Facing a need to change with the increase of new cyber threats, financial services institutions are implementing strong cyber security solutions, programs and training. As this is a crucial step to undertake and maintain a trusted environment, it is also important to share their best practices, this is what many financial service leaders will be doing at the FS-ISAC Fall Summit in Baltimore.
Thu, Sep 21, 2017
Thu, Jan 28, 2016
As part of the BrandProtect 2016 Elections Project, we’ve been looking at The Donald’s use of Twitter.
Or, more accurately, we’ve been looking at how others have been using Donald Trump's identity to promote their twitter activity. There are lots of them.....
Tue, Dec 08, 2015
That sound you hear is a bunch of the staffers at jeb2016.com (the official Jeb Bush website) trying to make it seem like they are on top of their web presence. Or is that the Trump team, laughing? We can't be sure.
The Washington Post reported yesterday that people who type "jebbush.com" into a browser found themselves redirected to Donald Trump's official site, donaldjtrump.com. You read that right -- one of the leading candidates for the Republican nomination for President of the United States has found himself on the wrong side of one of the most basic domain abuse issues. Someone else has registered a similar domain and is using it to confuse the public. Try it: jebbush.com (It's fun!)
Yes, it's funny for a moment. But in reality it is very scary. In fact, it is potentially devastating.
The massive breach at Anthem earlier this year originated from spear phishing emails that were sent from domains that impersonated Anthem. The employees who recieved the emails did not notice that the emails originated from a rogue address. They unwittingly opened attachments or clicked on links that gave the attackers inside access to Anthem networks.
When others appropriate your web presence by registering or appropriating a similar or easily mistaken domain, they put themselves in a position to confuse your message, siphon revenues or worse.
How big a problem can it be?...
Topics: Brand Protection, data breach, scam, brand abuse, Domain Management, cybersquatting, Phishing, gTLD, brandprotect, infographic, cyber threats, online risk, brandjacking, Health Care, OSINT, Jeb Bush, Legal, Spear Phishing, CISO, CSO, InfoSec, Donald Trump, 2016 Elections, Anthem, CMO
Fri, Jun 27, 2014
In the last 20 years there has been an evolution of cyber threats faced by both businesses and individuals. New technologies and social norms have changed the type and frequency of threats we deal with on a daily basis due to rapidly changing technology including the introduction of the Cloud, the proliferation of personal smart phone use, a push towards social engineering attacks and the ever increasing interconnectivity of technology.
Wed, Jun 05, 2013
The challenge of brand protection has grown exponentially for companies operating in the online world. Violations are more plentiful and harder to track. In addition, the nature of these violations can be far different from the typical ones found in more traditional media. Internet brand and trademark infringements along with other infractions can result in a range of unintended consequences including:
Fri, May 17, 2013
It felt a little like being Batman in a room full of music and revelers. The setting: ISSMM Engage Conference in Livermore, California. The plot: Corporations are worried about the impact of a Social Media engagement gone wrong and spend time building policies and best practices for their employees and contractors. Time and effort well spent.
Tue, Mar 05, 2013
BrandProtect is collaborating with the FS-ISAC on an upcoming webinar to discuss the implications of the current FDIC Mobile Applications Guidance and pending FFIEC Social Media Guidance. The webinar will provide financial institutions information on the two guidance’s including; exam findings, risks, best practices, budgetary planning and implementation plans.
Effective Internet reputation management is dependent on the ability to gain visibility into your Internet presence. This requires understanding the particular “Internet ecosystem” involved. The diagram below depicts the variety of ways brands are represented online, from its website through to the presence of associated marks on non-corporate sites, through to how they are being discussed in social media. These are the areas to be monitored for true coverage.