{"id":14057,"date":"2022-10-28T11:55:44","date_gmt":"2022-10-28T09:55:44","guid":{"rendered":"https:\/\/www.secify.com\/?page_id=14057"},"modified":"2022-11-29T15:27:24","modified_gmt":"2022-11-29T14:27:24","slug":"leaked-credentials","status":"publish","type":"page","link":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/leaked-credentials\/","title":{"rendered":"Leaked Credentials"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-bottom:30px;--awb-padding-top-small:0px;--awb-padding-bottom-small:0px;--awb-margin-top:30px;--awb-margin-bottom:30px;--awb-background-color:#f6f6f6;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><h2>The easiest way into an organization is through its employees.<\/h2>\n<p>That&#8217;s because the security barrier that exists between an attacker and the company&#8217;s information assets is often something as simple as an employee&#8217;s security awareness.<\/p>\n<p>The key to the organization and its assets are usually protected by a password that the employee can choose entirely himself, based on some fixed requirements such as special characters, upper\/lower case letters and password length. The employee is expected to remember this password along with all other passwords.<\/p>\n<p>The solution for many will be to reuse the same login details, username and password, in several places, and in the worst case, everywhere. It is enough for a site to leak user data such as passwords.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><div class=\"fusion-li-item-content\">\n<p class=\"TextSmall\"><strong>Minimal action handling in case of leaked passwords \u2022 Measures to minimize data breaches \u2022 Alerts when any of your user data is included in a leak<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:60px;--awb-padding-bottom:60px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img width=\"1024\" height=\"485\" title=\"Strong and weak easy Password. Note pad and laptop.\" src=\"https:\/\/www.secify.com\/wp-content\/uploads\/2020\/04\/credential-check-secify.jpg\" alt class=\"img-responsive wp-image-7970\" srcset=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2020\/04\/credential-check-secify-200x95.jpg 200w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2020\/04\/credential-check-secify-400x189.jpg 400w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2020\/04\/credential-check-secify-600x284.jpg 600w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2020\/04\/credential-check-secify-800x379.jpg 800w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2020\/04\/credential-check-secify.jpg 1024w\" sizes=\"(max-width: 640px) 100vw, 1024px\" \/><\/span><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><h2>There is a market for leaked passwords<\/h2>\n<p>On the internet today there are databases with user accounts and passwords that can be purchased at a relatively affordable price &#8211; roughly around \u20ac0.2 per account. These login credentials come from websites and systems that have either accidentally leaked the credentials or simply been hacked.<\/p>\n<p>The information in a leaked database often consists of a username or email, and a password. So, what if a user has the same username and password for all e-commerce stores, email accounts, websites and services. Exactly, it is enough for one of the services to suffer a leak for you to lose access and open up to data breaches to all sites that have the same password. Then it doesn&#8217;t matter at all if you have the world&#8217;s strongest password.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column cta\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h2 style=\"text-align: center;\">Do you want to know more?<\/h2>\n<\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-text-transform:none;\"><p style=\"text-align: center;\">Get in touch with us and we will help you get started with your monitoring.<\/p>\n<\/div><div class=\"fusion-text fusion-text-6 kontaktaoss\"><p><a href=\"#contact\">Contact Us<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:60px;--awb-padding-bottom:60px;--awb-margin-top:30px;--awb-margin-bottom:30px;--awb-background-color:#f6f6f6;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h2>Testimonials<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img width=\"300\" height=\"59\" alt=\"Dustin samarbetar med Secify\" title=\"dustin-logo\" src=\"https:\/\/www.secify.com\/wp-content\/uploads\/2022\/02\/dustin-logo-300x59.png\" class=\"img-responsive wp-image-11268\" srcset=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2022\/02\/dustin-logo-200x39.png 200w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2022\/02\/dustin-logo-400x79.png 400w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2022\/02\/dustin-logo-600x118.png 600w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2022\/02\/dustin-logo-800x158.png 800w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2022\/02\/dustin-logo-1200x236.png 1200w, https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/wp-content\/uploads\/2022\/02\/dustin-logo.png 4168w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><blockquote>\n<p>Secify supports us in data protection issues and in our work with Data Privacy. In a trustworthy manner and with broad competence, Secify has contributed to our delivery.<\/p>\n<\/blockquote>\n<p><strong>Robert Ekvall<\/strong>, IT Security &amp; Company Integration Lead<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-padding-top:30px;--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"LogoMarquee\">\n  <div class=\"LogoTrack\">\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2026\/03\/svenska-ingenjorer-logo.png\" alt=\"Sveriges Ingenj\u00f6rer\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2022\/04\/svedbergs_logo.png\" alt=\"Svedbergs\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/05\/lansforsakringar_jonkoping_logotyp-2.png\" alt=\"L\u00e4nsf\u00f6rs\u00e4kringar J\u00f6nk\u00f6ping\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/05\/if.png\" alt=\"If\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2022\/11\/coop-medmera.png\" alt=\"Coop MedMera\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/10\/infare.png\" alt=\"Infare\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/10\/tidsam.png\" alt=\"Tidsam\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2019\/12\/aleris-logo.png\" alt=\"Aleris\"><\/div>\n  <\/div>\n<\/div>\n\n<script>\ndocument.addEventListener(\"DOMContentLoaded\", function () {\n  document.querySelectorAll(\".LogoTrack\").forEach(function(track) {\n    if (!track.dataset.duplicated) {\n      track.innerHTML += track.innerHTML;\n      track.dataset.duplicated = \"true\";\n    }\n  });\n});\n<\/script><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:25px;margin-bottom:25px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-9\"><h2>How we do it<\/h2>\n<\/div><div class=\"fusion-text fusion-text-10\"><p>We want to monitor all company email accounts. We are adding coverage on @f\u00f6retaget.com and @f\u00f6retaget.se. We are also adding alarms to two employees in the IT department, martin@f\u00f6retaget.se and tommy@f\u00f6retaget.se.<\/p>\n<p>Johan is in the finance department and has the email address johan.pettersson@f\u00f6retaget.se. He has a number of services that he uses daily. One of the services recently suffered a data breach where a large amount of accounts and passwords were leaked. As many other companies have done before, this company chose to &#8220;put the lid on&#8221; and silence the leak instead of informing about it.<\/p>\n<p>A few days after the attack, the entire database is put up for sale, including all passwords.<\/p>\n<p>Our system matches the contents of the database and finds the @f\u00f6retaget.se account and sends an alarm to Martin and Tommy in IT.<\/p>\n<p>The actions that Martin and Tommy now need to take are minimal. A simple check of the logs and a password reset will suffice. The workload for everyone involved is minimal and without leaked data or damage to systems. If the account had been out for a longer period of time and the system had been exposed to a real cyber attack, the outcome would have looked very different.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:25px;margin-bottom:25px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-11\"><h2>Our service<\/h2>\n<\/div><div class=\"fusion-text fusion-text-12\" style=\"--awb-text-transform:none;\"><p>Briefly explained, our system monitors occurrences of email domains in password lists. We alert as soon as one of your employees&#8217; e-mail addresses is included in a leaked database.<\/p>\n<p>With our service, we can identify if\/when your employees&#8217; private company passwords become public, so you can manage this.