<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4832873&amp;fmt=gif">

FAQ

Cyber security can be difficult to understand and it can surely spark a lot of questions. Do you wonder about our platform, on how we find leaked data, who our partners are or maybe who has invested in us - you can find the answer right here! And if not, don't hesitate to contact us

Find questions and answers here below. 

Can I sign up and become a customer at Defentry?

This can be a bit tricky to understand, but we will do our absolute best to explain. The first thing to know, is that our customers and our users are not the same. 

Our customers are often larger companies, mostly within the insurance or security business. They offer a service to their customers where the Defentry platform is included in that service.

So our platform and service is then used by individuals and small and medium enterprises that we help. 

So, if you are using our platform you are a customer to one of our partners that is offering Defentry as a service to you. Or if you are not yet a user of the Defentry platform, you can get access to our cyber security  service by becoming a customer to one of our partners. 

What can Defentry help me with?
We monitor your personal data and credentials to spot any unusual activity. We alert you if your personal data has been leaked or involved in a hacker attempt. We teach and educate you in cyber security and how to avoid identity theft. And we support you through our platform if you would become exposed to fraud during your usage of our platform. 
What does cyber security mean?

The mening of cyber security is wide and can mean a lot of things, but ultimately it is how safe you and your personal data is online. If you have poor cyber security, there is a bigger risk to become a victim of identity theft, online fraud and cyber crime.

How do I stop my service with Defentry?

We sell our platform to companies which then offer it to their customers as a service. So, if you are a user of our platform then you are a customer of one of our partners.

Some of our partners offer our service individually and some as a package deal included in their own service to their customers. To cancel your service with us, you therefore need to contact the company that has offered you the service so that they can help you.

What happens when data is leaked?

A hacker attack can come in many different shapes and forms. It can be someone trying to target a certain person and get a hold of his/hers social security number, try to take loans or ordering things in their name.

But it can also be a larger attack targeting a company, either to hurt the company itself or for example get a hold of their customers e-mail addresses to then sell for commercial purposes.

Either way, it’s very difficult, not to say even impossible, to secure yourself from this kind of attacks which is why a technical solution is perfect to monitor and alert when personal information data is leaked.

What sources do you use to know that personal data has been leaked?

We gather our information from governmental, credit and bank data. We also monitor the non indexed or searchable part of the Internet, both the deep web and the dark web, since this is an ideal marketplace for stolen information.

We have created a market leading, real time Dark Web Monitoring System that’s integrated with our product.

How fast after a hacker attack or leak will Defentry alert?

We alert in realtime, so in other words super fast. As soon as a leak or hacker attack occurs, we alert our users in our app and send an email right away.

The hacked personal information data is not always used right away by the identity theif, which then gives our users the possibility to take the appropriate action even before the big damage is done.

Who are the owners of Defentry?

Do you want to know more about our team, founders  and the history of Defentry? Read more and https://www.defentry.com/about-us 

How is Defentry funded?

Investors are:

  • Founder and CEO Christer Hernestig
  • Founder and CCO Farid Lalami
  • Spintop Ventures
  • Private investor Jan Wäreby
  • Private investor Pontus Lesse
  • Private investor Peter Carlsson
  • Private investor Göran Hesseborn
  • Private investor Henrik Davidsson
  • Private investor Oskar Norin
  • Private investor Dan Egerstad
  • Private investor Adam Ljungrell
Can I buy stocks or invest in Defentry?

Defentry is still an unlisted company and right now there is not possible to buy stocks on the open market. 

If you are a private investor or a venture capitalist and wish to invest in Defentry, please contact us

How is the data you share with us kept safe?

1. Encryption. We encrypt the user data both in transit (when it is being sent over the internet) and at rest (when it is stored on servers or devices). This means that only you can see it.

2. Verifications. Any data that is part of a leak can not be viewed by anyone other than the person that owns a verified email address or telephone number connected to the leak.

3. Audits. We do regular auditing and testing of the systems and networks to help identify and address vulnerabilities before they can be exploited.

4. Compliance. We comply with regulations such as GDPR and standards like CIS18.
Security training. We have continuous employee training on best practices and company's security policies to avoid human error.

Are passwords stored in the app?
No. When you get a breach alert where your password is included we actually don’t have that password stored in the app. Instead it’s fetched encrypted and only shown to you because you’ve verified that you are the owner of the email or phone number connected to the password.
What does it mean to lock my credit and when should I do it?

We recommend locking your credit if you are a victim of identity theft. With Defentry, you're able to instantly lock your credit at Bisnode, Creditsafe, UC, Syna and Decidas with the press of a button.

Locking your credit restricts unauthorized access to your credit report and prevents identity thieves from opening new accounts, such as credit cards and loans, in your name. Placing a lock will not impact your credit score, but remember to unlock your credit information for any credit applications.

