{"id":7650,"date":"2019-05-23T08:26:23","date_gmt":"2019-05-23T12:26:23","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7650"},"modified":"2019-05-30T08:51:38","modified_gmt":"2019-05-30T12:51:38","slug":"dns-the-neglected-building-block-part-5","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/","title":{"rendered":"DNS: The Neglected Building Block, Part 5 &#8211; Mitigating the Risks of 10 Serious DNS Vulnerabilities"},"content":{"rendered":"\n<p><em>By Ken Linscott<\/em><\/p>\n\n\n\n<p>So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable to cyber attack, including:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>DNS cache poisoning<\/li><li>Poor domain management<\/li><li>DNS hijacking<\/li><li>Domain shadowing<\/li><li>DNS outages<\/li><li>Malware<\/li><li>DNS tunneling<\/li><li>Zero-day attacks<\/li><li>DDoS attacks<\/li><li>Poor digital certificate\nmanagement<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg\" alt=\"\" class=\"wp-image-7671\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSBlog-Image-Update-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSBlog-Image-Update-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSBlog-Image-Update.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>To mitigate these threats, it\u2019s clear that a company\u2019s defense in depth (DiD) strategy\u2014a multi-layered approach to keeping online assets secure\u2014should include clear policies for DNS security:<\/p>\n\n\n\n<p><strong>1. Employ advanced security features for business-critical domains<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Domain\nname system security extensions (DNSSEC) is an\nimportant tool in the overall defense of DNS vulnerabilities because it\nencrypts the query to the internet service provider and is also a visual\ndeterrent for cyber criminals, as it is indicated on the WHOIS. Digitally signing\nthe root zone means clients can be confident of reaching a company\u2019s legitimate\nwebsite; hijackers won\u2019t be able to redirect traffic to a spoofed site designed\nto collect usernames and passwords. <\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Registry locks stop automated changes of DNS records,\npreventing execution of unauthorized requests\u2014whether it comes from compromised\naccess to your domain portal or your registrars systems. These locks are\nvisible in the WHOIS database, adding another deterrent criminals can see.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Digital certificates encrypt online data to enable secure\neCommerce and internet-based communications. Increasingly, every live website\nneeds a valid, regularly renewed digital certificate to avoid being flagged by\nweb browsers as potentially unsafe for visitors. Google\u00ae, in particular, has\nmade it a rule to block websites without digital certificate protection.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Domain-based message authentication, reporting, and conformance\n(DMARC) is an email authentication protocol that gives organizations protection\nagainst unauthorized use of their domains, commonly known as email spoofing.\nDMARC prevents business email compromise attacks, phishing emails, email scams,\nand other cyber threats.<\/li><\/ul>\n\n\n\n<p><strong>2. Control user permissions<\/strong><\/p>\n\n\n\n<p>Companies should also routinely review permissions for staff with access to domains and the DNS portal. A good enterprise provider should be able to alert companies to changes in permissions. Only trusted individuals should have access to elevated permissions, and former employee permissions should be removed immediately. Those with elevated permission typically have access to critical DNS functions that can detrimentally disrupt or hijack a company\u2019s online presence, including: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Lapsing a domain<\/li><li>Transferring a domain away from company ownership<\/li><li>Modifying the DNS<\/li><li>Editing the zone file<\/li><\/ul>\n\n\n\n<p><strong>3. Secure DNS portal and domain access <\/strong><\/p>\n\n\n\n<p>This is far easier when domains and DNS are consolidated\nwith one enterprise provider, which should be a trusted partner who can offer two-factor\nauthentication (used by online banking platforms) and federated identity for a\nsingle sign on environment. These low cost yet effective protections make it\nharder for hijackers to access the vital company domains.<\/p>\n\n\n\n<p><strong>4. Consolidate with an enterprise-class domain, DNS, and digital certificate provider<\/strong><\/p>\n\n\n\n<p>When a company partners with an enterprise-class provider\nthat\u2019s able to manage domains, DNS, and digital certificates for large global\nbrands, they take on the burden of monitoring and updating all the protections\nwe\u2019ve outlined in our blog posts\u2014minimizing cyber threats. In the DNS space, it\nmeans choosing a provider with a credible history of providing 100% uptime to\nprevent DNS outages regardless of a DDoS attack.<\/p>\n\n\n\n<p>A provider should also be able to demonstrate their investment\ninto systems and security, including routine staff training to spot the risks\nfor the various types of cyber attacks, because humans will always create the\nlargest vulnerability. <\/p>\n\n\n\n<p>The importance of selecting the right partner cannot\nbe over stated, so we encourage companies to involve their security team in\nchallenging potentials providers to <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/digital-asset-checklist\/\">answer\nin-depth information security questions.