{"id":7627,"date":"2019-05-16T08:31:29","date_gmt":"2019-05-16T12:31:29","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7627"},"modified":"2026-01-19T08:59:36","modified_gmt":"2026-01-19T13:59:36","slug":"dns-the-neglected-building-block-part-4","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/","title":{"rendered":"DNS: The Neglected Building Block, Part 4 &#8211; The Growing Threat of DNS Hijacking and Domain Shadowing"},"content":{"rendered":"\n<p><em>By Ken Linscott<\/em><\/p>\n\n\n\n<p>In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most regular and damaging cyber attacks, and domain shadowing uses similar tactics.<\/p>\n\n\n\n<p>At the beginning of 2019, CSC joined the U.S. Department of Homeland\nSecurity\u2019s Cybersecurity and Infrastructure Security Agency, the UK National\nCyber Security Centre, and other leading security organizations\u2014including Cisco<sup>\u00ae<\/sup>\nTalos, FireEye<sup>\u00ae<\/sup>, and Akamai\u2014in alerting corporations and the public to the\nwidespread, growing threat of state-sponsored DNS hijacking. <\/p>\n\n\n\n<p>The targets of these attacks have included government, corporate,\ntelecommunication, and infrastructure entities\u2014and result in website and email\nredirection to collect sensitive information. <\/p>\n\n\n\n<p>DNS hijacking enables a third party to\nforward company customers to fake websites to steal login credentials and\nconfidential data. This is not only a serious data risk, but a privacy nightmare,\nespecially in light of more stringent government privacy policies, like the EU\nGeneral Data Protection Regulation. DNS hijackers can also harvest information\nfrom inbound company emails, then launch sophisticated phishing attacks on\ncustomers and staff using a company\u2019s own domains to make the attack appear legitimate.\n<\/p>\n\n\n\n<p>There are three possible attack vectors used for DNS hijacking.<\/p>\n\n\n\n<p><strong>1. Access\nto the domain or DNS management portal<\/strong><\/p>\n\n\n\n<p>The first method is taking advantage of poor access and permission\ncontrols within a domain management portal. Typically, an attacker will obtain\nthe username and password to a registrar\u2019s portal that is not protected by two-factor\nauthentication or IP validation, giving them access to change the name servers\nfor domains accessible within the account, thus giving them control of the\ncontent.<\/p>\n\n\n\n<p><strong>2. The registrar DNS providers\nsystems<\/strong><\/p>\n\n\n\n<p>The second possibility is that there\u2019s a vulnerability within the\nregistrar\u2019s systems or processes, allowing unauthorized access. FireEye\nrecently highlighted an ongoing domain shadowing issue for GoDaddy\u00ae that goes\nback to 2016, and allows attackers to access and add to the zone files of targeted\ndomains.<\/p>\n\n\n\n<p><strong>3. The registry <\/strong><\/p>\n\n\n\n<p>Finally, the registry itself could be compromised. This famously played\nout with a Brazilian registry in 2016 when 36 Brazilian bank domains were\nredirected to perfectly reconstructed fake sites for six hours. The fraudulent\nwebsites even had valid digital certificates issued in the bank\u2019s name,\ntricking clients whose computers were infected with malware disguised as a bank\nbrowser security plugin update. Really a Trojan, the malware was designed\u2014ironically\u2014to\ndisable computer antivirus software.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-9-1024x576.jpg\" alt=\"\" class=\"wp-image-7628\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-9-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-9-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-9-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide-9.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>What\u2019s clear with DNS hijacking is there\u2019s no silver bullet to mitigate\nthe threat. There are three distinct areas to defend and a layered approach to security\nis essential. We call this the Defense in Depth approach to cyber security\u2014layering\ndefense mechanisms to protect valuable digital assets and online data, so if\none mechanism fails, another is there to mitigate an attack.<\/p>\n\n\n\n<p><strong>Next post<\/strong><\/p>\n\n\n\n<p>In our next post, we\u2019ll list best practices CSC, government agencies,\nand The Internet Corporation for Assigned Names and Numbers (ICANN) recommend\nto mitigate the threats from DNS hijacking, as well as our recommendations to\novercome all 10 DNS vulnerabilities.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/blog\/email-sign-up\/\">Subscribe to our blog to receive notification of new posts.