The Dark Web and You

Why Should I Care About the Dark Web?

Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information that relates to your company. From clicking on a scam email to a data breach from a supplier, it’s quite easy for your information to be stolen.

So why should you care, what can you do about it, and how can you protect yourself in the future?

… Here’s what to do:

Find Out Whats Out There

Before you can make an informed decision about what to do and how to protect yourself, you need to know what information hackers already have about your organization.

• Email Credentials such as your email domain ( can be the first step in a hacker’s assault on your network.  Once a hacker knows your email domain, they will try to impersonate a co-worker or boss in an attempt to get you to click on a link or even wire money to an anonymous location. We’ve covered Email Scams before, so be sure to take a look.

• Passwords are obviously sought after by many different hackers. Passwords will allow hackers access to all types of account information, as most users have the same passwords across multiple accounts.

What can you do about it?

Once you know what company information is on the Dark Web, it’s time to take action.

Any of your email addresses that are lurking around the Dark Web should be looked over. Change the passwords on these accounts just in case these accounts were compromised. Additionally, be on the lookout for any impersonation attempts with similar names to these accounts.

Any passwords that have been leaked to the Dark Web need to be changed immediately. Alert the user that the password is compromised and to change the password on any and all accounts they may have used it on. Even a leaked password from years prior can still be a danger if it remains on one account.

How can I protect my company in the future?

1 One of the first things you should do is be sure to have professional IT help at your side. No one can stop employees from clicking on bad links altogether, but with Content Filtering, Managed Firewall, and Dark Web Monitoring, you can ensure your business will be protected from avoidable catastrophes.


2 Cyber Security Training is an easily implementable, manageable, and measurable way of making sure your team knows about email scams, ransomware attacks, and signs of hacking. Endpoint Users are one of the most common attack vectors a hacker will try, and proper educate will mitigate your risks.


3 Following through your cyber security procedures is one of the most important aspects of Protecting Your Business. Many companies come up with plans and procedures but do not enforce these rules or actively work around the rules to make their own lives easier.

Gaps in security will catch up to organizations that ignore their own rules.




Employee Safety Tips

Part Two of our Cyber Holiday Safety Series focuses on protecting your workplace. Gift card scams and money wiring scams increase this time of year …

Read More →

Online Shopping Safety Tips

Part One of our Cyber Holiday Safety Series focuses on protecting your information while online shopping. Phishing emails focused on fake deals and last minute …

Read More →

New York and New Jersey Data Regulation

If your company does any business in New York or New Jersey, it can be difficult to know what laws pertain to your business. We’ve …

Read More →

Security Alert: Lack of Trust Comes with a High Price Tag for U.S. Businesses

A new study finds that “Almost half (44%) of US consumers have suffered the negative consequences of a security breach or hack…”. The research done by …

Read More →

Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business …

Read More →

Building an Incident Response Program

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order …

Read More →

NetConnect / VISN-IT Featured in StorageCraft Press Release

New StorageCraft Partner Success Program Boosts Profit Paths Across All Channel Partner Business Models DRAPER, Utah, Sept. 27, 2018 /PRNewswire/ — StorageCraft®, whose mission is to protect all …

Read More →

Small Business Cyber Security Concerns

The truth is that Small Businesses have a lot to fear when it comes to Cyber Security. Any disruption that causes downtime or loss of …

Read More →

Email Compromise – How Does it Work?

Email compromises are becoming more and more dangerous every year, and it’s important to know how they work. Email Compromises involve the hacking of a …

Read More →

Cloud Computing Pros and Cons

What is the cloud? Cloud Computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, …

Read More →

Phishing Threats

Phishing threats are getting more and more sophisticated as cyber security measures become smarter. The main reason why phishing must be handled differently than other …

Read More →

The Dark Web and You

Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information that relates to your company. From clicking on …

Read More →

The New Extortion Scam you’ll want to look out for!

Email Threats constantly evolve and try to find new ways to steal your money or steal your information. A large part of Cyber Security is …

Read More →

Two Factor Authentication – Do I Really Need It?

Two Factor Authentication procedures or Multi Factor Authentication procedures are a part of many interactions in our daily life. Most credit and debit cards now …

Read More →

The True Cost of a Data Breach

One of the biggest headaches your company can endure is a data breach. Whether its caused by employee error or targeted cyber attacks, the long …

Read More →