A threat timeline item is a leak notice that has matched at least one item in your Threat Watchlist.
A threat notice is created when the exact text of one of your identity watchlist items is found in a record leaked in the hacker community.
If the threat matches an email address, you will need to verify that email address before you can see the associated text of the threat.
If the threat matches a freetext item (username, phone number, etc), the threat notice determines if there is an email address in the record.
Since digital identities, such as usernames, can be used by multiple people at the same time on different services, we use the email address in the record as the next best unique identifier for the record. If there is an email address in the record, then the leak notice will ask you if you use that email address. If so, you can add that email address to your watchlist, verify the address, and then view the associated text.
By reviewing the source of the record and the associated text, you may be able to narrow down the exact extent that your identity has been exposed. Given the nature of hacker shared information, the exact source may never be known.
You can use the Security Recovery checklist to reduce your cybersecurity risk from the identity leak. When you have completed all of the steps in the Security Recovery checklist, you can mark the identity leak as fixed, as a way to remind yourself that you have already worked through the checklist.
You can also delete the leak notice if after reading the notice, you have determined that the identity in the leak isn't you, or doesn't represent a risk to you. Please note that once a notice is deleted from your account, it will never show back up in your Leak Timeline.
Here are some quick details about Leak Timeline items:
- Header
- Indicates risk score, identity leaked, notification date, leak date, and visibility toggle button
- Shows the file name of the data source taken from dark web with leaked identity
- Gives a summary of the leak event
- Alert Details
- This is a key providing a legend of different data types that may be displayed and associated box style
- Exposed Information
- Shows the actual fields surfaced, including metadata that might not be categorized
- Gives machine learning highlights about the type of data exposed in the hack (ex: Identity: Names, Identity: Address, Identity: Phone Numbers)
- Hacker Threats
- This is what hackers can and may do with the information exposed
- Gives links to external resources for further reading.
- Security Recovery
- These are actions you should take to mitigate risk of hacker threats
- Teachable moments are given with bite-sized training videos tailored to the data exposed
- Recovery points are recorded when the user clicks the checkbox, indicating action was taken
Comments
0 comments
Please sign in to leave a comment.