<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Checking if company has been hacked/breached in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Checking-if-company-has-been-hacked-breached/m-p/83486#M5099</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hello Team&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Small company, need a simple solution/notification if my company/customers/partners have been hacked/breached. Found&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://havewebeenleaked.io/" rel="nofollow noreferrer" target="_blank"&gt;https://havewebeenleaked.io/&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Is it valid ? would you recommend something different ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there any value of such services ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 30 Aug 2025 15:45:42 GMT</pubDate>
    <dc:creator>highland</dc:creator>
    <dc:date>2025-08-30T15:45:42Z</dc:date>
    <item>
      <title>Checking if company has been hacked/breached</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Checking-if-company-has-been-hacked-breached/m-p/83486#M5099</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Team&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Small company, need a simple solution/notification if my company/customers/partners have been hacked/breached. Found&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://havewebeenleaked.io/" rel="nofollow noreferrer" target="_blank"&gt;https://havewebeenleaked.io/&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Is it valid ? would you recommend something different ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there any value of such services ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Aug 2025 15:45:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Checking-if-company-has-been-hacked-breached/m-p/83486#M5099</guid>
      <dc:creator>highland</dc:creator>
      <dc:date>2025-08-30T15:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: Checking if company has been hacked/breached</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Checking-if-company-has-been-hacked-breached/m-p/83492#M5100</link>
      <description>Great question! While HaveIBeenLeaked is a well-known resource for checking if your email has been involved in a data breach, there are also other services like DeHashed and Have I Been Pwned that can provide similar checks. For company-wide monitoring, you might want to look into more comprehensive solutions like SpyCloud or BreachLock, which offer proactive breach detection for businesses and customers. It’s definitely valuable to stay on top of these things to protect sensitive data!</description>
      <pubDate>Sat, 30 Aug 2025 18:37:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Checking-if-company-has-been-hacked-breached/m-p/83492#M5100</guid>
      <dc:creator>zainulabdeen</dc:creator>
      <dc:date>2025-08-30T18:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Checking if company has been hacked/breached</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Checking-if-company-has-been-hacked-breached/m-p/83506#M5101</link>
      <description>&lt;P&gt;There are a number of services that offer a database of known breaches (usernames/emails with or without cracked passwords). They can be part of the monitoring mosaic if you want, but their role at best is minor. No matter the circumstance, you should assume every online service you use will be breached at some point. A practice I have long applied is to use different email addresses for different services as a way of tracking who gets compromised or at least who sells or trades my contact information. It doesn't matter the size of the company, its mission, etc., nearly all get sloppy or breached.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Minimize what information you give any service. The more you give them, the more you are giving some future attacker. Tweak or mis-spell certain information as a cue that will stand out in some future phishng scam.&lt;/LI&gt;&lt;LI&gt;Good authentication practices. Passwords can still be very effective as long as they are long, random, and unique. For your critical resources, use two-factor authentication, but there is a double-edged sword in that you are now giving up more information (phone number, etc.) to a future attacker (again, assume compromise).&lt;/LI&gt;&lt;LI&gt;Perhaps most important, minimize your attackable footprint. Whether for business or personal use, before you download an app, signup for a service, really ask whether you need it. Also, do a little due diligence on its quality. You can consult the CVE (cve.org). If the product or the company behind has a laundry list of issues, maybe you want to consider an alternative. The same thinking applies to how you configure services (an easy one is to stop defaulting to HTML email).&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;As a small company, you are asking a good question. As we've erased the perimeter around our data and resources, security responsibility has moved from a centralized element to something shared by every employee. If you read about most attacks today, many of them come down to some employee having their credentials compromised by a phishing scam or the like. While monitoring has value, I'd prioritize good security training. Follow the SANS Internet Storm Center daily summaries or podcast and occasionally pull out one or two to share with your company and partners.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Aug 2025 12:15:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Checking-if-company-has-been-hacked-breached/m-p/83506#M5101</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2025-08-31T12:15:42Z</dc:date>
    </item>
  </channel>
</rss>