<\/a><\/p>\n\n\n\n<p><strong>Next post<\/strong><\/p>\n\n\n\n<p>In our next post, we address who should be responsible for implementing\nthese policies. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/email-sign-up\/\">Subscribe\nto our blog to receive notification of new posts.<\/a> <\/p>\n\n\n\n<p><strong>Read more posts in this series:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/what-dns-is-and-how-its-vulnerable\/\">&lt;&lt;&nbsp;Part 1 &#8211; What DNS is and How it\u2019s Vulnerable<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/\">&lt;&lt; Part 2 &#8211; Four DNS Vulnerabilities You Need to Know About<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-3\/\">&lt;&lt; Part 3 &#8211; Six More DNS Vulnerabilities That Make Security Crucial <\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-4\/\">&lt;&lt; Part 4 &#8211; The Growing Threat of DNS Hijacking and Domain Shadowing<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-6\/\">&gt;&gt;\nPart 6 &#8211; DNS Management is a Boardroom Discussion<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Ken Linscott So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable to cyber attack, including: DNS cache poisoning Poor domain management DNS hijacking Domain shadowing DNS outages Malware DNS tunneling Zero-day attacks DDoS attacks Poor digital certificate management [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-7650","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS: The Neglected Building Block, Part 5 - Mitigating the Risks of 10 Serious DNS Vulnerabilities | CSC<\/title>\n<meta name=\"description\" content=\"By Ken Linscott So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS: The Neglected Building Block, Part 5 - Mitigating the Risks of 10 Serious DNS Vulnerabilities | CSC\" \/>\n<meta property=\"og:description\" content=\"By Ken Linscott So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-23T12:26:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-30T12:51:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS: The Neglected Building Block, Part 5 &#8211; Mitigating the Risks of 10 Serious DNS Vulnerabilities\",\"datePublished\":\"2019-05-23T12:26:23+00:00\",\"dateModified\":\"2019-05-30T12:51:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSBlog-Image-Update-1024x576.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/\",\"name\":\"DNS: The Neglected Building Block, Part 5 - Mitigating the Risks of 10 Serious DNS Vulnerabilities | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSBlog-Image-Update-1024x576.jpg\",\"datePublished\":\"2019-05-23T12:26:23+00:00\",\"dateModified\":\"2019-05-30T12:51:38+00:00\",\"description\":\"By Ken Linscott So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSBlog-Image-Update-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSBlog-Image-Update-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-5\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS: The Neglected Building Block, Part 5 &#8211; Mitigating the Risks of 10 Serious DNS Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS: The Neglected Building Block, Part 5 - Mitigating the Risks of 10 Serious DNS Vulnerabilities | CSC","description":"By Ken Linscott So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/","og_locale":"en_US","og_type":"article","og_title":"DNS: The Neglected Building Block, Part 5 - Mitigating the Risks of 10 Serious DNS Vulnerabilities | CSC","og_description":"By Ken Linscott So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable","og_url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-05-23T12:26:23+00:00","article_modified_time":"2019-05-30T12:51:38+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS: The Neglected Building Block, Part 5 &#8211; Mitigating the Risks of 10 Serious DNS Vulnerabilities","datePublished":"2019-05-23T12:26:23+00:00","dateModified":"2019-05-30T12:51:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/"},"wordCount":707,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg","articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/","url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/","name":"DNS: The Neglected Building Block, Part 5 - Mitigating the Risks of 10 Serious DNS Vulnerabilities | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg","datePublished":"2019-05-23T12:26:23+00:00","dateModified":"2019-05-30T12:51:38+00:00","description":"By Ken Linscott So far in this series, we\u2019ve looked at the importance of DNS to online business and the 10 ways in which this infrastructure is vulnerable","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSBlog-Image-Update-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS: The Neglected Building Block, Part 5 &#8211; Mitigating the Risks of 10 Serious DNS Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7650"}],"version-history":[{"count":4,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7650\/revisions"}],"predecessor-version":[{"id":7701,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7650\/revisions\/7701"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}