Skip to main content

Recently Updated Pages

Post-Quantum Vulnerable

SSL Certificates

Documentation: Post-Quantum Vulnerable SSL and Recommended Countermeasures Overview The rise of...

Updated 17 hours ago by Admin

Instructions for Downloading Reports in BrandSek

User Guide

BrandSek allows you to download comprehensive reports to assess security health scores and track ...

Updated 2 weeks ago by Admin

Brandsek Continous Scan

BrandSek Continuous Security Scan

BrandSek is dedicated to ensuring robust security through continuous scanning. This process is de...

Updated 4 months ago by Admin

Instructions for Using the Search and Selecting a Client to View Results

User Guide

The Search feature in BrandSek allows you to quickly find a client and view their specific result...

Updated 7 months ago by Admin

Refresh Scan Feature: Running a Scan in BrandSek

User Guide

The Refresh Scan button in BrandSek allows you to initiate or manually run a scan for a specific ...

Updated 7 months ago by Admin

Instructions for Adding a User in BrandSek

User Guide

Step 1: Access the Client Panel Navigate to the BrandSek Client Panel at https://panel.brandse...

Updated 7 months ago by Admin

Instructions for Editing and Deleting Clients in BrandSek

User Guide

Step 1: Access the Client Panel Log in to your BrandSek account and navigate to the Client Panel...

Updated 7 months ago by Admin

How to create a client?

User Guide

Instructions for Adding a New Client in BrandSek To add a new client using the BrandSek platform...

Updated 7 months ago by Admin

Mitigation Plan for Managing Brand Mentions

Brand Mentions

To effectively manage brand mentions and mitigate associated risks, organizations should implemen...

Updated 10 months ago by Admin

Risks Associated with Unmonitored Brand Mentions

Brand Mentions

Failing to monitor and manage brand mentions across the internet can expose organizations to vari...

Updated 10 months ago by Admin

What are Brand Mentions?

Brand Mentions

Brand mentions refer to any instance where a company, product, or service name is referenced onli...

Updated 10 months ago by Admin

Mitigation Plan for Fake Social Media Profiles

Fake Social Media Profile

To address the risks posed by fake social media profiles, organizations should implement a compre...

Updated 10 months ago by Admin

Risks Associated with Fake Social Media Profiles

Fake Social Media Profile

Fake social media profiles present numerous risks to individuals, businesses, and society at larg...

Updated 10 months ago by Admin

Fake Social Media Profiles

Fake Social Media Profile

Fake social media profiles are fraudulent or impersonating accounts created on social media platf...

Updated 10 months ago by Admin

Mitigation Plan for Rogue Mobile Applications

Rogue Mobile Applications

To address the risks posed by rogue mobile applications, organizations should implement a compreh...

Updated 10 months ago by Admin

Risks Associated with Rogue Mobile Applications

Rogue Mobile Applications

Rogue mobile applications pose numerous risks to both users and organizations. Here are some key ...

Updated 10 months ago by Admin

Rogue Mobile Applications

Rogue Mobile Applications

Rogue Mobile Applications are unauthorized or malicious mobile apps that pose a significant threa...

Updated 10 months ago by Admin

Mitigation Plan for Lookalike Domains

Look-alike Domains

This plan outlines strategies to reduce the risks associated with lookalike domains as part of a ...

Updated 10 months ago by Admin

Risks Associated with Lookalike Domains

Look-alike Domains

Lookalike domains pose several significant risks to organizations and individuals. Understanding ...

Updated 10 months ago by Admin

Lookalike Domains

Look-alike Domains

Lookalike domains, also known as typosquatting domains or domain impersonation, are URLs that clo...

Updated 10 months ago by Admin