Skip to main content

Search by Threat: Needles in the haystack

Search by Threat & Tech allows you to seek out specific threats and technologies in your book for purpose of systemic risk or emergent threat analysis.

Updated over a week ago

1. Selecting the Pre-Claim Intervention module from the sidebar.

2. Navigate to the Search by Threat & Tech feature to identify entities exposed to specific threats or technologies.

3. Use the threat selection dropdown to pick a cybersecurity threat to investigate within your portfolio.

4. Press Enter or select a threat to review its technical details and understand the risk it poses to your portfolio entities.

5. The AFFECTED and VERIFIED SAFE tables are empty, so no entities are affected by the selcted threat.

6. Let's check another threat.

7. None are displayed. So far so good.

8. Let's try another.

9. Let's try this Fortinet Vulnerability

10.

An entity was found as VERIFIED SAFE.

This means that although some cyber tools would show this entity as "affected," BreachRisk™ a.i. has found evidence that the entity has either blocked the attack with another security control, or the attack pathway is impractical to conduct. This is a good thing.

11. Because this entity is VERIFIED SAFE, you would frustrate the broker or policyholder if you reported this issue. So be careful to not report this entity for intervention.

12.

No entities are AFFECTED.

If an entity was affected, consider working with the broker and policyholder to correct before hackers can find and exploit the attack pathway.


Did this answer your question?