{"id":9993,"date":"2021-05-20T13:07:52","date_gmt":"2021-05-20T17:07:52","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=9993"},"modified":"2021-11-09T13:55:51","modified_gmt":"2021-11-09T18:55:51","slug":"your-cybersecurity-is-only-as-strong-as-your-weakest-vendor","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/","title":{"rendered":"Your Cybersecurity is Only as Strong as Your Weakest Vendor"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg\" alt=\"\" class=\"wp-image-10008\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-300x157.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-768x402.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>By Sue Watts, global marketing leader<span style=\"padding-left:85px\"><strong>Share this post <\/strong><\/span>  <a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a> <a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a> <a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a><\/p>\n\n\n\n<p>Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk. The recent SolarWinds attack escalates the critical need for chief compliance officers to collaborate with their business counterparts to identify and mitigate potentially unknown threats that lie within third-party supply chains. Yet how can companies manage this risk when it\u2019s not if but when you\u2019re attacked?<\/p>\n\n\n\n<p>To assess, we can look at the domain and domain name system (DNS) vulnerabilities within a company\u2019s cyber security posture, as this is often a blind spot for many businesses. Companies manage their domain portfolios via two general categories of domain registrars: consumer-grade registrars and enterprise-class registrars. A consumer-grade registrar specializes in domain services, websites, and email for personal use, entrepreneurs, and small businesses that are just getting started. In contrast, enterprise-class registrars focus on corporations and brand owners that require increased security, advanced capabilities, and support staff.<\/p>\n\n\n\n<p>The registrar that your organization uses matters. As my colleague, Vin D\u2019Angelo, mentions in <em>Infosecurity Magazine<\/em>, consumer-grade domain registrars are not inherently malicious actors, but because of certain standard business practices, <a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/avoid-headline-domain-registrars\/\">they attract bad actors that execute brand abuse, phishing attacks, and fraud.<\/a> For example, on February 1, the PERL.COM domain, managed by the Perl Foundation, was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/perlcom-domain-stolen-now-using-ip-address-tied-to-malware\/\">hijacked by cyber criminals who redirected the URL to a domain parking site<\/a> that may have been related to sites that distributed malware in the past. Bad actors had hacked into the PERL.COM account (whose domain registrar is consumer-grade Network Solutions) and the Perl Foundation found it for sale for $190K at <a href=\"https:\/\/www.afternic.com\/\">afternic.com<\/a>, a domain parking site.<\/p>\n\n\n\n<p>As I mentioned in my blog \u201c<a href=\"https:\/\/www.cscdbs.com\/blog\/approach-to-keep-your-domain-names-and-dns-secure\/\">Four-Pronged Approach to Keep Your Domain Names and DNS Secure from Cyber Attacks<\/a>,\u201d working with an enterprise-class provider can help you develop the right compliance checklist for your organization to select the right registrar vendor. When it comes to working with your registrar, you need to work with a provider that has invested in protecting its own systems. In essence, it takes the right people, processes, and technology.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>People<\/strong><\/h3>\n\n\n\n<p>A good enterprise-class registrar should provide corporate clients with a dedicated account team, necessary to securely manage their business. You want to be sure you\u2019re working with a vendor that also knows who they\u2019re doing business on the back end, so you should be completing OFAC screening before account set-up. A good registrar also needs to have 24x7x365 in-house support. It\u2019s also important that they can provide global support in local languages via certified and fully trained managers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Processes<\/strong><\/h3>\n\n\n\n<p>Registrars should be Internet Corporation for Assigned Names and Number (ICANN) and registry accredited. A registrar that\u2019s qualified to serve an enterprise will offer a full accounting of all your domains, DNS, and digital certificate providers. It should provide cyber security training for its staff, including phishing and social engineering awareness. It\u2019s also important for your registrar to mandate written requests (never via phone), be data and policy compliant\u2014following the rules of the EU\u2019s General Data Protection Regulation (GDPR) and other similar regulations, like WHOIS practices\u2014as well as have a registry transfer-lock policy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Technology<\/strong><\/h3>\n\n\n\n<p>With all of the cyber security threats today, not only does your domain name registrar need to have the right technology\u2014to protect itself and your company from a data breach\u2014but it also needs best-in-class operations practices that put security at the forefront of its mission, and in how it engages with you. An enterprise-class registrar should have ISO 27001 accredited data centers, SOC 2\u00ae compliance, and third-party penetration and vulnerability testing. They should conduct regular security tests, including SQL injection and XSS.<\/p>\n\n\n\n<p>While anyone can say they offer services that meet the needs of today\u2019s global corporations, the onus is on you to do the homework to understand the differences between third-party providers. Companies need to understand how their choice of provider fits into decisions made about their organization\u2019s overall security posture, along with concerns about compliance and risk.<\/p>\n\n\n\n<p>CSC encourages its clients and corporations across the globe to adopt a defense in depth approach to secure vital domain names, DNS, and digital certificates. They should assess the security, controls, and processes of their domain name registrar and DNS management provider. Additionally we recommend implementing two-factor authentication, monitoring DNS activity, and using security measures like domain name registry locks, DNS security extensions (DNSSEC), domain-based message authentication, reporting, and conformance (DMARC), and redundancy on DNS hosting.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk.<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548,521],"tags":[],"class_list":["post-9993","post","type-post","status-publish","format-standard","hentry","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Cybersecurity is Only as Strong as Your Weakest Vendor | CSC<\/title>\n<meta name=\"description\" content=\"Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Cybersecurity is Only as Strong as Your Weakest Vendor | CSC\" \/>\n<meta property=\"og:description\" content=\"Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T17:07:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-09T18:55:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Your Cybersecurity is Only as Strong as Your Weakest Vendor\",\"datePublished\":\"2021-05-20T17:07:52+00:00\",\"dateModified\":\"2021-11-09T18:55:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg\",\"articleSection\":[\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/\",\"name\":\"Your Cybersecurity is Only as Strong as Your Weakest Vendor | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg\",\"datePublished\":\"2021-05-20T17:07:52+00:00\",\"dateModified\":\"2021-11-09T18:55:51+00:00\",\"description\":\"Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/05\\\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/05\\\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Cybersecurity is Only as Strong as Your Weakest Vendor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Cybersecurity is Only as Strong as Your Weakest Vendor | CSC","description":"Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/","og_locale":"en_US","og_type":"article","og_title":"Your Cybersecurity is Only as Strong as Your Weakest Vendor | CSC","og_description":"Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk.","og_url":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2021-05-20T17:07:52+00:00","article_modified_time":"2021-11-09T18:55:51+00:00","og_image":[{"url":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Your Cybersecurity is Only as Strong as Your Weakest Vendor","datePublished":"2021-05-20T17:07:52+00:00","dateModified":"2021-11-09T18:55:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/"},"wordCount":777,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg","articleSection":["Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/","url":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/","name":"Your Cybersecurity is Only as Strong as Your Weakest Vendor | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor-1024x536.jpg","datePublished":"2021-05-20T17:07:52+00:00","dateModified":"2021-11-09T18:55:51+00:00","description":"Managing the risk of third parties has become a compliance focus for many large organizations. Companies even work with third-party service providers and external vendors just to manage this risk.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/05\/Your-Cybersecurity-is-only-as-Strong-as-Your-Weakest-Vendor.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/your-cybersecurity-is-only-as-strong-as-your-weakest-vendor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Your Cybersecurity is Only as Strong as Your Weakest Vendor"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=9993"}],"version-history":[{"count":6,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9993\/revisions"}],"predecessor-version":[{"id":10009,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/9993\/revisions\/10009"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=9993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=9993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=9993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}