{"id":6128,"date":"2017-07-05T01:00:59","date_gmt":"2017-07-05T05:00:59","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=6128"},"modified":"2018-02-26T13:46:31","modified_gmt":"2018-02-26T18:46:31","slug":"domain-security-part-2-youre-only-as-secure-as-your-provider","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/","title":{"rendered":"Domain Security, Part 2: You\u2019re Only as Secure as Your Provider"},"content":{"rendered":"<p><em><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2.jpg\"><img decoding=\"async\" class=\"alignright size-medium wp-image-6191\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2-300x200.jpg\" alt=\"Partner an enterprise-level provider\" width=\"250\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-2-300x200.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-2.jpg 320w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>This is the second installment of a three-part blog series where CSC<sup>\u00ae<\/sup> explores how the WHOIS database has become a window into the security set up of an organization due to the ever-increasing threats of cyber crime. Click here to find out the <a href=\"\/blog\/domain-security-part-1-do-you-know-whos-in-your-whois\">#1 threat<\/a> to domain security in last week\u2019s post.<\/em><\/p>\n<h2>#2 threat: provider quality<\/h2>\n<p>The WHOIS, in many cases, will list the domain name registrar and the domain name system (DNS) servers. Not all registrars and DNS providers are equally secure with the infrastructure and processes in place to withstand attacks, which leaves WHOIS information available for bad actors to target brands with a weak setup. Comparison shopping is key to ascertaining the kind of security each registrar offers versus what your brand needs.<\/p>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-registrar2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6174 alignright\" style=\"box-shadow: 4px 4px 10px #cccccc;\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-registrar2-300x152.png\" alt=\"Registrar\" width=\"300\" height=\"152\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-registrar2-300x152.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-registrar2.png 357w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><b>Registrar<\/b><br \/>\nIt\u2019s well documented<sup>1<\/sup> that retail registrars are seemingly less secure, and therefore are targeted and compromised more frequently than corporate registrars. Companies should partner with a registrar that has invested heavily in security at the technology level, within the training of staff, and within the values of the company. Ask these questions of a potential registrar. Doing the research in advance of signing with a provider helps a brand avoid issues down the line.<\/p>\n<p><b>DNS provider<\/b><br \/>\n<a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-dns2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6179 size-medium alignright\" style=\"box-shadow: 4px 4px 10px #cccccc;\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-dns2-1-300x170.png\" alt=\"DNS provider\" width=\"300\" height=\"170\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-dns2-1-300x170.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-dns2-1.png 309w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>The investment required to build a robust, in-house, enterprise-level DNS infrastructure capable of enduring today&#8217;s cyber attacks means most companies should choose to outsource to a specialist provider.<\/p>\n<p>To run your own DNS, our estimates show that it\u2019s going to be a costly option:<\/p>\n<ul>\n<li>Staff x 2 for holiday and sick days = $150K\/year<\/li>\n<li>Hardware and bandwidth from ISP = $40K\/year<\/li>\n<li>Open source DNS software such as BIND = known security risks. And the most recent zero day vulnerability<sup>2<\/sup> was only last year. This had a massive impact on many DNS providers and companies.<\/li>\n<\/ul>\n<p>Not only is it expensive for a company to run its own DNS, but the estimated average annual cost to businesses from distributed denial of services attacks is <strong>$3.5 million<\/strong><sup>3<\/sup>. Given that the average cost to outsource DNS is a fraction in comparison should be a compelling reason to find a secure enterprise-level DNS provider.<\/p>\n<p>CSC\u2019s research suggest that 22% of organizations still operate their own DNS, and experience tells us many simply do not believe that they will be a target. This is misguided given that we have seen a vast range of companies and services in many different industries succumb to DDoS attacks.<\/p>\n<p>In the news:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.bbc.co.uk\/news\/uk-wales-south-east-wales-38053494\">Small businesses attacking competitors<\/a><\/li>\n<li><a href=\"http:\/\/www.dailydot.com\/layer8\/trump-hotel-ddos-attack\/\">Hotels held to ransom<\/a><\/li>\n<li><a href=\"http:\/\/www.ibtimes.co.uk\/opicarus-ny-stock-exchange-us-federal-reserve-many-financial-institutions-attacked-by-anonymous-1560836\">Global banks being targeted by hacktivists<\/a><\/li>\n<li><a href=\"http:\/\/www.computerworld.com\/article\/3186175\/security\/new-mirai-iot-variant-launched-54-hour-ddos-attack-against-a-us-college.html\">Universities DDoSed by the Internet of Things<\/a><\/li>\n<li><a href=\"https:\/\/www.scmagazineuk.com\/luxembourg-government-servers-forced-offline-by-ddos-attack\/article\/641003\/\">Governments forced offline<\/a><\/li>\n<\/ul>\n<p>Finally, what is clear from recent events<sup>4<\/sup> is that not all enterprise-level DNS providers are born equal, and therefore, although you might be offered 100% uptime, you should carefully check the track record of any provider before signing on.<\/p>\n<p>Brand owners should ensure that security considerations are top of their list when reviewing and choosing suppliers or considering managing a service in-house.<\/p>\n<p>Considerations should include:<\/p>\n<ol>\n<li>Ability to meet scope of needs within budget<\/li>\n<li>Security culture and ongoing training<\/li>\n<li>Track record and reputation<\/li>\n<\/ol>\n<p>At CSC, we carefully chose our partners for DNS and secure sockets layer certificates based on these criteria. If you have a concern regarding the management of any of your digital assets, CSC would be happy to provide a <strong><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/dns-services\">complimentary security audit<\/a><\/strong>.<\/p>\n<p>Next week, we wrap up our blog series with the #3 to domain security.<\/p>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/domain-security-part-1-do-you-know-whos-in-your-whois\">Domain Security, Part 1: Do You Know Who\u2019s in Your WHOIS?