{"id":6131,"date":"2017-07-13T02:00:48","date_gmt":"2017-07-13T06:00:48","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=6131"},"modified":"2019-03-29T11:22:11","modified_gmt":"2019-03-29T15:22:11","slug":"domain-security-part-3-preventing-unauthorized-access-and-modifications","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/","title":{"rendered":"Domain Security, Part 3: Preventing Unauthorized Access and Modifications"},"content":{"rendered":"<p><em>This is the final installment of a three-part blog series where CSC<sup>\u00ae<\/sup> explores how the WHOIS database has become a window into the security set up of an organization due to the ever-increasing threats of cyber crime. Click here to <a href=\"\/blog\/domain-security-part-1-do-you-know-whos-in-your-whois\">find out the #1<\/a> and <a href=\"\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\">#2 threats<\/a> to domain security in previous posts.<\/em><\/p>\n<h2>#3 threat: unauthorized access<\/h2>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-6189\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3-300x200.jpg\" alt=\"Unauthorized access\" width=\"300\" height=\"200\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-3-300x200.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-3.jpg 320w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Our focus in this post is on the security information available and what it tells would-be attackers about a company\u2019s ability to mitigate domain name system (DNS) hijacking and domain shadowing. We\u2019ll discuss some effective and cost-efficient protections companies can put into place to evade attacks, such as registry- and registrar-level locks, two-factor authentication, and domain name system security extensions (DNSSEC).<\/p>\n<p><strong>Domain locks<\/strong><br \/>\nDomain name locks were first introduced in the .COM domain extension in response to bad actors gaining legitimate access to registry and registrar platforms, and making unauthorized changes to domain name records. A registrar lock inserts a manual authorization process between the requestor and the registrar, before the registrar processes that request. A registry lock inserts a manual authorization process between the registrar and the registry. In both cases, it is possible to block three distinct requests:<\/p>\n<ul>\n<li><strong>Deletions.<\/strong> The locks ensure a domain name cannot be deleted or lapsed without the proper authorization.<\/li>\n<li><strong>Transfers.<\/strong> Both locks can reject unauthorized transfers away from the existing registrar.<\/li>\n<li><strong>Updates.<\/strong> Neither lock allows WHOIS information modification, including name server re-delegations.<\/li>\n<\/ul>\n<p>It is also possible to put a lock on renewal, but this is not considered good practice as it would mean that a company would have to unlock a domain before every renewal, negating the auto renewal function, which could be detrimental, especially for critical domains.<\/p>\n<p>Organizations should prioritize all business critical domains to be locked. The status codes for locked domains indicated by some WHOIS such as .COM are as follows:<\/p>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-locks.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6181 alignright\" style=\"box-shadow: 4px 4px 10px #cccccc;\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-locks-300x129.png\" alt=\"MultiLock\" width=\"300\" height=\"129\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-locks-300x129.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2017\/06\/WHOIS-locks.png 340w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Status with registrar locks applied:<\/p>\n<ul>\n<li>ClientDeleteProhibited<\/li>\n<li>ClientTransferProhibited<\/li>\n<li>ClientUpdateProhibited<\/li>\n<\/ul>\n<p>Status with registry locks applied:<\/p>\n<ul>\n<li>ServerDeleteProhibited<\/li>\n<li>ServerTransferProhibited<\/li>\n<li>ServerUpdateProhibited<\/li>\n<\/ul>\n<p>All of these locks are optional except for \u201cClientTransferProhibited,\u201d which the Internet Corporation for Assigned Names and Numbers deemed mandatory for all generic top-level domains (gTLDs). With the state of security today, registries of country-code TLDs are recognizing the importance of such locks and are slowly rolling out lock programs. CSC currently offers locks in all extensions that registries support.<\/p>\n<p>In January of this year, CSC\u2019s <em><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\">Cyber Security Report<\/a><\/em> reported that little over 50% of large brand owners are utilizing locking services. And in a further analysis of nearly 15,000 organizations with .COM or .NET core domains, we found that only 6% of companies have MultiLock (both registrar and registry locks) in place.<\/p>\n<p>Sadly, the message unsecure domains are sending to bad actors is that there is both weakness and opportunity for cyber crime.<\/p>\n<p><strong>Two-factor authentication<\/strong><br \/>\nTwo-factor authentication is a method of confirming a user&#8217;s claimed identity by utilizing a combination of two different components. A username and password are the first component, and a unique one-time code is usually the second.<\/p>\n<p>Although it\u2019s not possible to see from the WHOIS whether a domain is protected by two-factor authentication, it\u2019s important to share that in CSC&#8217;s experience, there is a correlation between those companies that have not invested in <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/multilock-two-factor-authentication-solutions\">MultiLock<\/a> for their core domain and those that have not invested in two-factor authentication on their domain name portfolio. Although most consumers now use <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/multilock-two-factor-authentication-solutions\">two-factor authentication<\/a> in its various forms for our banking needs, many corporate domain name portfolios don&#8217;t have this security step in place (does your domain provider offer it?). Certainly, the value of the digital assets within any of the domain name management platforms is far greater than anything in most people\u2019s bank accounts!<\/p>\n<p><strong>DNSSEC<\/strong><br \/>\nVulnerabilities in <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/dns-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">DNS Services<\/a> allow attackers to hijack the process of looking up services on the internet. DNSSEC is a solution to those vulnerabilities. For example, directing traffic to a spoofed site designed to collect user names and passwords is made more difficult when DNSSEC is fully implemented.<\/p>\n<p>By \u201cdigitally signing\u201d the root zone, users can confidently navigate to a brand\u2019s site without being redirected to a spoofed site. Although cheap to implement,<a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\"> CSC\u2019s research<\/a> suggests that less than 1% of core domains for organizations make use of the DNSSEC security measure.