EDR / MDRIdentify, contain, respond, and stop malicious activity on endpoints
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
Risk Assessment & Vulnerability ManagementIdentify unknown cyber risks and routinely scan for vulnerabilities
Identity ManagementSecure and streamline client access to devices and applications with strong authentication and SSO
Cloud App SecurityMonitor and manage security risk for SaaS apps
SASEZero trust secure access for users, locations, and devices
SOC ServicesProvide 24/7 threat monitoring and response backed by ConnectWise SOC experts
Policy ManagementCreate, deploy, and manage client security policies and profiles
Incident Response ServiceOn-tap cyber experts to address critical security incidents
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Expanded Definition: Dark Web Scan + Dark Web Risk Assessment
Dark web scan definition
A dark web scan is a service that searches databases of information resulting from breaches that leave users’ personal information exposed.
Following a data breach, sensitive user information is stolen and shared on hidden internet pages, known as the “dark web.” By proactively searching for exposed information, a dark web scan can help individuals prevent further damage by changing their passwords or other sensitive information.
Since content on the dark web is not accessible to search engines, this process may be the only way for a user to be alerted that their information has been compromised.
Dark web risk assessment definition
A dark web risk assessment, or dark web assessment, searches hidden databases and internet pages for sensitive information pertaining to an entire organization.
Organizations can become targets for cybercriminals, who may buy or sell their sensitive data. Being aware of the presence of their information on the deep web can help organizations avoid exploitation.
What is the difference between a dark web scan and a dark web risk assessment?
A dark web scan is an element within a dark web risk assessment. Both processes pertain to searching for private or sensitive information that has been leaked or sold.
A dark web risk assessment incorporates several techniques and tools, with the dark web scan being only one of them. Information on the dark web is not indexed by search engines, and cannot be discovered without an intentional pursuit. Since the dark web can only be accessed using VPNs or browser extensions, this process is usually handled by a cybersecurity team or partner.
The MSP role in Dark Web Risk Assessments
As the frontline of IT for their clients, an MSP must be prepared to guard against many types of cyberthreats. Proactive dark web risk assessments allow MSPs to alert their clients to any leaked or compromised data before an issue arises.
The type of information stolen and shared on the dark web varies, but could include:
- Usernames and passwords (resulting from credential theft)
- Credit card or other payment information
- Personal information, such as mailing addresses
- Intellectual property
Accessing information on the dark web is not illegal, but it does require a careful approach. When completing a dark web risk assessment, professionals use anonymous browsers and VPNs to avoid exposing their own data.
Given the knowledge required to remain safe while completing a dark web scan or risk assessment, it’s a good idea for non-technical users to rely on a partner to complete these processes. That’s where the MSP can step in, providing a dark web risk report to their client.
Did you know?
$155.73: The average cost of credentials for a hacked Gmail account on the dark web.
Take your Cybersecurity practice to the next level
Cybersecurity presents the greatest opportunity for your MSP to grow, and the greatest challenge to your long-term success, and that of your clients. Learn what you need to think about when launching, building or growing your cybersecurity practice.
Cybersecurity Management: Five ways to navigate the Cybersecurity Management Suite
Blog post >>
Nearly 80% of senior IT professionals and IT security leaders believe their organizations lack sufficient protection against cyberattacks. This is despite increased IT security investments made in 2020 to deal with distributed IT and work-from-home challenges.
Discover the dangerous world of the Dark Web
In this 90-minute webinar led by ConnectWise cybersecurity experts Jay Ryerse and Bryson Medlock, you can take a safe trip into this dangerous place and learn everything you need to know about the Dark Web, from its origin and history to the technologies that power it—and the criminal activity that takes place in its alleyways.
ConnectWise Cybersecurity Starter Kit
Want to get started selling cybersecurity? We’ve put together a kit to help. Download the kit today for helpful resources that will transform your business from an MSP to an MSP+ model, including educational information for your SMB customers, templates, and more.
Customer Data Security - Why it's Important for MSPs to Track Their Data
Blog post >>
Your clients are moving to SaaS services like Microsoft 365® and Google Workspace®, but you’re not off the hook when it comes to backing up their data. Read the fine print, and you’ll find out these services don’t offer any backups close to what your clients need. This puts SaaS backups near the top of your BDR strategy and service offerings. Do you have the tools and practices in place to get the job done?
Critical security risks threatening SMBs
Cyberattacks and their repercussions continue to make headlines around the world. Even as attacks against SMBs increase, many of them still aren’t where they should be to protect themselves. Based on anonymous data from over 1,000 risk assessments run through the ConnectWise Identify® risk assessment platform, we’ve pinpointed key risks SMBs are failing to address.