The warning signs of identity theft often reveal themselves following incidents like data breaches, phishing scams, social media impostor scams, theft of your social security number, theft of your driver's license, and physical theft of your wallet or smartphone. 

What is the Dark Web?

The Dark Web is a part of the internet that is not indexed by traditional search engines, and is therefore not easily accessible to most people. It can only be accessed using specialized software, such as the TOR network, which allows users to browse anonymously.

The Dark Web is often associated with illegal activities, such as the sale of drugs, weapons, and stolen personal information. However, it is also used by journalists, activists, and individuals seeking privacy to communicate and share information securely.

One of the main features of the Dark Web is its anonymity. Users are able to communicate and share information without revealing their identities, as all data is encrypted and transmitted through a series of servers, known as "onion routing." This makes it difficult for law enforcement to trace the origin of any illegal activities or to identify individuals participating in such activities.

Despite its reputation for illegal activity, the Dark Web is also home to a number of legitimate websites, including forums, marketplaces, and social media platforms. These websites are often used to discuss and share information on a wide range of topics, including politics, technology, and culture.

It is important to note that accessing the Dark Web carries certain risks, as it is not regulated and there is a high potential for fraudulent or malicious activity. It is advisable to use caution when navigating the Dark Web and to be aware of the potential risks.

Overall, the Dark Web is a complex and often misunderstood part of the internet that can be used for both legitimate and illegal purposes. It is important to be aware of its existence and to use caution if accessing it.

How does a hacker get your information?

Hackers can obtain your personal data through a variety of methods, including phishing scams, malware attacks, and data breaches. Once they have your data, they can sell it on the Dark Web, a part of the internet that is not indexed by traditional search engines and can only be accessed using specialized software.

On the Dark Web, there are various marketplaces where hackers can sell your personal data, such as your name, address, social security number, and credit card information. These marketplaces are often used by other criminals to commit identity theft or fraud.

Hackers may also use your personal data for their own gain. For example, they may use your credit card information to make purchases or use your social media accounts to spread spam or malicious links.

It is important to protect your personal data by using strong passwords, being cautious when sharing personal information online, and regularly checking your credit report for any unauthorized activity. It is also a good idea to use a secure, encrypted messaging app and to keep adding things to monitor here on Defentry.

What are data leaks?

A data leak is when personal or sensitive information is accidentally or intentionally released to the public without permission. This information can include things like names, addresses, social security numbers, and credit card information. Data leaks can happen in a variety of ways, such as through data breaches, malware attacks, or human error.

Data leaks can have serious consequences for individuals and organizations. For individuals, a data leak can lead to identity theft or fraud, as well as damage to their reputation. For organizations, a data leak can result in financial losses, legal liabilities, and harm to their reputation.

Using Defentry is one action to protect yourself against data leaks, but it is also important to use strong passwords, be careful when sharing personal information online, and use security measures like encryption and two-factor authentication. 

What should I do if my information has been leaked?

Password. If your password has been leaked,  there are several steps you should take to protect yourself:
1. Go to the website or service where your password was leaked and change it to a strong, unique password.
2. Make sure to change the password everywhere else, where you use the same one. Never reuse passwords.
3. Enable two-factor authentication (2FA). Many websites and services offer 2FA, which adds an extra layer of security to your account by requiring a code sent to your phone or email in addition to your password.
4. Consider using a different email address for important accounts.
5. Consider using a password manager.  A password manager can help you create and store strong, unique passwords for all of your accounts.

Email address. If your email address has been leaked, it means that your email address is now publicly available and can be used by cybercriminals to send you spam or phishing emails. To protect yourself, you should take the following steps:
1. Be extra cautious when opening emails or clicking links, especially if you don't know the sender.
2. If you receive any suspicious or unsolicited emails, mark them as spam or block the sender.
3. Consider creating a new email address to use instead of the leaked one.
4. If you think your account has been compromised, inform your email provider and follow their instructions.

Phone number. If your phone number has been leaked online, it means that it is publicly available and can be used by others to contact you.To protect yourself, you should do the following:
1. Be careful when answering calls or messages from unknown numbers.
2. Use call-blocking or text-blocking features on your phone to block unwanted calls or texts.
3. Consider changing your phone number if you are receiving a lot of unwanted calls or texts.
4. Monitor your phone bill for any unauthorized charges or suspicious activity.
5. Be extra careful in giving your phone number to unknown parties, and think twice before publishing your phone number on the internet.

