Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

90 total results found

Postman Monitoring Overview

Postman Monitoring

Postman is a popular platform used for API development, testing, and collaboration. While it provides a powerful toolset for teams to manage their API lifecycles, it’s important to ensure that sensitive information is protected during this process. Monitoring ...

Open Cloud Bucket Monitoring Overview

Open Cloud Buckets

Cloud storage services like AWS S3, Google Cloud Storage, and Azure Blob Storage are widely used to store data, including files, databases, and application backups. However, misconfigured or unsecured cloud buckets can lead to accidental exposure of sensitive ...

Dark Web Monitoring Overview

Dark Web Monitoring

The dark web is a part of the internet not indexed by traditional search engines, often used by cybercriminals to trade stolen data, credentials, and other illicit materials. Dark web monitoring refers to the proactive process of scanning the dark web for stol...

Lookalike Domains

Look-alike Domains

Lookalike domains, also known as typosquatting domains or domain impersonation, are URLs that closely resemble legitimate domain names but with slight variations. These domains are often used for phishing attacks, brand abuse, or other malicious activities. In...

Risks Associated with Lookalike Domains

Look-alike Domains

Lookalike domains pose several significant risks to organizations and individuals. Understanding these risks is crucial for effective attack surface management and cybersecurity strategy. 1. Phishing Attacks Credential Theft: Users may unknowingly enter lo...

Mitigation Plan for Lookalike Domains

Look-alike Domains

This plan outlines strategies to reduce the risks associated with lookalike domains as part of a comprehensive attack surface management approach. 1. Domain Monitoring and Registration Implement continuous monitoring for new domain registrations similar to...

Rogue Mobile Applications

Rogue Mobile Applications

Rogue Mobile Applications are unauthorized or malicious mobile apps that pose a significant threat to users and organizations. These apps typically fall into one of two categories: Impersonation Apps: These mimic legitimate, often popular applications in ap...

Risks Associated with Rogue Mobile Applications

Rogue Mobile Applications

Rogue mobile applications pose numerous risks to both users and organizations. Here are some key risks: Data Theft Personal information compromise (e.g., names, addresses, social security numbers) Financial data theft (credit card information, bank acco...

Mitigation Plan for Rogue Mobile Applications

Rogue Mobile Applications

To address the risks posed by rogue mobile applications, organizations should implement a comprehensive mitigation strategy: Continuous Monitoring Regularly scan official and unofficial app stores for unauthorized apps Implement automated alerts for new...

Fake Social Media Profiles

Fake Social Media Profile

Fake social media profiles are fraudulent or impersonating accounts created on social media platforms that misrepresent their true identity or purpose. These profiles are often designed to deceive users, spread misinformation, or exploit the reputation of indi...

Risks Associated with Fake Social Media Profiles

Fake Social Media Profile

Fake social media profiles present numerous risks to individuals, businesses, and society at large: Brand Damage Erosion of customer trust due to impersonation Reputation loss from association with scams or misinformation Dilution of brand message in c...

Mitigation Plan for Fake Social Media Profiles

Fake Social Media Profile

To address the risks posed by fake social media profiles, organizations should implement a comprehensive mitigation strategy: Proactive Monitoring Utilize social media listening tools to detect mentions and impersonations Implement automated alerts for ...

What are Brand Mentions?

Brand Mentions

Brand mentions refer to any instance where a company, product, or service name is referenced online. These mentions can occur across various digital platforms and can significantly impact a brand's online presence and reputation. Key Characteristics: Can b...

Risks Associated with Unmonitored Brand Mentions

Brand Mentions

Failing to monitor and manage brand mentions across the internet can expose organizations to various risks: Reputation Damage Unaddressed negative mentions can spiral into larger PR issues Missed opportunities to engage with positive mentions and brand ...

Mitigation Plan for Managing Brand Mentions

Brand Mentions

To effectively manage brand mentions and mitigate associated risks, organizations should implement a comprehensive strategy: Implement Robust Monitoring Tools Utilize advanced brand monitoring software to scan the entire internet Set up real-time alerts...

How to create a client?

User Guide

Instructions for Adding a New Client in BrandSek To add a new client using the BrandSek platform, follow these steps: Step 1: Access the Client Panel Navigate to the BrandSek Client Panel by visiting: https://panel.brands...

Instructions for Editing and Deleting Clients in BrandSek

User Guide

Step 1: Access the Client Panel Log in to your BrandSek account and navigate to the Client Panel by visiting https://panel.brandsek.com/clients. Step 2: Locate the Client On the Dashboard, use the search bar to find a specific client by entering their n...

Instructions for Adding a User in BrandSek

User Guide

Step 1: Access the Client Panel Navigate to the BrandSek Client Panel at https://panel.brandsek.com/clients. Log in using your credentials. Step 2: Select the Client Identify the client for whom you want to add a user. Click on the "User Access" b...

Refresh Scan Feature: Running a Scan in BrandSek

User Guide

The Refresh Scan button in BrandSek allows you to initiate or manually run a scan for a specific client. This feature is useful when you need to perform an immediate check for vulnerabilities or updates to the client’s security posture. Instructions to Run ...

Instructions for Downloading Reports in BrandSek

User Guide

BrandSek allows you to download comprehensive reports to assess security health scores and track vulnerabilities. You can choose between a Full Report or an Executive Report depending on your needs. Step 1: Access the Dashboard Log in to the BrandSek pla...