{"id":349951,"date":"2024-10-24T14:57:25","date_gmt":"2024-10-24T18:57:25","guid":{"rendered":"https:\/\/chiefexecutive.net\/?p=349951"},"modified":"2024-10-24T14:59:10","modified_gmt":"2024-10-24T18:59:10","slug":"ignore-the-dark-web-at-your-peril","status":"publish","type":"post","link":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/","title":{"rendered":"Ignore The &#8216;Dark Web&#8217; At Your Peril"},"content":{"rendered":"<p dir=\"ltr\">If your systems security personnel are not scouring the dark web for current threats or possible future risks, you are doing yourself and your customer base a disservice.<\/p>\n<p dir=\"ltr\">Internationally,\u00a0<a title=\"Original URL: https:\/\/www.solicitorsjournal.com\/sjarticle\/dark-web-monitoring-and-the-unseen-strategic-advantage-for-firms. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.solicitorsjournal.com%2Fsjarticle%2Fdark-web-monitoring-and-the-unseen-strategic-advantage-for-firms&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579080816%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=yWjDDrEUtxwggL9YHGLvCtBCd%2BrBChJMBl8IWukWhEI%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"0\">law firms, among other industries<\/a>, are increasingly recognizing the threats to their clients and their own internal systems, and boning up their dark web monitoring efforts. It may be an expensive pursuit, but you don\u2019t want to think about the havoc that might be caused by ignoring or missing a threat that would bring your business to its knees, not to mention create a public relations catastrophe.<\/p>\n<p dir=\"ltr\">Just as\u00a0<a title=\"Original URL: https:\/\/youtu.be\/4txmBNCAXg8?si=nqcE3tHJFzqx6YfA. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fyoutu.be%2F4txmBNCAXg8%3Fsi%3DnqcE3tHJFzqx6YfA&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579123667%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=2apUO8sPGi9XeWQhn57i2wjUar8nhB57C0dh6vVrQY8%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"1\">Boris and Natasha<\/a>\u00a0played the antagonistic foils to\u00a0<a title=\"Original URL: https:\/\/youtu.be\/_Lta51VFutU?si=v2vZ7-Dn8ZYICtR4. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fyoutu.be%2F_Lta51VFutU%3Fsi%3Dv2vZ7-Dn8ZYICtR4&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579162772%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=cC954Hdns%2FFk%2FiwDhN0UPfjgi%2FgnyIr3ixB%2FPnJETMA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"2\">Rocky and Bullwinkle<\/a>, so does the\u00a0<a title=\"Original URL: https:\/\/www.zdnet.com\/article\/what-is-the-dark-web-heres-everything-to-know-before-you-access-it\/. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fwhat-is-the-dark-web-heres-everything-to-know-before-you-access-it%2F&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579195204%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=JZ1TeRisFTmiOAuOWKKogSrhzhu2PXjD37LNG8a%2BH%2FE%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"3\">&#8220;dark web&#8221;<\/a>\u00a0lurk as the malevolent shadow of the internet as most of us know its presence within the depths of cyberspace. The dark web\u2019s disturbing content enables financial scams, high-level hacking, and other illicit activities including drug and human trafficking.<\/p>\n<p dir=\"ltr\">But those responsible for systems security are often disregarding the dark web at their significant professional peril. There is actionable intelligence to be gathered on the dark web, foreshadowing new, and ever widening efforts by the \u201cbad guys\u201d to undermine your system and critical data contained within. Avoid being the next victim by assuring that your team is taking aggressive efforts to monitor the place common business ethics is non-existent.<\/p>\n<p dir=\"ltr\"><a title=\"Original URL: https:\/\/www.zdnet.com\/article\/at-t-resets-passcodes-for-7-6-million-customers-following-dark-web-data-leak\/. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fat-t-resets-passcodes-for-7-6-million-customers-following-dark-web-data-leak%2F&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579225980%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=7Bf2pasAEHg00b74VbP1RwCsHyH0bQS55R0J%2FLimF9c%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"4\">AT&amp;T learned all too well<\/a>\u00a0what lies in the deep corners of the dark web when it discovered data from 2019 and earlier, further revealing the files affecting 7.6 million current subscribers and 65.4 million former account holders. Worse, for AT&amp;T, was the extent of the exposure:\u00a0full names, email addresses, mailing addresses, phone numbers, social security numbers, dates of birth, and AT&amp;T account numbers. The fallout from the revelation is only now shaking out.<\/p>\n<p dir=\"ltr\">While AT&amp;T searches for the source of the breach, an expensive reparations process has begun\u2014providing credit monitoring service to the millions affected. That\u2019s the right reaction to a breach of such magnitude. And one those affected should rightly take advantage.