{"id":9302,"date":"2020-10-28T08:51:41","date_gmt":"2020-10-28T12:51:41","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=9302"},"modified":"2020-10-28T09:08:16","modified_gmt":"2020-10-28T13:08:16","slug":"digital-threats-to-businesses","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/","title":{"rendered":"10 Common Digital Threats to Businesses"},"content":{"rendered":"\n<i><br \/> By Letitia Thian, marketing manager, APAC<\/i> <span style=\"padding-left:150px\"><strong>Share this post <\/strong>\n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg\" alt=\"\" class=\"wp-image-9327\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The year 2020 has created an increased impetus for change\u2014especially as companies embrace digital transformation at an accelerated pace. Cybercriminals have also upped their game, switching their attention to hot targets such as healthcare and pharmaceutical brands. <\/p>\n\n\n\n<p>Despite criminal focus changing, some of the underlying tactics aren\u2019t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers. Vulnerable digital assets include domain names, domain name system (DNS), and secure sockets layer (SSL) digital certificates. <\/p>\n\n\n\n<p><strong>Here are 10 types of digital threats:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/dns-hijack_tn.png\"\/> <\/td><td><strong>1.<\/strong> <strong>DNS hijacking<\/strong> \u2013 When a third party forwards a company&#8217;s web visitors to fake websites to steal login credentials and confidential data.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/cache-poisoning_tn.png\"\/><strong><\/strong><\/td><td><strong>2. DNS cache poisoning<\/strong> \u2013 When cyber criminals re-route saved internet queries to malicious websites.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/expired-ssl_tn.png\"\/><strong><\/strong><\/td><td><strong>3. Expired digital certificates<\/strong> \u2013 When organizations that require a large volume of digital certificates are not able to replace them before expiration, leaving websites open to threats.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/expired-domains_tn.png\"\/><strong><\/strong><\/td><td><strong>4. Expired or abandoned domain names<\/strong> \u2013 When lapsing the wrong domain names might mean the loss of business-critical services that enable you to operate. Corporate domain names carry a footprint of activity that can be leveraged as an attack vector.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/ddos_tn.png\"\/><strong><\/strong><\/td><td><strong>5. Distributed denial of service (DDoS) attacks<\/strong> \u2013 When a high volume of internet traffic bombards a targeted server, service, or network to disrupt normal traffic.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/counterfeit_tn.png\"\/><strong><\/strong><\/td><td><strong>6. Online counterfeiting<\/strong> \u2013 When fraudulent product listings and websites divert revenue away from genuine brands, and in some cases, are dangerous to the consumer (e.g., fake pharmaceutical products, food, and alcohol). Counterfeits are found in every industry from fashion to consumer electronics through food, pharmaceuticals, and consumer goods.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/domain-infringements_tn.png\"\/><strong><\/strong><\/td><td><strong>7. Domain infringements<\/strong> \u2013 When spoofed domains that are misspelled or use a combination of words (e.g., buy-brand.com) divert traffic from brand websites. Monetized click sites, copycat websites, and counterfeit sites are designed to defraud.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/ip-infringements_tn.png\"\/><strong><\/strong><\/td><td><strong>8. IP infringement<\/strong> \u2013 When an established brand\u2019s name, logo, or other assets (content, social media, pay-per-click, etc.) are used to impersonate that brand for financial gain, or to add \u201clegitimacy\u201d to misinformation. This dilutes a brand, and damages reputation and profits.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/phishing_tn.png\"\/><strong><\/strong><\/td><td><strong>9. Phishing<\/strong> \u2013 When innovative and costly scams are used to obtain data that can lead to corporate data breaches, credit card fraud, and identity theft. The potential for reputational damage, legal action, and data privacy fines are high.<\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/email-fraud_tn.png\"\/><strong><\/strong><\/td><td><strong>10. Email fraud<\/strong> \u2013 When emails forge a company\u2019s sender identity to phish for information and commit fraud.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>To find out how CSC can help you prevent these threats from attacking your brand, <a href=\"https:\/\/www.cscdbs.com\/en\/digital-threats\/\">contact us<\/a>.<\/p>\n\n\n<p><\/p>\n<p><\/p><\/span>","protected":false},"excerpt":{"rendered":"<p>By Letitia Thian, marketing manager, APAC Share this post The year 2020 has created an increased impetus for change\u2014especially as companies embrace digital transformation at an accelerated pace. Cybercriminals have also upped their game, switching their attention to hot targets such as healthcare and pharmaceutical brands. Despite criminal focus changing, some of the underlying tactics [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,521],"tags":[],"class_list":["post-9302","post","type-post","status-publish","format-standard","hentry","category-brands","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 Common Digital Threats to Businesses | CSC<\/title>\n<meta name=\"description\" content=\"Despite criminal focus changing, some of the underlying tactics aren\u2019t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Common Digital Threats to Businesses | CSC\" \/>\n<meta property=\"og:description\" content=\"Despite criminal focus changing, some of the underlying tactics aren\u2019t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-28T12:51:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-28T13:08:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"10 Common Digital Threats to Businesses\",\"datePublished\":\"2020-10-28T12:51:41+00:00\",\"dateModified\":\"2020-10-28T13:08:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg\",\"articleSection\":[\"Brand Protection\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/\",\"name\":\"10 Common Digital Threats to Businesses | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg\",\"datePublished\":\"2020-10-28T12:51:41+00:00\",\"dateModified\":\"2020-10-28T13:08:16+00:00\",\"description\":\"Despite criminal focus changing, some of the underlying tactics aren\u2019t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2020\\\/10\\\/10-Common-Digital-Threats-to-Business-2.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2020\\\/10\\\/10-Common-Digital-Threats-to-Business-2.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/digital-threats-to-businesses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Common Digital Threats to Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Common Digital Threats to Businesses | CSC","description":"Despite criminal focus changing, some of the underlying tactics aren\u2019t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/","og_locale":"en_US","og_type":"article","og_title":"10 Common Digital Threats to Businesses | CSC","og_description":"Despite criminal focus changing, some of the underlying tactics aren\u2019t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers.","og_url":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-10-28T12:51:41+00:00","article_modified_time":"2020-10-28T13:08:16+00:00","og_image":[{"url":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"10 Common Digital Threats to Businesses","datePublished":"2020-10-28T12:51:41+00:00","dateModified":"2020-10-28T13:08:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/"},"wordCount":423,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg","articleSection":["Brand Protection","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/","url":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/","name":"10 Common Digital Threats to Businesses | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2-1024x536.jpg","datePublished":"2020-10-28T12:51:41+00:00","dateModified":"2020-10-28T13:08:16+00:00","description":"Despite criminal focus changing, some of the underlying tactics aren\u2019t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/10\/10-Common-Digital-Threats-to-Business-2.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/digital-threats-to-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"10 Common Digital Threats to Businesses"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=9302"}],"version-history":[{"count":18,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9302\/revisions"}],"predecessor-version":[{"id":9335,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9302\/revisions\/9335"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=9302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=9302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=9302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}