Security Program Controls/Technologies, Channel partners, Content

ITRC Launches Free Breach Clarity Consumer Identity Safety Tool


The Identity Theft Resource Center (ITRC) has launched Breach Clarity, a free tool that teaches consumers about data breaches and their impact. ITRC announced Breach Clarity at the KNOW Conference in Las Vegas, Nevada.

Breach Clarity uses an algorithm based on ITRC's proprietary database of publicly available and notified data breaches. It updates as new information about data breaches becomes available, ensuring consumers can understand how they may have been impacted by recent breaches.

How Does Breach Clarity Work?

Consumers can search the Breach Clarity database to access data breach notifications and insights. That way, consumers can understand the short- and long-term effects of a data breach and take the necessary steps to safeguard their critical data.

For example, if a consumer receives a data breach notification, he or she can enter the name of the breach into Breach Clarity. This consumer then can receive details about the breach and what to do if he or she was affected by it.

Breach Clarity is now available. Also, ITRC will offer webinars to teach consumers how to use the tool and address questions from the public.

What Does Breach Clarity Mean for MSSPs?

Breach Clarity provides a valuable tool that MSSPs can use to teach their customers about data breaches.

MSSPs can use Breach Clarity to keep organizations up to date about data breaches. It also could help MSSPs highlight the impact of data breaches to their customers so they can identity and address cyberattacks before they escalate.

Symantec Introduces Free VPNFilter Malware Tool

In addition to Breach Clarity, other free tools are available to help consumers keep pace with cyberattacks.

For example, Symantec last year launched VPNFilter Check, a free tool that consumers and organizations can use to determine if a router may be impacted by VPNFilter malware. VPNFilter Check checks to see if a router has been compromised by a specific component used by VPNFilter; however, if it finds that a router is not infected by this component, the device may still be compromised by other VPNFilter threats or components.

Dan Kobialka

Dan Kobialka is senior contributing editor, MSSP Alert and ChannelE2E. He covers IT security, IT service provider business strategies and partner programs. Dan holds a M.A. in Print and Multimedia Journalism from Emerson College and a B.A. in English from Bridgewater State University. In his free time, Dan enjoys jogging, traveling, playing sports, touring breweries and watching football.