Sample Report Preview
This is a sample of our Account Exposure Report, powered by verified public datasets.
Want this automated for your company (recurring scans, deltas, ticketing, and user notifications)? Contact us for pricing & implementation.
Email Exposure Report
Generated: 2025-08-17 18:00
Scope: company email addresses checked against verified public exposure datasets (HIBP). Recency and presence of passwords drive priority.
Executive Summary
Emails Scanned
58
Addresses with Exposures
14
New Since Last Report
3
Entries Involving Passwords
9
Risk Grade: B
Grade considers total exposures, password involvement, and recency (greater weight to 2024–2025 incidents).
Address Overview
| Exposure Count | Highest Severity | Latest Incident | Priority | |
|---|---|---|---|---|
| alice@company.com — new | 2 | High | 2025-07-22 | Reset & MFA |
| bob@company.com | 1 | Medium | 2024-11-14 | Enforce MFA |
| carol@company.com | 3 | High | 2025-03-03 | Reset & Review |
| ceo@company.com | 0 | None | – | Monitor |
| dave@company.com | 2 | Medium | 2023-12-02 | Confirm MFA |
| finance.ap@company.com | 1 | High | 2025-05-09 | Reset & Audit |
“High” usually indicates passwords present in the dataset (even if hashed) and/or very recent discovery.
Exposure Details
alice@company.com – 2 exposures (latest: 2025-07-22)
-
Source of Leak: AcmeForum (2025-07-22) — Data: Email, Passwords (hashed), IP
Notes: Recent; common target for stuffing. Treat as credential exposure.
- Suggest: Immediate password reset; invalidate active sessions.
- Enforce MFA; review sign-in logs for anomalies.
- Check inbox rules/forwards.
-
Source of Leak: GraphicTools (2024-04-18) — Data: Email, Names
Notes: No password field indicated; lower urgency.
bob@company.com – 1 exposure (2024-11-14)
-
PhotoCloud (2024-11-14) — Data: Email, Partial Passwords (hashed)
Notes: Reinforce MFA; check for reuse.
carol@company.com – 3 exposures (latest: 2025-03-03)
-
DevHub (2025-03-03) — Data: Email, Passwords (hashed), 2FA flag
Notes: Contains credential material; assume reuse risk.
-
LearnPro (2024-06-09) — Data: Email, Names, Company
Notes: No password data in dataset.
-
LegacyBoard (2023-09-21) — Data: Email
Notes: Older; keep for historical context.
finance.ap@company.com – 1 exposure (2025-05-09)
-
InvoiceShare (2025-05-09) — Data: Email, Passwords (hashed), API tokens (revoked)
Notes: Finance role; prioritize reset, check vendor portals, and review mailbox rules.
ceo@company.com – 0 exposures
No known public exposure records as of report time.
Recommendations
- Mandatory MFA across email, VPN, finance, and admin portals.
- Immediate resets for any addresses with password-related exposures; revoke sessions.
- Block password reuse (SSPR/Conditional Access + banned password list).
- Enable sign-in risk alerts (impossible travel, atypical locations, token theft indicators).
- User notification with neutral, action-focused wording; track completion.
Methodology & Privacy
- We query exposure metadata only; no passwords are collected or transmitted.
- Priority blends recency and whether passwords were present in the dataset.
- Dates reflect dataset disclosure, which can differ from incident occurrence.
Contact us for pricing & implementation of this service..