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:25px;margin-bottom:25px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:25px;margin-bottom:25px;width:100%;\"><\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img width=\"828\" height=\"553\" title=\"secify-utbildning-itsakerhet-pa-djupet\" src=\"https:\/\/www.secify.com\/wp-content\/uploads\/2019\/04\/secify-utbildning-itsakerhet-pa-djupet.jpg\" alt class=\"img-responsive wp-image-7668\"\/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-13\"><p>The most important thing is not what is in the database right now, but what will be there tomorrow. The information that is leaked is most sensitive immediately after it is published publicly or for sale. Then it is important to have a tool and staff that can quickly identify, retrieve and analyze the content of new leaks and warn the account owners immediately when their information is leaked. We and our tool scan and analyze data from:<\/p>\n<ul>\n<li>Protected and semi-protected forums<\/li>\n<li>Tor network and i2p network<\/li>\n<li>File storage locations<\/li>\n<li>Dumped and leaked text files (pastebins)<\/li>\n<li>P2P networks<\/li>\n<li>Web directories<\/li>\n<\/ul>\n<p>There are both free tools and other players on the market. As for other players, it is the price that differs, where we have a good offer that can be compared. If we compare with the free tools, the difference is above all how quickly the leaks are found. Since the free tools only use the content of public leaks, it can take months before the data is included. This means that your employees&#8217; usernames and passwords into the organization are, during that time, public (to those who have access).<\/p>\n<\/div>\n<div class=\"table-2\">\n<table width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\" width=\"30%\"><\/th>\n<th align=\"left\">Secify<\/th>\n<th align=\"left\">Spycloud<\/th>\n<th align=\"left\">Vericlouds<\/th>\n<th align=\"left\">HaveIBeenPwned<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\">Data Leaks<\/td>\n<td align=\"left\">5 000+<\/td>\n<td align=\"left\">&#8211;<\/td>\n<td align=\"left\">&#8211;<\/td>\n<td align=\"left\">479<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Direct message in case of data leak<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">x<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Protects all email addresses under the same domain<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Actively searching for new leaks on the deepweb\/darknet and hacker forums.<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">x<\/td>\n<td align=\"left\">&#8211;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1200px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:20px;margin-bottom:20px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-14\"><p><a name=\"kontakt\"><\/a>Get in touch!<\/p>\n<\/div><div class=\"fusion-text fusion-text-15\"><p>If this seems interesting to your company, you can either send a message using the contact function, or simply pick up the phone and call.<\/p>\n<p>Phone: +46 20 \u2013 66 99 00<br \/>\nVisiting address: \u00d6stra Storgatan 67, J\u00f6nk\u00f6ping<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div id=\"zf_div_PANo_hcoduuCrJRkd3mSEJMAeGO5IG6UxDtGBkLhrzM\"><\/div><script type=\"text\/javascript\">(function() {\ntry{\nvar f = document.createElement(\"iframe\");\nf.src = 'https:\/\/forms.secify.com\/secify\/form\/KontaktformulrEngelsktGenerellt\/formperma\/PANo_hcoduuCrJRkd3mSEJMAeGO5IG6UxDtGBkLhrzM?zf_rszfm=1';\nf.style.border=\"none\";\nf.style.height=\"794px\";\nf.style.width=\"90%\";\nf.style.transition=\"all 0.5s ease\";\nvar d = document.getElementById(\"zf_div_PANo_hcoduuCrJRkd3mSEJMAeGO5IG6UxDtGBkLhrzM\");\nd.appendChild(f);\nwindow.addEventListener('message', function (){\nvar evntData = event.data;\nif( evntData && evntData.constructor == String ){\nvar zf_ifrm_data = evntData.split(\"|\");\nif ( zf_ifrm_data.length == 2 ) {\nvar zf_perma = zf_ifrm_data[0];\nvar zf_ifrm_ht_nw = ( parseInt(zf_ifrm_data[1], 10) + 15 ) + \"px\";\nvar iframe = document.getElementById(\"zf_div_PANo_hcoduuCrJRkd3mSEJMAeGO5IG6UxDtGBkLhrzM\").getElementsByTagName(\"iframe\")[0];\nif ( (iframe.src).indexOf('formperma') > 0 && (iframe.src).indexOf(zf_perma) > 0 ) {\nvar prevIframeHeight = iframe.style.height;\nif ( prevIframeHeight != zf_ifrm_ht_nw ) {\niframe.style.height = zf_ifrm_ht_nw;\n}\n}\n}\n}\n}, false);\n}catch(e){}\n})();<\/script><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"staatic_meta_publish":"","footnotes":""},"class_list":["post-14057","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages\/14057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/comments?post=14057"}],"version-history":[{"count":0,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages\/14057\/revisions"}],"wp:attachment":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/media?parent=14057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}