Jeb Bush Has A Domain Problem.  Do You?

Posted by Greg Mancusi-Ungaro

Tue, Dec 08, 2015

That sound you hear is a bunch of the staffers at jeb2016.com (the official Jeb Bush website) trying to make it seem like they are on top of their web presence.  Or is that the Trump team, laughing?  We can't be sure.  

The Washington Post reported yesterday that people who type "jebbush.com" into a browser found themselves redirected to Donald Trump's official site, donaldjtrump.com. You read that right -- one of the leading candidates for the Republican nomination for President of the United States has found himself on the wrong side of one of the most basic domain abuse issues. Someone else has registered a similar domain and is using it to confuse the public. Try it: jebbush.com (It's fun!)

Download the InfoGraphic

Yes, it's funny for a moment. But in reality it is very scary. In fact, it is potentially devastating.

The massive breach at Anthem earlier this year originated from spear phishing emails that were sent from domains that impersonated Anthem. The employees who recieved the emails did not notice that the emails originated from a rogue address. They unwittingly opened attachments or clicked on links that gave the attackers inside access to Anthem networks. 

Game over.

When others appropriate your web presence by registering or appropriating a similar or easily mistaken domain, they put themselves in a position to confuse your message, siphon revenues or worse. 

How big a problem can it be?...

Read More

Topics: Brand Protection, data breach, scam, brand abuse, Domain Management, cybersquatting, Phishing, gTLD, brandprotect, infographic, cyber threats, online risk, brandjacking, Health Care, OSINT, Jeb Bush, Legal, Spear Phishing, CISO, CSO, InfoSec, Donald Trump, 2016 Elections, Anthem, CMO

Credit Unions Need to Start Managing Their Social Media Risk

Posted by Natalie Gleba

Fri, Aug 01, 2014

credit-unions

On December 11, 2013, the Federal Financial Institutions Examination Council (“FFIEC”) released the article, Social Media: Consumer Compliance Risk Management Guidelines, to educate financial institutions about the risks involved in using social media. There are no additional obligations, however, this Guidance strongly suggests that financial institutions, effective immediately, become educated on the potential compliance, reputation and operational risks as it relates to social media use, and implement these guidelines into their risk management strategy. Credit Unions, like Banks, can benefit from these risk assessment strategies and need to be aware of the reputational damage that can occur via social media as a result of neglecting risk management. Here are the summarized risks that Credit Unions should be aware of and integrate into their risk assessment process:

Read More

Topics: Brand Protection, risk management, Social Media Monitoring, Phishing, social media, cyber threats, online risk

Why Social Media Risk Planning is Necessary for Brand Image

Posted by Natalie Gleba

Fri, Jul 11, 2014

It is no surprise that 84% of businesses have now adopted social media to implement an online presence to communicate with customers and overall, increase their brand reach [1]. Whether a small independent business or a large B2B company, it is more evident than ever that businesses who do not build and maintain an online social media presence will get left behind, and evidently lack competitiveness. Having a social media presence offers clear advantages for marketing and sales departments, however, with this comes the disadvantage of having increased social media risks that could potentially harm the company’s brand. Therefore, it is extremely important that businesses adopt a Social Media Risk Plan to manage their reputation online and know how to mitigate potential threats.

Read More

Topics: Brand Protection, risk management, defamatory, brand abuse, online brand protection, Reputation Management, Social Media Monitoring, employees social media, online identity, social media, Internet Threats, Risk, internet security, cyber threats

5 Reasons Why You Should Care About Internal Auditing

Posted by Natasha Vadori

Tue, May 13, 2014

One of the questions that customers ask BrandProtect most often is about social media policies and monitoring.   Luckily, there are many great examples of processes and procedures in parallel areas of business that can be applied to this issue.  At BrandProtect, we recommend an approach which is modelled around the “internal audit” procedures used at many companies to assess financial risks.  The purpose of internal audit is to ensure that the proper "controls" (procedures and policies) are in place and are effectively being followed.  They target “situations” that have a high risk score (high likelihood of happening and a high impact if they do happen).  The best Internal auditing practices look not only at abstract metrics (such as incident frequency and risk exposure)  but also at  a company’s strategic goals – different strategic goals will change a company’s willingness to take on risk.   Adding social media activity to the scope of an internal auditing practice will strengthen a company’s understanding of risk exposures that could affect its business.

Here are the main areas where social media can be greatly impacted by the internal auditing team:

1. Brand and Reputation Damage

Read More

Topics: Brand Protection, data breach, Privacy Protect, Reputation Management, internal auditing

What is the Cost to Your Organization When Your Internet Traffic is Diverted?

Posted by Rosemary Brkopac

Wed, Mar 19, 2014

Last fall, one of my new financial services clients asked if BrandProtect could provide them with information about the web presence of their Mortgage Loan Officers, also known as MLO’s.   As you can probably surmise, MLO’s are the lifeblood of many financial organizations, and the first impression prospective clients may glean about a bank/trust company etc. is how their employees are presented on the web. 

Read More

Topics: Brand Protection, Reputation Management, MLO

Reputation Combat: The Fight to Protect Your Reputation Online

Posted by Sarah Connor

Mon, Mar 03, 2014

Oh how the tables have turned! A company’s most valuable asset – its reputation – is at the hands of anonymous internet users. Not only are companies exposed to threat from malicious online attacks by hackers and cybercriminals, the power of the internet has made word-of-mouth, once a company's trusted ally, one of the most powerful tools to be used against any brand. Consumers have the opportunity to do and say whatever they want about whoever they want online protected by anonymity. They can defame a brand, write a negative review about a product and criticize a company even if their comments aren’t true.

Read More

Topics: Brand Protection, Reputation Management, negative reviews

Top 5 Social Risk Strategies for Financial Institutions for 2014

Posted by Shanna Gordon

Fri, Feb 28, 2014

As the social media ecosystem continues to evolve on a daily basis, so do the risks to your brand and reputation. Monitoring social media for risk is a no-brainer these days, but there are other channels you need to be looking at to ensure you are covering all your bases.  

Read More

Topics: Brand Protection, risk management, online brand protection, Internet Threats, Risk, internet security

3 Processes & Practices to Protect Your Brand's Reputation

Posted by Karim Dharamshi

Mon, Feb 17, 2014

The past few weeks have been very busy as large, well known companies were all hacked and wacked and everything in between as the bad guys took no prisoners. Target, Yahoo and Western Union just to name a few were all compromised. Not surprisingly they all involved the theft of personal identification; as a result, these companies’ reputations have seen a direct hit after information on these attacks spread quickly. 

Read More

Topics: Brand Protection, data breach, risk management, Reputation Management

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

 Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all