{"id":8119,"date":"2019-08-15T08:43:03","date_gmt":"2019-08-15T12:43:03","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8119"},"modified":"2021-06-11T11:34:54","modified_gmt":"2021-06-11T15:34:54","slug":"confused-about-domain-locks","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/","title":{"rendered":"Confused about domain locks? Understand the intricacies and security effectiveness."},"content":{"rendered":"\n<a class=\"social\" style=\"float:left\" href=\"\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/08\/Ken-Blog-Test.jpg\"\/><\/a>\n<i><br \/> <a href=\"https:\/\/www.linkedin.com\/in\/kenlinscott\/\">By Ken Linscott<\/a><\/i> <span style=\"padding-left:250px\">Share this post \n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n<\/span>\n\n<hr \/>\n\n\n\n<p>At the beginning of 2019, CSC joined the U.S.\nDepartment of Homeland Security\u2019s Cybersecurity and Infrastructure Security\nAgency, the UK National Cyber Security Centre, and other leading security\norganizations\u2014including Cisco<sup>\u00ae<\/sup> Talos, FireEye<sup>\u00ae<\/sup>, and\nAkamai\u2014in alerting corporations and the public to the widespread, growing\nthreat of state-sponsored <strong>domain name\nsystem (DNS) hijacking. <\/strong>The targets of these attacks have included\ngovernment, corporate, telecommunication, and infrastructure entities\u2014and\nresult in website and email redirection to collect sensitive information.<\/p>\n\n\n\n<p>In a DNS hijacking, a bad actor can divert\ncompany customers to a fake website to steal login credentials and confidential\ndata. This poses a threat as not only a serious data breach, but a privacy\nnightmare, especially in light of more stringent government privacy policies,\nlike the EU\u2019s General Data Protection Regulation. Information can also be\nharvested from inbound company emails, then used to launch sophisticated\nphishing attacks on customers and employees using a company\u2019s own domains to\nmake the phish appear legitimate.<\/p>\n\n\n\n<p>Amongst all of the aforementioned directives,\ndomain locking is the predominant advice and recommended best practice given to\nbrand owners.<\/p>\n\n\n\n<p><strong>What\nare domain locks?<\/strong><\/p>\n\n\n\n<p>Domain locks were first introduced in the .COM\ndomain extension in response to bad actors gaining illegitimate access to\nregistry and registrar platforms to make unauthorized changes to domain name\nrecords. <\/p>\n\n\n\n<p>There are two different types of locks\navailable:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Registrar locks that are prefaced with [client]<\/li><li>Registry locks that are prefaced with [server]<\/li><\/ul>\n\n\n\n<p>You\u2019ve probably seen the following if you\u2019ve\nlooked at a domain name\u2019s WHOIS record: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>[client or server] Delete Prohibited<\/strong> &#8211; Ensures a domain name cannot be deleted or lapsed <\/li><li><strong>[client or server] Transfer Prohibited<\/strong> &#8211; Rejects unauthorized transfers away from domain name provider <\/li><li><strong>[client or server] Update Prohibited <\/strong>-No WHOIS modifications      allowed, including name server re-delegations<\/li><\/ul>\n\n\n\n<p>Both client (registrar) and server (registry)\nlocks apply additional layers of security on key operations. But it is more\ncomplicated than this, depending on:<\/p>\n\n\n\n<p>1. How the locks have been implemented. Registry locks have a common implementation regulated by the registry, but registrar locks are defined by the registrar themselves.<\/p>\n\n\n\n<p>2. Who is maintaining the definitive WHOIS\ndata. The registry (THICK registry) or the registrar (THIN registry, e.g., .COM\nand .NET where the registrar maintains the WHOIS data). <\/p>\n\n\n\n<p>But herein lies the problem\u2014for someone not in\nthe domain industry, it\u2019s very confusing as to what locks are applied to their\nbusiness-critical domains and what locks should be applied. <\/p>\n\n\n\n<p>So here, we explain the various lock options,\nand rate their effectiveness:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1.\nRegistrar transfer lock:<\/strong> <\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>ClientTransferProhibited<br \/><strong><em>Lock effectiveness: very low<\/em><\/strong><em> <\/em><\/li><\/ul>\n\n\n\n<p>All locks are optional except for this\nregistrar transfer lock that the Internet Corporation for Assigned Names and\nNumbers (ICANN) made mandatory for all generic top-level domains (gTLDs). These\nlocks will stop your registrar from being duped into transferring your domain\nto another registrar by a fraudulent request in a domain hijacking. <\/p>\n\n\n\n<p>But, this lock won\u2019t stop DNS hijacking (the\nmodification of your DNS), nor your domain from being maliciously lapsed. And\nif a cyber-criminal gains unauthorized access to your domain management portal,\nthey could still process a request to the registry to transfer the domain away\nfrom your management, as the transfer request is sent directly to the registry\nwithout extra validation. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2.\nFull registrar lock: <\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>ClientDeleteProhibited <\/li><li>ClientTransferProhibited<\/li><li>ClientUpdateProhibited<br \/><srong><i><strong>Lock effectiveness: low<\/strong><\/i><\/srong><\/li><\/ul>\n\n\n\n<p>You can mitigate more risks by employing all\nthree registrar locks as above. The\nimportant piece is to understand specifically what a registrar lock means to\nyour registrar, and how they have implemented them. If properly implemented, these\nlocks mean there\u2019s manual and more vigilant checks between your registrar and\nyou, to ensure that lapse, deletion, modification, and transfer requests are\nall legitimate and authorized. If not implemented properly, the risk is that\nonce a request is made in the domain management portal, authorized or not, it automatically\nremoves the registrar locks with no additional verification steps.<\/p>\n\n\n\n<p>The additional risk with these locks is that\nthe registry will not validate any of the requests that come from your registrar\u2014meaning\nthat if a cyber-criminal gains unauthorized access to your domain management\nportal, they could still process a request to the registry to lapse, delete,\nmodify (DNS hijacking), or transfer the domain away from your management\n(domain hijacking). <\/p>\n\n\n\n<p>In particular, this is a risk for any THICK\nregistries who hold the definitive WHOIS data. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3.\nFull registry lock:<\/strong> <\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>ServerDeleteProhibited <\/li><li>ServerTransferProhibited<\/li><li>ServerUpdateProhibited<br \/><strong><em>Lock effectiveness: medium <\/em><\/strong><\/li><\/ul>\n\n\n\n<p>These registry locks validate requests from the\nregistrar, so if the registrars\u2019 systems have been compromised, an unauthorized\nrequest will be identified and dismissed, thus providing you with far better\nprotection, particularly in the case of THICK registries who hold the\ndefinitive data. <\/p>\n\n\n\n<p>However, registry locks alone will still leave\nyou vulnerable to unauthorized update requests for THIN registry extensions\nlike .COM, where the definitive WHOIS data is held by the registrar. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4.\nCSC\u2019s MultiLock: <\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>ClientTransferProhibited<\/li><li>ServerDeleteProhibited <\/li><li>ServerTransferProhibited<\/li><li>ServerUpdateProhibited<br \/><strong><em>Lock effectiveness: high\u2014best in class<\/em><\/strong> <\/li><\/ul>\n\n\n\n<p>The most effective mechanism is to employ all\nregistry locks together with the registrar transfer locks\u2014at CSC, we combine\nthem into our MultiLock service, which includes an additional mechanism not\nshown in the WHOIS to protect any THIN WHOIS details held with us as the\nregistrar. Specifically, we do not allow any changes through Domain Manager if\nMultiLock is enabled, and this is achieved by cutting off automated access to\nthe WHOIS database we manage. This ensures that every step of the chain\nrequires manual validation, meaning <strong>the\nrequest will be validated in two separate handshakes\u2014between the client and\nregistrar, and then between the registrar and registry. <\/strong>This approach means\nthat regardless of a THICK or THIN registry, your business-critical domains are\nprotected from the risks of domain hijacking, DNS hijacking, and malicious\ndeletions. <\/p>\n\n\n\n<p>Our <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\/\">June 2019 CSC Cyber Security Report<\/a> identified that only 43% of the 120 media brands\nresearched had registry locks in place, despite the recommendations from\nindustry experts and governments.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg\" alt=\"\" class=\"wp-image-8121\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DomainLocksPost-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DomainLocksPost-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/08\/DomainLocksPost.