- Subscribe/Unsubscribe from Daily/Monthly Dark Web Compromise Report
- Compromise results do not report compromises for a newly added domain
- End of Life for SpotLight ID
- I’m seeing multiple users with the same password being exposed on the same day, what does that mean?
- Can I track personal email accounts for compromises?
- Any “best practices” for individual users or corporate it on frequency of password change or actually changing your personal or professional email?
- Is it safe to say cloud storage is a serious concern for data breach? With most of our software tools moving to cloud hosting, does this create more risk for my company’s ip?
- If your personal data is found on the dark web, can it be removed?
- Are there any special credentials needed to investigate the dark web?
- The password identified does not meet our network criteria. Why should we care about this?
- What is the difference between a privileged user and standard user?
- What does it mean when a password has a long series of random numbers and letters?
- What is the dark web?
- How does Dark Web ID help protect my organization?
- How are the stolen or exposed credentials found on the dark web?
- Data source locations & descriptions: where do we find data?
- Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
- Identified method used to capture/ steal data: how was the data stolen or compromised?
- Some of this data is old and includes employees that are no longer working for us. Doesn’t this mean we are not at risk?
- What does password criteria mean?