Can I send my team their exposed data?

No, not currently. We are working with our customers to understand how their team can best use information from Fresh Security. We would love to have you part of the conversation. If you would be willing to share your view, please leave a comment on our transparent roadmap.

Related Questions

Who are highly visible people?

'Highly visible people' are the people easiest to identify in your business or school. You need to know who these people are, as they will be the ones hackers will most likely target.

Hackers are predictable. They always start by gathering as much information as possible about your organisation. This can be technical details but is increasingly focussed on the people who work for you.

Once hackers know who works for you, they use two main ways to…

Continue reading... "Who are highly visible people?"

What are the 4 types of authentication?

The four types of authentication claimed by some cyber security vendors are:

  1. Something you know – like a password.
  2. Something you have – like a smart card to enter a building.
  3. Something you are – like a fingerprint.
  4. Something you do – like typing speed or location.

Traditionally cyber security has thought of only 3 authentication factors. Something that you know, you have, or you are. But as vendors have tried to find new ways of measuring…

Continue reading... "What are the 4 types of authentication?"