As digital forensics experts and leaders in forensic software innovation, we have the knowledge, skills, and technology to help protect precious business data from dark web exploitation.


What’s the dark web? Unlike the portion of the internet the public accesses daily, the dark web is a restricted zone. Many are unaware of its existence, as it cannot be reached through standard online search portals.


A specialised dark web browser is required for a dark web login. Businesses are susceptible to exploitation by dark web users, which is why Forensic Pathways’ services include dark web monitoring and investigation.


What you can find on the dark web


Part of the allure of the dark web is anonymity, and the ability to engage in activities without legal repercussion. While some use the dark web to bypass regime restrictions, for many the dark web is an illegal goods marketplace.


While drug and counterfeit currency sales are common, a bigger risk to businesses is the growth in demand for information. Cyber security breaches lead to leaked data, a popular commodity.


The sale of stolen company data


The sale of sensitive information on the dark web is a burgeoning market. Valuable stolen data can take many forms, including but not limited to passwords. Every type of login and password is available for sale, or trade.


Consider the different passwords and logins affiliated with your company. Then, the associated sensitive data that could be leaked—and the damage this will do to your business when clients find out.


Dealing with the repercussions


In a worst case scenario, responsibility for leaking sensitive data can destroy a company, the reputational damage proving irreparable. If breached, act fast to combat potential legal repercussions.


A forensic computer investigation allows you to acquire evidence from your network and devices that may be requested in court. Contact the Forensic Pathways team for expert consultation.


How to avoid these issues


Simple steps can be implemented to increase basic protection of business data. Be aware, as malware advances practices that seemed “safe” can now add to a network’s vulnerability.


  • Change passwords


Passwords should not be easy to guess, or used across multiple sites. Words appearing throughout your social media are best avoided, like a favourite food, location or pet.


Birthdays, consecutive numbers, and numbers replacing similar letters are security weaknesses. Also creating complex passwords only to store them on an office computer or linked device, defeats the purpose.


  • Multi-factor authentication


The Australian Cyber Security Centre describes this as one of the most effective controls an organisation can implement to prevent an adversary from gaining access to a device or network.


A common form of multi-factor authentication is a mix of personal questions, reference to something you have, such as a qualification, and a bio security element like a fingerprint or iris scan.


  • Breach response


Every breach of security differs, and may require specialist consultation. But a basic business response plan for a breach is essential, and needs to be a collaborative effort with inhouse IT staff.


Basics include finding (and removing) the cause, identifying data leaked, and recording evidence. Consider adding cyber security protection to your business insurance policy.


Protect yourself from the dark web with Forensic Pathways. We offer a range of services pertaining to cyberattack protection, and dark web data identification post-breach.