The Requirement.
Understanding that the people and organisations they support through their legal services rely on them to protect their best interests, EMW decided they also needed to look inward.
As such, their IT director, Lee Killner, undertook a digital footprint review with Stripe OLT. By doing this, Lee was able to understand the type of information available about him online, and therefore available to malicious actors. In uncovering this information, Lee gained a clearer picture of the kinds of vulnerable data generally accessible online, and was able to build a digital profile that would not be considered a potential risk to the business.
As EMW’s IT director, Lee wanted to pave the way for his colleagues, helping them understand the types of vulnerable data online and ultimately raising further awareness within the business.
The Solution.
The Stripe OLT digital footprint review is underpinned by an established OSINT (open-source intelligence) framework that allows our team to uncover potentially risky personal information online. Our toolsets provide a complete overview of an individual’s digital profile, across various phases including:
Reconnaissance Mapping
In this phase, our team gathers as much information about the target as possible. Our specialist toolset provides a holistic view of an individual’s digital profile and how they appear to the outside world. This could include how many pets a person has, information about family members and which online platforms they use.
Passive Information Gathering
Passive information gathering focuses on collecting information archived on systems not located within a local network. During this phase, a variety of searches are conducted, which can include information not necessarily related to the target. We may look through search engines, government sites, corporate registries or personal websites.
Social Media Review
Social media content provides a versatile means of gathering information on an individual. In this phase, we can look for anything from emails and phone numbers to check-in locations and photographs. A multitude of avenues may be exploited if a user is not careful.
To help our clients understand where the specific risks lie, we have adopted a risk-based analysis, placing risky social data on a spectrum and detailing why and where the dangers exist within specific social platforms.
Leaked Credential Check
Data breaches occur regularly and often result in millions of individuals having their credentials and other information leaked, often without their knowledge. These credentials can be posted online and sold to the highest bidder or used by those who conceptualised and completed the data breach for malicious gain. Our experts scour the internet for leaked information, providing clients with the information they need to rectify any at risk accounts.
Data breaches occur regularly and often result in millions of individuals having their credentials and other information leaked, often without their knowledge. These credentials may be posted online and sold to the highest bidder, or used by those who orchestrated the breach for malicious gain. Our experts scour the internet for leaked information, providing clients with the knowledge they need to rectify any at-risk accounts.
Ultimately, Lee now has an in-depth understanding of the data available about him online, and has the information needed to ensure his digital footprint is watertight. Crucially, as a senior leader within the business, Lee has the knowledge to help build a strong, security-first culture at EMW.
From cyber security services to Microsoft cloud solutions, our mission is to provide cutting edge business technology that secures data, enhances productivity and nurtures growth. So, whether you’re looking for CREST certified Pen Testers to assess your security posture, or Microsoft Gold Certified Cloud & Security Architects to optimize your infrastructure, our accredited team are here to help transform your business operation.From cyber security services to Microsoft cloud solutions, our mission is to provide cutting-edge business technology that secures data, enhances productivity and nurtures growth. Whether you’re looking for CREST-certified penetration testers to assess your security posture, or Microsoft solutions partner certified cloud and security architects to optimise your infrastructure, our accredited team is here to help transform your business operations.
Want to know more about how we can help your senior leaders with a digital footprint assessment? Get in touch today.