CyberHygiene™ Process

CyberHygiene™ uses CyberRETINA™ Artificial Intelligence (AI) engine. CyberRETINA™ AI engine is built specifically to scan the dark web and index our customer’s data only.

CyberHygiene™ does not currently account for media of any sort and do not index X-rated data such as child porn.


  • CyberHygiene™ crawls and finds out what breached data exists on the dark web.
  • CyberHygiene™ continuously crawls the dark web to search for new breached data.
  • CyberHygiene™ tracks locations of known breached data for referencing.


CyberHygiene™ indexes the breached data it has located. CyberHygiene™ learns and understands the breached data and then indexes the breached data. CyberHygiene™ only indexes breached data relevant to our customer.

Serving™ provides notifications and alerts to customers’ organizations whose data is found and indexed on the dark web. CyberRETINA™ AI tool presents this information in form of a report indicating what breached data was found.

  • Emails
  • Passwords
  • DOB
  • Usernames
  • SSNs
  • Where the data was breached
  • Domain account that were affected in the data breach
  • Other


CyberHygiene™ provides written remediation steps based on the NIST (National Institute of Standards) Cybersecurity Framework (CSF).

Additional Services

  • Cybersecurity awareness training

    These are specially designed session for the organization’s executives and members of staff. Each session provides real-life use cases and scenarios on the emerging cyber threats and practical risk management strategies, tactics, and operations to manage cyber threats.

    We offer:

    • Executive session

      High-level interactive governance, compliance, and risk-based sessions.

    • End-users session

      In-depth and operations-based sessions

  • CSRAM (Cyber Security Resiliency Assessment Model)

    A policy-driven risk management framework that provides visibility to the business threat landscape to address current and future business threats and assists organizations in designing and implementing threat hunting and risk mitigation strategies.

  • CSRAM (Cyber Security Resiliency Audit Model)

    The audit entails a review of the design and management of policies, procedures, and operations of IT infrastructure to determine the effectiveness of IT governance and operations and establishes performance measurement for improvement.

  • Cyber Security Governance Framework

    This entails the design and development of policies and procedures that direct the planning, delivery, and evaluation of technology services and assists with the implementation of information security practices designed to protect and secure Information Technology (IT) resources and infrastructure in compliance with relevant regulations.