7 ways to protect your brand from cybersquatters
Now more than ever, your business is at risk from cybersquatters. Here's what you can do to fight the problem.
Computerworld - Cybersquatters are siphoning away increasing numbers of users from the Web sites of businesses large and small. Using variations on trademarked names, cybersquatters may lure prospective customers to pornographic Web sites, malware sites, sites hawking counterfeit goods, or pay-per-click advertising sites, some of which lead viewers to competitors' products and services.
They're doing so right under the noses of trademark holders, but many businesses remain blissfully ignorant of what's going on -- or how it can affect their business. In addition to lost revenue from customers who never reach a company's true Web site, businesses may find that cybersquatters have irrevocably damaged their brand's reputation.
While cybersquatters have been around almost as long as the Web itself, the problem is getting worse. See "Domain-name wars: Rise of the cybersquatters" for a full report on the scope of the situation.
What should you do to protect your business? We asked for tips from legal professionals, as well as from experts at brand-abuse monitoring vendors and companies such as Lego Juris AS and InterContinental Hotels Group (IHG) that have successfully fought cybersquatters. Here's what they had to say.
Establish a policy to deal with the problem
Take the time to create a detailed policy, then follow up with surveillance and policing, says Peter Kjaer, an attorney at Billund, Denmark-based Lego.
Monitor new domain registrations
IHG, based in Denham, England, uses a monitoring service that alerts the company when potentially infringing domain names are registered. Those services aren't cheap -- basic monitoring services from Cyveillance Inc., for example, run $5,000 to $10,000 per year. "But at least you can identify unauthorized registrations and know what's registered and who's registering it," says Lynn Goodendorf, global head of data privacy at IHG.
Incomplete or fictitious registration information is a tip-off that the entity is not aboveboard, she says.
Organizations that do their own monitoring often use Google to see if common misspellings and other variations on a trademarked domain name have been registered, says Doug Isenberg, an attorney at Atlanta-based GigaLaw Firm. The Domain Tools Web site allows "whois" lookups of trademarked name variations to see they've been registered as domain names. It also offers other monitoring and lookup services.
When checking for misspellings of your brand, remember that not all keyboards are in QWERTY format, says James Carnall, manager of the cyberintelligence division at Arlington, Va.-based Cyveillance. "Stay on top of what devices are selling well and what logical thumb mistakes are being made on those devices," he suggests.
Build a portfolio of defensive domain-name registrations
This includes common misspellings or other typographic errors users might enter when typing your brand names. Registering a domain name can cost as little as $6 per year. Recovering one from a cybersquatter costs much more.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts