In recent years, many major companies and enterprises have reported data security breaches. Misuse of Stolen Credentials Unchecked, Out of Control

“A major data point stands out in the 2017 DBIR report: the percentage of hacking-related breaches involving the misuse of stolen or weak credentials has reached 81%, effectively putting it front and center in terms of tactics being leveraged by attackers.”

Source: Verizon’s Data Breach Investigations Report (DBIR)


Over 3 Billion accounts hacked


117 Million LinkedIn Emails And Passwords


The company is yet to confirm the hack attack claims


143 million people affected

Keep your information off of the dark web.

Stolen user credentials are sold online, on the dark web and on the deep web for as little as $0.10 per record. Cybercriminals reuse passwords and login credentials to cause financial damage to companies and to their customers and vendors. Estimated 50% of businesses in the U.S. have been compromised.

Have your login credentials surfaced on one of few hundred thousand websites you have not even heard about? Have your company’s login credentials been compromised because of:

  • Employee error
  • Vendor hack
  • Client Hack
  • Social media hack
  • Targeted attack
  • Malware attack

Famous Target breach happened because of a compromised vendor. Are you confident none of your vendors were compromised? Maybe they did not know they were? Neiman Marcus did not know they were hacked until FBI knocked on their doors.

Did you or any of your employees reuse their login passwords on Social Media? About 67% users reuse passwords; cybercriminals can exploit it by trying stolen login credentials for other online services to gain access to company’s data.

There is no such thing as free movies online, yet many people keep downloading malware infected videos. Most if not all of those computers were compromised and all of its data could have been stolen. Some employees by mistake shared “My Documents” and exposed company’s documents online.

It is an old misconception that macs don’t get viruses. There are plenty of risks and Macs haven’t managed to avoid them completely, macs can get infected.

  • Use of botnets and malware
  • P2P file leaks
  • Keyloggers
  • Disgruntled employee
  • Phishing sites
  • Fake login sites

Most people store a lot of confidential data on mobile devices. Most people don’t frequently update or secure their devices. Are your employees using insecure personal devices for business purposes? Can those devices leak identities?

Do you know which mobile apps are malicious and may have already gained access to your mobile device(s)? Do you keep passwords on it?

We monitor the dark web for stolen IDs

We scour botnets, criminal chat rooms, blogs, websites and bulletin boards, Peer to Peer networks, forums, private networks, and other black-market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).

We look specifically for our clients’ top-level email domains and in some cases IP addresses. We monitor close to 1,000 distinct Internet relay chatroom (IRC) channels, over half of million private websites, 800 twitter feeds. Our platform executes tens of thousands of queries per day.

24/7 Monitoring

We keep monitoring hundreds of websites for your stolen credentials.

Daily reports

We will send you daily reports if any of your data surfaced on identity theft forums.

Monthly reports

We will send you monthly summative reports listing all stolen credentials we were able to find.

Be Proactive

You can’t control your business partners, but we can monitor if any of them leaked your login credentials.

Contact one of our security experts

We will begin our identity search.

About CCN

Chicago Computer Network (CCN) Inc. is a leading provider of Information Technology (IT) and consulting services for Chicago-based businesses. At CCN, we enthusiastically provide outstanding IT support and are committed to saving you time and money, while delivering long-term technology solutions to meet the current and evolving needs of your business.

Clients Worlwide

CCN has helped clients around the globe manage their IT services.


Business Hours: 8a-5p M-F
Managed Services: 24/7/365 Support

© Chicago Computer Network | All Rights Reserved