markmonitor webinar: top strategies for protecting your brand and

39
Top Strategies for Protecting Your Brand and Content Online in 2017 Akino Chikada Sr. Product Marketing Manager MarkMonitor Olesia Klevchuk Sr. Product Marketing Manager MarkMonitor

Upload: vokien

Post on 14-Feb-2017

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Top Strategies for

Protecting Your Brand and

Content Online in 2017

Akino Chikada Sr. Product Marketing Manager

MarkMonitor

Olesia Klevchuk Sr. Product Marketing Manager

MarkMonitor

Page 2: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

2

Agenda

2017 Trends

Brand Protection

AntiFraud

AntiPiracy

Q&A

Page 3: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

3

2017: What Brand Owners Should Care About

New channels are emerging for Brand Owners to consider

Brandjackers are continuously evolving their tactics

Identifying high-value targets (HVT) to bridge the online and offline

brand protection program

China continues to be a major pain point

Fraudsters are abusing brands and targeting credentials

Emerging threats in digital piracy

Page 4: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Emerging Channels

Page 5: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

5

Emerging Channels

46% of the global population accessing the Internet

Consumers are now able to access more digital channels than ever before,

including the Dark Web

E-

commerce

Sites

Social

Media

Mobile

Apps Email

Deep Web

& Dark

Web

Online

Marketpla

ces

Paid

Search

Page 6: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

6

What is the Dark Web?

Searchable with standard search engines like Google and browsed with

standard browsers

Surface Web

Dark Web Websites that run on the “Darknet” – a covert network that uses

anonymizing software such as TOR and aren’t accessible to search engines

or by using traditional browsers

Deep Web Sites that aren’t indexed by search engines, with the majority of content in

access-controlled databases

Page 7: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

7

2017: What Brand Owners Should Care About

Prepare against planned attacks

Identify and resolve breaches

Remediate and analyze stolen credentials

Consumers

Business

Detect leaked intellectual property

Minimize exposure to third-party breaches

Understand hacking tools and services

Page 8: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

8

Example: Promoting Hacking Tools

What Happened

- In a forum, a hacker was sharing a

“how to hack XX company” tutorial

- Company was alerted on this

- Company worked with security and

engineers to fix vulnerabilities

- End result: Mitigate future hacks using

that vulnerability

Page 9: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

9

Brand Owners: Take a Comprehensive Approach

An end-to-end brand protection strategy

that is cross-functional is essential

Businesses and security teams need to

consider vulnerabilities from all angles

Visibility across the entire internet,

across all channels

Taking action immediately will reduce

cost and damage

Page 10: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Emerging Tactics

Page 11: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

11

Scams beyond counterfeit …

Trademark abuse

Copyright abuse

Impersonation

False association

Traffic diversion

Unauthorized sellers

Fraud

Emerging Tactics: Fraudsters Evolve Their Strategy

E-

commerce

Sites

Social

Media

Mobile

Apps

Email

Deep Web &

Dark Web

Online

Marketplaces

Paid

Search

Page 12: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

12

Deep Web E-Commerce

Beating fraudsters at their game – by following their ads

Fraudulent sites often choose not to be indexed by search engines, to avoid detection and legal

action. By harvesting the links associated with these ads, we should be able to take action on

additional infringing websites we have previously not detected.

Potential Sources:

Paid Ads

Email Solicitation

Banner Ads

Social Media

Page 13: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

13

Marketplaces – New Trend in China

Latest trend – counterfeits are using third party image hosting sites to avoid shutdowns

Page 14: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

14

Search Results

Infringers are injecting counterfeit URL’s into

legitimate sites to help avoid detection

These sites often show up highly ranked on

Google, leading to additional confusion for

consumers

Site owners often have no idea their site has been

infected

Domain Hijacking

Counterfeiters hiding infringing pages within legitimate sites

Page 15: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

15

What Brand Owners Should Do

1. Stay up-to-date with ongoing emerging

trends

2. Use technology to help find / detect brand

abuse

3. Ongoing enforcement is essential –

become the hardest brand to abuse

• New channels and

increased volumes

• Evolving tactics

• Sophisticated

software and tools

Page 16: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Bridging the Online & Offline

Page 17: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

17

Brand Owners: Beat the Whack-a-Mole

The Anonymity of the Internet

Fake information

Generic usernames

Proxy registrations

Distributed Networks

Emergence of Multi-Level

Marketing Networks

Worldwide online networks

Stolen Credentials

Page 18: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

18

Bridge the Online and Offline

Brand owners should keep track of all repeat offenders – and identify those that are

causing the most harm to your brand

Investigate bad threat actors to get the evidence you need to send law enforcement

