Dark Web Monitoring FAQ
Dark Web Monitoring FAQ
You
                  are likely seeing this article because
                  your email (or an email you are
                  responsible for) and an associated
                  password or PII was discovered in a data breach.
                  If you are still using the password
                  indicated in the alert, or still active on
                  the website indicated, we recommend
                  changing the password. 
Q: The alert is about a password I use, what should I do?
When you recognize the password or the website associated with the breach, you should update the password immediately across all sites with the same password. Ideally, every website should have a completely unique password.
Q: Why are we receiving alerts about a
                  former employee’s email address?
Sometimes alerts
                                  come through associated
                                  with users that no longer
                                  with your company.
                                  Historic accounts that
                                  were used at cloud
                                  providers like
                                  linkdin.com, target.com,
                                  amazon.com etc; cannot be
                                  deactivated when a former
                                  employee’s email is turned
                                  off. As such, when a
                                  website/cloud provider has
                                  a breach, those
                                  ***@yourdomain.com will be
                                  discovered and reported by
                                  our
                                  system.
When this happens,
                                  we will still send you the
                                  alert to evaluate whether
                                  the former employee’s
                                  login at that site is a
                                  risk. In most cases it
                                  will not be. In the rare
                                  case that the login is
                                  still relevant, the
                                  password should be
                                  changed.
Example of a
                                  relevant
                                  alert:  A former
                                  employee set up an account
                                  for stamps.com and it is
                                  now used by everyone in
                                  the company. Those would
                                  be important to fix. Items
                                  like facebook.com,
                                  linkdin.com, etc, can
                                  usually be
                                  ignored.
 
Q: Can we stop receiving alerts from
                  former employee’s email addresses?
Unfortunately, no.
                                  Alerting can only be set
                                  up on a domain-wide basis.
                                  Any compromise containing
                                  your company’s domain will
                                  generate an
                                  alert.
 
Q: Why does the alert only show an
                  encrypted password (long string of
                  letters, numbers and symbols)?
Some alerts will
                                  generate with the
                                  passwords showing as a
                                  string of letters, numbers
                                  and symbols. This means
                                  the passwords were
                                  compromised in an
                                  encrypted form. The
                                  password itself was not
                                  exposed, but if someone
                                  has the “key” to that
                                  encryption, they would be
                                  able to figure it out. We
                                  still advise changing the
                                  password for sites like
                                  that
 
Q: Why does the password say, “Not
                  Disclosed”?
Some passwords on
                                  the report state “Not
                                  Disclosed”. This can mean
                                  two
                                  things:
- The
                                  email address was found in
                                  a database not associated
                                  with a login specific
                                  website,
- or
                                  the compromised
                                  information was personal,
                                  ie: first name, last name,
                                  address, phone number, but
                                  the password itself was
                                  not
                                  found.
Unfortunately, the
                                  databases are not always
                                  specific enough to include
                                  which website was
                                  breached.  These
                                  breaches are listed just
                                  to make you aware that the
                                  information out there.
                                  Some of the compromised
                                  information provided does
                                  not always have an
                                  actionable response.
                                  Vigilance and training are
                                  the most effective ways to
                                  prevent compromised
                                  personal information from
                                  being used against
                                  you.
 
Q: What does “PII HIT” mean?
Some compromises on
                                  the report state “PII”
                                  (personally identifiable
                                  information).
This can include
                                  things like name, birth
                                  date, place of employment,
                                  etc. from websites like
                                  facebook or linkedin. This
                                  information is reported
                                  because personal data can
                                  be used to format more
                                  personalized phishing
                                  emails or other
                                  scams.
Unfortunately, the
                                  databases are not always
                                  specific enough to include
                                  which website was
                                  breached. Some of the
                                  compromised information
                                  provided does not always
                                  have an actionable
                                  response. Vigilance and
                                  training are the most
                                  effective ways to prevent
                                  compromised personal
                                  information from being
                                  used against
                                  you.