<\/p>\n<p dir=\"ltr\">In an era where digital threats loom large, businesses must turn their focus to the dark web, not as a nefarious playground, but as a critical frontier in cybersecurity defense. The dark web, a term that evokes intrigue and caution, has emerged as a double-edged sword in the realm of digital security. Monitoring dark web activity has become a mandatory response in an era when your business can be stopped cold with a brutal and merciless attack.<\/p>\n<p dir=\"ltr\">It\u2019s difficult to know if two of the more well publicized and pernicious recent disruptions foisted on businesses by bad actors\u2014the <a title=\"Original URL: https:\/\/www.nytimes.com\/2024\/03\/05\/health\/cyberattack-healthcare-cash.html. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.nytimes.com%2F2024%2F03%2F05%2Fhealth%2Fcyberattack-healthcare-cash.html&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579253167%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=EBBUo8nSdH2ZriYNaU02cCrUDGTgHV9SxQdLj1z%2BdjQ%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"5\">UnitedHealth Group payments system<\/a>\u00a0compromise and\u00a0<a title=\"Original URL: https:\/\/abcnews.go.com\/US\/cyberattack-shuts-us-pipeline-supplies-45-fuel-east\/story?id=77573904. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fabcnews.go.com%2FUS%2Fcyberattack-shuts-us-pipeline-supplies-45-fuel-east%2Fstory%3Fid%3D77573904&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579276814%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=ea%2FmJyjsxaykD4ueRfPMa2iMLBeIBtZ2lZaZKjjP3uc%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"6\">Colonial Pipeline cyberattack<\/a>\u2014could have been prevented with diligent dark web monitoring, but it is a relevant question. Were there clues hidden in the recesses of the dark web that could have foreshadowed events that crippled a major payments system or a critical part of the nation\u2019s fuel distribution infrastructure?<\/p>\n<p dir=\"ltr\">In the current digital environment, ignorance is not bliss\u2014it&#8217;s a liability. Businesses, regardless of size, are potential targets for cybercriminals leveraging the dark web. From ransomware attacks that can cripple an organization&#8217;s operations to data breaches that compromise sensitive customer information, the risks are real and growing. It&#8217;s within this context that dark web monitoring emerges as a crucial tool in a comprehensive cybersecurity strategy.<\/p>\n<p dir=\"ltr\">Has your security team performed an extensive search to determine if any of your data has been breached? Are there customer lists, trade secrets lurking behind a hidden doorway on the dark web?<\/p>\n<p dir=\"ltr\"><a title=\"Original URL: https:\/\/www.vanityfair.com\/news\/2019\/10\/the-untold-story-of-the-sony-hack. Click or tap if you trust this link.\" href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.vanityfair.com%2Fnews%2F2019%2F10%2Fthe-untold-story-of-the-sony-hack&amp;data=05%7C02%7Ccjprince%40chiefexecutive.net%7Ca8e45f7c317b4dc4637008dcf2a011c9%7C4d7955266df24a9788152c421914e263%7C0%7C0%7C638652016579295472%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=SZi0ZPRvXWHC7gBlQkXvAEIOkJzg9HfGg%2BiG8OfsEHQ%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\" data-linkindex=\"7\">Sony paid a deep price for the hack<\/a> that exposed salacious internal company emails and scripts of unreleased films.<\/p>\n<p dir=\"ltr\">To protect your company from becoming the next AT&amp;T or Colonial Pipeline, here are three immediate steps CEOs and senior executives can take to\u00a0 secure their systems:<\/p>\n<p dir=\"ltr\" role=\"presentation\"><span data-olk-copy-source=\"MessageBody\"><strong>\u2022 Enforce strong protocols.<\/strong> That includes a password and Multi-Factor Authentication (MFA) policy, and a password manager.<\/span> Companies should require complex, unique passwords\u00a0 along with multi-factor authentication (MFA) for enhanced security. Using a password manager can help generate and store strong passwords while notifying users if credentials are weak, reused or compromised. This strengthens password practices and reduces the risk of breaches from compromised credentials often sold on the dark web.<\/p>\n<p dir=\"ltr\" role=\"presentation\"><strong>\u2022 Implement dark web monitoring<\/strong>. Invest in tools that automatically scan the\u00a0 dark web for threats related to your business, such as leaked employee credentials, sensitive company data, or mentions of your organization in illicit forums. This proactive\u00a0 measure allows organizations to respond to early warning signs before cybercriminals can exploit the data.<\/p>\n<p dir=\"ltr\" role=\"presentation\"><strong>\u2022 Train employees on cybersecurity awareness.<\/strong> Regular cybersecurity training is crucial to help employees recognize phishing attempts, avoid unsafe browsing practices, understand relevant aspects of the dark web, and secure their login credentials. Companies should ensure that all employees understand how their online behavior can make the organization vulnerable.<\/p>\n<p dir=\"ltr\">The ramifications of dark web activities on businesses are multifaceted, affecting everything from operational continuity to legal compliance and brand reputation. In response, organizations must adopt proactive security measures that include dark web monitoring to identify and respond to threats before they materialize into full-blown attacks.