What We Do
It is estimated that over 50% of all sites on the Dark Web are used for criminal activities, including the disclosure and sale of digital credentials. Far too often, companies that have had their credentials compromised and sold on the Dark Web don’t know it until they have been informed by law enforcement — but by then, it’s too late.
That’s why we go into the Dark Web to keep you out of it.
Pricing
- Compromised Data Report including
- Compromised addresses
- Compromised password hint
(full passwords not provided) - Origin of Compromise (if known)
- Clean Scan Guarantee
Real-time compromise alerting.
Breach policy and procedure template.
Access to remediation team
Branded and CoBranded options
Provide proactive peace of mind.
- Compromised Data Report including
- Compromised addresses
- Compromised password hint
(full passwords not provided) - Origin of Compromise (if known)
- Clean Scan Guarantee
Real-time compromise alerting.
Breach policy and procedure template.
Access to remediation team
Branded and CoBranded options
Provide proactive peace of mind.
FAQ's
Q. What is the Dark Web?
Beyond the Internet (surface web) that you use day to day with Google and Bing, lies the deep web, these are sites Google can not index, and maybe require credentials or payment. It is estimated the deep web is 300x larger than the surface web. The dark web requires special browsers and because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.
Q. If your personal data is found on the Dark Web, can it be removed?
Once the data is posted for sale within the Dark Web, it is quickly copied and distributed (re-sold or traded) to a large number of cybercriminals, within a short period of time. It is generally implausible to remove data that has been disseminated within the Dark Web. all compromised accounts should have their password updated. Where the same password has been used across sites, all sites should be updated to unique passwords.
Q. Does the identification of my companies credentials mean we are being targeted by hackers?
While we can’t say definitively that the data we’ve discovered has already been used to exploit your company, the fact that we are able to identify this data should be very concerning. Companies should consult their internal or external IT and/or security teams to determine if they have suffered a cyber incident or data breach.