What is a data breach event?

A data breach event is one time your team’s email and password was lost as part of a data breach. For example, Jane in sales losing her password as part of the LinkedIn data breach.

This information can show that some people in your team have lost passwords in many data breaches. Whereas other team members have lost a password only once. This can help in prioritise who could pose a more significant risk to your organisation.

Related Questions

Who are highly visible people?

'Highly visible people' are the people easiest to identify in your business or school. You need to know who these people are, as they will be the ones hackers will most likely target.

Hackers are predictable. They always start by gathering as much information as possible about your organisation. This can be technical details but is increasingly focussed on the people who work for you.

Once hackers know who works for you, they use two main ways to…

Continue reading... "Who are highly visible people?"

What is a lost account?

The Fresh Security Risk score estimates how much risk your organisation faces based on your team's usernames and passwords for sale on the dark web.

One of the critical elements to calculate the risk score is the number of your teams' usernames, email addresses, or passwords that have been found on the dark web.

A lost account is one of your team's email addresses and passwords that have been part of a data breach. On the Fresh Security dashboard, the lost account value helps answer: – Looking at the Highly Visible People in…

Continue reading... "What is a lost account?"

How do you calculate the Fresh Security risk score?

At Fresh Security, we believe that people should be at the heart of security. Which is why people and their environment are the foundation of the Fresh Security risk score.

The risk score is all about people

To calculate the risk score, we first calculate the risk each person faces. The personal risk score examines each email address that a person uses. When an email address is stolen, the algorithm looks at the other data stolen in the breach…

Continue reading... "How do you calculate the Fresh Security risk score?"