If my information is exposed, what should I do?
If the tool identifies exposed data, you are advised to replace this data as quickly as possible so that no one can exploit it.
It's the same principle as if someone steal the key to your home. Then of course you want to change the lock as quickly as possible to prevent break-ins.
Related Articles
I've received an email about leaked information, but there's no information about the source.
Sometimes, certain pieces of information can be identified as leaked (exposed) without the original source being available. Unfortunately, we're unable to investigate this further. As the recipient of this information, what you can do is, if the ...
Why are you monitoring my information?
Safestate collaborates with a number of different partners where you as a customer can take advantage of our proactive cyber security services. This includes that we monitor whether your data has been exposed. We search with a keyword, which can be ...
How should I interpret the results of password monitoring?
The report is interpreted as follows: Headline: Indicates from which source the information is exposed, e.g. Dropbox. If it says "Dark Web Password Database," it means that the information is exposed but the original source cannot be verified. Source ...
What is password monitoring?
A service that scans for exposed passwords linked to the company's domain. The tool scans the clear, deep, and dark web for exposed email addresses and passwords linked to those email addresses, specifically at the domain level rather than tied to ...
What is meant by PII disclosure?
PII stands for "personally identifiable information", which means information that can be used to identify a specific individual. "PII disclosure" refers to when such informationis disclosed or leaked in a way that may be harmful to the individual. ...