Domain Phishing: Antidotes In Today’s Market

Whether a large, international corporation or your neighbourhood’s favourite bakery, cybercriminals have discovered new formulas to try to swipe the credentials and life savings of citizens across the globe.

As a result, it’s not just big companies who need to be worried about domain phishing and spoof attacks - businesses of all sizes need to take practical steps to ensure they don’t fall prey to these tactics.

So, in an age where companies are reaping the benefits of digital transformation, what can be done to avoid being caught in the phishing net?

Reflecting On Our Technological Evolution

Just a few years ago, we experienced a powerful technology shift that businesses thought would only come 10 years from now. However, in the blink of an eye, companies were forced to digitally transform their systems and protocols during the pandemic.

While great for businesses, this new wave of technological innovation also made way for refined cyber attacks.

Cyber attacks have therefore found newer, smarter ways to try and infiltrate the market. And with technological advancements like generative AI now in everyone’s hands, cybercriminals have become more sophisticated in their phishing attempts as well. 

But whatever the sector, businesses are far from defenceless. By making some savvy decisions and deploying effective security measures, these risks can be overcome. 

Closing Off Phishing Loopholes

Businesses both large and small should consider additional security measures when starting or upgrading a web domain to help them stay safe. Buying from businesses that provide domain name protection is, therefore, the best solution to close any gaps within the system. 

Some crucial measures to go the extra mile in keeping a business protected from phishing attacks include homographic blocking. One of the best-known forms of domain phishing comes from swapping out characters within a company’s website domain name - camouflaging the imposter at first glance. This is often done by swapping out an “i” for an “¡”, which can help disguise an illegitimate website from its owner. Built-in homographic blocking technology eliminates these opportunities by identifying and blocking every malicious permutation of your domain name, preventing all future registrations, and keeping your brand intact. 

A brand’s digital identity can be its greatest asset in today’s technological landscape. Therefore, it is more important than ever to protect it from malware, spam, and phishing.

On top of built-in homographic blocking, it is important for businesses to lock down their valuable trademarks online. This is where a unique offering like the Domains Protected Marks List (DPML) comes in. In short, a service like this defensively blocks registrations of trademarked brands across a specific registry’s entire portfolio of domains. At the time of purchase, all domain names matching the trademarked brand within the portfolio are reserved, allowing only the trademark holder to register them going forward. It’s always worth taking the time to examine the additional security benefits and services domain name registrars have to offer, as each one will provide different solutions, often unique to them. 

Locking a domain at the registry level is a final measure that blocks unwanted domain modifications, transfers, and deletions to ensure your domains are safe. When a Registry Lock is requested, it ensures that any future modifications need to be authenticated via a secure, multi-step process through the registrar.

Spotting The Imposter

While solutions like the above are readily available for companies to utilise and provide peace of mind, it never hurts to educate both employees and customers on the signs of a phishing attack. So, how can we spot the difference?

A tell-tale sign of a phishing attack can be spotted through inconsistencies when in communication with employees or customers. This includes deviations in fonts, brand design or logos, website designs, and, of course, grammar and spelling.

Another helpful measure to encourage employees or customers to pause and reflect is with a few simple questions: Does my company or provider usually communicate to me in this tone of voice? Have they ever asked for certain credentials via their website in the past? Is there a padlock icon (a sign of encryption) displayed on their URL field? Do they ever communicate with me on certain platforms, such as SMS, or social media? By asking these questions, it becomes possible to spot the imposter lurking in your peripherals — and a means to keep them out.

Final Thoughts

Doubling down on security measures is the key to protecting not only your web address but your brand. So by checking your peripherals, you are saving both yourself and your company from the loss of private information or assets - not to mention, reputational damage should the worst happen.

The good thing is that the technology and solutions to keep imposters and fraudsters away are already within reach. In a world where cybercriminals have become smarter, we, as businesses and customers alike, should become wiser. 

Brian Lonergan is Vice President of Product Strategy with Identity Digital          Image: Cottonbro Studio

You Might Also Read:

Why Domain Protection Is A Key Pillar Of Cybersecurity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Out-Sourcing Can Compromise Cyber Security
Understanding The Threat Of QR Codes & Quishing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).