Digital Risk Monitoring
Digital Risk Monitoring
What is a digital footprint?
The digital footprint - also known as the digital shadow - is the data trail that a company leaves behind as soon as it uses the internet. This footprint changes almost daily, depending on the web activities of employees and the assets such as applications and resources that the company puts online.
For the security officer the digital footprint plays a major role when he determining the organization's attack surface. This is understood to mean:
- the company values/assets connected to the internet
- all vulnerabilities (attack vectors) that hackers can use to gain access to the company network and sensitive data or to carry out a cyberattack
- Information that has fallen into the hands of the hacker through attacks on partners, suppliers or employees of the company. This makes phishing emails appear more trustworthy, for example.
- A fake website created with the company's logo. Customers could be deceived with this fake and their data could fall into the hands of the attacker.
The digital footprint business
Every day cyber criminals attack companies. If they are successful, they try to commercialize the illegally acquired data or sell it to other hackers. For example, if login data is stolen, it can be used to spread malware or gain access to other internal systems. The stolen data becomes a valuable product and the hacker becomes a businessman who trades with this product – mainly on the dark web. As a result, millions of hacked customer and account data appear on the dark web and deep web every day.
Only if you know your digital footprint and the associated risks can you react accordingly and take defensive measures at an early stage.
Digital Risk Monitoring Service
This service from the terreActive SOC determines your digital footprint from an external perspective, because risk management requires permanent monitoring of your footprint. The security situation is determined, a risk assessment is carried out and, if necessary an alarm will be triggered. Our digital risk monitoring service is triggered when
- Data from your company is offered on the Darknet
- Data from your partner companies appear on the Darknet
- Fake websites appear under your name
This enables us to react quickly and contain any potential damage immediately.
terreActive offers Digital Risk Monitoring in two service levels:
Digital Risk Monitoring Base
For a cost-effective start. Scope:
- Security monitoring in the open, deep and dark web
- Brand phishing (domain- and cybersquatting)
- Social media, repositories, credentials, data leakage
- Alerting according to handling instructions
- Real-time keyword (option)
Digital Risk Monitoring Premium
For a comprehensive view and deeper evaluation. Scope:
- External Attack Surface Management (EASM), Alerts & Reporting
- Asset Management, Discovery and Classification
- In-Depth Attack Surface Analysis
- Real-time Operation Insights for Remediation and Prioritization
- Analysis and instructions for action
- Alerting according to handling instructions
- Deletion of fake websites at cost
- Supply chain monitoring (option)
The trackers – Our partners
To provide the Digital Risk Monitoring Service, terreActive uses tools from these internationally recognized manufacturers, among others:
- C2SEC
- DomainTools
- KADUU
Here you will find an overview of all our partners.