September 25, 2018

How Long Does it Take to Find Compromised Data

According to Verizon’s 2018 Data Breach Investigations Report, there have been more than 2,200 data breaches this past year alone. Close to 90 percent of these data breaches were executed in a minute or less, yet virtually all of them took months or longer to discover. And even then, when the breach was disclosed, questions about who has the information and what will be done with it are left unanswered, because the truth is, we don’t know where the data goes or how it will be used.

In an era of everything and everyone having a digital footprint, this doesn’t add up.

How Long Does it Take to Find Compromised Data

Why does it take months to find stolen data after a breach (if it is even found at all) when it can be compromised in a matter of minutes?

The honest answer is that there is no one reason.

One likely factor is the frequency of attacks, and the manpower it takes to simply identify them. Data breaches and cyberattacks occur multiple times a day, and it can take days, weeks, months or longer to fully understand what happened and what information was compromised.

Typical Data breach lifecycleTypical Data Breach Lifecycle within the Deep and Dark Web and Underground Communities

 

Only after that do we know for sure what to watch out for. And even then we’re searching for the proverbial needle in a haystack.

Another factor, as mentioned in our previous post, is that the cybercriminal is in the driver seat. The criminal controls what happens with the compromised information, and when it happens. They might post the compromised information within 24 hours of obtaining it. They may post it six months later after utilizing it for their own fraudulent or unauthorized purposes. They may never post it at all. Regardless of the cybercriminal’s timeline, companies need to know what to look for and be monitoring consistently. There’s no other way to know what is most vulnerable or when to employ specific tactics aimed at protecting corporate assets and employee security.

So how do we stay on top of what information is on the Deep and Dark Web? Only by looking for it.

The obvious top priority for cybersecurity professionals is to prevent attacks in the first place. But these days there’s no such thing as an impenetrable security system – especially online. Companies and individuals must also start thinking about engaging partners to monitor for compromised information on the Deep and Dark Web. Only by understanding what information is available to unauthorized parties can a company thoroughly understand how to thwart future attacks and better protect personal, sensitive, and confidential information.

Takeaway for Companies: Do you know what potentially compromising information about your company is on the Deep and Dark Web? If not, it’s time you learn. This intelligence can inform critical business decisions and protect your most valued assets, your business partners, your customers, and most importantly, yourself.

Takeaway for Consumers: Ideally, every company you conduct business with is not only keeping your information private, but also monitoring the Deep and Dark Web. Even then, your information is just a couple data points out of potentially millions they’re searching for. Take matters into your own hands and sign up for your own identity theft protection services that prioritize your digital protection and identity. When your information appears on the Deep and Dark Web, you’ll be alerted immediately and provided with immediate action to take to restore your security.