SlideShare a Scribd company logo
1 of 10
Dark Web – What it is & How Does
it Work?
 While the name makes us think of dark alleys in dangerous
neighborhoods, the Dark Web is quite simply an anonymous
communications platform on the Internet. And, according to the
Dark Web specialists from Secmon1, it was invented by the US
military as a security exercise.
 This is a perfect example of how technology that was intended
to be used for good (to test if the scenario is possible) can be
turned to the dark side
Introduction
 The dark web is mostly used for illegal activities such as fraud
(selling credit card details, personal information for identity
theft or company data), drug dealing (check out the Silk Road
story), and more.
 Here, you can also find information stolen from corporations
and organizations (by hackers) and published for anyone to
see. In these scenarios, the hackers consider that the leaked
data should be publicly accessible, as a way to fight for a just
cause or right a wrong.
What it’s used for?
 The Dark Web as a whole is not that much more different than
the internet we know. However, there are some things that
would throw off a regular user (at least at first).
 For instance, these sites are not indexed by a search engine. In
fact, they do everything possible to avoid this. In addition, the
URL structure is different as all the domain extensions are
replaced with .onion and all the domain names are just a string
of random text.
How Does it Look Like?
 The Dark Web is festering with illegal online activities, but most
of them are left to the proper authorities. However, most
companies that ever went through a data breach, worry that
their data is publicly available somewhere online.
How To Protect Your Interests?
 In short, cybercriminals will get anything they can get their
hands on. This includes all sorts of files (word, excel, pdfs,
accounting files), CRM (Customer Relationship Management)
data, and more.
 A recent example is the Australian Toll breach where personal
employee information, customers, financial information ended
up on the Dark Web.
What Data are Cybercriminals after?
 While there is no one sure way to keep your company’s data safe, there are
several steps every company should take to increase protection:
 Know where your sensitive data is stored:
 Is it in the cloud, is it on any computers or servers at the office?
 Reduce your sensitive data footprint:
 Is it easy to manage the security for all the locations of where the sensitive data is
stored?
 Does all the sensitive data need to be accessible, can we archive it and take it
offline in a secure location (e.g put it on an external hard drive and store it in a
safe)?
 Automate the classification of your data
 Ensure sensitive data is classified and stored in safe and secure locations
 Automate remediation of data where it is saved to less controlled parts of your
network
How to Stay Safe
 Apply the Essential 8: Security Recommendations from The
Australian Government to ensure the IT security of your
computers and servers are very strong
 Apply DLP (Data Loss Prevention) in your cloud applications
like Google Workspace or Office 365 – this can prevent sensitive
data from incorrectly or maliciously being sent outside the
organization.
Onsite Helper’s recommendation to
reduce vulnerability
Contact US
https://onsitehelper.com/

More Related Content

Similar to Dark Web What it is & How Does it Work

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptxjohn6938
 
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012jerryjustice
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONSDATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONSSprintzeal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 

Similar to Dark Web What it is & How Does it Work (18)

A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
Security
SecuritySecurity
Security
 
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ Overview
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONSDATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
DATA LEAK - WHAT IS IT, PREVENTION AND SOLUTIONS
 
Information security
Information securityInformation security
Information security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from Onsite Helper

An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationOnsite Helper
 
Understanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right OneUnderstanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right OneOnsite Helper
 
Explore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your BusinessExplore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your BusinessOnsite Helper
 
Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...Onsite Helper
 
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkOnsite Helper
 
What is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your BusinessWhat is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your BusinessOnsite Helper
 
Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it Onsite Helper
 
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...Onsite Helper
 
Understanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdfUnderstanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdfOnsite Helper
 

More from Onsite Helper (9)

An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor Authentication
 
Understanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right OneUnderstanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right One
 
Explore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your BusinessExplore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your Business
 
Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...
 
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
 
What is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your BusinessWhat is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your Business
 
Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it
 
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
 
Understanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdfUnderstanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdf
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Dark Web What it is & How Does it Work

  • 1. Dark Web – What it is & How Does it Work?
  • 2.  While the name makes us think of dark alleys in dangerous neighborhoods, the Dark Web is quite simply an anonymous communications platform on the Internet. And, according to the Dark Web specialists from Secmon1, it was invented by the US military as a security exercise.  This is a perfect example of how technology that was intended to be used for good (to test if the scenario is possible) can be turned to the dark side Introduction
  • 3.
  • 4.  The dark web is mostly used for illegal activities such as fraud (selling credit card details, personal information for identity theft or company data), drug dealing (check out the Silk Road story), and more.  Here, you can also find information stolen from corporations and organizations (by hackers) and published for anyone to see. In these scenarios, the hackers consider that the leaked data should be publicly accessible, as a way to fight for a just cause or right a wrong. What it’s used for?
  • 5.  The Dark Web as a whole is not that much more different than the internet we know. However, there are some things that would throw off a regular user (at least at first).  For instance, these sites are not indexed by a search engine. In fact, they do everything possible to avoid this. In addition, the URL structure is different as all the domain extensions are replaced with .onion and all the domain names are just a string of random text. How Does it Look Like?
  • 6.  The Dark Web is festering with illegal online activities, but most of them are left to the proper authorities. However, most companies that ever went through a data breach, worry that their data is publicly available somewhere online. How To Protect Your Interests?
  • 7.  In short, cybercriminals will get anything they can get their hands on. This includes all sorts of files (word, excel, pdfs, accounting files), CRM (Customer Relationship Management) data, and more.  A recent example is the Australian Toll breach where personal employee information, customers, financial information ended up on the Dark Web. What Data are Cybercriminals after?
  • 8.  While there is no one sure way to keep your company’s data safe, there are several steps every company should take to increase protection:  Know where your sensitive data is stored:  Is it in the cloud, is it on any computers or servers at the office?  Reduce your sensitive data footprint:  Is it easy to manage the security for all the locations of where the sensitive data is stored?  Does all the sensitive data need to be accessible, can we archive it and take it offline in a secure location (e.g put it on an external hard drive and store it in a safe)?  Automate the classification of your data  Ensure sensitive data is classified and stored in safe and secure locations  Automate remediation of data where it is saved to less controlled parts of your network How to Stay Safe
  • 9.  Apply the Essential 8: Security Recommendations from The Australian Government to ensure the IT security of your computers and servers are very strong  Apply DLP (Data Loss Prevention) in your cloud applications like Google Workspace or Office 365 – this can prevent sensitive data from incorrectly or maliciously being sent outside the organization. Onsite Helper’s recommendation to reduce vulnerability