Is The Dark Web Real?

October is National Cybersecurity Awareness Month, and cybersecurity is arguably the hottest topic around technology. IT teams fight a daily battle to keep their company, employee, and client data safe from compromise. Organizations of every size are at risk for an attack, but small/midmarket businesses are particularly targeted, as they generally have less sophisticated security infrastructure and practices, as well as fewer IT personnel to manage and respond to threats. Unfortunately, these organizations are also least likely to survive the cost in dollars, downtime, and reputation of a cyberattack. These, and many more facts surrounding today’s security environment for small/midmarket businesses are highlighted in Cisco’s Cybersecurity Special Report. As a Cisco partner with extensive experience in this sector, Liberty Technology’s CEO Ben Johnson contributed valuable insight to the study.

As part of our efforts to help organizations fight the fine fight, Liberty is encouraging organizations to reinforce their cybersecurity by gaining insight into your organization’s presence on the dark web.

The dark web is a sublayer of the Internet that is hidden from conventional search engines like Google, BING, and Yahoo. These are able to access only .04 percent of the “surface” Internet. The remaining 99.96 percent of the Internet consists of databases, private academic and government networks, and the Dark Web. Because you can operate anonymously, the dark web holds a wealth of stolen data and illegal activity.

The result is a constant interplay of new threats and new methods to detect and combat them. But cybercriminals are relentless. Even two-factor authentication can easily be hacked by intercepting codes or exploiting account recovery systems – particularly via mobile. If an employee uses a business email address to create an account on another service, usually with the same or similar password, and that service gets breached, those credentials can be used to hack the employer’s network.

Likewise, encrypted data is only as safe as the encryption key. Once that is published, much of that data is no longer safe. The LinkedIn breach is a great example of this.

Liberty offers credentials monitoring as a powerful tool to combat these threats. Our dark web scanning supports your own internal IT department by providing them an early warning system to help mitigate the effects caused by a breach. It provides them with a service they’re unable to access on their own in helping them protect your organization.

Dark Web ID is designed to help both public and private sector organizations detect and mitigate cyberthreats that leverage stolen email addresses and passwords. With a combination of human and artificial intelligence, the service scours hundreds of thousands of dark web sites each day.

Take an important step in supporting your IT security and contact us to learn more and to request your unique Dark Web ID report. Liberty will be here to help you in case of any breach-related damage, but knowing about it early or preventing it altogether is always the better course of action to keep your organization safely and seamlessly doing what you do best.

To request this report all you need to do is send an email to with your domain and permission to pull the report. Or request a more in depth security assessment HERE.


Back Next

Recent Blogs

Protect Your Data

Your data is one of the most important assets of your business. It is what allows you to keep track of your customers, sales, and operations. However, if this data falls into the wrong hands, it can irreparably harm your business. That’s why it’s so important to protect your data from unauthorized access and theft. […]
Oct 16th, 2018 | by Ben Johnson

How to Take Advantage of Section 179 Tax Code

You’ve most likely put off upgrading your IT infrastructure for too long, but thanks to a special IRS tax code, now might be the perfect time to do so. Small businesses can take advantage of Section 179 of the tax code to deduct operating expenses, like your IT infrastructure. If you are looking for ways […]
Oct 16th, 2018 | by Ben Johnson

Why It Security Is Important For Business

While Liberty Technology provides IT disaster recovery and stands ready to assist you in a moment of crisis, we hope that day never comes. Taking preventative measures can drastically increase the probability that it never will. Don’t think you need the top of the line in IT security or worried it costs too much money? […]
Oct 16th, 2018 | by Ben Johnson

How To Manage A Hybrid Workplace

Working remotely was not just a temporary effect of the COVID-19 pandemic. In fact, it’s not going anywhere. Many businesses are making permanent shifts to full-time remote or hybrid models. If your business has taken this route, have you considered how that will affect data security? Your current security measures and policies are based on […]
Oct 16th, 2018 | by Charles Goodsell

Why Your Company Needs An IT Assessment

How do you feel about your company’s data security? If a hacker tried to steal your data, would they succeed? Would such an occurrence catch you completely off guard and throw your organization into disarray? Would you look back and wonder what you could have done differently to prevent it? The truth is, there is […]
Oct 16th, 2018 | by Charles Goodsell

Having trouble staffing your Internal IT?

In the post-pandemic economy, many small business owners are having trouble getting back to “business as usual.” A big part of that challenge has been attracting talent. According to National Federation of Independent Businesses (NFIB) Chief Economist Bill Dunkelberg, “Main Street is doing better as state and local restrictions are eased, but finding qualified labour […]
Oct 16th, 2018 | by Ben Johnson

5 Things to Look for When Choosing an MSP

A managed service provider (MSP) can provide significant value to your organization. An increasing number of businesses and organizations are turning to MSPs to address their IT needs, including: Security: The constant battle against cyber attacks, data protection and retention, disaster recovery and more involves constant oversight and research that most IT departments simply don’t […]
Oct 16th, 2018 | by Charles Goodsell

The Evolution of the Cloud

Market trends are changing, and the IT world is on the cusp of a big shift. We at Liberty have a mission to stay on the leading edge of all things IT, and it’s our job to make sure you stay right out front alongside us. With the newest consumption model taking form, we are […]
Oct 16th, 2018 | by Ben Johnson

Windows 7 End of Life

After 10 years as one of the most universally loved operating systems, Windows 7 End of Life (EoL) is taking place January 14, 2020. And if there’s one thing zombie season should teach us, it’s to know when it’s time to say goodbye. Sure, Windows 7 brought new features, advancements, increased functionality and usability to […]
Oct 16th, 2018 | by Charles Goodsell

Ryuk Ransomware Attacks and What You Need to Know

Law Enforcement and other Governmental Agencies all over Georgia recently received a shocking warning in regards to what is being characterized as a targeted and organized series of Malware attacks. Shortly after this warning was released, over 20 Texas agencies were crippled. Ryuk Ransomware attacks are targeting Law Enforcement and Government Agencies in an attempt […]
Oct 16th, 2018 | by Ben Johnson

Dishing on Vishing and Phishing

Fraudsters are lurking everywhere, sometimes even in plain sight if you know what to look for. Some hacker-favorite tactics include vishing and phishing. Not sure what these odd words mean? Here’s a quick IT vocab lesson. vish-ing (noun) the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies […]
Oct 16th, 2018 | by Charles Goodsell

Two Ways to Protect Your Invisible Assets

At Liberty, we stand by our statement: The best way to get hacked is to believe you won’t be. It makes sense to protect the assets you can see, but, with an average cost of $3.86 million, a data breach of your “invisible” network resources could be even more costly than you might imagine. From […]
Oct 16th, 2018 | by Ben Johnson