{"id":9284,"date":"2020-10-19T09:57:28","date_gmt":"2020-10-19T13:57:28","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=9284"},"modified":"2021-11-09T14:25:26","modified_gmt":"2021-11-09T19:25:26","slug":"c-suite-council-for-domain-security","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/","title":{"rendered":"Creating a C-suite Council for Domain Security"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg\" alt=\"\" class=\"wp-image-9288\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<i><br \/> By Sue Watts, Global Marketing Leader<\/i> <span style=\"padding-left:100px\"><strong>Share this post <\/strong>\n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n\n\n\n<p>While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks such as domain or domain name system (DNS) hijacking, subdomain hijacking, and domain shadowing.<\/p>\n\n\n\n<p>Cyber criminals regularly use a wide variety of malicious tactics to gain access to foundational digital components that enable a company to operate online\u2014domain names, the domain name system (DNS), and digital certificates. The consequences are devastating to brands, reputations, and the bottom line.<\/p>\n\n\n\n<p>That\u2019s why it\u2019s more important than ever to have the support of your company\u2019s C-suite members. For chief information security officers (CISOs), creating a C-suite Domain Security Council to\u00a0identify and monitor domain security practices and procedures can be a win-win. Through such a council, CISOs collaborate with corporate C-suite members to identify, implement, and continuously monitor domain security policies to improve upon them. For example, the chief compliance officer would be very keen to understand the risk, and how to rate it. General counsel would be concerned about IP rights and data privacy due to the General Data Protection Regulation (GDPR). A chief marketing officer would want to understand the business impact to a brand in the case of a cyber attack. There\u2019s a lot at stake with a variety of stakeholders needing to weigh in.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What are some key focus areas for the C-suite council?<\/strong><\/h3>\n\n\n\n<p><strong>To get your Domain Security Council started, you\u2019ll want to concentrate in these three focus areas:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Establish a cadence of monitoring new threats<\/strong><br \/>You\u2019ll need to be sure that your organization\u2019s monitoring the current digital threat landscape. This can be accomplished via threat intelligence reports, with updates on how bad actors  are continuously finding new ways to infiltrate networks for unlawful purposes.<br \/><br \/><\/li><li><strong>Include domain and DNS compromises as part of your company\u2019s risk register<\/strong><br \/> Companies use their risk register as a repository of all potentials risks for compliance and prioritization. This ensures that the organization will consider these attacks as known and serious risk components that merit continuous attention.<br \/><br \/><\/li><li><strong>Establish key performance indicators (KPIs)<\/strong><br \/> To constantly improve upon progress, a KPI \u201creport card\u201d should measure the percentage of vital domain names that have registry locks. By monitoring this, your organization will have an advanced line of defense against cyber attacks. In addition, a DNS health checks should be required each year, where you would look at the number of providers, DNS security extensions (DNSSEC), and distributed denial of service (DDoS) attack protection. Lastly, domain security internal training can help build the knowledge base needed for this level of security. <\/li><\/ol>\n\n\n\n<p>In a world where hackers and cyber criminals are always creating more innovative and complex schemes, companies need to be aware of just how serious certain risks are within their organizations, and learn how to \u00a0get secure against them.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdbs.com\/en\/resources-news\/domain-security-report\/\">Read about just how exposed some of the largest organizations in the world are in our Domain Security Report.<\/a><\/p>\n<\/span>","protected":false},"excerpt":{"rendered":"<p>By Sue Watts, Global Marketing Leader Share this post While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[547,548,521],"tags":[],"class_list":["post-9284","post","type-post","status-publish","format-standard","hentry","category-domain-management","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Creating a C-suite Council for Domain Security | CSC<\/title>\n<meta name=\"description\" content=\"While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks such as domain or domain name system (DNS) hijacking, subdomain hijacking, and domain shadowing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Creating a C-suite Council for Domain Security | CSC\" \/>\n<meta property=\"og:description\" content=\"While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks such as domain or domain name system (DNS) hijacking, subdomain hijacking, and domain shadowing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-19T13:57:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-09T19:25:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Creating a C-suite Council for Domain Security\",\"datePublished\":\"2020-10-19T13:57:28+00:00\",\"dateModified\":\"2021-11-09T19:25:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/\"},\"wordCount\":533,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg\",\"articleSection\":[\"Domain Management\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/\",\"name\":\"Creating a C-suite Council for Domain Security | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg\",\"datePublished\":\"2020-10-19T13:57:28+00:00\",\"dateModified\":\"2021-11-09T19:25:26+00:00\",\"description\":\"While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks such as domain or domain name system (DNS) hijacking, subdomain hijacking, and domain shadowing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2020\\\/10\\\/DBS_CSuite_Security_Council_10.19.20.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2020\\\/10\\\/DBS_CSuite_Security_Council_10.19.20.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/c-suite-council-for-domain-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Creating a C-suite Council for Domain Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Creating a C-suite Council for Domain Security | CSC","description":"While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks such as domain or domain name system (DNS) hijacking, subdomain hijacking, and domain shadowing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/","og_locale":"en_US","og_type":"article","og_title":"Creating a C-suite Council for Domain Security | CSC","og_description":"While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks such as domain or domain name system (DNS) hijacking, subdomain hijacking, and domain shadowing.","og_url":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-10-19T13:57:28+00:00","article_modified_time":"2021-11-09T19:25:26+00:00","og_image":[{"url":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Creating a C-suite Council for Domain Security","datePublished":"2020-10-19T13:57:28+00:00","dateModified":"2021-11-09T19:25:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/"},"wordCount":533,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg","articleSection":["Domain Management","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/","url":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/","name":"Creating a C-suite Council for Domain Security | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20-1024x536.jpg","datePublished":"2020-10-19T13:57:28+00:00","dateModified":"2021-11-09T19:25:26+00:00","description":"While companies are making significant investments to improve their security posture with the deployment of secure firewalls, endpoint management software, and monitoring solutions, many are still exposed to security blind spots when it comes to domain security. Companies need to invest in protecting against cyber attacks such as domain or domain name system (DNS) hijacking, subdomain hijacking, and domain shadowing.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/DBS_CSuite_Security_Council_10.19.20.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/c-suite-council-for-domain-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Creating a C-suite Council for Domain Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=9284"}],"version-history":[{"count":3,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9284\/revisions"}],"predecessor-version":[{"id":9289,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9284\/revisions\/9289"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=9284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=9284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=9284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}