Dark Web Monitoring

Your business data is one of your most critical assets. And the Dark Web makes up a substantial proportion of the Internet. As a repository for cybercriminal and cyberthreat groups, it acts as a storehouse of stolen and illicit information including stolen and compromised credentials:

Potentially your business credentials

Dark Web ID ensures a high level of surveillance and protection with 24/7 human and machine-powered monitoring of business credentials including domains, IP addresses, and email addresses. What’s your next move?

 

 

You’ve just discovered compromised employee credentials and other sensitive data exposed and available on the dark web. What do you do?

  • Be aware that once exposed on the dark web your information cannot be completely removed or hidden

  • minimize risks - replace all potentially exposed login passwords with new and unique credentials

  • minimize risk - change any credentials older than 3-6 months

  • If the source of the breach is not known, change the passwords for all accounts which had the same or similar credentials

  • Ensure that in cases where the same password is used across multiple services, change each to a unique password, especially for critical services

  • Use only strong complex credentials

  • Pay attention to increased phishing emails hitting any mailbox

  • Increase the aggressiveness in checking access logs to critical services such as accounting, bookkeeping, and stores of intellectual property

  • Disable/close accounts of all former users

 
 
 

What went wrong?

  • Proactively use dark web monitoring set to check for your organization’s domain and email addresses

  • Your organization should be using a secure, centralized password management system

  • Ensure that multifactor authentication is used with every possible service

  • Ensure that policies require that users periodically change their password, and force the user to use strong, complex credentials

  • Prevention is helped by providing basic cybersecurity user training

  • Perform periodic risk assessments

  • Verify that ALL business data is being backed up