As the threat landscape expands, online protection is no longer left solely to a single department. Implementing a strategy now calls for buy-in from top management along with involvement from multiple areas of business.
Advances in the interne...t and the proliferation of social media pose many dangers to your organisation - from counterfeiting and impersonation, to fraud and piracy - impacting consumer trust, your market reputation and your bottom line. Having a plan in place is more important than ever given the rapidly-changing threat landscape and the next generation of online criminals seeking new ways to take advantage of your brand....Read More
Determining intent prior to enforcement is crucial, and knowing what information is required for each type of enforcement is just as important to ensuring an effective strategy. Once intent is established, you can decide which enforcement strategy wi...ll be most effective.
This topic landed among those discussed at length during our latest Forum’s “Determining Intent for Effective Brand & Fraud Enforcement Strategies” panel. As a follow up, AntiFraud and Brand Protection specialists, Stefanie Ellis and Dustin Richards, discuss the importance of determining intent when evaluating an infringement on your brand.
Fraud or infringement?
Any organisation, simply by having an online presence, is vulnerable to...Read More
More than four months have passed since the General Data Protection Regulation (GDPR) became effective, resulting in many domain name registries and registrars moving to redact registrant information from their public WHOIS records (including informa...tion related to legal entities and persons not located in the European Economic Area; redactions that are beyond the scope of the privacy regulation).
Historically, domain name registrant information in WHOIS has been used by cybersecurity experts, brand protection service providers, law enforcement, intellectual property owners, and child protection advocates to identify, contact, and prosecute individuals who propagate websites that sell counterfeit goods and pirated movies, TV...Read More
Jane Sunderland, of Sunderlaw Strategies, Inc., never imagined that studying biological evolution would someday lead her down a road to data analysis in online protection.
But she joined the MarkMonitor Forum as a speaker on that very topic last week.... Juxtaposing it with the an ever-developing intellectual property industry, she explained:
“It’s about figuring out what the data has to say about trends,” she said. “There have been a lot of changes.”
Among those changes – the fact that online protection challenges now span more business departments and industries than ever. In fact, a MarkMonitor report, slated for release this October,...Read More
Once upon a time, a phishing email would nearly always impersonate a financial organization, would be poorly written and easily recognizable.
Today, there are many ways that phishers can target organizations, employees and consumers – and multiple av...enues that they take to do so. As society becomes increasingly dependent on online processes, phishers become more innovative in capitalizing on those practices.
Case in point? Cryptophishing, a new form of online phishing that has surfaced with the advent of cryptocurrency in online financial practices. We’ll delve into this, but first, let’s review some background on cryptocurrency.
What Is cryptocurrency?
As of this...Read More