HiRUM Software Solutions

The Dark Web: Everything you need to know

Posted by HiRUM Software Solutions - 06/08/2020
shady character oobscured by data stream - how to protect yourself from the dark web | HiRUM

The Dark Web, you may have heard of it, you may have chosen to ignore it. Either way, it’s something you should know about as it can be detrimental to your business operations. Dictionary.com defines the Dark Web as, the portion of the internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser: part of the deep web. The Dark Web is a scary place that can be used as a hub for criminal activity and a platform for illicit content and the sharing of information. While this goes pretty under the radar for everyday people, it is still very much a source for over 2 million users every day who are accessing our sensitive information and accounts. Let’s take a look at why you should know about it and how to protect yourself from the dark web.


Why should you be aware of it?

The technology in this corner of the internet is developing at a rapid pace, allowing criminals to buy and sell data that has been collected from breaches across the globe and cross-reference information until a match is acquired. As a business owner, you are privy to not only your information and that of your staff but the personal information of all guests past, present and future. If this was inadvertently leaked to less than friendly individuals from the Dark Web, it could mean big trouble for you and your business.


How To Protect Yourself From The Dark Web

What can you do to protect your sensitive information?

Employee measures

Establish exit procedures for employee turnover that covers all grounds for privacy and security at your place of business. This means updating any communal passwords, removal of access to any directories or employee platforms etc.

Utilise a Managed Service Provider (MSP)

Robert Marsden, Managing Director at Addictive Technology Solutions, encourages businesses to be extra cautious and look to an MSP for added peace of mind. An MSP has the support, tools and systems to assist in ways that would prove challenging for the business owner without this support.

Update to complex passwords

All users with access to sensitive information should be updating passwords on a regular basis and ensuring they are complex with symbols, numbers and lettering. Obvious passwords that are recycled put businesses at a greater risk of being compromised.

Education and training

Get up to scratch with the latest security awareness training and phishing simulations for you and your staff. There are plenty of tools available through MSP’s such as Addictive Technology Solutions in order to build confidence in how to protect your sensitive data.


What to do if your data has been breached?

Alert affected stakeholders

Start with informing all employees, top to bottom, of the compromised data so that all staff clearly understand the severity and any potential threats and outcomes of the breach. Once internal and external stakeholders have been notified establish and/or update organisational password policies then communicate with all relevant stakeholders. It’s important to then determine the source of the breach and understand how it happened to avoid any future threats.


All in all, this is something that will not be going away anytime soon and could have lasting impacts on your business. We recommend educating yourself and your staff on the risks and how to protect yourself from the dark web and the best ways to prevent the leakage of sensitive information before it’s too late.


We regularly post alerts and advice to help protect your business so make sure you sign up to receive our blog posts and keep ahead of potential threats to your business data.


Complete the form below to enquire about any of our products or services!

  • This field is for validation purposes and should be left unchanged.


Internet Security Scams and Viruses: How to Keep Your Business Running Smoothly


View all posts by

Comments are closed.