Threat Vendors are Going Mainstream:
Extortion Is Their Business Model!

Posted by Greg Mancusi-Ungaro

Wed, May 27, 2015

I’m just back from a fantastic International Trademark Association (INTA) conference. It is exciting to spend a few days with the foremost practioners in trademark and IP world.  One of the most visible organization there was a registrar, Vox Populi Registrar, Inc., who owns the .SUCKS gTLD.   Their representatives, clad in bright blue and white, were merrily touring the floor, speaking with vendors and attendees, about how much business sense it made to a brand to purchase the .SUCKS domain.  There booth featured a continuous slide show of F500 brands,"using" the .SUCKs domain.  ibm.sucks; ford.sucks; starbucks.sucks. yourcompanyhere.sucks. Outside the conference hall, there were more blue-clad representatives, passing out .SUCKs items that were prohibited in the hall. The Vox Populi message was communicated clearly --  It only costs $2500/year to reserve this gTLD.
"Isn't that a small amount to pay to know that no one else uses it with your brand?..."

Read More

Topics: risk management, brand abuse, online brand protection, Reputation Management, INTA, trademark, intellectual property, Risk, gTLDs, cyber threats, Chief Security Officer, online risk, unauthorized associations

Credit Unions Need to Start Managing Their Social Media Risk

Posted by Natalie Gleba

Fri, Aug 01, 2014

credit-unions

On December 11, 2013, the Federal Financial Institutions Examination Council (“FFIEC”) released the article, Social Media: Consumer Compliance Risk Management Guidelines, to educate financial institutions about the risks involved in using social media. There are no additional obligations, however, this Guidance strongly suggests that financial institutions, effective immediately, become educated on the potential compliance, reputation and operational risks as it relates to social media use, and implement these guidelines into their risk management strategy. Credit Unions, like Banks, can benefit from these risk assessment strategies and need to be aware of the reputational damage that can occur via social media as a result of neglecting risk management. Here are the summarized risks that Credit Unions should be aware of and integrate into their risk assessment process:

Read More

Topics: Brand Protection, risk management, Social Media Monitoring, Phishing, social media, cyber threats, online risk

Why Social Media Risk Planning is Necessary for Brand Image

Posted by Natalie Gleba

Fri, Jul 11, 2014

It is no surprise that 84% of businesses have now adopted social media to implement an online presence to communicate with customers and overall, increase their brand reach [1]. Whether a small independent business or a large B2B company, it is more evident than ever that businesses who do not build and maintain an online social media presence will get left behind, and evidently lack competitiveness. Having a social media presence offers clear advantages for marketing and sales departments, however, with this comes the disadvantage of having increased social media risks that could potentially harm the company’s brand. Therefore, it is extremely important that businesses adopt a Social Media Risk Plan to manage their reputation online and know how to mitigate potential threats.

Read More

Topics: Brand Protection, risk management, defamatory, brand abuse, online brand protection, Reputation Management, Social Media Monitoring, employees social media, online identity, social media, Internet Threats, Risk, internet security, cyber threats

Top 5 Social Risk Strategies for Financial Institutions for 2014

Posted by Shanna Gordon

Fri, Feb 28, 2014

As the social media ecosystem continues to evolve on a daily basis, so do the risks to your brand and reputation. Monitoring social media for risk is a no-brainer these days, but there are other channels you need to be looking at to ensure you are covering all your bases.  

Read More

Topics: Brand Protection, risk management, online brand protection, Internet Threats, Risk, internet security

3 Processes & Practices to Protect Your Brand's Reputation

Posted by Karim Dharamshi

Mon, Feb 17, 2014

The past few weeks have been very busy as large, well known companies were all hacked and wacked and everything in between as the bad guys took no prisoners. Target, Yahoo and Western Union just to name a few were all compromised. Not surprisingly they all involved the theft of personal identification; as a result, these companies’ reputations have seen a direct hit after information on these attacks spread quickly. 

Read More

Topics: Brand Protection, data breach, risk management, Reputation Management

Target’s Once-Stellar Reputation Is In Trouble… Big Trouble

Posted by Adriana Tayraco

Mon, Jan 27, 2014

Earlier last week Jody Westby wrote a very insightful article for Forbes highlighting the lack of experience and expertise from most board members and CEOs when dealing with serious cyber risks. A great point is made when she remarks that “they [CEOs and board members] are beginning to realize that there are best practices for cyber governance, and this involves more than asking interesting questions now and then or accommodating an annual ten-minute IT report on the board agenda”.

Read More

Topics: risk management, hackers, brand abuse, online brand protection, security breach

Security Risks: The Real Threat Could Be Internal

Posted by Sarah Connor

Fri, Jan 17, 2014

So your company’s computer system has just been compromised. It must have been those nasty hackers, wreaking havoc by targeting your business. But maybe not.

Read More

Topics: risk management, Reputation Management, Risk, internet security

New Federal Guidance for Social Internet Risk from FFIEC

Posted by Greg Mancusi-Ungaro

Fri, Dec 13, 2013

This week, the Federal Financial Institutions Examination Council  (FFIEC) released important guidance  on social Internet risk that affects nearly every institution in the United States that offers credit.  The guidance, in essence says the following:  significant risk to these institutions can arise from a wide range of online activities and events initiated by third parties.  These activities include “comments made by social media users, spoofs of institution communications, and activities in which fraudsters masquerade as the institution…” 

Read More

Topics: risk management, online brand protection, Risk

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

 Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all