{"id":7693,"date":"2019-05-30T08:20:57","date_gmt":"2019-05-30T12:20:57","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7693"},"modified":"2019-09-03T15:45:59","modified_gmt":"2019-09-03T19:45:59","slug":"dns-the-neglected-building-block-part-6","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/","title":{"rendered":"DNS: The Neglected Building Block, Part 6 &#8211; DNS Management is a Boardroom Discussion"},"content":{"rendered":"\n<p><em>by Ken Linscott<\/em><\/p>\n\n\n\n<p>The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents in 76 countries. And unsurprisingly, DNS was a contributing factor in four of the 10 risks\u2014due to the vulnerabilities we\u2019ve outlined in this blog series\u2014including cyber attacks, data breaches, unplanned IT and telecom outages, as well as supply chain disruption.<\/p>\n\n\n\n<p><strong>In our last post, we shared CSC\u2019s recommendations for securing DNS from the 10 vulnerabilities, which included adopting four policies to:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Employ advanced security\nfeatures for business critical domains<\/li><li>Control user permissions<\/li><li>Secure domain and DNS portal access<\/li><li>Consolidate with an enterprise-class\ndomain, DNS, and digital certificates provider <\/li><\/ol>\n\n\n\n<p><strong>In this post, we address who should be responsible for implementing these policies.<\/strong><\/p>\n\n\n\n<p>With any cyber attack, companies face potential loss of trade secrets and intellectual property, as well as litigation brought by impacted customers, partners, and shareholders. Significant reputation damage and loss of investor confidence could also occur, often accompanied by a fall in the stock price.<\/p>\n\n\n\n<p>That means boards are responsible for understanding all risk, including\ncyber risk. It\u2019s clear domains and DNS are at risk of poor management and\nthird-party attacks. If an incident occurs, the actions of the board will be\nclosely watched in the court of public opinion, the legal courts, and by\nlawmakers.<\/p>\n\n\n\n<p>However, security of domains and DNS is a means to an end\u2014the end meaning\ncompliance. Recent research from the Ponemon Institute<a href=\"http:\/\/thesslstore.com\/blog\/71-of-organizations-dont-know-how-many-certificates-keys-they-have\/\"><sup>[1]<\/sup><\/a>\nregarding digital certificates suggests that organizations are less interested\nin the actual security benefits than they are in maintaining compliance and\navoiding fines and penalties due to non-compliance (think EU General Data\nProtection Regulation, enacted May 2018, able to fine companies up to 4% of\ntheir global annual revenue for failing to safeguard customer information).<\/p>\n\n\n\n<p>If a company\u2019s board is does not understand that DNS is recognized as a prime target for data exfiltration, there\u2019s no better time to share the information. Organizations that experienced data theft via DNS vulnerabilities increased from 28% in 2017 to 33% in 2018<sup><a href=\"http:\/\/www.efficientip.com\/wp-content\/uploads\/EfficientIP-DNS-Threat-Report-2018.pdf\">[2]<\/a><\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg\" alt=\"\" class=\"wp-image-7694\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSHijackingFinalBlog-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSHijackingFinalBlog-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/DNSHijackingFinalBlog.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Implementing and enforcing a DNS security\npolicy with CSC Security Center<\/strong><\/p>\n\n\n\n<p>CSC Security Center<sup>SM<\/sup> is a\nplatform we developed that understands the risks around vital domains\u2014giving companies\nthe ability to present domain security risks to their board for policy decisions\nnecessary to mitigate cyber threats. CSC Security Center also enables policy\nenforcement, sending notices when policies are not adhered to. <\/p>\n\n\n\n<p>This unique approach will change the\nway domains and DNS are secured. The platform identifies business-critical\ndomains, monitors them continually to ensure they\u2019re secured with the right\nprotections, and alerts companies to any security blind spots. <\/p>\n\n\n\n<p>We\u2019ve also established an automatic\nregistry lock policy with our CSC Security Center clients to mitigate the risk\nof DNS hijacking of their vital domains. The Auto-Lock Policy works in tandem\nwith the best practice of auto-renewing domain names to avoid expiration and\nthird-party registration. <\/p>\n\n\n\n<p>We advise companies to partner with enterprise-class\nproviders that have the resources and tools to help enforce strong policies. Your\nboard will appreciate a strong partner once they understand the risks and the\nimplications of poor management and third-party attacks on DNS, and they\u2019ll\nwant to invest in the partner who is the most security conscious.<\/p>\n\n\n\n<p><strong>Subscribe to our blog<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/email-sign-up\/\">Subscribe\nto our blog <\/a>to receive notification of new posts.