Domain Phishing: Antidotes In Today’s Market

Whether a large, international corporation or your neighbourhood’s favourite bakery, cybercriminals have discovered new formulas to try to swipe the credentials and life savings of citizens across the globe.

As a result, it’s not just big companies who need to be worried about domain phishing and spoof attacks - businesses of all sizes need to take practical steps to ensure they don’t fall prey to these tactics.

So, in an age where companies are reaping the benefits of digital transformation, what can be done to avoid being caught in the phishing net?

Reflecting On Our Technological Evolution

Just a few years ago, we experienced a powerful technology shift that businesses thought would only come 10 years from now. However, in the blink of an eye, companies were forced to digitally transform their systems and protocols during the pandemic.

While great for businesses, this new wave of technological innovation also made way for refined cyber attacks.

Cyber attacks have therefore found newer, smarter ways to try and infiltrate the market. And with technological advancements like generative AI now in everyone’s hands, cybercriminals have become more sophisticated in their phishing attempts as well. 

But whatever the sector, businesses are far from defenceless. By making some savvy decisions and deploying effective security measures, these risks can be overcome. 

Closing Off Phishing Loopholes

Businesses both large and small should consider additional security measures when starting or upgrading a web domain to help them stay safe. Buying from businesses that provide domain name protection is, therefore, the best solution to close any gaps within the system. 

Some crucial measures to go the extra mile in keeping a business protected from phishing attacks include homographic blocking. One of the best-known forms of domain phishing comes from swapping out characters within a company’s website domain name - camouflaging the imposter at first glance. This is often done by swapping out an “i” for an “¡”, which can help disguise an illegitimate website from its owner. Built-in homographic blocking technology eliminates these opportunities by identifying and blocking every malicious permutation of your domain name, preventing all future registrations, and keeping your brand intact. 

A brand’s digital identity can be its greatest asset in today’s technological landscape. Therefore, it is more important than ever to protect it from malware, spam, and phishing.

On top of built-in homographic blocking, it is important for businesses to lock down their valuable trademarks online. This is where a unique offering like the Domains Protected Marks List (DPML) comes in. In short, a service like this defensively blocks registrations of trademarked brands across a specific registry’s entire portfolio of domains. At the time of purchase, all domain names matching the trademarked brand within the portfolio are reserved, allowing only the trademark holder to register them going forward. It’s always worth taking the time to examine the additional security benefits and services domain name registrars have to offer, as each one will provide different solutions, often unique to them. 

Locking a domain at the registry level is a final measure that blocks unwanted domain modifications, transfers, and deletions to ensure your domains are safe. When a Registry Lock is requested, it ensures that any future modifications need to be authenticated via a secure, multi-step process through the registrar.

Spotting The Imposter

While solutions like the above are readily available for companies to utilise and provide peace of mind, it never hurts to educate both employees and customers on the signs of a phishing attack. So, how can we spot the difference?

A tell-tale sign of a phishing attack can be spotted through inconsistencies when in communication with employees or customers. This includes deviations in fonts, brand design or logos, website designs, and, of course, grammar and spelling.

Another helpful measure to encourage employees or customers to pause and reflect is with a few simple questions: Does my company or provider usually communicate to me in this tone of voice? Have they ever asked for certain credentials via their website in the past? Is there a padlock icon (a sign of encryption) displayed on their URL field? Do they ever communicate with me on certain platforms, such as SMS, or social media? By asking these questions, it becomes possible to spot the imposter lurking in your peripherals — and a means to keep them out.

Final Thoughts

Doubling down on security measures is the key to protecting not only your web address but your brand. So by checking your peripherals, you are saving both yourself and your company from the loss of private information or assets - not to mention, reputational damage should the worst happen.

The good thing is that the technology and solutions to keep imposters and fraudsters away are already within reach. In a world where cybercriminals have become smarter, we, as businesses and customers alike, should become wiser. 

Brian Lonergan is Vice President of Product Strategy with Identity Digital          Image: Cottonbro Studio

You Might Also Read:

Why Domain Protection Is A Key Pillar Of Cybersecurity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Out-Sourcing Can Compromise Cyber Security
Understanding The Threat Of QR Codes & Quishing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

Seiber

Seiber

Seiber are a UK based Cyber Security company who provide consultancy and training services. Our objective is to stop bad things happening to good people.