{"id":6901,"date":"2018-07-17T08:55:40","date_gmt":"2018-07-17T12:55:40","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=6901"},"modified":"2018-07-18T08:54:37","modified_gmt":"2018-07-18T12:54:37","slug":"cyber-security-report-analyzing-the-threats-to-every-business","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/","title":{"rendered":"Cyber Security Report: Analyzing the Threats to Every Business"},"content":{"rendered":"<p><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"230\" class=\"wp-image-6902 size-medium alignright\" style=\"max-width: 50%;\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png\" alt=\"\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-768x589.png 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/07\/Cyber-Security-Report-July-2018.png 906w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of service attacks being a common threat used to disrupt businesses in major industries and around the world. Email was identified as the biggest threat vector for attackers looking to compromise organizations<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a>, and has resulted in businesses around the globe losing over $5.3 billion through email scams<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>.<\/p>\n<p>The statistics are staggering, but the message is clear: every organization is at risk, including the social media platform LinkedIn<sup>\u00ae<\/sup>, which saw its access shut down due to a secure sockets layer certificate expiration, and even the Winter Olympics Games, fell victim to a web attack that blocked customers from accessing their ticket information for 12 hours during the Games.<\/p>\n<p>We also analyzed the main domains of 100 large, global, public companies to see how they fare in terms of domain security. Our findings reveal there is more they can do to improve security in light of the changes the General Data Protection Regulation demands, as well as the Google<sup>\u00ae<\/sup> Chrome<sup>TM<\/sup>\u00a0browser&#8217;s distrust of all non-HTTPS websites. We also share some best practices companies can adopt.<\/p>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\"><strong>View a complimentary copy of the report here<\/strong><\/a><\/p>\n<p><span style=\"font-size: 8pt;\"><a href=\"#_ftnref2\">[1]<\/a> https:\/\/www.infosecurity-magazine.com\/news\/fsecure-email-still-the-weakest\/<\/span><\/p>\n<p><span style=\"font-size: 8pt;\"><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> https:\/\/securityledger.com\/2017\/05\/fbi-business-email-compromise-is-a-5-billion-industry\/<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of service attacks being a common threat used to disrupt businesses in major industries and around the world. Email was identified as the biggest threat vector for attackers looking [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171,521],"tags":[],"class_list":["post-6901","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Report: Analyzing the Threats to Every Business | CSC<\/title>\n<meta name=\"description\" content=\"In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Report: Analyzing the Threats to Every Business | CSC\" \/>\n<meta property=\"og:description\" content=\"In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-17T12:55:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-18T12:54:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Cyber Security Report: Analyzing the Threats to Every Business\",\"datePublished\":\"2018-07-17T12:55:40+00:00\",\"dateModified\":\"2018-07-18T12:54:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/\"},\"wordCount\":224,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cyber-Security-Report-July-2018-300x230.png\",\"articleSection\":[\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/\",\"name\":\"Cyber Security Report: Analyzing the Threats to Every Business | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cyber-Security-Report-July-2018-300x230.png\",\"datePublished\":\"2018-07-17T12:55:40+00:00\",\"dateModified\":\"2018-07-18T12:54:37+00:00\",\"description\":\"In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cyber-Security-Report-July-2018-300x230.png\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Cyber-Security-Report-July-2018-300x230.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-report-analyzing-the-threats-to-every-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Report: Analyzing the Threats to Every Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Report: Analyzing the Threats to Every Business | CSC","description":"In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Report: Analyzing the Threats to Every Business | CSC","og_description":"In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of","og_url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2018-07-17T12:55:40+00:00","article_modified_time":"2018-07-18T12:54:37+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Cyber Security Report: Analyzing the Threats to Every Business","datePublished":"2018-07-17T12:55:40+00:00","dateModified":"2018-07-18T12:54:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/"},"wordCount":224,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png","articleSection":["Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/","url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/","name":"Cyber Security Report: Analyzing the Threats to Every Business | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png","datePublished":"2018-07-17T12:55:40+00:00","dateModified":"2018-07-18T12:54:37+00:00","description":"In this CSC Cyber Security Report: July 2018, we look at how the domain name system is a frequent target for cyber criminals, with distributed denial of","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2018\/07\/Cyber-Security-Report-July-2018-300x230.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-report-analyzing-the-threats-to-every-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Report: Analyzing the Threats to Every Business"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=6901"}],"version-history":[{"count":8,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6901\/revisions"}],"predecessor-version":[{"id":6911,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/6901\/revisions\/6911"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=6901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=6901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=6901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}