How does the Data Leak scan work?

Created by Charley Downey, Modified on Fri, 22 Mar at 12:02 PM by Charley Downey

We monitor for data that has been stolen by hackers and shared on social media, the Dark Web and other websites. The data we find with this scan has been stolen from 3rd party companies and not the company that is being scanned directly. 


For example, you may scan abctrucking.com and find 100 records that were stolen from LinkedIn several years ago, related to the company. While abctrucking.com has not been hacked directly, the stolen data from the 3rd party website may contain emails, passwords, phone numbers and other information that aids hackers in carrying out an attack on the scanned company.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article