<\/p>\n<p dir=\"ltr\">Understanding and monitoring the dark web is not just about keeping pace with cybercriminals; it&#8217;s about staying ahead of them. As businesses navigate the complex digital landscape, the dark web will undoubtedly continue to play a significant role in shaping cybersecurity strategies. By embracing the challenges and opportunities it presents, organizations can not only protect themselves but also turn potential vulnerabilities into strengths. The journey through the digital underworld, while fraught with risks, offers invaluable insights and tools for those willing to venture into its depths.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Want to avoid becoming the next AT&#038;T, Sony or Colonial Pipeline? The head-in-the-sand approach won&#8217;t cut it. <\/p>\n","protected":false},"author":29994,"featured_media":349952,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[467,5],"tags":[],"class_list":["post-349951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ignore The &#039;Dark Web&#039; At Your Peril<\/title>\n<meta name=\"description\" content=\"Want to avoid becoming the next AT&amp;T, Sony or Colonial Pipeline? The head-in-the-sand approach won&#039;t cut it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ignore The &#039;Dark Web&#039; At Your Peril\" \/>\n<meta property=\"og:description\" content=\"Want to avoid becoming the next AT&amp;T, Sony or Colonial Pipeline? The head-in-the-sand approach won&#039;t cut it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/\" \/>\n<meta property=\"og:site_name\" content=\"ChiefExecutive.net\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/chiefexecutivegroup\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-24T18:57:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-24T18:59:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1068\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Allendevaux\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Allendevaux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/\"},\"author\":{\"name\":\"Scott Allendevaux\",\"@id\":\"https:\/\/chiefexecutive.net\/#\/schema\/person\/0a03728b6221a55fcbf8c808dd8f55d2\"},\"headline\":\"Ignore The &#8216;Dark Web&#8217; At Your Peril\",\"datePublished\":\"2024-10-24T18:57:25+00:00\",\"dateModified\":\"2024-10-24T18:59:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/\"},\"wordCount\":964,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/chiefexecutive.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg\",\"articleSection\":[\"Cybersecurity\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/\",\"url\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/\",\"name\":\"Ignore The 'Dark Web' At Your Peril\",\"isPartOf\":{\"@id\":\"https:\/\/chiefexecutive.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg\",\"datePublished\":\"2024-10-24T18:57:25+00:00\",\"dateModified\":\"2024-10-24T18:59:10+00:00\",\"description\":\"Want to avoid becoming the next AT&T, Sony or Colonial Pipeline? The head-in-the-sand approach won't cut it.\",\"breadcrumb\":{\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage\",\"url\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg\",\"contentUrl\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg\",\"width\":1068,\"height\":680,\"caption\":\"AdobeStock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chiefexecutive.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ignore The &#8216;Dark Web&#8217; At Your Peril\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chiefexecutive.net\/#website\",\"url\":\"https:\/\/chiefexecutive.net\/\",\"name\":\"ChiefExecutive.net\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/chiefexecutive.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chiefexecutive.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chiefexecutive.net\/#organization\",\"name\":\"Chief Executive Group\",\"url\":\"https:\/\/chiefexecutive.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chiefexecutive.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2018\/05\/logo_8202.png\",\"contentUrl\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2018\/05\/logo_8202.png\",\"width\":820,\"height\":180,\"caption\":\"Chief Executive Group\"},\"image\":{\"@id\":\"https:\/\/chiefexecutive.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/chiefexecutivegroup\",\"https:\/\/x.com\/ChiefExecGrp\",\"https:\/\/www.linkedin.com\/company\/chief-executive-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/chiefexecutive.net\/#\/schema\/person\/0a03728b6221a55fcbf8c808dd8f55d2\",\"name\":\"Scott Allendevaux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chiefexecutive.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/07\/scott-allendevaux_avatar-96x96.jpeg\",\"contentUrl\":\"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/07\/scott-allendevaux_avatar-96x96.jpeg\",\"caption\":\"Scott Allendevaux\"},\"description\":\"Scott Allendevaux, LP.D., CISSP, CIPP\/US, HCISPP, CIPT, CIPM is senior practice lead of law and policy at Allendevaux &amp; Company, a data protection agency.