How should I interpret the results of password monitoring?

How should I interpret the results of password monitoring?

The report is interpreted as follows:

Headline:
Indicates from which source the information is exposed, e.g. Dropbox. If it says "Dark Web Password Database," it means that the information is exposed but the original source cannot be verified.

Source type:
How the information was exposed, e.g. breach

Name:
Same as the headline

Full name:
If the exposed information is linked to a person's full name

Username:
If the exposed information is linked to a username

Email:
Exposed email

Password:
If it says TRUE, the password has been exposed; if FALSE, the password is not exposed, only the other listed information.

Domain:
The domain to which the information is linked

Telephone:
If the exposed information is linked to a phone number
    • Related Articles

    • What is password monitoring?

      A service that scans for exposed passwords linked to the company's domain. The tool scans the clear, deep, and dark web for exposed email addresses and passwords linked to those email addresses, specifically at the domain level rather than tied to ...
    • Why are you monitoring my information?

      Safestate collaborates with a number of different partners where you as a customer can take advantage of our proactive cyber security services. This includes that we monitor whether your data has been exposed. We search with a keyword, which can be ...
    • What should I do with the email addresses that have leaked passwords?

      If you have disclosed your email address along with your password, you should immediately change the password for the corresponding email account. To do this, log in to the account and navigate to the settings or security section, where you can ...
    • I've received an email about leaked information, but there's no information about the source.

      Sometimes, certain pieces of information can be identified as leaked (exposed) without the original source being available. Unfortunately, we're unable to investigate this further. As the recipient of this information, what you can do is, if the ...
    • How do I ensure to reduce the risks in the future?

      Here are some steps to prevent email addresses and passwords from leaking: Use strong passwords that include a combination of letters, numbers, and special characters. Regularly update passwords and avoid using the same password for multiple ...