<\/a><\/p>\n\n\n\n<p><strong>Read more posts in this series:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/blog\/what-dns-is-and-how-its-vulnerable\/\">&lt;&lt;\u00a0Part 1 &#8211; What DNS is and How it\u2019s Vulnerable<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/\">&lt;&lt; Part 2 &#8211; Four DNS Vulnerabilities You Need to Know About<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-3\/\">&lt;&lt; Part 3 \u2013 Six More DNS Vulnerabilities That Make Security Crucial<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/\">&gt;&gt; Part 5 \u2013 Mitigating the Risks of 10 Serious DNS Vulnerabilities<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/\">&gt;&gt; Part 6 &#8211; DNS Management is a Boardroom Discussion<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Ken Linscott In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most regular and damaging cyber attacks, and domain shadowing uses similar tactics. At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-7627","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS: The Neglected Building Block, Part 4 - The Growing Threat of DNS Hijacking and Domain Shadowing | CSC<\/title>\n<meta name=\"description\" content=\"By Ken Linscott In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS: The Neglected Building Block, Part 4 - The Growing Threat of DNS Hijacking and Domain Shadowing | CSC\" \/>\n<meta property=\"og:description\" content=\"By Ken Linscott In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-16T12:31:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-19T13:59:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-9-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS: The Neglected Building Block, Part 4 &#8211; The Growing Threat of DNS Hijacking and Domain Shadowing\",\"datePublished\":\"2019-05-16T12:31:29+00:00\",\"dateModified\":\"2026-01-19T13:59:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/\"},\"wordCount\":595,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-9-1024x576.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/\",\"name\":\"DNS: The Neglected Building Block, Part 4 - The Growing Threat of DNS Hijacking and Domain Shadowing | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-9-1024x576.jpg\",\"datePublished\":\"2019-05-16T12:31:29+00:00\",\"dateModified\":\"2026-01-19T13:59:36+00:00\",\"description\":\"By Ken Linscott In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-9-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide-9-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-4\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS: The Neglected Building Block, Part 4 &#8211; The Growing Threat of DNS Hijacking and Domain Shadowing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS: The Neglected Building Block, Part 4 - The Growing Threat of DNS Hijacking and Domain Shadowing | CSC","description":"By Ken Linscott In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/","og_locale":"en_US","og_type":"article","og_title":"DNS: The Neglected Building Block, Part 4 - The Growing Threat of DNS Hijacking and Domain Shadowing | CSC","og_description":"By Ken Linscott In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most","og_url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-05-16T12:31:29+00:00","article_modified_time":"2026-01-19T13:59:36+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-9-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS: The Neglected Building Block, Part 4 &#8211; The Growing Threat of DNS Hijacking and Domain Shadowing","datePublished":"2019-05-16T12:31:29+00:00","dateModified":"2026-01-19T13:59:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/"},"wordCount":595,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-9-1024x576.jpg","articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/","url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/","name":"DNS: The Neglected Building Block, Part 4 - The Growing Threat of DNS Hijacking and Domain Shadowing | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-9-1024x576.jpg","datePublished":"2019-05-16T12:31:29+00:00","dateModified":"2026-01-19T13:59:36+00:00","description":"By Ken Linscott In this post, we take a deep dive into DNS hijacking\u2014as well as domain shadowing\u2014because DNS hijacking has recently become one of the most","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-9-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide-9-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS: The Neglected Building Block, Part 4 &#8211; The Growing Threat of DNS Hijacking and Domain Shadowing"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7627"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7627\/revisions"}],"predecessor-version":[{"id":15015,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7627\/revisions\/15015"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}