Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

Handling Dark Web Monitor Results in CYRISMA

Dark web monitoring is an essential part of maintaining cybersecurity hygiene and safeguarding organizational data. CYRISMA’s Dark Web Monitor module allows administrators to proactively detect compromised data associated with company domains or employee accounts. This guide outlines the steps to efficiently analyze, respond to, and mitigate dark web threats using CYRISMA.

Written by Liam Downward

Updated at March 25th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Step 1: Identify the Exposed Data Prioritization Criteria: Step 2: Prioritize and Categorize the Findings Mark Exposures: Step 3: Notify Affected Users Step 4: Enforce Password Reset (If Applicable) Step 5: Update Credentials Used in Tools & Systems Step 6: Document and Track Actions in CYRISMA Step 7: Perform a Security Awareness Reminder Step 8: Rescan or Monitor Continuously Step 9: Report to Management or Compliance Include in Your Report:

Step 1: Identify the Exposed Data

When reviewing the results, pay close attention to the following data fields:

Email Addresses: Identify any corporate or employee-associated addresses.

Passwords: Check for plaintext or weakly hashed credentials.

Data Breach Source: Determine where the breach occurred (e.g., specific platforms or databases).

Breach Date: Understand the timeline of exposure to assess potential risks.

Prioritization Criteria:

Credentials linked to current employees or corporate domains (e.g., john@company.com).

Presence of plaintext or weakly hashed passwords.

Multiple exposures tied to the same user or email address.


Step 2: Prioritize and Categorize the Findings

To effectively manage exposed data, use the following guidelines:

Apply filters to identify high-risk exposures, such as:

Leaked credentials with passwords

Multiple exposures for a single user/email

Categorize the findings:

Internal Employee Credentials: High priority, immediate action required.

Former Employee Credentials: Assess relevance and risk.

3rd-Party or Vendor Accounts: Coordinate with vendors to ensure credential updates.

Mark Exposures:

Use internal ownership tags to mark items that require follow-up action.


Step 3: Notify Affected Users

When notifying impacted users, follow these steps:

Inform Users of Exposure: Clearly explain the breach and the details of the compromised data.

Password Reset Instructions: Advise users to change passwords immediately on any associated accounts.

Enable MFA: Strongly recommend enabling multi-factor authentication (MFA) wherever applicable.


Step 4: Enforce Password Reset (If Applicable)

For active accounts within your organization:

Initiate a password reset via your Identity and Access Management (IAM) system, such as:

Active Directory

Azure AD

Google Workspace

Ensure the new password meets complexity requirements and that old credentials are invalidated.


Step 5: Update Credentials Used in Tools & Systems

If the exposed credentials are linked to critical systems:

Update and rotate passwords immediately.

Log out of all active sessions on affected accounts and devices.

Apply updates to:

Remote Access (VPNs, RDP)

SaaS Platforms

Shared Admin Accounts


Step 6: Document and Track Actions in CYRISMA

Within the Dark Web Monitor Module:

Mark each entry as Reviewed, In Progress, or Remediated.

Use the checkbox or action button to update the status.

Add detailed remediation notes for future audits.

Export the updated CSV report to maintain a record of actions taken.


Step 7: Perform a Security Awareness Reminder

To reinforce cybersecurity best practices, remind employees to:

Never reuse company credentials for personal accounts.

Utilize a password manager to maintain unique credentials.

Remain vigilant for phishing attempts, especially following credential leaks.


Step 8: Rescan or Monitor Continuously

To maintain continuous protection:

Schedule regular re-scans to detect new breaches.

Increase scan frequency during high-risk periods or after significant breach announcements.


Step 9: Report to Management or Compliance

Prepare a summary report including:

Number of Exposed Credentials: Total instances found.

Risk Rating: Based on the severity of each finding.

Actions Taken: Details of remediated issues.

Outstanding Items: Any unresolved risks or pending actions.

Recommendations: Strategies to improve security posture.

Include in Your Report:

Attach the latest CSV export for reference.

Share insights on any recurring vulnerabilities or patterns.


By following these structured steps, you can efficiently manage dark web exposures and maintain a proactive stance on cyber hygiene. Regular monitoring and timely action will significantly reduce the risk of compromised credentials impacting your organization.

dark web results handle how to remediate best practices

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to setup a Dark Web Monitor
  • Dark Web Monitor Results
  • Data Scan in Progress

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand