{"id":8388,"date":"2019-12-10T08:49:47","date_gmt":"2019-12-10T13:49:47","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8388"},"modified":"2026-05-05T05:12:24","modified_gmt":"2026-05-05T09:12:24","slug":"cyber-security-risk-postures","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","title":{"rendered":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures<\/h3>\n\n\n\n<p>In 2019, we\u2019ve seen a surge in domain name system (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.\u2019s Cybersecurity Centre, ICANN, and other notable security experts. Although, the topic has gained popularity amongst CIOs and CISOs, most companies are still overlooking important security blind spots when it comes to securing their digital assets outside the enterprise firewalls\u2014domains, DNS, digital certificates. <\/p>\n\n\n\n<p>In fact, most\norganizations, regardless of geographic location or industry, are exposed to\nthese risks. Our most recent <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\/\">Domain Name Security report<\/a> featuring insights from the\ndefense, media, and financial sectors illustrates the risk trends.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Do you know who your domain name<br \/>registrar is (the domain name management company that holds the keys to the<br \/>kingdom)?<\/li>\n\n\n\n<li>What do you know about your<br \/>domain name registrar\u2019s controls, security, policies and processes?<\/li>\n<\/ol>\n\n\n\n<p>I like to think of\nthis topic like the <a href=\"https:\/\/www.linkedin.com\/pulse\/domain-names-dns-ssls-electricity-vincent-d-angelo\/\">electricity that powers our homes<\/a>. Everyone expects their lights\nto work, but then, what happens when the power goes out? In the enterprise\nenvironment, domain names, DNS, and certificates are the lifeline to any internet-based\napplication including websites, email, apps, virtual private networks (VPNs), voice\nover IP (VoIP) and more. <\/p>\n\n\n\n<p>Unfortunately, the\nsecurity of these critical digital assets is often overlooked because management\nresponsibilities are often split between legal and IP, marketing, IT and security,\nand third parties, like agencies and law firms. As a result, cyber criminals\nand state-sponsored actors are capitalizing on these vulnerabilities to launch\nsocial engineering attacks in an attempt to hijack an organization\u2019s entire web\npresence. Most of these attacks are occurring by targeting critical nodes, such\nas <a href=\"https:\/\/krebsonsecurity.com\/2019\/10\/breaches-at-networksolutions-register-com-and-web-com\/\">domain name registrars<\/a>, which can lead to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Loss<br \/>of control of business-critical internet assets like websites, email, apps, VPNs,<br \/>and VoIP<\/li>\n\n\n\n<li>Compliance<br \/>risks and data breaches, which can result in fines, especially with the<br \/>introduction of the EU\u2019s General Data Protection Regulation and new privacy<br \/>laws<\/li>\n\n\n\n<li>Reputation<br \/>loss, which leads to loss of revenue and a decrease in market valuation<\/li>\n\n\n\n<li>Loss<br \/>of business-critical intellectual property <\/li>\n\n\n\n<li>Risk<br \/>of transfer of funds to unauthorized third parties <\/li>\n<\/ul>\n\n\n\n<p>To date, the focus\nof cyber security has primarily been to secure as much as possible behind the\nfirewall. The reality is that domain names, DNS, and digital certificates are\npublicly accessible and haven\u2019t been a focus in most organizations. Security\ngoes beyond the firewall, not just behind it. The \u201celectricity\u201d that powers\nyour business needs constant vigilance and management.<\/p>\n\n\n\n<p>A defense in depth\napproach can help companies apply the necessary multi-layered security controls\nrequired to defend their digital assets outside the firewall.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png\" alt=\"\" class=\"wp-image-8389\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE-300x169.png 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE-768x432.png 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Here are some resources that may be helpful\nin raising awareness of this topic in your organization:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cscglobal.com\/service\/webinar\/DNS-Hijacking\">DNS Hijacking:<\/a> Security Learnings From the<br \/>Latest Incidents <\/li>\n\n\n\n<li>Mitigate<br \/>Security Threats Through <a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/mitigate-security-threats\/\">Digital Certificate Policy Enforcement<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/confused-about-domain-locks\">Confused About Domain Locks?<\/a> Understand the Intricacies and Security<br \/>Effectiveness<\/li>\n\n\n\n<li>CSC\u2019s<br \/>latest innovation, <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/security-center\/\">CSC Security Center<\/a><sup>SM<\/sup>, the first-of-its-kind platform<br \/>that identifies and manages the aforementioned risks beyond the firewall<\/li>\n\n\n\n<li>CSC\u2019s<br \/><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cyber-security-report\/\">Cyber Security Report<\/a> which references current domain<br \/>security trends and best practices<\/li>\n<\/ul>\n\n\n\n<p>&gt;&gt;\n<a href=\"https:\/\/www.cscdigitalbrand.services\/en\/request-consultation\/\">Request for a complimentary domain security\nassessment<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures In 2019, we\u2019ve seen a surge in domain name system (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.\u2019s Cybersecurity Centre, ICANN, and other notable security experts. Although, the topic has gained popularity amongst CIOs [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[171],"tags":[],"class_list":["post-8388","post","type-post","status-publish","format-standard","hentry","category-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC<\/title>\n<meta name=\"description\" content=\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures In 2019, we\u2019ve seen a surge in domain name system (DNS)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC\" \/>\n<meta property=\"og:description\" content=\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures In 2019, we\u2019ve seen a surge in domain name system (DNS)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-10T13:49:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T09:12:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures\",\"datePublished\":\"2019-12-10T13:49:47+00:00\",\"dateModified\":\"2026-05-05T09:12:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\"},\"wordCount\":533,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\",\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\",\"name\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\",\"datePublished\":\"2019-12-10T13:49:47+00:00\",\"dateModified\":\"2026-05-05T09:12:24+00:00\",\"description\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures In 2019, we\u2019ve seen a surge in domain name system (DNS)\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/DBS-BLOG-IMAGE-1024x576.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-risk-postures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC","description":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures In 2019, we\u2019ve seen a surge in domain name system (DNS)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","og_locale":"en_US","og_type":"article","og_title":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC","og_description":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures In 2019, we\u2019ve seen a surge in domain name system (DNS)","og_url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-12-10T13:49:47+00:00","article_modified_time":"2026-05-05T09:12:24+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/12\/DBS-BLOG-IMAGE.png","type":"image\/png"}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures","datePublished":"2019-12-10T13:49:47+00:00","dateModified":"2026-05-05T09:12:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/"},"wordCount":533,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png","articleSection":["Cyber security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/","name":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png","datePublished":"2019-12-10T13:49:47+00:00","dateModified":"2026-05-05T09:12:24+00:00","description":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures In 2019, we\u2019ve seen a surge in domain name system (DNS)","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/12\/DBS-BLOG-IMAGE-1024x576.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-risk-postures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8388"}],"version-history":[{"count":10,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8388\/revisions"}],"predecessor-version":[{"id":15518,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8388\/revisions\/15518"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}