Infographic - Monthly Internet Risk Cyber Threat Trends | November 2017

Posted by Alexa Villanueva

Wed, Dec 06, 2017

Mobile apps leveraging brands and posing security risks to end users increased by 105%

BrandProtect uses propietary technology to constantly search the internet for threats associated with operational, legal, reputational, revenue and compliance risk.

View BrandProtect's Monthly Internet Risk Cyber Threat Trends and learn about the monthly trends on mitigation and take downs of malicious domains, brand, social media, mobile and phishing threats.

Download November's Infographic!

Read More

Topics: Brand Protection, Domain Management, Social Media Monitoring, infographic, mitigation, Phishing trends, cyber threat, trends, cyber threat trends

Infographic - Monthly Internet Risk Cyber Threat Trends | October 2017

Posted by Alexa Villanueva

Tue, Nov 07, 2017

Threats on social media increased significantly compared to September! 

BrandProtect uses propietary technology to constantly search the internet for threats associated with operational, legal, reputational, revenue and compliance risk.

View BrandProtect's Monthly Internet Risk Cyber Threat Trends and learn about the monthly trends on mitigation and take downs of malicious domains, brand, social media, mobile and phishing threats.

Download October's Infographic

Read More

Topics: Brand Protection, Domain Management, Social Media Monitoring, infographic, mitigation, Phishing trends, cyber threat, trends, cyber threat trends

Infographic - Monthly Internet Risk Cyber Threat Trends | September 2017

Posted by Alexa Villanueva

Wed, Oct 11, 2017

Mitigation of mobile apps posing security risks to end users increased by 271%

BrandProtect uses propietary technology to constantly search the internet for threats associated with operational, legal, reputational, revenue and compliance risk.

Read More

Topics: Brand Protection, Domain Management, Social Media Monitoring, infographic, mitigation, Phishing trends, cyber threat, trends, cyber threat trends

Jeb Bush Has A Domain Problem.  Do You?

Posted by Greg Mancusi-Ungaro

Tue, Dec 08, 2015

That sound you hear is a bunch of the staffers at jeb2016.com (the official Jeb Bush website) trying to make it seem like they are on top of their web presence. Or is that the Trump team, laughing?  We can't be sure.  

The Washington Post reported yesterday that people who type "jebbush.com" into a browser found themselves redirected to Donald Trump's official site, donaldjtrump.com. You read that right -- one of the leading candidates for the Republican nomination for President of the United States has found himself on the wrong side of one of the most basic domain abuse issues. Someone else has registered a similar domain and is using it to confuse the public. Try it: jebbush.com (It's fun!)

Download the InfoGraphic

Yes, it's funny for a moment. But in reality it is very scary. In fact, it is potentially devastating.

The massive breach at Anthem earlier this year originated from spear phishing emails that were sent from domains that impersonated Anthem. The employees who recieved the emails did not notice that the emails originated from a rogue address. They unwittingly opened attachments or clicked on links that gave the attackers inside access to Anthem networks. 

Game over.

When others appropriate your web presence by registering or appropriating a similar or easily mistaken domain, they put themselves in a position to confuse your message, siphon revenues or worse. 

How big a problem can it be?...

Read More

Topics: Brand Protection, data breach, scam, brand abuse, Domain Management, cybersquatting, Phishing, gTLD, brandprotect, infographic, cyber threats, online risk, brandjacking, Health Care, OSINT, Jeb Bush, Legal, Spear Phishing, CISO, CSO, InfoSec, Donald Trump, 2016 Elections, Anthem, CMO

Credit Unions Need to Start Managing Their Social Media Risk

Posted by Natalie Gleba

Fri, Aug 01, 2014

credit-unions

On December 11, 2013, the Federal Financial Institutions Examination Council (“FFIEC”) released the article, Social Media: Consumer Compliance Risk Management Guidelines, to educate financial institutions about the risks involved in using social media. There are no additional obligations, however, this Guidance strongly suggests that financial institutions, effective immediately, become educated on the potential compliance, reputation and operational risks as it relates to social media use, and implement these guidelines into their risk management strategy. Credit Unions, like Banks, can benefit from these risk assessment strategies and need to be aware of the reputational damage that can occur via social media as a result of neglecting risk management. Here are the summarized risks that Credit Unions should be aware of and integrate into their risk assessment process:

Read More

Topics: Brand Protection, risk management, Social Media Monitoring, Phishing, social media, cyber threats, online risk

Why Social Media Risk Planning is Necessary for Brand Image

Posted by Natalie Gleba

Fri, Jul 11, 2014

It is no surprise that 84% of businesses have now adopted social media to implement an online presence to communicate with customers and overall, increase their brand reach [1]. Whether a small independent business or a large B2B company, it is more evident than ever that businesses who do not build and maintain an online social media presence will get left behind, and evidently lack competitiveness. Having a social media presence offers clear advantages for marketing and sales departments, however, with this comes the disadvantage of having increased social media risks that could potentially harm the company’s brand. Therefore, it is extremely important that businesses adopt a Social Media Risk Plan to manage their reputation online and know how to mitigate potential threats.

Read More

Topics: Brand Protection, risk management, defamatory, brand abuse, online brand protection, Reputation Management, Social Media Monitoring, employees social media, online identity, social media, Internet Threats, Risk, internet security, cyber threats

5 Reasons Why You Should Care About Internal Auditing

Posted by Natasha Vadori

Tue, May 13, 2014

One of the questions that customers ask BrandProtect most often is about social media policies and monitoring.   Luckily, there are many great examples of processes and procedures in parallel areas of business that can be applied to this issue.  At BrandProtect, we recommend an approach which is modelled around the “internal audit” procedures used at many companies to assess financial risks.  The purpose of internal audit is to ensure that the proper "controls" (procedures and policies) are in place and are effectively being followed.  They target “situations” that have a high risk score (high likelihood of happening and a high impact if they do happen).  The best Internal auditing practices look not only at abstract metrics (such as incident frequency and risk exposure)  but also at  a company’s strategic goals – different strategic goals will change a company’s willingness to take on risk.   Adding social media activity to the scope of an internal auditing practice will strengthen a company’s understanding of risk exposures that could affect its business.

Here are the main areas where social media can be greatly impacted by the internal auditing team:

Read More

Topics: Brand Protection, data breach, Privacy Protect, Reputation Management, internal auditing

What is the Cost to Your Organization When Your Internet Traffic is Diverted?

Posted by Rosemary Brkopac

Wed, Mar 19, 2014

Last fall, one of my new financial services clients asked if BrandProtect could provide them with information about the web presence of their Mortgage Loan Officers, also known as MLO’s.   As you can probably surmise, MLO’s are the lifeblood of many financial organizations, and the first impression prospective clients may glean about a bank/trust company etc. is how their employees are presented on the web. 

Read More

Topics: Brand Protection, Reputation Management, MLO

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

 Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Recent Posts

Posts by Topic

see all