Monitoring the security posture of your vendors, suppliers, and partners is a critical part of managing third-party risk. The HackNotice Third Party Service makes it easy to add domains to your Watchlist so you can begin receiving near real-time breach alerts and reviewing detailed vendor risk profiles.
Adding Vendors to Your Watchlist
You can add any vendor domain (up to your contracted limit) directly from the Third Party Watchlist page.
Add a Single Domain
Go to Business → Third Party → Watchlist
Enter the vendor’s domain into the “Enter Domain” field
Click Submit
Once submitted, the vendor will appear in your Watchlist and HackNotice will automatically begin monitoring it for breach activity.
Bulk Importing Vendor Domains
If you have a large list of vendors, you can upload them all at once.
You have two options:
Option A — Send a CSV to HackNotice
Send a CSV file (domain, company name, and optional tags) to your HackNotice representative and we will upload it for you.
Option B — Upload via the UI
You can upload the CSV yourself at:
Business → Account → Uploads
This is the fastest way to onboard multiple vendors at once.
Optional Fields
These additional fields help you organize and categorize vendors more effectively:
Company Name
Add a company name to accompany the domain. This is especially helpful when domains do not clearly match the company name.Tags
Add any number of tags to categorize vendors—e.g., critical supplier, cloud service, regional partner, PCI-relevant, Tier 1 vendor, etc.
Tags also integrate with Tiered Alerts so you can customize notification workflows.Validate Domain
When checked, HackNotice will automatically verify that the submitted domain is valid and properly formatted.
What to Expect After Adding Vendors
Once a vendor is added to your Watchlist:
HackNotice automatically begins monitoring the domain
Any new breach event will trigger an alert in near real time
The vendor’s full Company Profile becomes available, including:
Historical breaches
Dark web exposure
4th-party vendor exposure
Leaked record volumes
Threat Factor risk score
The vendor will appear in all Third Party dashboards
The vendor will populate in your Third Party Timeline as historical incidents are matched and ingested
For guidance on navigating the full Third Party Service—including Company Profiles, Timeline, and Dashboards—see the Third Party Service Overview (link).
Comments
0 comments
Please sign in to leave a comment.