<\/p>\n\n\n\n<p><strong>Read previous posts in this series:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/what-dns-is-and-how-its-vulnerable\/\">&lt;&lt;&nbsp;Part 1 \u2013 What DNS is and How it\u2019s Vulnerable<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/four-dns-vulnerabilities-you-need-to-know-about\/\">&lt;&lt; Part 2 \u2013 Four DNS Vulnerabilities You Need to Know About<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-3\/\">&lt;&lt; Part 3 \u2013 Six More DNS Vulnerabilities That Make Security Crucial<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-4\/\">&lt;&lt; Part 4 \u2013 The Growing Threat of DNS Hijacking and Domain Shadowing<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-the-neglected-building-block-part-5\/\">&lt;&lt; Part 5 &#8211; Mitigating the Risks of 10 Serious DNS Vulnerabilities <\/a><\/p>\n\n\n\n<p>Download our most recent <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\/\">Cyber\nSecurity Report.<\/a><br \/><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><a href=\"http:\/\/thesslstore.com\/blog\/71-of-organizations-dont-know-how-many-certificates-keys-they-have\/ \">[1 ]thesslstore.com\/blog\/71-of-organizations-dont-know-how-many-certificates-keys-they-have\/ <\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/www.efficientip.com\/wp-content\/uploads\/EfficientIP-DNS-Threat-Report-2018.pdf \">[2] efficientip.com\/wp-content\/uploads\/EfficientIP-DNS-Threat-Report-2018.pdf <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Ken Linscott The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents in 76 countries. And unsurprisingly, DNS was a contributing factor in four of the 10 risks\u2014due to the vulnerabilities we\u2019ve outlined in this blog series\u2014including cyber attacks, data breaches, unplanned IT and telecom [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-7693","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS: The Neglected Building Block, Part 6 - DNS Management is a Boardroom Discussion | CSC<\/title>\n<meta name=\"description\" content=\"by Ken Linscott The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS: The Neglected Building Block, Part 6 - DNS Management is a Boardroom Discussion | CSC\" \/>\n<meta property=\"og:description\" content=\"by Ken Linscott The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-30T12:20:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-03T19:45:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS: The Neglected Building Block, Part 6 &#8211; DNS Management is a Boardroom Discussion\",\"datePublished\":\"2019-05-30T12:20:57+00:00\",\"dateModified\":\"2019-09-03T19:45:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSHijackingFinalBlog-1024x576.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/\",\"name\":\"DNS: The Neglected Building Block, Part 6 - DNS Management is a Boardroom Discussion | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSHijackingFinalBlog-1024x576.jpg\",\"datePublished\":\"2019-05-30T12:20:57+00:00\",\"dateModified\":\"2019-09-03T19:45:59+00:00\",\"description\":\"by Ken Linscott The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSHijackingFinalBlog-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/DNSHijackingFinalBlog-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-the-neglected-building-block-part-6\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS: The Neglected Building Block, Part 6 &#8211; DNS Management is a Boardroom Discussion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS: The Neglected Building Block, Part 6 - DNS Management is a Boardroom Discussion | CSC","description":"by Ken Linscott The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/","og_locale":"en_US","og_type":"article","og_title":"DNS: The Neglected Building Block, Part 6 - DNS Management is a Boardroom Discussion | CSC","og_description":"by Ken Linscott The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents","og_url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-05-30T12:20:57+00:00","article_modified_time":"2019-09-03T19:45:59+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS: The Neglected Building Block, Part 6 &#8211; DNS Management is a Boardroom Discussion","datePublished":"2019-05-30T12:20:57+00:00","dateModified":"2019-09-03T19:45:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/"},"wordCount":644,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg","articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/","url":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/","name":"DNS: The Neglected Building Block, Part 6 - DNS Management is a Boardroom Discussion | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg","datePublished":"2019-05-30T12:20:57+00:00","dateModified":"2019-09-03T19:45:59+00:00","description":"by Ken Linscott The 2018 Business Continuity Institute\u2019s Horizon Scan Report identified the top 10 business continuity risks reported by 657 respondents","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/DNSHijackingFinalBlog-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/dns-the-neglected-building-block-part-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS: The Neglected Building Block, Part 6 &#8211; DNS Management is a Boardroom Discussion"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7693"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7693\/revisions"}],"predecessor-version":[{"id":8174,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7693\/revisions\/8174"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}