{"id":827,"date":"2024-03-18T08:12:57","date_gmt":"2024-03-18T13:12:57","guid":{"rendered":"https:\/\/cmitsolutions.com\/boston-ma-1089\/?p=827"},"modified":"2024-07-19T07:39:03","modified_gmt":"2024-07-19T12:39:03","slug":"is-your-information-safe-from-the-dark-web","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/is-your-information-safe-from-the-dark-web\/","title":{"rendered":"Is Your Information Safe From The Dark Web?"},"content":{"rendered":"<p>Many people think the internet they use every day is the vast majority of the World Wide Web, but it\u2019s actually only <a href=\"https:\/\/www.darkowl.com\/blog-content\/understanding-the-difference-between-the-surface-web-deep-web-and-darknet\/\">4% of the internet visible to the public<\/a>. That means roughly 96% of the information on the rest of the internet is hidden \u2013 but does that also mean it\u2019s safe? The short answer is probably not. The \u201cdark web\u201d is a term you may have heard before, even if you\u2019re not a cybercriminal. What is the dark web? Why should you care about it? Most importantly, how do you protect yourself from it? Think of the internet as being composed of three parts:<\/p>\n<h3>#1 The Surface Web, #2 The Deep Web, and #3 The Dark Web<\/h3>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1007 size-full\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/Dark-Web-Iceberg-infographic.png\" alt=\"surface web, deep web, and dark web\" width=\"800\" height=\"1200\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/Dark-Web-Iceberg-infographic.png 800w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/Dark-Web-Iceberg-infographic-200x300.png 200w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/Dark-Web-Iceberg-infographic-683x1024.png 683w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/Dark-Web-Iceberg-infographic-768x1152.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The Surface Web<\/strong><\/h2>\n<p>The internet that you are most familiar with is also known as the surface web. It\u2019s also been referred to as the \u201cpublic web\u201d, \u201cclearnet\u201d or \u201cclear web\u201d. Everything you find on the surface web is indexed by search engines like Google and Bing. This part of the internet is where you search for various information, shop online, view pictures on social media, stream YouTube videos, and download music and podcasts. While it is the most visible, the surface web accounts for the smallest part of the total web.<\/p>\n<h2><strong>The Deep Web<\/strong><\/h2>\n<p>The largest part of the internet is the deep web. It makes up roughly 90% of the internet. Unlike the surface web, the deep web is not indexed by search engines. These sites require authentication credentials to gain access to the content and cannot be searched for in the surface web. It contains things like patient medical records, banking website portals, government databases, subscription websites, and internal company networks. Much of this data is encrypted and protected from searching, not to hide something illegal, but to protect it from the public or because it is a paid service.<\/p>\n<h2><strong>The Dark Web<\/strong><\/h2>\n<p>The remaining estimated 6% of cyberspace is the dark web.\u00a0 Similar to the deep web, the dark web is not indexed by search engines. The dark web requires special browsers or tools to access its contents. Using the TOR (The Onion Router) browser, the dark web allows users and visitors to maintain anonymity because of <a href=\"https:\/\/www.truthfinder.com\/dark-web\/\">the way it routes encrypted internet traffic<\/a> through various nodes in layers like an onion. Specifically, those nodes (computers and\/or routers) each conceal the source of the dark web traffic and cannot be easily tracked.<\/p>\n<p>Although the dark web is best known as a haven for cybercriminal activity, there are some legitimate uses of the dark web. These legitimate uses include being able to conduct anonymous conversations in places where free speech is suppressed, being able to browse the web without one\u2019s activities being monitored including hiding your IP address and helping to maintain your privacy online. Unfortunately, because of these protections the dark web also provides the means for criminals to conduct their business.<\/p>\n<h2><strong>The Dark Side of the Dark Web<\/strong><\/h2>\n<p>The dark web or \u201cdarknet\u201d continues to get <a href=\"https:\/\/www.ft.com\/content\/c70ef7d6-230a-4404-b854-2e75fe0f2e0a\">a lot of attention<\/a>. Advancements in AI-powered technologies and malware only fuel the fire for cybercriminals to leverage the anonymous nature of the dark web. Allowing them to launch more sophisticated attacks on company networks, individuals and mettle in foreign affairs. The dark web is also a hiding place for loot stolen from these cyberattacks and is an exchange where criminals can sell their wares\u2014i.e. your stolen data.<\/p>\n<p>If you have been the victim of a data breach\u2014<a href=\"https:\/\/haveibeenpwned.com\/\">and it\u2019s pretty likely you have<\/a>\u2014your credit card data, personal information (social security number, addresses, etc.) or usernames and <a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/4-key-steps-for-securing-your-passwords\/\">passwords<\/a> are likely on the dark web. Your data which may be invaluable to you, fetches pennies on the dollar on the dark web and cybercriminals will stop at nothing to get, sell and use it.<\/p>\n<h3>Here are five ways to protect yourself from dark web criminals:<\/h3>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1008 size-full\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/How-to-protect-your-data-from-the-dark-web-infographic-1.png\" alt=\"How to protect yourself from the dark web\" width=\"800\" height=\"1200\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/How-to-protect-your-data-from-the-dark-web-infographic-1.png 800w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/How-to-protect-your-data-from-the-dark-web-infographic-1-200x300.png 200w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/How-to-protect-your-data-from-the-dark-web-infographic-1-683x1024.png 683w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2019\/06\/How-to-protect-your-data-from-the-dark-web-infographic-1-768x1152.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Considering over <a href=\"https:\/\/www.apple.com\/newsroom\/pdfs\/The-Continued-Threat-to-Personal-Data-Key-Factors-Behind-the-2023-Increase.pdf\">360 million people were victims of corporate and institutional data breaches<\/a> in 2023, the odds that your identity or information will fall prey to one of these breaches sooner or later is only a matter of time. As Supreme Court Justice Louis Brandeis once wrote, \u201cSunlight is said to be the best of disinfectants.\u201d This is also true for the dark web.<\/p>\n<p>The best way to determine if your data is on the dark web is to perform a dark web scan.\u00a0 Not confident that you can do a thorough dark web scan and identity protection on your own? Work with your <a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/contact-us\/\">trusted advisor CMIT<\/a> to shine light on your own private information hiding out in the dark web.<\/p>\n<p>Written by: <a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/about\/\">Chris Zambuto<\/a> | Chief Information Security Officer <a href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\">@<\/a><a href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\">CMITBostonCambridge<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many people think the internet they use every day is the vast&#8230;<\/p>\n","protected":false},"author":259,"featured_media":1009,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[29,32,51],"class_list":["post-827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blog","tag-cmit-solutions","tag-cybersecurity","tag-dark-web"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/comments?post=827"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media\/1009"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media?parent=827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/categories?post=827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/tags?post=827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}