The Standard User does NOT have access to view passwords.
Fake email accounts are routinely created by employees as a “throw away” when wanting to gain access to a system or piece of data.
This means the password was published as “hashed”
Password Criteria is designed to allow you or your clients to identify what their on-network password criteria is in order to put a higher alert status on credential exposures that may meet these criteria.
While employees may have moved on from your organization, their company issued credentials can still be active and valid within the 3rd party systems they used while employed.
Click for the detailed explanation
In all sorts of places !
While we can’t say definitively that the data we’ve discovered has already been used to exploit your organisation, the fact that we are able to identify this data should be very concerning.
Our service is designed to help both public and private sector organisations detect and mitigate cyber threats that leverage stolen email addresses and passwords.
Our services focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals.