The faster an identity breach is detected, the faster an organization can take steps to reduce the impact of the data breach. Faster detection times and notifications to impacted staff and organizations can result in lower data breach recovery costs and help save a company’s reputation.
Identity breaches are a type of data leak in which employee identities and credentials have been stolen or exposed, which could potentially cripple an entire organization or cause severe financial and reputational damage. With billions of pages on the internet to scan, it’s imperative for organizations to employ an internal identity breach detection tool or service, such as UpGuard Breach Risk.
UpGuard offers an Identity Breach module within its Breach Risk product to help organizations identify any third-party identity breaches that have been exposed on the internet, what information has been exposed, and the scope of the security breach.
An identity breach is a cybercrime attack where a hacker or cybercriminal obtains sensitive information, like personally identifiable information (PII), social security numbers, financial information, credit card information, login credentials, or medical and patient data, through criminal means. Threat actors may use any number of methods to breach identities, most commonly through:
Once the identity has been exposed or stolen, hackers can use the stolen legitimate credentials to access an organization’s most important data. Once the hacker is in the network and systems, it can be much harder to detect as access will seem legitimate and authorized.
Identity breaches and identity theft are very similar, with one major difference — breaches are typically much wider in scope and are carried out using cyber attack means. Breaches can affect entire companies when employee credentials have been exposed, and organizational systems and assets are put at risk. If sensitive data is successfully stolen or exfiltrated, cybercriminals can attempt to ransom that data back to the business, sell it on the dark web, or expose it to the public.
Identity theft is typically confined to a single individual where stolen personal data is used to commit fraud or theft. Although the impact is usually much smaller, identity theft damage can still be extremely severe, depending on the status of the compromised individual. In most cases, identity thieves seek to steal identities for monetary reasons.
Identity breaches can occur through various physical or digital methods so it’s important to recognize early signs of a breach so that you can report it to the relevant authorities and company executives. Some of the most common signs a breach has affected you are:
Having a dedicated cybersecurity solution to manage internal attack surfaces can help companies detect identity breaches much faster, save countless hours, and most importantly, prevent costly recovery and remediation from exposed data. Dedicated solutions, such as UpGuard Breach Risk, help organizations gain better visibility of their entire risk profile, allowing them to initiate risk mitigation and remediation processes early on.

UpGuard Breach Risk’s Identity Breach module crawls the internet for third-party data breaches and identifies where an employee’s credentials have been exposed in real-time. All identified matches are automatically populated within the module including the following data points:

Each potential identity breach report is classified by four main risk severity levels:
Each breach is labeled with the highest severity of the data that has been exposed — multiple instances or data types of Low severity and one instance of Critical severity from one breach will be classified as a Critical-level breach.

Under the Identity Breaches module, there are three ways to view the data:
The “View by breach” tab can show a comprehensive list of all the instances of identity that may have been exposed within the organization. Each individual breach contains a list of all the email addresses that are involved with the exposure, including pertinent breach details, such as severity, employees involved, current breach status, and type of data exposed.
Companies will have the option to archive or ignore a specific breach using the “Archive breaches” button if they feel that the identified breach is not a risk.

Instead of viewing each breach, UpGuard users can organize the Breach Report by viewing all of the email addresses that are part of the data breach. The “Exposed Email Address” list will exclude all related email addresses from the specific breach that has been archived and ignored.
In some cases, email addresses will be associated with multiple breaches, which users will be able to view once they select the email address in the list. Users will also be able to use the “Ignore email addresses” button to remove any emails that are no longer active or relevant, such as those from former employees or deactivated emails. Each email in the list will have a “Notify Employee” button to send a message to the affected employee about the compromised email.

VIP lists can be tagged from the email or breach views or manually added to see how much identity breaches the email was involved in and the severity level of the breach. Users can click the "Add emails" button in the top right to manually add VIP entries
Notifications can also be configured and set up to automatically notify any VIPs if they are involved in a breach.

The view in the dashboard under Identity Breaches can be configured to show or hide columns using the “Show Fields” button on the right hand side. Currently, users can filter the view through six fields:

Users that want to share individual Identity Breach reports internally can export them as a PDF document or Excel sheet.
To do so, users must first click into the specific breach they want to export and click the “Export” button in the top right. Users will then have the option to choose between exporting as a PDF file or an Excel document. Additional options include setting up a recurring report and report delivery via email.
