Hackers are trading your credentials over the Dark Web

dark

Your private details might be all over the Dark Web… What’s that?

The internet has three key levels – the ‘Public Web’, containing of only around 4% of the internet, is what we all use every day, this includes things like websites and social media platforms. The ‘Deep Web’, signifies around 93% of the net, consists of private systems, such as the cloud services we use as businesses. Leaving around 3% of the internet known as the ‘Dark Web’, untraceable, and therefore a prime location for the shared activities between cybercriminals of all kinds.

If a hacker successfully stole an entire list of user login credentials from a system, these personal details will now have value to other cybercriminals and therefore shared and sold within the Dark Web.

 

Should I be concerned at all?

If your private credentials have been exposed and posted on the Dark Web, they will be available to anyone & everyone that wants to buy them…. and worse; if you happen to use the same repeat email address and passwords across multiple systems, such as your banking, social media, email, and data storage, you’re insanely susceptible to attack and theft across your entire internet presence.

 

What can I do to stop the attacks?

There is a wide range of services to identify first & foremost whether you are largely at risk. Such services can sustain a constant watch by trawling data held on the dark web for your email address, or other associated credentials, and then raise an alert if anything of note can be found.

If your details are widely found in the results, you are then at least instantly aware of your exposure and can act fast by at least resetting and changing passwords wherever used.

 

Can I stop myself from being a target?

In the current generation, it’s practically impossible to hide. We must all accept that at some point in the future, our personal data will be stolen from somewhere.

HOWEVER! What’s more important is being alert when we’re at risk and having a process in place to diminish the exposure of our business & our own personal data. By implementing best practices, such as setting secure passwords, regularly changing those passwords, ensuring we differ the passwords & login details across the different systems & services we use, and lastly, implementing features such as 2-Factor / Multi-Factor Authentication (2FA/MFA).

By applying cybersecurity features, such as 2FA or MFA, we can add another step in the process of accessing our web-based data & services, beyond usernames and passwords. Should someone obtain your password and try to access a system that you use, you’ll receive a text message, phone call, or email to your device to authorise that login, providing a key obstacle to fault cybercriminals from getting to your data.

 

Want to get the best of cybersecurity for your business?

 

At CCS, we specialise in learning our clients’ business and best-applying security technology to their needs.

If you would appreciate a free brief discussion about your operational challenges & to explore the threats to your business, please get in touch today.

Share this:

Leave a Reply