The Importance Of Ensuring Domain Infrastructure Security

Domain names are the backbone of the internet. They guide our online interactions, serving as a backdrop for websites, emails and other digital communications. The role they play seems very simple, however domain names play an important role in protecting our digital infrastructure in more ways than one. 

With cyberattacks targeting the domain name system (DNS) with regularity and sophistication, it is critical to understand the vulnerabilities, as well as possible best practices for protecting online integrity.

In our interview with Ram Mohan, Chief Strategy Officer at Identity Digital, he explores the role of domain names in maintaining online safety, as well as how they impact economic growth. He also shares advice for organisations in mitigating future cybersecurity risks.

Q: The Domain Name System (DNS) has been described as the backbone of the internet. What is the reason for this?

The DNS acts as a translator that converts domain names into IP addresses, which allow browsers to get to websites and other internet resources. The DNS also helps maintain the critical infrastructure, stability, resilience and security of domains. The widely distributed DNS ensures that drops in regional service have little to no effect on a website’s availability. Combined with modern techniques such as caching and Content Delivery Networks (CDNs), the DNS brings phenomenal performance and capacity for users to reach the websites and internet resources they want. 

Q: What is the role of domain registries in combating phishing attacks and protecting critical infrastructure?

Domain registries are responsible for managing the top level domains (TLDs) of the internet. They are the key to a secure and trusted online experience. Without reliable registries, the internet would lack the organisation and accessibility needed for users to find and access information online. 

Registries play an important role in combating domain name-based attacks by implementing various measures to prevent the registration of phishing domains, including automatic detection systems and working closely with law enforcement agencies. They also protect critical infrastructure, by collaborating with network operators and government agencies to monitor and take action on suspicious activity.

Q: What is the impact of domain name security on digital transformation and economic growth? 

Domain names are essential for protecting brands and individuals, and for business continuity. By protecting domain names, registries help mitigate disruptions in business operations which can be caused by DDOS attacks, data breaches, compromised credentials and hijacked websites. As many know, breaches can be detrimental to brands, leading to loss of trust and customers, and costing millions. Therefore, the security of the online ecosystem is instrumental for maintaining stable infrastructure - without it there is no innovation, growth, or economic development.

Q: Can you share any best practices for organisations to mitigate domain name-related risks?

With new forms of phishing tactics and domain hacks continuing to evolve, it is important that individuals and businesses alike, learn to protect themselves and their business(es) from online dangers with simple, effective steps: 

  • Lock down your critical domain names. You can ask your domain name registrar, or in some cases, the domain name registry, to securely lock these names so they cannot be transferred away from you fraudulently.
  • Use strong, unique passwords to avoid compromised credentials leading to data breaches.
  • Take advantage of Two Factor Authentication at your domain registrar. If they don’t offer it, switch to a more secure registrar.
  • Create a proactive and comprehensive plan to immediately address security breaches as they happen and quickly mitigate the associated risks.
  • Monitor DNS traffic for suspicious activity on a regular basis to help spot unusual and unauthorised patterns.
  • Educate employees on the risks involved with domain name-based attacks, including what kinds of attacks to watch out for, as this can help them spot any phishing attempts and report them to the right channels.

Image: Madmaxer

You Might Also Read: 

Why DNS Protection Should Be A Crucial Part In Building Cyber Defense:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Canada Accuses India Of Using Spyware To Track Separatists
Cybercrime & Trade Secrets »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Everything Blockchain

Everything Blockchain

Everything Blockchain offer solutions that transform enterprise data-management capabilities. Increased efficiency, super-charged performance and all with government grade security.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.