Dark Web Domain Status Report

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
How It Applies In A Virtual World
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security By Duncan Hall.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Electronic Commerce Semester 1 Term 1 Lecture 14.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
CYBERSECURITY SOLUTIONS
Why is this called “the ostrich effect”?
Fraud Protection.
Fraud protection.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Common Methods Used to Commit Computer Crimes
How to use the internet safely and How to protect my personal data?
Handling Personal Data
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Overview 1. Phishing Scams
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
I S P S loss Prevention.
October 26, 2017 Main Line Association for Continuing Education
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
This presentation has been prepared for
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Phishing is a form of social engineering that attempts to steal sensitive information.
Jason C. Belford Information Security Briefing Staff Senate
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Forensics Week 11.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Today’s Risk. Today’s Solutions. Cyber security and
Passwords.
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Security Essentials for Small Businesses
Network Security Best Practices
Introduction to Computers
Protecting Your Company’s Most Valuable Asset
Practical tips to defend your business from cyber attacks
Cyber Security - Protecting Information
Defense in Depth: Windows 8.1 Security
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Business Compromise and Cyber Threat
Chapter 6 Finding a Job.
Internet Safety for Everyone
What is Phishing? Pronounced “Fishing”
Stop Ignoring the Problem
Employee Cybersecurity Program
Employee Cybersecurity Program
Company Name | Phone Number | Website | Address
Communicating in the IT Industry
6. Application Software Security
Identity Theft By Omer Ersen.
Employee Cybersecurity Program
Cybersecurity Simplified: Phishing
CS101 Security.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Dark Web Domain Status Report We may not be able to erase the data found on the dark web, but we can bring it to light. Prepared for: [Client Name]

What Is the Dark Web? Why is the Dark Web Dangerous? Password Reuse The Dark Web, sometimes called the deep web, contains only 6% of internet content, but that content can be powerful if used illegally. Imagine the Dark Web to be like an unlit, hidden alley. You can’t see the face of anyone when you peek inside; transactions are happening between people that aren’t being seen, and individuals are moving freely, anonymously, and without a trace. Nothing is tracked by search engines like Google or Bing, encryption hides identities, and to get into these secret areas, you need special software. Like that dark alley, this is where dishonest behavior can thrive. If your information and identity are being exchanged on the Dark Web, you need to know so you can remedy things quickly. If you don’t want to be seen, then it’s likely that you don’t want to be caught. Cybercriminals buy and sell physical items like illegal drugs and guns, as well as electronic material like identities, passwords, hacking tools, and credit card numbers. The problem is not only IF your credentials have been compromised, but WHAT you do next to protect yourself. Password reuse and lack of awareness of sophisticated phishing scams, like Business Email Compromise scams, means cybercriminals can use your own data against you. Password Reuse Business Email Compromise Internal Data Breach Once a password is found on the Dark Web, cybercriminals will attempt to use that password across any other accounts they can think of. If that password has been reused, particularly on a business account, not only is the employee at risk, but your organization is as well. Cybercriminals will use Dark Web data to create very targeted emails called Business Email Compromise (BEC) scams, where they impersonate key company executives to trick employees into carrying out their requests – often to transfer funds. Password reuse and Business Email Compromise scams are just two risks associated with having data on the Dark Web. This data can be used against you and your organization in several other ways, which may lead to an internal data breach for your organization.

What Do the Results Mean? What Is a Dark Web Scan? By taking a dive into the depths of the Dark Web, we are able to perform a scan that searches for the presence of your organization’s email domain. Cybercriminals on the Dark Web work hard to keep law enforcement and good-guy hackers from uncovering compromised data. So, while we do have human-verified data and a team hard at work cracking passwords, there may be more information on the Dark Web than what is being presented here today in this report. The Dark Web is large and complex, and there are locations that have yet to be penetrated and indexed. Therefore, it is imperative that you adopt a proactive approach of educating your users on possible phishing emails and other tactics that can result from breached dark web data. This isn’t a problem that is contained within borders – it’s growing every single day, which is why you need to conduct ongoing monitoring of the Dark Web. What Do the Results Mean? We ran a Dark Web Scan of your domain and compiled all the results into this report. Our human operatives gathered all the data found, including passwords. Compromised data will vary depending on the type of data breach it was acquired from. Compromised Data Data Breach Details The compromised data section shown on your report signifies what data has been found floating around on the Dark Web. The type of data can include name, address, email, etc. and can be used to craft sophisticated phishing scams. If there are known details of the data breach an employee has been involved in, they will appear in the Data Breach Details section of your report. Breach Score Passwords Each breach that your domain is found to be involved in will have a breach score associated with it. This score indicates how confident our research staff is that the data leak is from a credible source. If a password is found on the Dark Web, those details may be available. At times, passwords are compromised, however they have not yet been cracked – but that doesn’t mean they are not at risk!

What Should I Do to Protect Myself and My Organization? If your data was compromised - even one account, your credentials need to be attended to right away. The first thing you should do is change your passwords for any and all accounts you may have used that same password for. Passwords should be complex and a combination of at least 8-10 letters and characters. You should consider making your strong password a passphrase, which is a sequence of words meshed together. On an ongoing basis, you should always: Use two-factor authentication Monitor your Dark Web status Two-factor authentication (2FA) is an extremely beneficial added security layer that requires users to provide extra proof that they are who they say they are when trying to log into their accounts. New data breaches are discovered every hour of every day. A once and done Dark Web scan will not be enough to protect your Dark Web status ongoing. Continuous monitor equals constant protection. Provide ongoing training & education Phish your employees regularly Cybersecurity threats are constantly changing and evolving. Ongoing training is necessary for your employees to stay up-to-date on current threats and best security practices. In addition to training your employees on phishing, it is important that you put them to the test. Sending simulating phishing emails will help ensure employees know how to spot phishing attempts when they hit their inboxes. Contact us today to learn how you can bundle in complete end-user security into your service. Dark Web Monitoring, Weekly Training, Ongoing Phishing, & more. Together we can strengthen the most targeted part of your network, your employees, into your most vigilant defense.

Get in Touch 123 Office Address Rd City, State 000000 contact@yourdomain.com www.yourdomain.com +1 800 555-1234