PII Exposure Feed

Create a feed to monitor for Personally Identifiable Information (PII) exposed on the web

Overview

The PII Exposure Feed is designed to create a feed to monitor for Personally Identifiable Information (PII) exposed on the web. It's a crucial tool for data protection, compliance, and risk management.

Functionality:

  • Scans various online sources for exposed PII, including social media, forums, dark web, and data breaches.

  • Essential for identifying and mitigating risks associated with exposed personal or sensitive information.

  • Provides alerts and insights when new instances of exposed PII related to your monitoring criteria are detected.

Benefits:

  • Helps in protecting against identity theft, fraud, and other malicious activities that can arise from exposed PII.

  • Supports compliance with data protection regulations by enabling proactive monitoring and response to potential data breaches.

  • Enhances overall cybersecurity posture by identifying and addressing data exposure risks promptly.

How-to Use:

  1. Define the specific types of PII you wish to monitor for exposure, such as names, email addresses, or identification numbers.

  2. Set up the PII Monitor with these parameters to start tracking for exposed personal information.

  3. View events in the Console. Utilize the discoveries to take immediate action on any detected exposure, thereby mitigating potential risks and ensuring data protection.

Creating a PII Exposure Feed

Status

  • Enabled: Activates the monitor.

  • Disabled: Deactivates the monitor.

Feed Name

  • Assign a unique and descriptive name for the monitor.

Use Case

  • Select the relevant use case to tailor the monitoring to specific needs, such as Fraud Detection, Insider Threat Detection, Regulatory Compliance, etc.

Tags

  • Add relevant tags for categorization and easier searching.

Send Data To

  • Choose a destination for the data. Options include specific monitors or a default location.

PII Identifiers

  • Define the specific PII elements to be monitored, such as Social Security Numbers, Email Addresses, Phone Numbers, etc.

Must Contain

  • Specify additional keywords or phrases that must be present in the collected data for it to be relevant.

Must Not Contain

  • List keywords or phrases to be excluded from monitoring to filter out irrelevant data.

Purpose

  • The primary objective is to identify and alert on the exposure of PII, aiding in the prevention of data breaches and identity theft.

Best Practices

  • Regularly review and update the PII identifiers and filters based on emerging threats and evolving data privacy regulations.

  • Continuously assess the data collected and adjust the monitor settings to refine the monitoring process.

  • Collaborate with legal and compliance teams to ensure alignment with data protection laws and policies.