Everything You Need to Know
Frequently Asked Questions
What is Cyber Exposure?
Cyber exposure refers to information that is available or assets that are visible on the internet. Even a small data leak from a 3rd party is a major concern. Exposure leads to attacks. Detecting exposure early allows you to proactively prevent damages. Although most data leaks are accidental, they can still lead to the same damage as intended data breaches. An intentional data breach happens when an inside or outside attacker is able to access organisation data. Previous cyber exposure enables these attacks.
What is the Dark Web?
The dark web refers to a technology that makes surfing sessions more private – technically, ‘anonymous’. As a result, no-one will be able to identify who is surfing the dark web, where this traffic originates from, or where the servers are that the person is using. The user does not know where the server is that they are accessing, nor does the server know who or where the user is.
A user needs a specific browser to access the dark web. The tor browser is the most used, but other technologies like freenet and i2p are available.
What is Deepweb?
Publicly available search engines such as Google only cover a limited portion of the Internet. This is the visible part that we call the surface web. Where the surface web ends, the deep web begins. This is everything you can potentially access with your browser that is not indexed by search engines. This could be your e-mail accounts, intranet, leak platforms, some discussion forums, private blogs and so forth.
What are Data breaches?
In a Data breach sensitive, protected or confidential data is copied, transmitted, viewed, stolen or users by an unauthorized third party. Data breaches can cause damage to companies and individuals, as this type of Cyber Exposure can lead to further attacks.
How does CIH gather its data?
CIH’s proprietary technology continuously collects information from the dark web, deep web and data breaches. Metadata factors are added to the data to make it more searchable and to create context of the content. Providing both real-time notifications as well as historical presentation of leaked information.
How often is the data on the platform refreshed?
The data on the platform is continuously updated.
Can I See the Cyber Exposure Platform in Action?
If you would like to see the platform in action, please get in touch to arrange a full in-depth demo.
Are pre built reports included?
Yes, we have a full and detailed cyber exposure reports, that include an executive summary and remediation recommendations. These come as standard in the platform.
What kind of keywords should I use?
Domain names are the most important keywords, they allow you to discover both exposed assets and exposed information. Our technical analysts are on hand to help you define your keywords, VIP monitoring and any other variable you would like to search with.
Can I monitor company VIP's?
You can add names, corporate & personal email addresses and even obfuscated credit card details, along with other details to ensure company VIP’s are not being targeted by threat actors.
Can I check how my company compares to other companies?
You can benchmark the account results against a group of similar organizations. The benchmark group can be selected by geography, industry and employee count.
Can I download custom reports?
You can download reports from most pages. Download high level reports from the Home page or detailed information for the Asset Details pop-up window.
How is the exposure risk calculated?
Exposure meter shows the residual risk from the last 12 months, you can lower the exposure meter score by marking the findings as remediated. Risk is calculated as a weighted sum of high, medium and low severity findings.
Can I do a quick search on a domain?
Yes, we have a function called “Investigation” which enables you to use domains or plain text to quickly and easily search for exposure contained within the platform. You can then run a full “Assessment” which is a deep dive.
How is the severity level (high, medium or low) of a finding assigned?
The severity level of a finding is automatically calculated based on the type of data and the risk associated with that type of data. For example an internal password receives a higher severity level than a clear text password which has a higher severity level than an encrypted password. You cannot change the severity level of a finding.
How are tags added to my alerts?
Tags are automatically added by our machine learning algorithm, which analyse the found data in each alert.
Can I remove findings from the exposed information pages?
The findings are found based on your keywords and cannot be removed. You can mark a finding as remediated after you have mitigated the risk.
Does each finding have a remediation suggestion?
Every finding comes with a remediation suggestion. This allows you to take action and mitigate your cyber exposure risk.
What happens when I mark a remediation action as remediated?
A remediation action that you mark as remediated will move to the Remediation log. This is your repository of mitigated risks. All alerts related to the remediation action are tagged ‘remediated’. The score on the Exposure meter is adjusted to residual risk after remediation.
How are my assets discovered?
Your internet facing assets are discovered based on assets you already know and have added to the Discover page. Asset discovery then uses a combination of active and passive reconnaissance techniques. In passive reconnaissance already existing information about your assets is collected from various open sources. As these sources also contain historical data, we check which of these assets are online today.
To discover your assets which are not available in open sources, for example assets without hostnames, we use techniques like subdomain enumeration and ping sweeps. While these techniques are likely to generate a lot of network traffic on your DNS servers, they are not harmful as they utilize the basic internetworking protocols and mechanisms.
How are my assets’ vulnerabilities discovered?
You may find that assets have vulnerabilities. These vulnerabilities are discovered using port scanning and banner grabbing to detect known vulnerabilities and security misconfigurations from your assets. The results for these scans are basic and their reliability is limited.
The most reliable way to discover vulnerabilities for your assets is by activating Continuous Testing. Assets are actively tested for vulnerabilities. This type of testing uses fingerprinting, fuzzing and other offensive security techniques to detect vulnerabilities in services and operating systems. Fingerprints also work as keywords for various vulnerability databases to discover known vulnerabilities.
Where can I check if my assets have vulnerabilities?
Visit the Asset List. The list is automatically sorted to display assets with vulnerabilities first. Vulnerable assets are marked with a red triangle. Click the asset to view the vulnerability details.
What is the best way to add custom tags to my assets?
Customs tags allow you to filter and group assets in any way you like. Add tags that are significant to your company. You can create and add as many tags as you like.
How much does it cost?
Our subscriptions are sold on an annual basis and you can find a full breakdown of each of our Silver, Gold & Platinum packages here
More questions?
- Lorem ipsum dolor sit amet, consectetur
- Sed vestibulum mauris ac lectus varius
- Customized risk assessments and recommendations tailored to your clients’ needs.
- Dedicated support from our team of cybersecurity experts.