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Given the increase in DNS hijacking attacks,\nit\u2019s key for brand owners and those responsible for their business\u2019 operating\ninfrastructure to understand not only the scale of the threat, but the\nintricacies of the solutions. Too many brand owners have a false sense of\nsecurity offered by registrar locks alone, and a more comprehensive solution\nshould be considered for fuller protection.<\/p>\n\n\n\n<p><strong>&gt;&gt;\n<\/strong><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/multilock-two-factor-authentication-solutions\/\"><strong>Request a consultation<\/strong><\/a><strong> to understand if your vital\ndomains have the appropriate locks applied.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency, the UK National Cyber Security Centre, and other leading security organizations\u2014including Cisco\u00ae Talos, FireEye\u00ae, and Akamai\u2014in alerting corporations and the public to the widespread, growing threat of state-sponsored domain name system [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,7,521],"tags":[],"class_list":["post-8119","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-domains","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Confused about domain locks? Understand the intricacies and security effectiveness. | CSC<\/title>\n<meta name=\"description\" content=\"By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Confused about domain locks? Understand the intricacies and security effectiveness. | CSC\" \/>\n<meta property=\"og:description\" content=\"By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-15T12:43:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-11T15:34:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Confused about domain locks? Understand the intricacies and security effectiveness.\",\"datePublished\":\"2019-08-15T12:43:03+00:00\",\"dateModified\":\"2021-06-11T15:34:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/\"},\"wordCount\":1077,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DomainLocksPost-1024x536.jpg\",\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Domains\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/\",\"name\":\"Confused about domain locks? Understand the intricacies and security effectiveness. | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DomainLocksPost-1024x536.jpg\",\"datePublished\":\"2019-08-15T12:43:03+00:00\",\"dateModified\":\"2021-06-11T15:34:54+00:00\",\"description\":\"By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DomainLocksPost-1024x536.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/DomainLocksPost-1024x536.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/confused-about-domain-locks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Confused about domain locks? Understand the intricacies and security effectiveness.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confused about domain locks? Understand the intricacies and security effectiveness. | CSC","description":"By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/","og_locale":"en_US","og_type":"article","og_title":"Confused about domain locks? Understand the intricacies and security effectiveness. | CSC","og_description":"By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security","og_url":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-08-15T12:43:03+00:00","article_modified_time":"2021-06-11T15:34:54+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Confused about domain locks? Understand the intricacies and security effectiveness.","datePublished":"2019-08-15T12:43:03+00:00","dateModified":"2021-06-11T15:34:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/"},"wordCount":1077,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg","articleSection":["Brand Protection","Cyber security","Domains","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/","url":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/","name":"Confused about domain locks? Understand the intricacies and security effectiveness. | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg","datePublished":"2019-08-15T12:43:03+00:00","dateModified":"2021-06-11T15:34:54+00:00","description":"By Ken Linscott Share this post At the beginning of 2019, CSC joined the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/08\/DomainLocksPost-1024x536.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Confused about domain locks? Understand the intricacies and security effectiveness."}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8119"}],"version-history":[{"count":8,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8119\/revisions"}],"predecessor-version":[{"id":9123,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8119\/revisions\/9123"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}