The Dark Web: What is it and why should you care?
As a serious business owner, just hearing the term ‘dark web’ is enough for you to conjure up an array of concerning images where people engage in all sorts of illegal activities.
You go straight to the scare stories you’ve seen in the headlines and automatically assume the dark web is bad.
After all, if you’ve never ventured into the risky area that is the dark web – who wouldn’t?
The reality is though, the dark web is neither good nor bad. It's a place where all kinds of individuals and organisations, with both good and bad intentions, congregate. However, where it was originally created with security and privacy in mind, this had led to many using it as a venue for other illicit things.
If you fall into the latter category, your business, regardless of its size or nature of operations, could become a target. You have a wealth of sensitive information that could be very valuable to certain people. Indeed, stolen information, ransomware, malware, and hacking services are all hot commodities within the dark web.
While avoiding a dark web invasion is difficult at times, being aware of the threat and staying alert will help to mitigate the damage done. We discuss what the dark web is, how businesses are at risk, and some key steps you can do to stay out of trouble.
What is the dark web?
To put it simply, the dark web is a subset of the wider internet. A good way to visualise how the different layers come together is as an iceberg. For instance, on a daily basis, you and your employees will spend a substantial amount of time on the web, searching for information through search engines such as Google and Bing. This is the surface web, or sometimes known as the open web, and makes up a small 10% of the internet.
Below that, the part of the iceberg that sits below the water’s surface, is the remaining 90% called the deep web. Most people will use the deep web when they go online as this is the content that is hidden behind passwords and paywalls like company intranets and online banking.
The dark web goes beyond that, metaphorically the bottom layer of the iceberg, and is a small portion of the deep web. Unlike the surface and deep web, it cannot be accessed through regular browsers. Instead, users must install a dark web browser like TOR (The Onion Router). TOR allows users to access any site but bounces the request around multiple intermediaries, encrypting and decrypting the user's identity along the way to keep the data anonymous.
Since the content on the dark web is not searchable using standard search engine software, you must know where you want to go. Dark web directories are unreliable and most people on there don’t want to be found out by the wrong people.
The dark web business risk
As briefly mentioned, not all activity is for illegal purposes on the dark web. But ultimately, it’s not somewhere you or your employees need to be. Indeed, the number of dark web listings that could harm you organisation is growing – in 2019, a research study found that 60% of all listings could harm enterprises, and the number of those types of listings has grown by 20% since 2016.
However, even without any direct interaction with the dark web, businesses should be vigilant about the exposure. For example, information stolen from companies is often sold on the dark web: “Personally identifiable customer information such as home address and birthdays may be compromised and traded wholesale in such markets,” explains Pedram Amini, CTO of InQuest, a network security solution platform. “This includes customer account information, such as usernames and passwords.”
It is in fact a major operation with far reaching effects: “The dark web often acts as the catalyst behind corporate data breaches,” says Uzi Scheffer, CEO of SOSA, a global innovation platform. “Sensitive corporate information and digital assets are at risk. Criminals and hackers target this information, so they can steal the identities of customers and employees, as well as reveal unannounced company announcements that have the potential to sway stock value.”
Steps to take to avoid trouble with the dark web
Once data ends up on the dark web, there is not much that can be done. The best thing a business can do is be proactive and try avoid it from happening in the first place. These five tips are a good place to start when doing that.
- Prohibit staff from using TOR
Employees who access the TOR network can expose your business to potentially harmful content and/or malware. This can be particularly damaging to your network. You should provide all staff with clear guidance on ‘clean’ internet use and make sure you use software that blocks TOR and other forms of dark web browsers.
- Educate staff on security measures
We say it all the time, but we mean it: you are only as strong as your weakest link. All employees should be trained on cyber security measures, common attack methods and compliance with your business’ policies. The more knowledgeable and well-trained your staff are, the better.
- Limit employee access to data
When it comes to company data, it’s safer to operate on a need-to-know basis. This is because the fewer people that have access to sensitive client data, the less likely it is for your company to experience a breach.
- Employ comprehensive security programme
Cyber security experts say that if a company has good control over their sensitive information, it won’t end up on the dark web. Your privacy protections should be airtight and cyber security procedures need to be baked into your IT infrastructure and business processes. Moreover, efficient, and accurate security tools that monitor and detect threats in real-time are key.
- Set password protocols company-wide
Passwords are frequently traded on the dark web and criminals take advantage of the knowledge that people reuse passwords across accounts. Your business should be setting strict password protocols for all staff, and ideally clients.
Conclusion
Because the dark web doesn’t account for one direct attack on a specific company like phishing or ransomware, it’s something that is not often thought about as part of a business’ security strategy. The trouble with this is, it becomes a silent killer in today’s cyber world – a covert operation threatening to expose company secrets and harm reputations beyond repair. To fully protect your individual and business assets from all forms of threats in the cyber world today, including the dark web, it is crucial you have a comprehensive security strategy in place.
Luckily, a Managed IT Service provider such as one from within the entrust IT Group is the best way to do this. We get to know your business inside out, looking at your IT infrastructure and how secure it is, then will work closely with you to form a security strategy that fits your requirements and any industry compliance. Finally, as we have invested heavily in our business monitoring and security systems, you can rest assured everything is always up-to-date and protected.
Want to become a cyber security champion? Why not download our FREE White Paper – estimated read time 5 mins! >>
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)