\",\"url\":\"https:\/\/chiefexecutive.net\/author\/scottallendevaux\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ignore The 'Dark Web' At Your Peril","description":"Want to avoid becoming the next AT&T, Sony or Colonial Pipeline? The head-in-the-sand approach won't cut it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/","og_locale":"en_US","og_type":"article","og_title":"Ignore The 'Dark Web' At Your Peril","og_description":"Want to avoid becoming the next AT&T, Sony or Colonial Pipeline? The head-in-the-sand approach won't cut it.","og_url":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/","og_site_name":"ChiefExecutive.net","article_publisher":"https:\/\/www.facebook.com\/chiefexecutivegroup","article_published_time":"2024-10-24T18:57:25+00:00","article_modified_time":"2024-10-24T18:59:10+00:00","og_image":[{"width":1068,"height":680,"url":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg","type":"image\/jpeg"}],"author":"Scott Allendevaux","twitter_misc":{"Written by":"Scott Allendevaux","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#article","isPartOf":{"@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/"},"author":{"name":"Scott Allendevaux","@id":"https:\/\/chiefexecutive.net\/#\/schema\/person\/0a03728b6221a55fcbf8c808dd8f55d2"},"headline":"Ignore The &#8216;Dark Web&#8217; At Your Peril","datePublished":"2024-10-24T18:57:25+00:00","dateModified":"2024-10-24T18:59:10+00:00","mainEntityOfPage":{"@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/"},"wordCount":964,"commentCount":0,"publisher":{"@id":"https:\/\/chiefexecutive.net\/#organization"},"image":{"@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage"},"thumbnailUrl":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg","articleSection":["Cybersecurity","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/","url":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/","name":"Ignore The 'Dark Web' At Your Peril","isPartOf":{"@id":"https:\/\/chiefexecutive.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage"},"image":{"@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage"},"thumbnailUrl":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg","datePublished":"2024-10-24T18:57:25+00:00","dateModified":"2024-10-24T18:59:10+00:00","description":"Want to avoid becoming the next AT&T, Sony or Colonial Pipeline? The head-in-the-sand approach won't cut it.","breadcrumb":{"@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#primaryimage","url":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg","contentUrl":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/10\/AdobeStock_917756109.jpg","width":1068,"height":680,"caption":"AdobeStock"},{"@type":"BreadcrumbList","@id":"https:\/\/chiefexecutive.net\/ignore-the-dark-web-at-your-peril\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chiefexecutive.net\/"},{"@type":"ListItem","position":2,"name":"Ignore The &#8216;Dark Web&#8217; At Your Peril"}]},{"@type":"WebSite","@id":"https:\/\/chiefexecutive.net\/#website","url":"https:\/\/chiefexecutive.net\/","name":"ChiefExecutive.net","description":"","publisher":{"@id":"https:\/\/chiefexecutive.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chiefexecutive.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chiefexecutive.net\/#organization","name":"Chief Executive Group","url":"https:\/\/chiefexecutive.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chiefexecutive.net\/#\/schema\/logo\/image\/","url":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2018\/05\/logo_8202.png","contentUrl":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2018\/05\/logo_8202.png","width":820,"height":180,"caption":"Chief Executive Group"},"image":{"@id":"https:\/\/chiefexecutive.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/chiefexecutivegroup","https:\/\/x.com\/ChiefExecGrp","https:\/\/www.linkedin.com\/company\/chief-executive-magazine\/"]},{"@type":"Person","@id":"https:\/\/chiefexecutive.net\/#\/schema\/person\/0a03728b6221a55fcbf8c808dd8f55d2","name":"Scott Allendevaux","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chiefexecutive.net\/#\/schema\/person\/image\/","url":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/07\/scott-allendevaux_avatar-96x96.jpeg","contentUrl":"https:\/\/chiefexecutive.net\/wp-content\/uploads\/2024\/07\/scott-allendevaux_avatar-96x96.jpeg","caption":"Scott Allendevaux"},"description":"Scott Allendevaux, LP.D., CISSP, CIPP\/US, HCISPP, CIPT, CIPM is senior practice lead of law and policy at Allendevaux &amp; Company, a data protection agency.","url":"https:\/\/chiefexecutive.net\/author\/scottallendevaux\/"}]}},"_links":{"self":[{"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/posts\/349951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/users\/29994"}],"replies":[{"embeddable":true,"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/comments?post=349951"}],"version-history":[{"count":0,"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/posts\/349951\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/media\/349952"}],"wp:attachment":[{"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/media?parent=349951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/categories?post=349951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chiefexecutive.net\/wp-json\/wp\/v2\/tags?post=349951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}