What is Dark Web Monitoring?
Dark Web Monitoring enables to quickly identify exposed employee email accounts and identities that have been publicly disclosed online via third-party data breaches.
With billions of credentials present in data dumps, paste sites, and hacking forums, employees that sign up to third-party services with their work email address could be leaving your organization at huge risk of social engineering, business email compromise (BEC), and other damaging attacks.
With Dark Web Monitoring, you can:
- Identify exposed employee accounts: Dark Web Monitoring identifies accounts that are exposed on paste sites, data dumps, and hacking forums
- Locate what employee data is exposed: Common data includes email addresses, passwords, usernames, etc.
- Help prevent data loss: Locating these at-risk accounts enables you to safeguard users from social engineering and BEC attacks
- Obtain actionable steps: Enables follow-up user training on security best practice
How Dark Web Monitoring works
- Step One: Conducts a deep web search through data dumps, paste sites, and hacking forums
- Step Two: Identifies users that have had account information exposed online
- Step Three: Collates your users’ results into an easy-to-digest format, accessible from your account dashboard
Dark Web Monitoring key features
- Quick web search enables you to rapidly identify exposed accounts
- Gathers high-level data (i.e., number of exposed accounts & source of breach) neatly into your dashboard
- View each user’s exposed data breakdown from their profile within the tool
- 100% free with your subscription
What the different types of data on Dark Web Monitoring mean to your organization’s security
These will be present in every breach that is visible on Dark Web Monitoring, as your users’ emails are used to find their exposed credentials. An attacker having the email address of one of your users is not generally a risk in itself, as this is likely to be public information anyway.
If a user has had their password exposed in a breach, it is likely to be a major cause of concern. If the password has been cracked, it will have allowed an attacker to access the user’s account on the service on which the breach happened. More importantly for you, however, is that a very high proportion of people reuse their passwords across online services. This means that your user could be using that same password to protect their company email account or any of their other business logins, causing a risk to your business network.
IP addresses – the unique numbers associated with every device that connects to the internet – sometimes appear in breaches. This will happen when a service stores the IP addresses that its users log in from. Knowing your company’s IP addresses could help an attacker launch an attack such as DDOS, but as IP addresses are fairly easy to harvest, having them exposed in breaches does not necessarily cause a significantly heightened risk to your organization.
Personal details including birthdays, job titles etc.
Any personal details that are exposed in breaches cause a heightened risk of phishing and social engineering. An attacker could use information like one of your users’ birthdays in order to help them pretend to be someone within the organization. Exposed personal information also causes a high stolen identity risk, allowing an attacker to bypass security protections to access the users’ accounts.
Protecting your organization
If you notice that one of your user’s passwords has been exposed in a breach, this creates an immediate risk to you and your user due to the chance of them reusing passwords. To protect your organization and your user, you should ensure that they change their passwords and do not reuse them in the future.
Any other type of information that is exposed about your users will increase the risk of phishing. If any of your users have had personal information exposed in breaches, they should be alert about anyone trying to access their accounts with their stolen identity. All your other users should also be alerted about the risk of an attacker using the exposed information to pose as the user in an attempt to infiltrate your organization’s network.
You will be able to see the services from which the user’s data has been exposed, the date when the breach happened, the date when the breach was added to our database, and the type of information that was exposed.
Get started today by using our tool for free for 14 days. Contact us at Bob@hipaatraining.net to get started today. We have clients in USA, UK, Canada, Asia, Australia, France, Saudi Arabia, and many other countries who use our services.
Stay Proactive in your Cybersecurity projects.