15645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10447"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=15640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=15640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=15640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}