Background Screening Services

Dark Web Screening

Dark web monitoring combines human and sophisticated Dark Web intelligence with search capabilities to identify, analyze and proactively monitor for your compromised or stolen employee, customer, and supply chain user credentials. The largest private and public-sector organizations globally rely on Dark Web Monitoring to provide actionable stolen credential data to make informed decisions.

Dark Web Email Screening

Your executives and administrative users often have greater access to systems, information, and sensitive data. If their personal email credentials are compromised, the attacker may be able to use social engineering to trick other employees to gain access or reuse the same user credentials to gain access to corporate systems. Therefore, it’s important to monitor the personal mail addresses of your executive and administrative users, in addition to their corporate email accounts. Dark Web ID will monitor up to 10 personal emails, in addition to those within the corporate network.

Sources of Vulnerability

When your employees use their work email on websites like the ones listed below, it makes your business vulnerable to a breach.

  HR & Payroll (ADP, PAYCHEX, CERIDIAN)
  Email Services (Yahoo, Office 365, Gmail)
  CRM (Salesforce, HubSpot)
  Travel Services (Expedia, Travelocity, Orbitz)
  Communications (Verizon, AT&T, T-Mobile)
  E-Commerce (Amazon, Etsy, Ebay)
  Banking & Finance (Quickbooks, Freshdesk, Bank of America)
  Collaboration (Dropbox, OneDrive)
  Social Media (Facebook, Instagram, Twitter)

How are Credentials Compromised?

  Phising

  • Send emails disguised as legitimate messages
  • Tricks user into disclosing credentials
  • Deliver malware to capture credentials
 

  Watering Holes

  • Targets a popular site
  • Inject code into the legitimate website
  • Deliver malware to visitors that capture credentials

  Malvertising

  • Inject malware into legitimate advertising networks
  • Deliver malware to visitors that capture credentials
 

  Web Attacks

  • Scan internet-facing company assets for vulnerabilities
  • Exploit those vulnerabilities
  • Move through the network to discover credentials
0 %

of hacking related breaches leveraged either stolen/weak passwords

0 %

of Small Businesses don’t have up to date or active cybersecurity strategies

0 %

 of Small Businesses will go out of business within 6 months of a cyber incident

Why Choose Sutton Associates?

Consumer Protection

Sutton Associates operates in a controlled, regulated, and transparent process pursuant to the FCRA.  Background checks are only conducted with the applicant’s written consent. Our regulations protect your business.

Accuracy

Sutton Associates matches criminal records to applicants using a combination of identifiers including social security number, date of birth, alias names, driver’s license numbers, and past addresses.

Efficiency

Our professional background screeners yield fast response times, usually returning a background check within 12-72 hours.

Cost Effective

By hiring the right employee, businesses can reduce turnover, increase productivity, and reduce costs through training.

Consider Dark Web Screening Services With Your Next Background Check