{"id":5227,"date":"2016-03-10T10:32:59","date_gmt":"2016-03-10T15:32:59","guid":{"rendered":"http:\/\/www.digitalbrandinsider.com\/?p=5227"},"modified":"2016-06-20T03:36:01","modified_gmt":"2016-06-20T07:36:01","slug":"no-access-allowed","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/","title":{"rendered":"1, 2, 3 Factor Authentication &#8211; Are Your Domains Secure?"},"content":{"rendered":"<p>Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network, entering your username, password, and a changing code to gain access.<\/p>\n<p>The same thing might happen when you access your bank account online\u2014with your bank asking you for an account username and unique password. Many banks are already using smart card authentication, which provides stronger security than just a password. Smart card authentication ensures that a user is in physical possession of the card and must know the personal identification number. This proves it\u2019s really you accessing your bank account.<\/p>\n<p><strong>Domain Authentication and authorization work together<\/strong><br \/>\nBut are your most business-critical domain names also as secure?<\/p>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-5230 size-full\" style=\"margin-left: 15px;\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/03\/NoEntrySign_200w.jpg\" alt=\"NoEntrySign_200w\" width=\"200\" height=\"142\" \/><\/a>Two-factor authentication is a security product designed to help protect your business-critical digital assets. It requires a special key that is used in conjunction with your username and password to access sensitive systems. With the choice of a soft (smart phone app) or hard (physical) token, you enter the changing key code when logging in, along with your username and password. If the keys match, the system knows it\u2019s you, and you are granted access.<\/p>\n<p>Corporation Service Company<sup>\u00ae<\/sup> (CSC<sup>\u00ae<\/sup>) offers <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/multilock-two-factor-authentication-solutions?utm_campaign=DigitalBrandInsider&amp;utm_source=blog%2Bpost&amp;utm_medium=blog&amp;utm_content=EN\" target=\"_blank\">two-factor authentication<\/a> to protect your brand. It prevents your business-critical domains names from unauthorized changes.<\/p>\n<p>In addition to the authentication process, CSC also offers <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/multilock-two-factor-authentication-solutions?utm_campaign=DigitalBrandInsider&amp;utm_source=blog%2Bpost&amp;utm_medium=blog&amp;utm_content=EN\" target=\"_blank\">multi-layer authorization<\/a>. MultiLock combines registry and registrar-level locks with three-party manual authorization and a WHOIS lock to provide the highest level of security for high-value domains. An important and valuable aspect of CSC MultiLock is that in order to make any changes, three independent parties must provide authorization. This manual 3 factor authentication between the domain owner, CSC, and the applicable registries significantly reduces the likelihood of a domain name being hijacked or pointed to third-party content by a hacker or unauthorized user.<\/p>\n<p>Cybercrime is on the rise\u2014prevent it from happening to you. \u00a0To learn more about Domain Security and Registrar Lock Services, <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/multilock-two-factor-authentication-solutions\">please visit our website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network, entering your username, password, and a changing code to gain access. The same thing might happen when you access your bank account online\u2014with your bank asking you for an account username and [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,7,525,167],"tags":[529,506,23,515],"class_list":["post-5227","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-domains","category-domains-new-gtlds","category-internet","tag-brands","tag-cyber-security","tag-domain-names","tag-two-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>1, 2, 3 Factor Authentication - Are Your Domains Secure? | CSC<\/title>\n<meta name=\"description\" content=\"Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1, 2, 3 Factor Authentication - Are Your Domains Secure? | CSC\" \/>\n<meta property=\"og:description\" content=\"Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-10T15:32:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-20T07:36:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/03\/NoEntrySign_200w.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"1, 2, 3 Factor Authentication &#8211; Are Your Domains Secure?\",\"datePublished\":\"2016-03-10T15:32:59+00:00\",\"dateModified\":\"2016-06-20T07:36:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/\"},\"wordCount\":341,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/NoEntrySign_200w.jpg\",\"keywords\":[\"Brand Protection\",\"cyber security\",\"domain names\",\"two-factor authentication\"],\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Domains\",\"Domains &amp; New gTLDs\",\"Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/\",\"name\":\"1, 2, 3 Factor Authentication - Are Your Domains Secure? | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/NoEntrySign_200w.jpg\",\"datePublished\":\"2016-03-10T15:32:59+00:00\",\"dateModified\":\"2016-06-20T07:36:01+00:00\",\"description\":\"Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/NoEntrySign_200w.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/NoEntrySign_200w.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/no-access-allowed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"1, 2, 3 Factor Authentication &#8211; Are Your Domains Secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"1, 2, 3 Factor Authentication - Are Your Domains Secure? | CSC","description":"Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/","og_locale":"en_US","og_type":"article","og_title":"1, 2, 3 Factor Authentication - Are Your Domains Secure? | CSC","og_description":"Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network,","og_url":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2016-03-10T15:32:59+00:00","article_modified_time":"2016-06-20T07:36:01+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/03\/NoEntrySign_200w.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"1, 2, 3 Factor Authentication &#8211; Are Your Domains Secure?","datePublished":"2016-03-10T15:32:59+00:00","dateModified":"2016-06-20T07:36:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/"},"wordCount":341,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/03\/NoEntrySign_200w.jpg","keywords":["Brand Protection","cyber security","domain names","two-factor authentication"],"articleSection":["Brand Protection","Cyber security","Domains","Domains &amp; New gTLDs","Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/","url":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/","name":"1, 2, 3 Factor Authentication - Are Your Domains Secure? | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/03\/NoEntrySign_200w.jpg","datePublished":"2016-03-10T15:32:59+00:00","dateModified":"2016-06-20T07:36:01+00:00","description":"Working remotely, you most likely go through an authentication process to connect to your company\u2019s network using a dial-up or virtual private network,","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/03\/NoEntrySign_200w.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/03\/NoEntrySign_200w.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/no-access-allowed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"1, 2, 3 Factor Authentication &#8211; Are Your Domains Secure?"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=5227"}],"version-history":[{"count":6,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5227\/revisions"}],"predecessor-version":[{"id":5442,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5227\/revisions\/5442"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=5227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=5227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=5227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}