Identify homoglyphs, typosquats, and look-alike domains that attackers could use to impersonate your brand.
Missing keys or adjacent letters (exmple.com)
Replacing characters with visual lookalikes (l vs I).
Adding plausible keywords (login, support, secure).