Select Free Check Service
Politically Exposed Person (PEP)
Sanction
Adverse Media
Know Your Business (KYB)
Compromised Email
AML Risk Assessment
Find out what hackers already know about you. This free email compromise check allows you to analyse how secure your profile is on websites where you have shared your email.
Check if your email has been compromised in a data breach.
Good job!
your email address is not associated with any data breaches.
- {{#each breaches}}
- See AlsoMyChart - Login PageSomalia’s flag didn’t inspire Minnesota’s state flagYandex Mail — reliable and easy to use email with spam protectionHow Can I Check My Email Inbox? - We List All Methods
{{title}}
{{domain}}
Breach Date
{{breachDate}}
Compromised data
{{dataClasses}}
{{title}}
{{{domainLink}}}
Breach Date
{{breachDate}}
{{{changePasswordLink}}}
Breach Data
{{{description}}}
Compromised Data
{{{dataClassesHTML}}}
Source: haveibeenpwned.com
{{/each}}
Source: haveibeenpwned.com {{#if has_paging}}
{{/if}}
Our Services
PEP Screening
Access our comprehensive data sets, which have been compiled from over 20,000 government sources, allowing you to identify politically exposed persons and their close associates.
Learn More
Sanction Screening
Screen against thousands of government regulatory and law enforcement watchlists, and over 100 International and National Sanctions lists that are updated daily.
Learn More
Know Your Business Check
Primary source company intelligence via Know Your Business (KYB) Solution. Access primary source,company intelligence to optimise your KYC processes.
Learn More
AML Consulting Service
Work with our accredited advisers to assess the money laundering and terrorism financing risk toyour business.
Learn More
ID Verification (IDV)
Reduce the time and effort associated with sighting and collecting physical copies of IDs by verifying them against their issuing sources using NameScan’s ID Verification service.
Learn More
What is a data breach?
Data breaches occur when personal information is accessed or disclosed without authorisation. Every year, millions of sensitive online details such as usernames, passwords and email addresses are compromised in cyber attacks from hundreds of sites around the world. These stolen details are published and sold on the dark web, where criminals can use them to gain access to your sensitive information. Other forms of this phenomenon include unintentional information disclosure, data and information leaks, and data spill.
How does a data breach affect you?
Being involved in a data privacy breach does not necessarily mean your identity has been stolen. It is important, however, to know what type of information may have been stolen and the impact such breaches can have on you. Name, Date of Birth, Email, Usernames, Phone Numbers, Residential Address. Your name and date of birth may seem like insignificant information but losing it to hackers can have a significant impact on your life. Hacked information can be used for social engineering attacks to gather additional information and build up a complete profile of you, and your identity has been stolen.
Financial Loss
Hackers can use the stolen data to potentially apply for credit cards, medical benefits, and lodge your tax returns.
Identity Theft
A more severe data breach can lead to identity theft. Hackers can utilise information found through data breaches to open bank accounts, set up utilities and tarnish your credit report.
Compromised Public Image
Hackers can also use this sensitive data to trick you into thinking they have videos and images of you in a compromising position, requesting payment to stop the content being uploaded.
How to create a strong password?
The key to your online security is to have a strong password, but the challenge is to create distinct passwords that reduce your risk of exposure to cyber attacks. When it comes to creating a strong password, there are several aspects to keep in mind.
Make It Long
This is the most critical factor when generating a new password. The longer the better, always try and create a password that is at least 15 characters long.
Mixed Characters
The more you mix characters, the tougher it is for hacking software to guess your password. Use a mixture of upper and lower case letters, numbers and special characters to make your password harder to crack.
What should you avoid when creating a password?
Memorable Keyboard Paths
Do not use sequential keyboard paths such as (qwerty, or asdfgh). These sequential passwords make it very easy for hacking software to decode your password.
Personal Information
Avoid using information that may be easily available. Information such as your date of birth, first and last names, children or pet names and phone numbers.
Common Passwords
Passwords such as 12345, password, abc123, and iloveyou are more common than you think. Avoid using passwords like the ones previously mentioned as they can be easy to decode.