<\/p>\n<p><strong>Summary<\/strong><br \/>\nPublicly available WHOIS information is so much more than the contact information for the owner of a domain. It is a window into a brand\u2019s approach to security. If companies make the WHOIS work for them, WHOIS can act as a deterrent to the cyber criminals looking for their next target.<\/p>\n<p>If you are interested in reviewing the level of information available on your WHOIS, contact CSC for a <strong><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/digital-asset-security-audit\">complimentary security audit<\/a><\/strong> of your digital assets.<\/p>\n<p><a href=\"\/blog\/domain-security-part-1-do-you-know-whos-in-your-whois\">Domain Security, Part 1: Do You Know Who\u2019s in Your WHOIS?<\/a><br \/>\n<a href=\"\/blog\/domain-security-part-2-youre-only-as-secure-as-your-provider\">Domain Security, Part 2: You\u2019re Only as Secure as Your Provider<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the final installment of a three-part blog series where CSC\u00ae explores how the WHOIS database has become a window into the security set up of an organization due to the ever-increasing threats of cyber crime. Click here to find out the #1 and #2 threats to domain security in previous posts. #3 threat: [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171,525,521],"tags":[506,541,542,515],"class_list":["post-6131","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-domains-new-gtlds","category-send-email","tag-cyber-security","tag-dns-security","tag-multilock","tag-two-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mitigating DNS Hijacking and Domain Shadowing | CSC<\/title>\n<meta name=\"description\" content=\"Learn about the security information available and what it tells would-be attackers about a company\u2019s ability to mitigate DNS hijacking and domain shadowing. We discuss some effective and cost-efficient protections companies can put into place to evade attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating DNS Hijacking and Domain Shadowing | CSC\" \/>\n<meta property=\"og:description\" content=\"Learn about the security information available and what it tells would-be attackers about a company\u2019s ability to mitigate DNS hijacking and domain shadowing. We discuss some effective and cost-efficient protections companies can put into place to evade attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-13T06:00:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-29T15:22:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3-300x200.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Domain Security, Part 3: Preventing Unauthorized Access and Modifications\",\"datePublished\":\"2017-07-13T06:00:48+00:00\",\"dateModified\":\"2019-03-29T15:22:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/\"},\"wordCount\":815,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-3-300x200.jpg\",\"keywords\":[\"cyber security\",\"DNS security\",\"MultiLock\",\"two-factor authentication\"],\"articleSection\":[\"Cyber security\",\"Domains &amp; New gTLDs\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/\",\"name\":\"Mitigating DNS Hijacking and Domain Shadowing | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-3-300x200.jpg\",\"datePublished\":\"2017-07-13T06:00:48+00:00\",\"dateModified\":\"2019-03-29T15:22:11+00:00\",\"description\":\"Learn about the security information available and what it tells would-be attackers about a company\u2019s ability to mitigate DNS hijacking and domain shadowing. We discuss some effective and cost-efficient protections companies can put into place to evade attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-3-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/WHOIS-3-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-security-part-3-preventing-unauthorized-access-and-modifications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Domain Security, Part 3: Preventing Unauthorized Access and Modifications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitigating DNS Hijacking and Domain Shadowing | CSC","description":"Learn about the security information available and what it tells would-be attackers about a company\u2019s ability to mitigate DNS hijacking and domain shadowing. We discuss some effective and cost-efficient protections companies can put into place to evade attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/","og_locale":"en_US","og_type":"article","og_title":"Mitigating DNS Hijacking and Domain Shadowing | CSC","og_description":"Learn about the security information available and what it tells would-be attackers about a company\u2019s ability to mitigate DNS hijacking and domain shadowing. We discuss some effective and cost-efficient protections companies can put into place to evade attacks.","og_url":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2017-07-13T06:00:48+00:00","article_modified_time":"2019-03-29T15:22:11+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3-300x200.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Domain Security, Part 3: Preventing Unauthorized Access and Modifications","datePublished":"2017-07-13T06:00:48+00:00","dateModified":"2019-03-29T15:22:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/"},"wordCount":815,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3-300x200.jpg","keywords":["cyber security","DNS security","MultiLock","two-factor authentication"],"articleSection":["Cyber security","Domains &amp; New gTLDs","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/","url":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/","name":"Mitigating DNS Hijacking and Domain Shadowing | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3-300x200.jpg","datePublished":"2017-07-13T06:00:48+00:00","dateModified":"2019-03-29T15:22:11+00:00","description":"Learn about the security information available and what it tells would-be attackers about a company\u2019s ability to mitigate DNS hijacking and domain shadowing. We discuss some effective and cost-efficient protections companies can put into place to evade attacks.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3-300x200.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2017\/06\/WHOIS-3-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/domain-security-part-3-preventing-unauthorized-access-and-modifications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Domain Security, Part 3: Preventing Unauthorized Access and Modifications"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=6131"}],"version-history":[{"count":10,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6131\/revisions"}],"predecessor-version":[{"id":7460,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6131\/revisions\/7460"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=6131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=6131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=6131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}