Common External Threats
Businesses face high levels of footprint from external threats posed by the dark web and other forms of external exposure. Cybercriminals can exploit vulnerabilities at any moment to cause data breaches, financial losses, and reputational damage.
Exposed Services
Open ports, misconfigured firewalls, and vulnerable applications can be exploited by cybercriminals to gain unauthorized access to your network.
Missing Records
Incorrect DNS records, missing SPF or DKIM records, and other configuration errors can lead to phishing attacks, spoofing, and other targeted email-based cybercrime.
Invalid Chain of Trust
Improperly configured or expired SSL/TLS certificates can expose sensitive information and enable cybercriminals to launch man-in-the-middle attacks.
Leaked Credentials
Leaked credentials are typically found in data dumps and other lists on the dark web and pose a critical risk to employees and businesses if they go unchecked.
Evolving Ecosystem
It’s difficult for small businesses to keep up with their external posture and the ever-changing methods of attack on an on-going basis.
Business Targeting
The dark web is frequently used to buy and sell data targeting businesses and their employees for malicious purposes such as ransomware, competitive advantage, and financial gain.
Proactive External Footprint Features
External Service Scanning
CRM 360 scans for open ports and public exposures to prevent malicious actors from accessing vulnerable and outdated services.
Configured Email Records
TLS / SSL Certificates
Discovering the current use of protocols in public domains and servers enables CRM 360 protocol monitoring for missing TLS/ SSL certificates.
Footprint Assessment Report
Generate a report summarizing risk across a business’s digital footprint based on exposed assets and external attack surface.
Compromised Data
CRM 360 continuously monitors the internet for leaked credentials and exfiltrated data, triggering alarm bells when the keys to the castle are in nefarious hands.
Dark Web Intelligence
Using machine learning tools, CRM 360 scrapes and analyzes dozens of sources that monitor the dark web for malicious activity targeting businesses and users.
How Does External Footprint Assessment Work?
Initiate
After signing up with a business domain, CRM 360 initiates an initial risk assessment.
Dark Web Results
![](https://www.trinityitconsulting.com.au/wp-content/uploads/2021/02/Group-758018.png)
Results of a dark web scan are delivered within minutes, and issues are triggered to alert admins to the compromised data.
External Surface Results
![](https://www.trinityitconsulting.com.au/wp-content/uploads/2021/02/slide3.png)
Results of the public exposure scan are delivered within 3 hours to 3 days and trigger alerts to admins to external surface results.
Remediation
CRM 360 remediation playbooks enable precise steps for simplified resolution, leveraging industry best practices.
Security Score and Issues
![](https://www.trinityitconsulting.com.au/wp-content/uploads/2021/02/Group-758230.png)
Each business receives a security score based on an overall risk assessment which will be continuously updated according to the issue status from external scans and reflect any new vulnerabilities.