<\/a><br \/>\n<a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/\">Domain Security, Part 3:\u00a0Preventing Unauthorized Access<\/a><\/p>\n<p><span style=\"font-size: 10pt;\"><sup>1<\/sup>Various articles on past compromises: http:\/\/www.pcworld.com\/article\/2892632\/driveby-attack-relies-on-hacked-godaddy-accounts.html, http:\/\/thehackernews.com\/2015\/01\/godaddy-vulnerability-allows-domain_20.html, and https:\/\/betanews.com\/2016\/08\/26\/godaddy-phishing-scam\/<\/span><br \/>\n<span style=\"font-size: 10pt;\"> <sup>2<\/sup>http:\/\/news.softpedia.com\/news\/attackers-use-recent-bind-flaw-to-attack-dns-servers-509315.shtml<\/span><br \/>\n<span style=\"font-size: 10pt;\"> <sup>3<\/sup>https:\/\/security.radware.com\/uploadedFiles\/Resources_and_Content\/Attack_Tools\/CyberSecurityontheOffense.pdf<\/span><br \/>\n<span style=\"font-size: 10pt;\"> <sup>4<\/sup>Recent attacks: https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet or https:\/\/www.scmagazineuk.com\/ovh-suffers-11tbps-ddos-attack\/article\/532197\/<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the second installment of a three-part blog series where CSC\u00ae explores how the WHOIS database has become a window into the security set up of an organization due to the ever-increasing threats of cyber crime. Click here to find out the #1 threat to domain security in last week\u2019s post. #2 threat: provider [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171,525,521],"tags":[506,541,271],"class_list":["post-6128","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-domains-new-gtlds","category-send-email","tag-cyber-security","tag-dns-security","tag-whois"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Domain Security: You\u2019re Only as Secure as Your Provider | CSC<\/title>\n<meta name=\"description\" content=\"The WHOIS, in many cases, will list the domain name registrar and the domain name system (DNS) servers. Not all registrars and DNS providers are equally secure with the infrastructure and processes in place to withstand attacks, which leaves WHOIS information available for bad actors to target brands with a weak setup.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Domain Security: You\u2019re Only as Secure as Your Provider | CSC\" \/>\n<meta property=\"og:description\" content=\"The WHOIS, in many cases, will list the domain name registrar and the domain name system (DNS) servers. Not all registrars and DNS providers are equally secure with the infrastructure and processes in place to withstand attacks, which leaves WHOIS information available for bad actors to target brands with a weak setup.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-05T05:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-26T18:46:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2-300x200.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Domain Security, Part 2: You\u2019re Only as Secure as Your Provider\",\"datePublished\":\"2017-07-05T05:00:59+00:00\",\"dateModified\":\"2018-02-26T18:46:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-2-300x200.jpg\",\"keywords\":[\"cyber security\",\"DNS security\",\"WhoIs\"],\"articleSection\":[\"Cyber security\",\"Domains &amp; New gTLDs\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/\",\"name\":\"Domain Security: You\u2019re Only as Secure as Your Provider | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-2-300x200.jpg\",\"datePublished\":\"2017-07-05T05:00:59+00:00\",\"dateModified\":\"2018-02-26T18:46:31+00:00\",\"description\":\"The WHOIS, in many cases, will list the domain name registrar and the domain name system (DNS) servers. Not all registrars and DNS providers are equally secure with the infrastructure and processes in place to withstand attacks, which leaves WHOIS information available for bad actors to target brands with a weak setup.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-2-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-2-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-2-youre-only-as-secure-as-your-provider\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Domain Security, Part 2: You\u2019re Only as Secure as Your Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Domain Security: You\u2019re Only as Secure as Your Provider | CSC","description":"The WHOIS, in many cases, will list the domain name registrar and the domain name system (DNS) servers. Not all registrars and DNS providers are equally secure with the infrastructure and processes in place to withstand attacks, which leaves WHOIS information available for bad actors to target brands with a weak setup.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/","og_locale":"en_US","og_type":"article","og_title":"Domain Security: You\u2019re Only as Secure as Your Provider | CSC","og_description":"The WHOIS, in many cases, will list the domain name registrar and the domain name system (DNS) servers. Not all registrars and DNS providers are equally secure with the infrastructure and processes in place to withstand attacks, which leaves WHOIS information available for bad actors to target brands with a weak setup.","og_url":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2017-07-05T05:00:59+00:00","article_modified_time":"2018-02-26T18:46:31+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2-300x200.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Domain Security, Part 2: You\u2019re Only as Secure as Your Provider","datePublished":"2017-07-05T05:00:59+00:00","dateModified":"2018-02-26T18:46:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/"},"wordCount":650,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2-300x200.jpg","keywords":["cyber security","DNS security","WhoIs"],"articleSection":["Cyber security","Domains &amp; New gTLDs","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/","url":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/","name":"Domain Security: You\u2019re Only as Secure as Your Provider | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2-300x200.jpg","datePublished":"2017-07-05T05:00:59+00:00","dateModified":"2018-02-26T18:46:31+00:00","description":"The WHOIS, in many cases, will list the domain name registrar and the domain name system (DNS) servers. Not all registrars and DNS providers are equally secure with the infrastructure and processes in place to withstand attacks, which leaves WHOIS information available for bad actors to target brands with a weak setup.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2-300x200.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-2-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Domain Security, Part 2: You\u2019re Only as Secure as Your Provider"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=6128"}],"version-history":[{"count":15,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6128\/revisions"}],"predecessor-version":[{"id":6219,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6128\/revisions\/6219"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=6128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=6128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=6128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}