|
Tell us how you feel! Take a very brief 10-question survey on Kaseya product documentation (available 5/22–6/5).
|
Identified method used to capture/ steal data: how was the data stolen or compromised?
- Tested: the compromised data was tested to determine if it is live/active;
- Sample: the compromised data was posted to prove its validity;
- Keylogged or Phished: the compromised data was entered into a fictitious websiteor extracted through software designed to steal PII;
- 3rd Party Breach: the compromised data was exposed as part of a company’s internal data breach or on a 3rd party Website;
- Accidental Exposure: the compromised data was accidentally shared on a Web, social media, or Peer-to Peer site;
- Malicious / Doxed: the compromised data was intentionally broadcast to expose PII.
^
Copyright © 2025 Kaseya Limited | Privacy Policy | Edit Cookies | Website Terms of Use