Case Study

The Economist Group

With RiskIQ, The Economist Group is the Master of its Domain

Protecting The Economist’s brands across web:

As a majority of The Economist’s revenue comes from subscriptions and not advertising, it is of vital importance that trust is maintained in the brand, both online and in print. However, like most global brands, they face an ongoing threat from digital impersonation by cyber criminals leveraging their brand to create legitimate-looking web assets to dupe customers and potential customers. While The Economist has had a domain infringement provider in place, they were concerned that the relatively small number of detections did not represent the real scope of the threat.

The Solution

RiskIQ External Threat Detection – Domain Infringement: RiskIQ’s Domain Infringement solution detects the unauthorized use of Economist brands within third-party registered domains. RiskIQ’s unique virtual-user crawling infrastructure intelligently analyzes the associated websites to provide the additional context needed to determine how threat actors may be using each domain and the risk it poses, such as brand impersonation, traffic diversion, phishing, and malware distribution. With this data, their security team can continuously monitor infringing site content and behavior to prioritize infringements according to their brand impact. Sites deemed to be at risk are taken down by RiskIQ.

The RiskIQ domain infringement tool is one of the best investments I have made. Within the first two months of operation, the tool has paid for itself. It’s easy to use interface, and the great support we’ve received from the RiskIQ team have allowed us to get productive very quickly. We are looking forward to a much clearer view of our overall digital asset security going forward thanks to the RiskIQ team.

--Vicki Gavin, Compliance Director, Head of business continuity, cyber security and data privacy The Economist Group

The Results

Within the first two months of operation, RiskIQ has uncovered hundreds of infringement suspects, many of which are in review or under active monitoring, and has undertaken some successful takedowns.