Complimentary Dark Web Scan (Limited Time Only)

Data breaches are a REAL threat that you should plan for. Do you take this advice seriously?

A lot of Georgia based businesses don’t take this advice seriously, which is alarming since SMBs have a higher susceptibility of being successfully breached in comparison to larger corporations! There is a lack of knowledge and ability to plan for varying attacks, but you can take small steps to mitigate exposure to the threats before they gain access to your network.

Ask yourself these questions:

  • What monetary value is at stake if my business is successfully is hit with a cyber-attack?
  • Could I detrimentally affect the lives of my customers if their information gets into the wrong hands?
  • Would my business go bankrupt because of an attack?
Think about it this way, when it comes to experiencing a data breach, the odds are as high as 1 in 4. Therefore, you must understand the probability of being attacked, how your business could be affected, and which factors can reduce or increase the impact and cost of your data breach.  You have to compare the cost of preventing an attack versus recovering from an attack.  What is the value you put on protecting your network with the most up to date security offerings? Once you have answered the questions above, this answer should be clear as day.

Complimentary Dark Web Search

A good place to start is to see whether your credentials (email and passwords) are on the Dark Web. If you have been compromised, we can assist by completing a Complimentary Dark Web Credential Search. If nothing turns up, you’ll have peace of mind and can take preventative actions. I would like to offer you this Complimentary Dark Web Credential Search. Take the next logical steps to robustly protecting your network!

Complimentary Dark Web Search
($299 Value)

Get started with our Complimentary Dark Web Credential Search



The Dark Web is a hidden universe contained within the “Deep Web”- a sub- layer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.
Our service is designed to help both public and private sector organizations detect and mitigate cyber threats that leverage stolen email addresses and passwords. Dark Web ID leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other black- market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).


Dark Web ID focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals. We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, 600 twitter feeds, and execute 10,000 refined queries daily.


While we can’t say definitively that the data we’ve discovered has already been used to exploit your organization, the fact that we are able to identify this data should be very concerning. Organizations should consult their internal or external IT and/or security teams to determine if they have suffered a cyber incident or data breach.

Cybersecurity threats are on the rise!

Cybersecurity Threats


If you’re not living under a rock, you know that the internet is dominating our world. In a philosophical sense, the internet has completely altered global culture forever. Constant connectivity and the mind-blowing speed at which ideas are disseminated have changed forever the way in which nearly all populations think and communicate.

Unfortunately, the internet can be a dangerous place. Organizations all around the world are suffering through cyberattacks, many unsuccessfully.  Nation and corporate sponsored espionage and “Hacktivism” are on the rise. Defending against today’s cyber threat landscape requires a Proactive Cyber Security strategy with a real-time approach to assessing and managing risks. In this fast evolving environment, the challenge is for private and public sector organizations to manage risks proactively rather than reactively. This calls for making informed, predictive, risk-based decisions rather than implementing controls after a breach has already happened.

Companies are being breached seemingly at-will by hackers, malicious insiders, business competitors and nation-states. Companies and consumers seem to be losing the battle and here are a few of the reasons why:

· 83% of organizations have no formal cyber security plan. (Source: National Cyber Security Alliance)
· 96% of breaches were avoidable through simple or intermediate controls. (Source: US Secret Service)
· Thousands of breaches have occurred over the last 12 months. (Source: US Secret Service)
· 48% of breaches were caused by insiders, which means employees and trusted business partners. (Source: US Secret Service)
· 67% of security professionals are unqualified to do the job. (HP Cyber-security study)

Organizations could find themselves in serious jeopardy if a successful breach occurs, both financially and through brand and reputation damage. Businesses that do not take Pro-Active risk management and security seriously in our globally connected market could suffer severely.

Michael Frost-Founder and President-TelPlus Communications, Inc
Michael Frost-Founder and President-TelPlus Communications, Inc


Cybersecurity company finds classified NSA, Army data online

“A cybersecurity company said Tuesday it found top secret files related to classified Army communications systems sitting unprotected online for anyone to see.

The data belonged to the U.S. Army’s Intelligence and Security Command, a division of both the Army and the National Security Agency. It’s the latest known setback linked to the NSA where former agency contractor Edward Snowden disclosed a cache of classified material in 2013.”

Read more details here.

Author: Deb Riechmann

FedEx Grapples With TNT Express Cyberattack: Time to Dump?

“FedEx’s operations have been severely hurt by the Jun 27 cyberattack on its subsidiary, TNT Express. The attack caused large-scale service delays on its TNT Express unit. Evidently, the company’s top line in first-quarter fiscal 2018 was affected, primarily due to decreased volumes at TNT Express. First-quarter results were also hampered by Hurricane Harvey. In fact, the company incurred costs of approximately $300 million during the quarter due to the catastrophe.”

Read more details here.

Author: Zacks Equity Research

Guarding the firewall: Ensuring cyber security for small businesses

Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information.

Small and medium businesses (SMBs) , unfortunately, have been seeing rising incidences of cybercrime. Growing digitization of business assets and access to sensitive customer information, while driving rapid improvements in business, are also making them more vulnerable. Shops, clinics, community centers, and small manufacturers have all been attacked in the recent past. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees. Reports also say that half of the attacked small businesses close down within six months as a result of the loss of customer loyalty and reputation.

For a list of must-have cyber security measures for SMBs, click here.

Contact your local Cyber Gate IT vCIO to learn more about how we can help you safeguard your business.

Author: Nikhil Arora