FAQ
Articles
- Compromise Data Spike
- Dark Web ID Data Integrity
- CSS Compromise Type
- I see fake emails (false positives). Why is this important?
- How are the stolen or exposed credentials found on the Dark Web ID?
- What is the Dark Web?
- What does password criteria mean?
- Some of this data is old and includes employees that are no longer working for us. Doesn’t this mean we are not at risk?
- Identified method used to capture/ steal data: how was the data stolen or compromised?
- Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
- Data source locations & descriptions: where do we find data?
- How does Dark Web ID help protect my organization?
- What does it mean when a password has a long series of random numbers and letters?
- What is the difference between a privileged user and standard user?
- The password identified does not meet our network criteria. Why should we care about this?
- Are there any special credentials needed to investigate the dark web?
- If your personal data is found on the dark web, can it be removed?
- Is it safe to say cloud storage is a serious concern for data breach? With most of our software tools moving to cloud hosting, does this create more risk for my company’s ip?
- Any “best practices” for individual users or corporate it on frequency of password change or actually changing your personal or professional email?
- Can I track personal email accounts for compromises?
- Why am I seeing multiple users with the same password being exposed on the same day?