Home / Industry

10 Common Digital Threats to Businesses

The year 2020 has created an increased impetus for change—especially as companies embrace digital transformation at an accelerated pace. Cybercriminals have also upped their game, switching their attention to hot targets such as healthcare and pharmaceutical brands.

Despite criminal focus changing, some of the underlying tactics aren’t new. Cybercriminals continue to exploit digital blind spots, especially with the digital assets that are managed by third-party providers. Vulnerable digital assets include domain names, domain name system (DNS), and secure sockets layer (SSL) digital certificates.

Here are 10 types of digital threats:

1. DNS hijacking – When a third party forwards a company’s web visitors to fake websites to steal login credentials and confidential data.

2. DNS cache poisoning – When cyber criminals re-route saved internet queries to malicious websites.

3. Expired digital certificates – When organizations that require a large volume of digital certificates are not able to replace them before expiration, leaving websites open to threats.

4. Expired or abandoned domain names – When lapsing the wrong domain names might mean the loss of business-critical services that enable you to operate. Corporate domain names carry a footprint of activity that can be leveraged as an attack vector.

5. Distributed denial of service (DDoS) attacks – When a high volume of internet traffic bombards a targeted server, service, or network to disrupt normal traffic.

6. Online counterfeiting – When fraudulent product listings and websites divert revenue away from genuine brands, and in some cases, are dangerous to the consumer (e.g., fake pharmaceutical products, food, and alcohol). Counterfeits are found in every industry from fashion to consumer electronics through food, pharmaceuticals, and consumer goods.

7. Domain infringements – When spoofed domains that are misspelled or use a combination of words (e.g., buy-brand.com) divert traffic from brand websites. Monetized click sites, copycat websites, and counterfeit sites are designed to defraud.

8. IP infringement – When an established brand’s name, logo, or other assets (content, social media, pay-per-click, etc.) are used to impersonate that brand for financial gain, or to add “legitimacy” to misinformation. This dilutes a brand, and damages reputation and profits.

9. Phishing – When innovative and costly scams are used to obtain data that can lead to corporate data breaches, credit card fraud, and identity theft. The potential for reputational damage, legal action, and data privacy fines are high.

10. Email fraud – When emails forge a company’s sender identity to phish for information and commit fraud.

To find out how CSC can help you prevent these threats from attacking your brand, contact us.

By CSC, We are the business behind business

We help effectively manage, promote, and secure our clients’ valuable brand assets against the threats of the online world. Leading companies around the world choose CSC as their trusted partner to gain control of their digital assets, maximize their online potential, and increase online security against brand risks.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API