Conduct controlled test purchases to confirm counterfeit, and learn more about the

high value target

Work closely with law enforcement and provide them with as much evidence to help

streamline the process

Page 19: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

19

What Brand Owners Should Do

Blocking Demand: Tactical Brand Protection

Continual daily online monitoring and

deterrence

Remove suspicious sites and marketplace

listings via various enforcement methods

Protect and educate consumers

Intercepting Supply: Strategic Brand

Protection

Focus resources where risk is greatest

Use actionable intelligence to target worst

offenders

Bridge online and physical enforcement

Brands Must Play Defense and Offense

Page 20: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

China

Page 21: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

21

China Continues to be a Major Concern

Chinese counterfeit products now account for

two-thirds of goods seized by US and UK

customs; and remains the largest manufacturer

and exporter of counterfeit products worldwide

China is the biggest e-commerce marketplace in

the world - 16% of total retail compared to

worldwide average of 7%

Chinese online shoppers currently number

more than 361 Million

Online sales outpaced those of the U.S.,

the long time leader in online shopping

Page 22: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

22

China Considerations for Brand Owners

China has a first-to-file trademark policy - register for trademarks immediately

Problems for companies with a popular brand and have not entered the Chinese market yet

Businesses may need to buy back the Chinese trademark or go through costly lawsuits

Chinese consumers prefer the Chinese versions of a brand – and make sure you register for

the trademark

Chinese consumers may name your brand on your behalf

Have all the authorized and original registered intellectual property (IP) rights in a centralized

place (trademarks, patents, or copyrights)

If you don’t have all the right documentation, enforcement can be a challenge

Page 23: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

23

What Brand Owners Should Do

Prepare to constantly evolve your enforcement strategy

Be prepared to meet country-specific requirements

Adapt internal processes to specific marketplace requirements and enforcement guidelines

Use industry groups to strengthen influence against key marketplaces

When possible – build relationships based on a premise of partnership

Understand your distribution partners and affiliates in each marketplace

Set realistic goals that prioritize making a counterfeit version of your product hard to find by

consumers

Know your “other” names

Region-specific representation

Investigate your investigators

Page 24: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Fraud

Page 25: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

25

Brand Owners: Phishing on the Rise

Increase in both consumer and employee

phishing attacks

Many major breaches start as a targeted

phishing email

The U.S. continues to be the most

attacked country and is the top

hosting country

Consumer Phishing Attacks

Page 26: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

26

Example of a Phishing Scam

Goal: to steal personal credentials

Fraudsters will leverage trusted brand

names and direct people to a phishing site

– 45% email fraud conversion rate

Significant costs associated with fraud

Page 27: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

27

Data Being Sold in the Deep Web & Dark Web

Fraudsters will then sell stolen credentials

in the deep web and/or dark web

59% of consumers reuse passwords

Access to username and password can

impact an individual, as well as

businesses

Page 28: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

28

What Brand Owners Should Do

1. Protecting your consumers from fraud should be part of your brand protection program

2. Ensure you have a way to prevent, detect and mitigate fraud in a timely manner

3. Make education – internally and externally – part of your brand protection strategy

Page 29: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Piracy

Page 30: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

30

Digital Piracy

Open source media player compatible with TVs,

computers, smartphones & video game systems

Access content from local and network storage &

stream on any device

Pirates and hackers use to distribute unauthorized

content

Black market of add-ons giving free access to

subscription services

KODI – Emerging Piracy Channels

Page 31: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

31

KODI Devices

Revenue usually comes from hardware rather than

subscription

Streams are not from dedicated servers, huge

overlap with web streams

Add-ons are “stealing” streams from illegal

websites

Amazon fire-stick (Amazon has banned Kodi from

its app store)

Page 32: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

32

KODI Digital Piracy

KODI developers do not endorse illegal streaming via their platform

Identify ‘fully-loaded’ KODI boxes on marketplaces

Use technology to identify unauthorized streams for enforcement

Developments and Enforcement Best Practices

Page 33: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

33

Facebook Live

Impact live events, shows and movies

Educate viewers on legality of sharing live

content

Use Facebook Rights Manager to protect content

from streaming piracy on Facebook (launched

April 2016)

How to Protect Live Content

Page 34: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Best Practices

Page 35: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

35

What Not To Do

1. Ignore the issue

Brand abuse and counterfeit will not go away on its own

Be proactive now rather than trying to fix the damage later

2. Do it manually

There are too many channels and venues to monitor manually

Manual approach is usually more costly and less effective in the long run

3. Treat all abuses equally

Not all brand abuse has the same impact

Prioritize abuse based on its impact on your business

Page 36: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

36

What You Should Do

1. Be proactive

Monitor and proactively protect your customers from counterfeit and brand abuse

2. Leverage technologies

Ensure you have a purpose-built technology to help you detect, analyze and enforce to

combat counterfeit

3. Don’t focus on just one channel

Brand abuses take place across multiple digital channels in different forms

Websites Paid

Search

Social

Media

Mobile

Apps Email

Deep

Web &

Dark

Web

Page 37: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

37

Educate Your Customers

Make your customers your allies in fighting counterfeit activities

Set up easy methods for customers to forward any scams

Provide best practices and clearly identify who your authorized sellers so your customers can

purchase with confidence

Page 38: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

Q&A

Page 39: MarkMonitor Webinar: Top Strategies for Protecting Your Brand and

For information on MarkMonitor solutions, services and complimentary

educational events:

Contact via email: [email protected]

Visit our website: www.markmonitor.com

Contact via phone: US: 1 (800) 745 9229 Europe: +44 (0) 203 206 2220