User name. If your username has been leaked:
1. Change your password. A leaked username can be used in combination with a guessed or stolen password to gain access to your account.
2. Monitor your account for suspicious activity.
3. Enable two-factor authentication.
4. Be wary of phishing attempts. Scammers may try to use your leaked username to trick you into giving away sensitive information.
5. If sensitive information is involved, consider freezing the account and creating a new one.

Social Security Numbers. If your SSN has been leaked, there are several steps you should take to protect yourself from identity theft:
1. Contact the credit bureaus to place a fraud alert on your credit report. This will alert you if anyone attempts to open new accounts in your name.
2. Report the leak to the police, if it is a result of a crime, to ensure that it is investigated and to provide a record of the incident.
3. Keep a close eye on your credit report and look out for any suspicious activity, such as new accounts opened in your name.
4. Contact your bank and credit card companies to let them know about the leak and to monitor your accounts for suspicious activity.
5. Consider freezing your credit to prevent anyone from opening new accounts in your name.

Passport. If your passport has been leaked, you should take the following steps as soon as possible to protect yourself from potential identity theft or fraud:
1. Contact the governmental body responsible for issuing the passport and inform them of the situation. That way they can take any necessary measures to protect your driver's license, such as revoking or canceling it and issuing a new one.
2. Report the leak to the police, if it is a result of a crime, to ensure that it is investigated and to provide a record of the incident.
3. Keep a close eye on your credit report and look out for any suspicious activity, such as new accounts opened in your name.
4. Be wary of any unsolicited phone calls or emails that ask for personal or financial information, as they may be part of a phishing scam.
5. Consider freezing your credit to prevent anyone from opening new accounts in your name.
6. Get a new passport as soon as possible to ensure that your identity is protected and you can continue to travel.

Drivers license. If your driver's license has been leaked, you should take the following steps as soon as possible to protect yourself from potential identity theft or fraud:
1. Contact the governmental body responsible for issuing the license and inform them of the situation. That way they can take any necessary measures to protect your driver's license, such as revoking or canceling it and issuing a new one.
2. Report the leak to the police, if it is a result of a crime, to ensure that it is investigated and to provide a record of the incident.
3. Keep a close eye on your credit report and look out for any suspicious activity, such as new accounts opened in your name.
4. Be wary of any unsolicited phone calls or emails that ask for personal or financial information, as they may be part of a phishing scam.
5. Consider freezing your credit to prevent anyone from opening new accounts in your name.
6. Get a new driver's license as soon as possible to ensure that your identity is protected and you can continue to drive legally.

National ID. If your national ID has been leaked, you should take the following steps as soon as possible to protect yourself from potential identity theft or fraud:
1. Contact the governmental body responsible for issuing the ID and inform them of the situation. That way they can take any necessary measures to protect your driver's license, such as revoking or canceling it and issuing a new one.
2. Report the leak to the police, if it is a result of a crime, to ensure that it is investigated and to provide a record of the incident.
3. Keep a close eye on your credit report and look out for any suspicious activity, such as new accounts opened in your name.
4. Be wary of any unsolicited phone calls or emails that ask for personal or financial information, as they may be part of a phishing scam.
5. Consider freezing your credit to prevent anyone from opening new accounts in your name.
6. Get a new ID as soon as possible to ensure that your identity is protected.

Payment card. If your payment card has been leaked, you should take the following steps as soon as possible to protect yourself from financial fraud:
1. Contact your bank or card issuer immediately to report the issue and request a new card.
2. Report the leak to the police, if it is a result of a crime, to ensure that it is investigated and to provide a record of the incident.
3. Monitor your account for any unauthorized transactions.
4. Keep a close eye on your credit report and look out for any suspicious activity, such as new accounts opened in your name.

IBAN. If your IBAN (International Bank Account Number) has been leaked, you should take the following steps to protect yourself from potential fraud:
1. Inform your bank of the situation and ask them to take any necessary measures to protect your account, such as freezing it or issuing a new IBAN.
2. Keep a close eye on your account activity and look out for any suspicious transactions. Report any unauthorized transactions to your bank as soon as possible.
3. Be wary of any unsolicited phone calls or emails that ask for personal or financial information, as they may be part of a phishing scam.
4. If you have online accounts connected to your bank account, change the passwords for these accounts as soon as possible to prevent unauthorized access.

IP. If your IP address has been leaked, it means someone has obtained your IP address without your permission. This can happen through hacking, malware, or other means. To protect yourself, you should:
1. Change your IP address by resetting your router or contacting your internet provider.
2. Secure your router with a strong password and keep the firmware updated.
3. Use a VPN to hide your IP address and encrypt your internet connection.
4. Check your device for malware and remove it. 

It's important to note that a leaked IP address alone can't be used to steal your personal information or cause damage to your device, but it could be used to track your online activities, launch targeted attacks on your network or device.

Didn't find the answer you were looking for?