Skip to main content

Using the Breach Tracker to Catch the Attention of Prospects

Set up Breach Tracker in your Cyber Score campaigns so you get alerts when your prospects or clients show up in a new dark web breach.

Michael Bakaic avatar
Written by Michael Bakaic
Updated over 2 months ago

Let me tell you how our Breach Tracker feature works. We developed this to provide you with timely information, allowing you to act quickly when new dark web breaches affect companies you're engaged with.

The core idea is straightforward: you identify the companies (prospects or clients) you want us to monitor via a Cyber Score campaign. When employees from those companies appear in a newly published dark web breach, we notify you. This gives you a relevant, immediate reason to reach out and provide value, positioning you as a proactive cybersecurity advisor.

Here are the steps to enable and use Breach Tracker:

Step 1: Prepare Your Cyber Score Campaign

  • First, you need to work within a Cyber Score campaign. You can either create a new campaign for this purpose or use an existing one.

Step 2: Add Company Domains

  • Make sure the campaign includes the domains of the specific prospects or clients you intend to monitor with Breach Tracker.

  • You will typically load a CSV list containing these domains into your selected campaign.

Iceberg Cyber dashboard displaying 'Accountants Charlotte' campaign with company list, breach counts, and cyber scores; export button highlighted.

Step 3: Activate the Breach Tracker Feature

  • Go into the settings for that specific Cyber Score campaign.

  • You will see a toggle switch labeled "Breach Tracker" on the right side of the Campaigns list on the Dashboard page

  • Switch this toggle to the "ON" position.

Step 4: Understand the Monitoring and Notification Process

  • Enabling Breach Tracker activates monitoring for the domains within that campaign.

  • Our system checks these domains against each new dark web breach as it is published.

  • If we find employees from a monitored domain listed in a new breach, the system generates an email notification that is sent directly to you (or your designated account contact).

  • The notification will specify which company was impacted, for example: "Acme Dental was included in this morning's dark web breach."

Step 5: Utilizing the Notification for Outreach

  • Treat this email notification as actionable intelligence. The key is the timeliness.

  • Contact the decision maker at the affected company. Choose the outreach method that makes sense for your relationship (email, phone, LinkedIn, etc.).

  • When you reach out, focus on being helpful. You might say something along these lines:

"Hi [Contact Name]. As part of our cybersecurity monitoring [adjust based on prospect vs. client], I check for new dark web breaches related to your domain. It appears some employees were included in a breach reported today. I wanted to inform you promptly and offer some guidance on immediate steps they should take..."

  • Providing actionable advice in this situation is crucial. Remember to follow up. This approach demonstrates your commitment to their security and helps build trust, establishing you as their cybersecurity advisor – particularly valuable when engaging prospects before they've signed on.

Application for Existing Clients:

  • This feature is equally valuable for monitoring your existing clients. It provides another touchpoint to discuss their security posture proactively.

The Bottom Line:

Setting up Breach Tracker automates an important monitoring function, freeing you up to focus on the strategic outreach that builds relationships and demonstrates your expertise when it matters most.

Did this answer your question?