Brand Protection |
Sponsored by |
Until the pandemic hit, I rarely thought about upload bandwidth. I mostly used upload bandwidth to send files to people, and I rarely cared if they received the files immediately -- I was happy as long as files got sent. But the pandemic changed everything for millions of people. All of a sudden, homes were unable to function well due to problems with uploading.
Marketers far and wide have piled onto the non-fungible token (NFT) craze. To some great success and fanfare, NFTs are being used to promote and monetize media, goods, and services in almost every segment. Media, Fashion, Entertainment, Sports, Gaming, Art, Beverage, Consumer Goods, Financial, and even Enterprise Software companies are getting into the mix. This brief review examines why, how, and where marketers are using NFTs, how NFTs are being abused and gives high-level advice to marketers and brand protection professionals.
One of the central goals of a brand protection program is detecting infringing third-party activity that falls outside the firewall - that is, external to a brand owner's portfolio of official core and tactical domains. Brand threats occur across a range of internet channels, but domain name abuse is one of the most significant areas for concern, both in terms of the visibility and potential for confusion of branded domain names by potential customers, and the enforcement options available. For this reason, domain monitoring is considered a core component of a brand protection service.
Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks.
Avivah Litan, the storied Gartner analyst, laid it down succinctly for insiders in her blog two and one-half years ago. She said, "Web 3.0 will transform us from Web 2.0's monetization via surveillance capitalism and advertising to monetization built directly into the protocol that is equally available to any connected user." Translated, that means we'll control our destiny by owning and managing our credentials for logging into systems, content, financial resources, and, importantly, our data. And, we are told, blockchain technology will enable all that.
Months ago, while watching a Saturday Night Live skit about non-fungible tokens (NFT) featuring a parody of Janet Yellen speaking to a high school economics class, I realized what an NFT is and how they work. What they represent, how they are minted, and how their value is exchanged became clear while watching Pete Davidson in a boy wonder unitard rap about the latest crypto-phenomena. It was only later that I realized that NFTs have plenty of practical applications.
We had a very interesting presentation and discussion regarding the topic of interplanetary internet with my international colleagues, of which Vint Cerf – one of the “fathers of the internet” – is also a member. As a partner of the Interplanetary Networking Special Interest Group (IPNSIG), he took us on a journey that he has been involved with over the last 20 years regarding communication networks in space. A true mind-broadening experience.
In the 2021 Domain Security Report, we analyzed the trend of domain security adoption with respect to the type of domain registrar used, and found that 57% of Global 2000 organizations use consumer-grade registrars with limited protection against domain and DNS hijacking, distributed denial of service (DDoS), man-in-the-middle attacks (MitM), or DNS cache poisoning. On average, the adoption of domain security controls is two times higher for enterprise-class registrars than for those using consumer-grade registrars.
Domain brand squatting can be defined as the unauthorized or dishonest use of a brand or company identifiers in domain names. It is often linked to the use of look-alike domains in bad faith, and we see it all the time. The threat actors behind these domains are called different names, though a prevalent one would be “typosquatters.” The Hot on the Trail of Compulsive Brand Squatters webinar showcased how these people are infiltrating the Internet. The first page of PhishTank’s valid phish search alone as of this writing tells us that domain brand squatting is a real and present danger.
According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing.