Getting Started with Breach Risk: Part 4

Use identity breaches and VIP notifications to stay apprised of potential employee data leaks.

This guide discusses functionality from across product tiers and may reference functionality not available on your account.

So far, we’ve discussed your attack surface at the company-level but users form an important part of your attack surface as well.

Step 1: Identity Breaches

We recommend checking Identity Breaches at a regular, set cadence to monitor new breaches and respond based on their severity.

How Identity Breaches works:

  • UpGuard searches online for third-party data breaches and surfaces breaches where an employee's credentials (e.g. email, passwords) have been exposed.
  • Pertinent breaches are added to Identity Breaches as UpGuard uncovers them.

Step 2: VIP list notifications

Some breaches, some individual’s data leaks, have a higher potential fallout. Identify those people and get notified of related breaches.

  1. Add emails to your VIP list. These are emails corresponding with people whose data leaks would be especially significant.
  2. Set up app and email notifications from Home>Manage notifications to inform you immediately if a VIP is involved in a breach.

Level-up: Create an integration that uses VIP notifications as triggers for ‘x’ actions (e.g. create a JIRA ticket when a new identity breach notification is triggered).

Up next: Getting Started with Breach Risk: Part 5