Preventive cybersecurity services and questions of responsibility in case of a data breach
Nation-state-sponsored cyber terrorist attacks aim to cause disruption in utility infrastructure

Cybersecurity is no longer an optional investment in today’s digital world. With the increasing number of cyber attacks and data breaches, it’s important to have robust cybersecurity measures in place to protect your company and its assets. At Cyber Intel Matrix (CIM), an Axalton company, we offer a range of services designed to help businesses of all sizes and across a variety of industries protect themselves from cyber threats.

We offer cooperation in the framework of a tech partnership with cybersecurity companies in 2 areas using our proprietary access to data:

  1. We built the largest industrial control system honeypot network in the world, mimicking ICS infrastructure to gather threat intel
  2. Historical indexed and parsed databases of dark web content, including 20 billion breach records, financial, health PII, leaked databases, etc.

Why is this important?

Cybersecurity threats are increasing day by day and they can cause significant damage to a company’s reputation, finances, and data security. Cybercriminals are always looking for new ways to exploit vulnerabilities in IT systems and steal sensitive information. Therefore, it’s crucial for companies to have a comprehensive cybersecurity strategy in place.

The services offered by CIM can help companies address various aspects of cybersecurity, including vulnerability assessment, data breach monitoring, phishing detection, and Dark Web monitoring. These services can be useful to companies of all sizes and industries, but especially those operating in sectors where data security is critical, such as finance, healthcare, and energy.

Data breaches as well as more direct disruption of industrial control system (ICS) infrastructure can occur as a result of hostile cyber activity.

So what needs to be done to mitigate the risk?

For example, the CIM Cyber Security Maturity Assessment (see below) can help a company identify weaknesses in its network and data security, as well as potential compliance failures. The Exposure Test can help a company identify stolen credentials and sensitive information that may be used in social engineering campaigns. The CIM Framework can help monitor and detect attacks on ICS protocols and devices, while the Dark Web Alerting service can alert a company when its sensitive information is found on the Dark Web.

CIM Services Breakdown

Here are some of the services we offer:

  1. Cyber Security Maturity Assessment: Our automated passive network and supplier vulnerability scoring system identifies compliance failures and detects weak points in corporate and supplier networks, production, industrial facilities, and data integrity.
  2. Exposure Test: Our automatic assessment reveals stolen credentials and sensitive information that may be used in social engineering campaigns, providing businesses with greater insight into their current and historical exposure in the Dark Web.
  3. CIM Account Takeover (ATO) Database: Access to over 20 billion breached credentials, including usernames, passwords, phone numbers, addresses, IP numbers, and email addresses, as part of the CIM Framework.
  4. Wide-Range Intelligence Database: Our Open Source Intelligence (OSINT) database includes leaked data and compromised corporate datasets, providing businesses with a comprehensive overview of potential threats.
  5. CIM Blackpot Honeynet: Our Industrial Control System (ICS) global honeynet emulates OT protocols, constantly gathering IP addresses, adversary TTP, and payloads (malware).
  6. Industrial Threat Cloud: Our sector-wide weekly overview of threats provides raw data on hacking activity in sectors such as automotive, energy, oil, refineries, DoD contractors, water supply management, and PLC manufacturers.
  7. CIM Framework (SaaS): Our framework monitors and detects attacks on ICS protocols/devices, combining IT threat feeds with interactive security tools and intel databases.
  8. Dark Mapper: Our service scans Dark Web Hidden Services for network info, open ports, CMS, metadata, header information, and vulnerabilities, providing businesses with valuable intel on Dark Web services.
  9. Dark Web Alerting: Our alert service is based on query terms provided by the customer, providing businesses with timely alerts on potential threats.
  10. Brand Monitoring: Our daily monitoring of terms, technologies, and brand names alerts businesses when relevant sensitive information is found in the Dark Web, pastebin sites, hacker forums, repositories, communication channels, and data dumps.
  11. Data Breach Monitoring: Our honeytoken, leaked document, and ransomware monitoring services provide businesses with early warnings of potential threats.
  12. Credential Breach Alerting, Querying: Our services include compromised credential monitoring, exploring compromised credential databases for exposure analysis, and daily cross-checking of millions of customer usernames/emails for new leaks.
  13. Phishing Detection: Our daily monitoring of possible new phishing domains provides businesses with early warnings of potential attacks.
  14. Dark Web Feed: Our curated feed from entities extracted from the entire Dark Web includes IPs, hosts, usernames, emails, file sharing links, SSH creds, technology terms, PLC manufacturers, PLC devices, networking technologies, solutions, and possible hacking code highlights.

Our services are designed to address a wide range of markets, including healthcare, finance, manufacturing, energy, and government agencies. Regardless of the size or industry of your business, we can help you protect your data and assets from cyber threats. With our expertise and cutting-edge technology, we provide businesses with the tools they need to stay ahead of potential threats and safeguard their operations.

So what if there is a data breach?

Companies can suffer various types of damages in case of a data breach. Here are some of the most common ones:

  1. Financial losses: Data breaches can result in significant financial losses for a company. For example, a company may need to pay for forensic investigations, legal fees, credit monitoring for affected individuals, and other related costs.
  2. Reputational damage: A data breach can damage a company’s reputation and erode customer trust. This can lead to a loss of business, negative media coverage, and a decline in stock prices.
  3. Legal liabilities: A company may face legal liabilities if it fails to protect customer data or comply with data privacy laws. For example, a company may be sued by customers or regulators for negligence or breach of data protection laws.
  4. Operational disruptions: A data breach can cause operational disruptions for a company, such as system downtime, reduced productivity, and supply chain interruptions.
  5. Intellectual property theft: A data breach can result in the theft of a company’s intellectual property, such as trade secrets, patents, and copyrights. This can have long-term impacts on a company’s competitiveness and market position.

Who is ultimately responsible?

The question of who is held responsible when damages occur as a result of a data breach depends on a number of factors, including the nature of the breach, the jurisdiction where the breach occurred, and the specific laws and regulations that apply. Here are some general guidelines:

  1. Company executives and board members: In many cases, company executives and board members can be held responsible for data breaches if they are found to have neglected their duties to protect customer data. This can include failure to implement reasonable cybersecurity measures, failure to disclose the breach to affected parties in a timely manner, and failure to comply with data protection laws.
  2. IT staff and vendors: IT staff and vendors who are responsible for maintaining a company’s cybersecurity defenses can also be held responsible for data breaches if they are found to have been negligent or breached their contractual obligations.
  3. Hackers and other cyber criminals: In cases where a data breach was caused by an external attacker, the hacker or cyber criminal responsible for the breach can be held legally liable for damages caused to the company and affected parties.
  4. Regulators and government agencies: Regulators and government agencies responsible for enforcing data protection laws can also hold companies accountable for data breaches and impose fines and other penalties for noncompliance.

Companies should take proactive steps to prevent data breaches, comply with data protection laws, and have a plan in place to respond to and mitigate the impact of a breach if one occurs.