NordVPN’s Dark Web Monitor feature continuously monitors your email address for potential data leaks, which might include passwords or other sensitive personal information, and alerts you once a threat is detected on the web. In this article, you will learn how to enable NordVPN's Dark Web Monitor and what to do if you get a notification that your data has been breached.
Windows & macOS
If you wish to enable Dark Web Monitor and track the status of your monitored data, follow the steps below:
- Open your NordVPN application.
- Click the Dark Web Monitor button:
-
Enable Dark Web Monitor:
- Check the websites where your data was leaked:
If you see that your data has been leaked, make sure to safeguard your data by following the steps later on in the article.
iOS
If you would like to enable Dark Web Monitor on iOS and check for any data leaks, follow the steps below:
- Open your NordVPN app.
- Tap the person icon in the bottom right:
-
Turn on Dark Web Monitor:
- Tap on your email:
- Check for any data leaks:
If you find that your data has been leaked, make sure to follow the steps on how to protect yourself.
Android
If you would like to enable Dark Web Monitor on your Android device and check if your data has been leaked, follow the steps below:
- Open your NordVPN app.
- Tap the person icon in the bottom right:
-
Enable Dark Web Monitor:
- Tap on your email:
- Check for any leaks:
If you find any leaked data, make sure to follow the steps to protect yourself.
How to check for data breaches on your Nord Account?
If you would like to check for any data breaches using your Nord Account, follow along below:
- Log in to your Nord Account.
- Select NordVPN:
- Click review and resolve under Dark Web Monitor:
- Here you can track your alerts:
To add an email address for tracking, follow the steps below:
- Click asset management:
- Click add email address:
What to do if I find data breaches?
If data exposures associated with one of your monitored email addresses were detected by NordVPN's Dark Web Monitor, it’s crucial to take immediate steps to protect yourself:
- Change the password for the affected account and any others using the same password.
- Set up two-factor authentication on all relevant accounts.
- Remain vigilant against phishing attempts. Avoid clicking on links or downloading attachments from unknown or suspicious sources.