Skip to main content

Recently Updated Pages

Brandsek Continous Scan

BrandSek Continuous Security Scan

BrandSek is dedicated to ensuring robust security through continuous scanning. This process is de...

Updated 3 weeks ago by Admin

Instructions for Using the Search and Selecting a Client to View Results

User Guide

The Search feature in BrandSek allows you to quickly find a client and view their specific result...

Updated 4 months ago by Admin

Instructions for Downloading Reports in BrandSek

User Guide

BrandSek allows you to download comprehensive reports to assess security health scores and track ...

Updated 4 months ago by Admin

Refresh Scan Feature: Running a Scan in BrandSek

User Guide

The Refresh Scan button in BrandSek allows you to initiate or manually run a scan for a specific ...

Updated 4 months ago by Admin

Instructions for Adding a User in BrandSek

User Guide

Step 1: Access the Client Panel Navigate to the BrandSek Client Panel at https://panel.brandse...

Updated 4 months ago by Admin

Instructions for Editing and Deleting Clients in BrandSek

User Guide

Step 1: Access the Client Panel Log in to your BrandSek account and navigate to the Client Panel...

Updated 4 months ago by Admin

How to create a client?

User Guide

Instructions for Adding a New Client in BrandSek To add a new client using the BrandSek platform...

Updated 4 months ago by Admin

Mitigation Plan for Managing Brand Mentions

Brand Mentions

To effectively manage brand mentions and mitigate associated risks, organizations should implemen...

Updated 6 months ago by Admin

Risks Associated with Unmonitored Brand Mentions

Brand Mentions

Failing to monitor and manage brand mentions across the internet can expose organizations to vari...

Updated 6 months ago by Admin

What are Brand Mentions?

Brand Mentions

Brand mentions refer to any instance where a company, product, or service name is referenced onli...

Updated 6 months ago by Admin

Mitigation Plan for Fake Social Media Profiles

Fake Social Media Profile

To address the risks posed by fake social media profiles, organizations should implement a compre...

Updated 6 months ago by Admin

Risks Associated with Fake Social Media Profiles

Fake Social Media Profile

Fake social media profiles present numerous risks to individuals, businesses, and society at larg...

Updated 6 months ago by Admin

Fake Social Media Profiles

Fake Social Media Profile

Fake social media profiles are fraudulent or impersonating accounts created on social media platf...

Updated 6 months ago by Admin

Mitigation Plan for Rogue Mobile Applications

Rogue Mobile Applications

To address the risks posed by rogue mobile applications, organizations should implement a compreh...

Updated 6 months ago by Admin

Risks Associated with Rogue Mobile Applications

Rogue Mobile Applications

Rogue mobile applications pose numerous risks to both users and organizations. Here are some key ...

Updated 6 months ago by Admin

Rogue Mobile Applications

Rogue Mobile Applications

Rogue Mobile Applications are unauthorized or malicious mobile apps that pose a significant threa...

Updated 6 months ago by Admin

Mitigation Plan for Lookalike Domains

Look-alike Domains

This plan outlines strategies to reduce the risks associated with lookalike domains as part of a ...

Updated 6 months ago by Admin

Risks Associated with Lookalike Domains

Look-alike Domains

Lookalike domains pose several significant risks to organizations and individuals. Understanding ...

Updated 6 months ago by Admin

Lookalike Domains

Look-alike Domains

Lookalike domains, also known as typosquatting domains or domain impersonation, are URLs that clo...

Updated 6 months ago by Admin

Dark Web Monitoring Overview

Dark Web Monitoring

The dark web is a part of the internet not indexed by traditional search engines, often used by c...

Updated 6 months ago by Admin