{"id":7292,"date":"2019-02-05T08:52:11","date_gmt":"2019-02-05T13:52:11","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7292"},"modified":"2023-08-15T10:30:22","modified_gmt":"2023-08-15T14:30:22","slug":"global-dns-hijacking","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/","title":{"rendered":"Global DNS Hijacking and How CSC Secures Your Digital Assets"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg\" alt=\"global DNS hijacking\" class=\"wp-image-7295\" style=\"width:241px;height:160px\" width=\"241\" height=\"160\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/02\/DIGITAL-iStock-518059902-300x200.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/02\/DIGITAL-iStock-518059902-768x513.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/02\/DIGITAL-iStock-518059902.jpg 1300w\" sizes=\"auto, (max-width: 241px) 100vw, 241px\" \/><\/figure>\n<\/div>\n\n\n<p>In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article focuses on a global campaign aimed at hijacking DNS at an unprecedented scale<a href=\"#1\"><sup>1<\/sup><\/a>, the other, another massive scam manipulating domain names using a major retail registrar\u2019s <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/dns-services\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"managed DNS services (opens in a new tab)\">managed DNS services<\/a><a href=\"#2\"><sup>2<\/sup><\/a>. The articles highlight specific techniques the attackers used to intercept and manipulate legitimate traffic, harvest information (like credentials or emails), or cause a range of other malicious activities, such as phishing.&nbsp;In some cases, low validation (and often free) digital security certificates issued by some providers were used to increase the credibility of the scams, compounding the issue for brands and customers.<\/p>\n\n\n\n<p>DNS hijacking is not a new threat. It\u2019s been used countless times by hacktivists and others to cause destruction or raise awareness to a cause<a href=\"#3\"><sup>3<\/sup><\/a>. However, cyber criminals have recently begun leveraging the tactic to sabotage financial institutions<a href=\"#4\"><sup>4<\/sup><\/a> and cryptocurrency providers for monetary gain<a href=\"#5\"><sup>5<\/sup><\/a>. These latest examples prove that cyber criminals are using DNS hijacking to access companies\u2019 DNS and reroute traffic to fraudulent sites. Additionally, they are conducting phishing campaigns to steal money or data, and in some extreme cases, even government property.<\/p>\n\n\n\n<p>This serves\nas an important reminder to organizations: you should ensure you are\ncollaborating with corporate providers focused on security that also possess the\nagility to deal with evolving threats. To mitigate these types of attacks, your\nprovider should:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mandate two-factor authentication on their domain management and\nDNS systems<\/li>\n\n\n\n<li>Offer authentication options, such as IP validation and federated identity<\/li>\n\n\n\n<li>Offer registry and registrar locks on your business-critical\ndomains<\/li>\n\n\n\n<li>Offer ongoing monitoring of your domain portfolio to identify\nsecurity blind spots around access permissions, DNS, and digital certificates<\/li>\n<\/ul>\n\n\n\n<p>Within DNS,\nthere are also steps that can make you\u2015the brand owner\u2015a far less attractive\ntarget and reduce the impact of an attack, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CAA records\u2015The addition of Certificate Authority Authorization\nrecords for certificate validation can reduce the impact of an attacker adding\ntheir own certificate to a hijacked domain.<\/li>\n\n\n\n<li>DNSSEC\u2015Domain Name System Security Extensions will provide an\nadditional hurdle for the attacker trying to re-sign the zone with their own\nchanges.<\/li>\n\n\n\n<li>Zone restore function\u2015This additional tactic may help with a swift\nreturn to business as usual.<\/li>\n<\/ul>\n\n\n\n<p>At CSC, we employ\na number of protocols in addition to those listed above to secure our systems\nand protect our customers\u2019 domains from unauthorized access, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security&nbsp;first training <\/li>\n\n\n\n<li>Phishing awareness&nbsp;training with companywide phishing testing<\/li>\n\n\n\n<li>Social engineering training&nbsp;<\/li>\n\n\n\n<li>A mandated \u201cclear desk\u201d policy<\/li>\n\n\n\n<li>Mandatory written requests (never via phone) <\/li>\n\n\n\n<li>An enforced Authorized Contact Policy, requiring any requests to come\nfrom an authorized account contact before changes are made<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/event.on24.com\/wcc\/r\/1931159\/F6578ECF95EF154FEC603667291DA602?partnerref=AMBlog\"><strong>We will be sharing more on this topic at our webinar on February 21. Register to attend this free session.