What is dark web monitoring?

October 22nd, 2019
What is dark web monitoring?

img-security-iStock-868936214

Cybercrime is an ever-growing threat to companies worldwide. Hackers are getting increasingly creative in their methods, with tactics like formjacking and ransomware on the rise. But with various forms of data breaches happening by the day, where does all this information go?

While sometimes used for personal gain, such credentials often fall into the far more sinister hands of the dark web.

What is the dark web?

The internet is comprised of three layers: the surface web, the deep web, and the dark web.

All users are familiar with the surface web; a visible network of websites shared on common search engines like Google. This article you’re reading right now, for example, is displayed through the surface web.

Privatized web pages make up the deep web. This content is hidden from search engine results, accessible only through passwords and other forms of authorization. Such pages include school portals, company intranets, or those of online banking sites. Though elusive, these pages are estimated to make up over 90% of the entire internet.

Finally, we have the dark web — a side of the internet that can’t be found through search engines. To venture this side of the web, you’ll need special browsers or software, such as Tor (The Onion Router).

This isolated landscape is a hotbed for criminal activity, housing untraceable websites and online activity. As such, illicit dealings are often made on the dark web, such as those involving malware kits, drugs, and even weapons. It’s also become a common marketplace for stolen information, where hackers put up credit card numbers, social security numbers, and other business or personal information for sale.

The importance of dark web monitoring

To prevent this misuse of confidential data, companies and individuals often turn to dark web monitoring (also known as dark web scans).

These services scan for any use of your personal information on the dark web, including passwords, credit card details, and other private material. The software then informs you of any data found, helping you perform the necessary protocols for remediation.

With business data breaches on a steady rise, these measures are more crucial than ever. Just this year, a Seattle-based hacker gained access to the personal online data of 140,000 customers from the bank holding company, Capital One.

That’s just one incident, however. In the first half of 2019 alone, over 23 million credit and debit card details worldwide were traded on the dark web. What’s more, companies take an average of 197 days to identify a breach of data. It then takes about an average of 69 days to contain said breach, according to IBM statistics.

Dark web monitoring should thus be part of your regular business practices, ensuring all your company’s online information is safe, secure, and free from the hands of identity thieves.

Protect your data with Fidelis Inc.’s free dark web scan

It’s no surprise that stolen data will cause your business a fortune, with 2019 reports showing an average of $3.92 million dollars lost to cybercrime worldwide.

Don’t turn into a negative statistic — for any vigilant business owner, Fidelis Inc. currently offers security assessments for your company’s dark web presence. This procedure is done in three steps:

  • Scanning the dark web for any data breaches involved with your domain and any related accounts
  • Simulate a phishing email to be sent out to your employees, assessing their responses and testing for human vulnerabilities
  • Providing video-based security awareness training for your staff to help them better protect themselves against the risks of cybercrime

With our free dark web monitoring service, you can stop a data breach before it’s too late.

Looking to further your business security? Get your complimentary dark web scan today by filling out our simple online form.


For many businesses, complying with the GDPR’s specific data security and privacy requirements may sound daunting, but it doesn’t have to be. Our eBook Navigating the Data Privacy Labyrinth: A Guide to GDPR Compliance can simplify your compliance journey.GRAB YOUR FREE EBOOK HERE!