Global Head of Marketing, MarkMonitor
Do businesses get the online protection they need? Half say no.
Earlier this month, two major sport and shoe brands put their foot down on illicit counterfeit activity. A joint claim accused 53 different ecommerce sellers of various counts of trademark infringement, counterfeiting and unfair competition. In the claim, both companies said they suffered “daily and sustained violations of their trademark rights at the hands of counterfeiters and infringers”, with money being diverted away from genuine brands and into the hands of counterfeiters. Companies report needing more support for online protection We all know that cybercrime has very real and damaging impacts. But did you know that many brands also struggle to... Read More
Portfolio Marketing Manager
Waiting to secure your new products online? Infringers aren't.
We researched the time it takes from product release date to first online counterfeit, and the results are in: There’s no time to waste. New algorithms using historic and anonymized data from clients have revealed that, for well-known enterprises, a typical measure of “Time-to-Counterfeit” is, well, zero. Issues like information leaks, product popularity and low barriers to entry will nearly guarantee your brand falls into the most vulnerable category. If you’re selling a more complex item (think of the latest smartphone or unique computer software), you could buy a few weeks. Maybe. Research delved deeper into a particular brand (whose name... Read More
Portfolio Marketing Manager
Part 2: Brand-Targeted vs. Brand-Associated Malware: What’s the Biggest Threat to your Organization?
In Part One of this three-part series about the top threats to be aware of for operating on the internet in 2018 I reviewed the trust issues around verifying secure sites and different aspects of SSL certificates. I’ll now move on to discuss the issues associated with malware and what we expect to see in 2018. Malicious software has transitioned over the years, from relatively harmless adware to spyware, to keystroke loggers and banking trojans, to the massive ransomware attacks widely reported around the world in 2017 — such as with the Wannacry and Petya attacks. Throughout these developments, there has... Read More
Senior Brand Client Service Manager
How to Identify, Disrupt and Dismantle Unauthorized Product Distribution Networks
Online counterfeit networks are on the rise as it becomes easier and less time-consuming for criminal organizations to hide online. Globally, many of these organizations make use of online networks to not only to distribute counterfeit products but also to hide from manufactures and distribute gray market products. The Internet enables anonymity and many online activities are unregulated. For example, there are no checks in place to ensure website operators use their legal name, address or phone number. It is relatively quick and inexpensive to register multiple websites with different registrars worldwide. It has become common for many criminal networks who practice... Read More
Portfolio Marketing Director
Survey shows a staggering 24% of consumers have been duped by online counterfeiters
In the U.S. alone, online retail sales are projected to grow 57% to $414 billion by 2018. As the volume of online shopping grows and the number of e-commerce channels increase, so do the opportunities for counterfeiters. As savvy shoppers seek out the best deals online, they face an increased risk from the sale of counterfeit goods by brand impersonators masquerading as legitimate sources for genuine products. These threats cause concern for both brand owners and their legal departments, along with consumers. In light of this, we wanted to understand consumers’ current attitudes towards shopping on the web and decided to... Read More

Search

Follow Us

Get all the latest updates

Subscribe
Get all the latest updates
Interests

Featured Author

Alison Simpson
With more than 13 years’ experience in the domain industry, Alison has managed all aspects of Corporate Domain Managem... More