<\/strong><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/assets\/pdfs\/Secure-Best-Practices-For-Your-Digital-Assets.pdf\">&gt;&gt; Download our complimentary Digital Asset Security Checklist\u2014covering six key areas that are often overlooked when it comes to cyber security.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/csc-endorsed-by-abn-amro\/\">&gt;&gt; Find out how CSC Security Center helps our clients expose security blind spots to mitigate cyber threats.<\/a><br \/><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n\n<p><em><a id=\"1\"><sup>1<\/sup><\/a>fireeye.com\/blog\/threat-research\/2019\/01\/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html <\/em><\/p>\n\n\n\n<p><em><a id=\"2\"><sup>2<\/sup><\/a>krebsonsecurity.com\/2019\/01\/bomb-threat-sextortion-spammers-abused-weakness-at-godaddy-com\/ <\/em><\/p>\n\n\n\n<p><em><a id=\"3\"><sup>3<\/sup><\/a>theregister.co.uk\/2018\/12\/07\/linuxorg_hacked\/ <\/em><\/p>\n\n\n\n<p><a id=\"4\"><sup>4<\/sup><\/a>wired.com\/2017\/04\/hackers-hijacked-banks-entire-online-operation\/ <\/p>\n\n\n\n<p><em><a id=\"5\"><sup>5<\/sup><\/a>techcrunch.com\/2018\/04\/24\/myetherwallet-hit-by-dns-attack\/ <\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article focuses on a global campaign aimed at hijacking DNS at an unprecedented scale1, the other, another massive scam manipulating domain names using a major retail registrar\u2019s managed DNS services2. [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171,521],"tags":[],"class_list":["post-7292","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Global DNS Hijacking and How CSC Secures Your Digital Assets | CSC<\/title>\n<meta name=\"description\" content=\"In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Global DNS Hijacking and How CSC Secures Your Digital Assets | CSC\" \/>\n<meta property=\"og:description\" content=\"In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-05T13:52:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-15T14:30:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Global DNS Hijacking and How CSC Secures Your Digital Assets\",\"datePublished\":\"2019-02-05T13:52:11+00:00\",\"dateModified\":\"2023-08-15T14:30:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/\"},\"wordCount\":547,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/DIGITAL-iStock-518059902-1024x684.jpg\",\"articleSection\":[\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/\",\"name\":\"Global DNS Hijacking and How CSC Secures Your Digital Assets | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/DIGITAL-iStock-518059902-1024x684.jpg\",\"datePublished\":\"2019-02-05T13:52:11+00:00\",\"dateModified\":\"2023-08-15T14:30:22+00:00\",\"description\":\"In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/DIGITAL-iStock-518059902-1024x684.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/DIGITAL-iStock-518059902-1024x684.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/global-dns-hijacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Global DNS Hijacking and How CSC Secures Your Digital Assets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Global DNS Hijacking and How CSC Secures Your Digital Assets | CSC","description":"In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/","og_locale":"en_US","og_type":"article","og_title":"Global DNS Hijacking and How CSC Secures Your Digital Assets | CSC","og_description":"In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article","og_url":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-02-05T13:52:11+00:00","article_modified_time":"2023-08-15T14:30:22+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Global DNS Hijacking and How CSC Secures Your Digital Assets","datePublished":"2019-02-05T13:52:11+00:00","dateModified":"2023-08-15T14:30:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/"},"wordCount":547,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg","articleSection":["Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/","url":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/","name":"Global DNS Hijacking and How CSC Secures Your Digital Assets | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg","datePublished":"2019-02-05T13:52:11+00:00","dateModified":"2023-08-15T14:30:22+00:00","description":"In the world of cyber crime, the news never seems to cease. In fact, two recent news stories detail domain name system (DNS) hijacking. One article","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/02\/DIGITAL-iStock-518059902-1024x684.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/global-dns-hijacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Global DNS Hijacking and How CSC Secures Your Digital Assets"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7292"}],"version-history":[{"count":8,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7292\/revisions"}],"predecessor-version":[{"id":12759,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7292\/revisions\/12759"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}