Thank you for taking the time to complete our onboarding form

The information you have provided is exactly what we need to start monitoring and protecting your business online.

deco-blob-1 decoration
graphical divider

 

DarkSub Monitoring

If our teams need any additional information, we will reach out directly to the contact person you specified. Otherwise, you will receive an email in the next 24-48 hours once your digital monitoring has been expertly setup and activated.

How Does Setup And Activation Work?

Thank you for trusting us with your business monitoring. We are committed to helping SMB fight cybercrime effectively and affordably.

Our security team review your information and create custom detection rules specifically tailored to your business unique digital footprint.

The process works as follows:

  1. Initial Review: Our team verifies we have all the necessary information required for comprehensive rule creation
  2. Custom Monitoring Setup: We develop specific detection rules that focus on your business and potential threat patterns
  3. Quality Assurance Testing: We conduct thorough scenario testing to eliminate false positives and ensure accurate threat detection
  4. System Activation: Your protection is fully implemented and activated typically within 24-48 hours of your submission
  5. Confirmation Notification: You will receive a status update confirming your monitoring is active and working to protect your business

When Will I Receive Notifications?

You will receive notifications whenever our system detects a potential threat to your brand or digital assets. Here is how our alert process works:

Alert Notification Process:

  1. Initial Detection: Our automated system identifies suspicious activity and immediately sends an alert to the DarkSub Cyber Triage Team for review.
  2. Threat Analysis: Our security team conduct a risk assessment to evaluate the threat severity, identify potential threat actors and determine the possible business impact.
  3. Priority Notification: You receive a detailed alert summary with actionable information including the nature of the threat, origins and region-specific guidance tailored to your business needs.
  4. Ongoing Support: Our team remains available to answer questions and provide additional guidance as you address the identified threat.

We place priority on notifications based on threat severity to ensure you are immediately informed about critical issues while less urgent detections are bundled into regular reports to avoid alert fatigue.

What if no alerts occur?

That is typically a good sign! No alerts mean our monitoring has not detected any suspicious activities targeting your brand. Here is what you should know:

  • Regular Updates: Even without alerts, we will send you monthly news updates with security tips to help you stay informed and protected.
  • Staying Vigilant: According to recent data, small businesses face an average of 31 cyberattack attempts per day - so it is important to stay alert, aware and up to date.
  • Protection Value: The average cost of a data breach for small businesses in the US is $25,612. Your proactive monitoring is helping you avoid these potential costs.
  • Continuous Monitoring: Our systems continue working 24/7 in the background so you can focus on running your business.

Remember that cybersecurity is an ongoing process. While no alerts is a positive sign, maintaining your protection is essential as threats continuously evolve and monitoring alone cannot catch every threat. It is important to always follow security basics: keep systems updated, rotate passwords, use two-factor authentication, be aware of malicious actors, train staff in cybersecurity and secure your local systems.

Next Steps While You Wait

While we set up your monitoring, here are some valuable resources to explore:

icon

Emergency Contacts

Know who to contact if you experience a security incident. Our team is ready to assist even during your setup period.

Security Response Guide
icon

Security Events

Discover upcoming cyber security conferences in your region. Connect with experts and stay informed about the latest security trends.

View Events Calendar
icon

Technical Glossary

Get Familiar with industry terms sometimes used in reports and online. Learning language can help you get the most from our service.

Browse Glossary