Repeated posts from a Twitter handle with only two followers is posting brags about the breach of your company and claims that all the stolen records were posted on the dark web.
How do you respond?
Make your selection from the items below.
The team is now searching the dark web for these records, which may risk a further breach without the necessary security equipment.
Great! The team is looking into the handle to see if it is legitimate or not. On to the next issue!
Sounds good. You have bigger things to worry about than a Twitter troll — unless of course, it’s the true cybercriminal behind the breach.
To experience Breach Breaker on your mobile device, please rotate your device to the landscape position.