Why can I find information in haveibeenpwned.com and not in Fresh Security?

The most common reason for this is that your account is currently using a base configuration. This configuration means that only email addresses found as part of the Fresh Security discovery process are being monitored. These are the highly visible people in your organisation. We do not guarantee that we will find all email addresses used in an organisation. If we could, that would be a significant problem.

To maintain privacy, services like haveibeenpwned.com only allow searching based on a specific email address and not a general search based on the domain. So, if an email address was not found as part of the highly visible people discovery process, we will not search these privacy-aware services.

In our Clifton High School customer story, we describe how the school added non-visible accounts to the service to reduce the risk while teaching remotely - as a result of COVID19.

You can do the same for your organisation by raising a Fresh Security Support ticket, and we will add the extra accounts for you.

Related Questions

Who are highly visible people?

'Highly visible people' are the people easiest to identify in your business or school. You need to know who these people are, as they will be the ones hackers will most likely target.

Hackers are predictable. They always start by gathering as much information as possible about your organisation. This can be technical details but is increasingly focussed on the people who work for you.

Once hackers know who works for you, they use two main ways to…

Continue reading... "Who are highly visible people?"

Is Fresh Security GDPR complaint?

Yes. Fresh Security has been assessed to be GDPR compliant.

Your privacy is important to us. We process any information we collect in line with the Fresh Security privacy policy. We use cookies as described in our cookies policy.

Continue reading... "Is Fresh Security GDPR complaint?"

What is an asset?

The idea in brief: In cybersecurity, an asset is something valuable that a business owns or anything that can be directly used to create value. This is very similar to the accounting and finance idea of an asset.

In more detail: The most common types of assets are software applications and laptops. But intellectual property and the data companies control are also considered assets.

From a cybersecurity view, there are two essential types of…

Continue reading... "What is an asset?"