The Dark Web is no joke – Why it should be monitored by your businessLew Smith, Director of Consulting Services | September 13, 2018
Since we began piloting our Dark Web monitoring service, we’ve participated in many conversations with executives where our team has been able to tell them their password, accurately. Their resulting silent response is confirmation of the importance of this service. However, it’s the next statement that truly solidifies the need for businesses to monitor such password compromises… “I use that password in many places.”
In my recent post regarding Office 365 email attacks, I highlighted the challenges with password use. Your employees reuse passwords, period. This means that their network logon credentials and external service credentials for your business systems (Salesforce.com, Dropbox, ADP, etc.) have a high likelihood of being the same. The challenge associated to that statement is that IT security is no longer directly controlled by your company. All that is required for YOUR business to be compromised is a single hack of ANY external service. This includes your business systems and any personal services your employees use. Once their password is exposed, this information can be used by criminals to access any personal or business account where that password, or any variation of it, is used.
This is why we recommend that our clients monitor the Dark Web, which is where criminals auction these personal details to the highest bidder. While this cannot prevent the mentioned services from being hacked, it WILL provide you with monitoring and alerts so you can take action to protect your business.
If you’re interested in discussing a Dark Web monitoring service, or are interested in a scan to see if your business is in danger today, simply contact our team via our web form and we will set up a call to discuss.
*Pew Research Center, “Americans and Cybersecurity,” January 2017
Mobile-workforce-management company Fleet Complete not only delivered during a recent surge in business, but even after extensive flooding at their Toronto headquarters, their fast-paced business continued seamlessly.
With secure @Microsoft cloud technology, including Microsoft Azure, Teams, and Dynamics 365, the company has experience over 50% YOY growth–despite the threat of disaster.
Does your company have a business continuity and disaster recovery plan in place? Interphase Systems, Inc. can help. Contact us to learn more.
To receive updates from Interphase Systems, Inc., and to learn more about how we can help with Applications and Infrastructure, subscribe today!
Manual processes, handwritten logs, and paper trails are not only inefficient, but they can be costly. These outdated business management techniques often result in error, duplication, and quality-control issues that can compromise efficiency, productivity, and morale.
But with cloud-based productivity and data centralization tools such as Microsoft Dynamics 365, you can modernize your business and achieve more.
At Interphase Systems, Inc., we understand the importance of modern digital tools to help businesses move forward. Contact us to learn more. #WhyCloud
Imagine if you could:
Identify sensitive information automatically.
Eliminate passwords entirely in favor of biometrics or pins.
Identify, quarantine, and wipe a compromised endpoint all from a single location.
Quantify your security position and gain insights on how to improve it.
All of this and more is possible with Azure Advanced Threat Protection, just one of four valuable tools included in Microsoft 365 Enterprise E5. Interested in what other tools are available to you? Interphase Systems, Inc. has the answers to your questions. Contact us to learn more.
Does your company follow password policy best practices? We often say that some companies spend millions of dollars on cyber security tools, but then forget about setting up the basics. For the last several years, a company called SplashData conducts an analysis of...
During some recent testing, we have discovered that the Local Active Directory attribute AccountExpires does not properly synchronize with Azure Active Directory (AAD), which is used with Office365. Many organizations use this feature (AccountExpires) to set a future...