Threat Vendors are Going Mainstream:Extortion Is Their Business Model!

Posted by Greg Mancusi-Ungaro

Wed, May 27, 2015

I’m just back from a fantastic International Trademark Association (INTA) conference. It is exciting to spend a few days with the foremost practioners in trademark and IP world.  One of the most visible organization there was a registrar, Vox Populi Registrar, Inc., who owns the .SUCKS gTLD.   Their representatives, clad in bright blue and white, were merrily touring the floor, speaking with vendors and attendees, about how much business sense it made to a brand to purchase the .SUCKS domain.  There booth featured a continuous slide show of F500 brands,"using" the .SUCKs domain.  ibm.sucks; ford.sucks; starbucks.sucks. yourcompanyhere.sucks. Outside the conference hall, there were more blue-clad representatives, passing out .SUCKs items that were prohibited in the hall. The Vox Populi message was communicated clearly --  It only costs $2500/year to reserve this gTLD.
"Isn't that a small amount to pay to know that no one else uses it with your brand?..."

Read More

Topics: risk management, brand abuse, online brand protection, Reputation Management, INTA, trademark, intellectual property, Risk, gTLDs, cyber threats, Chief Security Officer, online risk, unauthorized associations

Why Social Media Risk Planning is Necessary for Brand Image

Posted by Natalie Gleba

Fri, Jul 11, 2014

It is no surprise that 84% of businesses have now adopted social media to implement an online presence to communicate with customers and overall, increase their brand reach [1]. Whether a small independent business or a large B2B company, it is more evident than ever that businesses who do not build and maintain an online social media presence will get left behind, and evidently lack competitiveness. Having a social media presence offers clear advantages for marketing and sales departments, however, with this comes the disadvantage of having increased social media risks that could potentially harm the company’s brand. Therefore, it is extremely important that businesses adopt a Social Media Risk Plan to manage their reputation online and know how to mitigate potential threats.

Read More

Topics: Brand Protection, risk management, defamatory, brand abuse, online brand protection, Reputation Management, Social Media Monitoring, employees social media, online identity, social media, Internet Threats, Risk, internet security, cyber threats

Top 5 Social Risk Strategies for Financial Institutions for 2014

Posted by Shanna Gordon

Fri, Feb 28, 2014

As the social media ecosystem continues to evolve on a daily basis, so do the risks to your brand and reputation. Monitoring social media for risk is a no-brainer these days, but there are other channels you need to be looking at to ensure you are covering all your bases.  

Read More

Topics: Brand Protection, risk management, online brand protection, Internet Threats, Risk, internet security

Security Risks: The Real Threat Could Be Internal

Posted by Sarah Connor

Fri, Jan 17, 2014

So your company’s computer system has just been compromised. It must have been those nasty hackers, wreaking havoc by targeting your business. But maybe not.

Read More

Topics: risk management, Reputation Management, Risk, internet security

How To Handle A Social Media Reputation Crisis The Right Way

Posted by Karim Dharamshi

Thu, Dec 19, 2013

Some of you may have already experienced this, for the others it’s only a matter of time.

Read More

Topics: Reputation Management, social media, Risk

New Federal Guidance for Social Internet Risk from FFIEC

Posted by Greg Mancusi-Ungaro

Fri, Dec 13, 2013

This week, the Federal Financial Institutions Examination Council  (FFIEC) released important guidance  on social Internet risk that affects nearly every institution in the United States that offers credit.  The guidance, in essence says the following:  significant risk to these institutions can arise from a wide range of online activities and events initiated by third parties.  These activities include “comments made by social media users, spoofs of institution communications, and activities in which fraudsters masquerade as the institution…” 

Read More

Topics: risk management, online brand protection, Risk

How to Take Down a Phishing Site: 5 Crucial Steps

Posted by Dylan Sachs

Mon, Dec 09, 2013

After telling people what we do here at BrandProtect, people often ask me “How do you ‘take down’ a phishing page?”  Well, today I’m going to tell you.  Phishing mitigation is a multi-step process that involves several steps.  First and foremost, you have to find them. 

Read More

Topics: Malware, scam, Phishing, Risk, copyright, phishing take down

Cyber Monday Threats to Companies Grow in 2013

Posted by Greg Mancusi-Ungaro

Thu, Dec 05, 2013

It will be no surprise to enterprise security departments -- especially CSOs at major retailers and e-tailers -- that the biggest days of the year for shopping are also the biggest days of the year for identity theft, brand abuse, and other forms of Internet crime. 

Read More

Topics: Brand Protection, Reputation Management, cyber monday, Risk, infographic, online threat

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

 Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all