HackNotice announced today it has added a set of free analysis and visualization tools to enable end users to know when their personally identifiable information has been disclosed. The tools, dubbed Risk Explorer, also will be available as part of HackNotice Teams, a threat intelligence platform the company already provides.
HackNotice CEO Steve Thomas said the goal is to make it easier for end users to become aware of when, for example, their credentials have been shared on the dark web. Including Risk Explorer in HackNotice Teams will also make it possible for cybersecurity teams to provide users with a set of tools for tracking risks that are specific to them, he noted.
That approach will enable cybersecurity teams to transform what is often perceived as a theoretical risk into a set of visualizations that end users can employ themselves to better appreciate their level of risk, added Thomas. In effect, he said, Risk Explorer democratizes threat intelligence.
That approach also helps eliminates the perception that cybersecurity professionals are the harbingers of doom and gloom, he noted. Instead, users can visually explore analytics that might spur positive behavior, such as encouraging them to change their passwords more often.
Providing those insights should improve the overall security posture of an organization because end users are always going to be the first line of defense, Thomas said. The higher the awareness of potential risks, the fewer the number of cybersecurity incidents to investigate, it’s hoped. With more employees working from home, the need to proactively make users aware of those threats has never been more acute, he added.
HackNotice Teams provides organizations with more than 100 different ways to review, analyze, filter and visualize those threats. Most organizations today don’t realize there is a threat until it’s too late. Cybercriminals often freely share techniques and targets that can be tracked using tools such as HackNotice, said Thomas. The challenge is, most organizations today still focus their efforts on theoretical threats instead of trying to identify threats crafted to gain illicit access to a specific IT environment.
Whether Risk Explorer is embraced by end users remains to be seen. However, at the very least, the technology should serve to make them more aware of whether and how much cybercriminals are targeting them. While cybercriminals still launch large-scale attacks in the hopes of harvesting a broad range of credentials, they are also starting to focus more on individuals who might prove to more lucrative, based on their roles in an organization.
Cybersecurity professionals today are not just tasked with protecting network perimeters. The mission now is to protect the digital identities of end users, who routinely access applications residing on-premises and in the cloud. As such, the most important thing is to remain as forewarned about any imminent attacks as much as possible.