Password Criteria is designed to allow you or your clients to identify what their on-network password criteria is in order to put a higher alert status on credential exposures that may meet these criteria.
While employees may have moved on from your organization, their company issued credentials can still be active and valid within the 3rd party systems they used while employed.
Click for the detailed explanation
In all sorts of places !
While we can’t say definitively that the data we’ve discovered has already been used to exploit your organisation, the fact that we are able to identify this data should be very concerning.
Our service is designed to help both public and private sector organisations detect and mitigate cyber threats that leverage stolen email addresses and passwords.
Our services focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals.
When you do find evidence of our information on the Dark Web, does it mean we are being targeted by hackers ?
We focus on Cyber Threats that are specific to our customers.
The Dark Web is a hidden universe contained within the “Deep Web”- a sublayer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.