Your details might be all over the Dark Web… what is it?
The internet consists of three mains tiers – the ‘Public Web’, comprising of around 4% of the internet, is what we all use day to day, and includes the likes of social media platforms, shopping and such other sites. The ‘Deep Web’, representing around 93% of the net, consisting of private systems, such as the cloud services we use as businesses. Leaving around 3% of the internet identified as the ‘Dark Web’, untraceable, and therefore a prime location for the shared activities between criminals of all kinds.
If a Cyber Hacker has been able to successfully steal a list of user login credentials from a particular system, these private details will have value to other cyber criminals and therefore shared and sold within the Dark Web.
Should I be worried?
If your login credentials have been exposed and posted on the Dark Web, they will be available to anyone & everyone that wants them…. and worse; if you happen to use the same repeat email address and password across multiple systems, such as your banking, social media, email and data storage, you’re incredibly vulnerable to attack across your entire internet presence.
What can I do about it?
Services are available to scan the Dark Web to identify first & foremost whether you are at risk. Such services can maintain a constant watch by trawling data held on the dark web for your email address, or other associated credentials, and then raise an alert if anything of note can be found.
If your details are found, you are then immediately aware of your vulnerability and can act by at least resetting your passwords wherever used.
Can I stop myself from becoming a target?
It’s almost impossible to stop yourself from becoming a target in the first place. We must all accept that at some point, our personal data will be stolen from somewhere.
HOWEVER! What’s even more important is being aware when we’re at risk and having a process in place to mitigate our the exposure of our business & personal data. By implementing best practices, such as setting secure passwords, regularly changing those passwords, ensuring we differ the passwords & login details across the different systems & services we use, and lastly, implementing features such as 2-Factor / Multi-Factor Authentication (2FA/MFA).
By utilising cyber security features, such as MFA or 2FA, we are able to add another step in the process of accessing our web-based data & services, beyond usernames and passwords. Should someone obtain your password and try to access a system that you use, you’ll receive a text message, phone call, or email to your device to authorise that login, providing a key hurdle to fault cyber criminals from getting to your data.
Want to get the best of cyber security for your business?
At Antechs, we specialise in learning our clients’ business and best applying security technology to their needs.
If you would appreciate a free brief discussion about your operational challenges & to explore the threats to your business, please get in touch today – 0191 375 1979 or drop us a line email@example.com.