Have we been breached ?

When you do find evidence of our information on the Dark Web, does it mean we are being targeted by hackers ?

Dark Web
100% found this useful

How are my credentials found on the Dark Web ?

We focus on Cyber Threats that are specific to our customers.

Dark Web
Not yet rated

How does it protect my business ?

Our service is designed to help both public and private sector organizations detect and mitigate cyber threats that leverage stolen email addresses and passwords. Dark Web ID leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other blackmarket sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).

What is the Dark Web

The Dark Web is a hidden universe contained within the “Deep Web”- a sublayer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.

Are there any special credentials needed to investigate the Dark Web?

You do not need special permission to access the deep or Dark Web.

Dark Web
100% found this useful

If your personal Data is found on the Dark Web, can it be removed?

Individuals whose PII has been discovered on the Dark Web are encouraged to enrol in an identity and credit monitoring service immediately.

Dark Web
Not yet rated

Is it safe to say cloud storage is a serious concern for Data breach? With most of our software tools moving to Cloud hosting, Does this create more risk for my company's IP?

There can be as much risk to your data within a Cloud environment as there is when it resides locally within your own servers.

Dark Web
Not yet rated

The password identified does not meet our network criteria. Why should we care about this?

Employees often recycle passwords throughout their work and personal networks. If your internal requirement is to have a capital letter and special character, it’s common practice for employees to use a password they are familiar with, and add a capital letter and exclamation mark.

Dark Web
Not yet rated

Can I track personal email accounts for compromises?

We allow for up to 5 personal email addresses per organization to be tracked, in addition to all emails on the company domain.

Dark Web
100% found this useful
  • Previous