Monitoring deep, dark and surface web to detect exposure of your sensitive data, secret projects and initiatives, privileged users, critical systems, IT infrastructure, and more.
Monitoring and alerting of third party data breaches impacting your employees’ emails, usernames, and personally identifiable information.
Assess the risk footprint and security posture of key business relationships to get a handle on external risk introduced through your extended attack surface.

Sign Up for Updates

Digital risk monitoring of key personnel with telemetry and risk metrics. VIPRecon provides broad coverage of social media, deep and dark web, as well as physical threat assessments.
Our Ransomware Response Readiness Assessment, Playbook and Table Top Exercise gives your organization the best chance to survive and recover.
Gain visibility of your digital footprint by reaching into the most active areas of the cyber underground.
Fully managed and tailored Threat Intelligence services that becomes an extension of your current security processes and provides real-time visibility on new threats.
Providing research and investigations into known threats, to save security teams time and stress during a cyber emergency.

Sign Up for Updates

GroupSense offers a comprehensive package of services for assessing and responding to ransomware attacks, including negotiations with threat actors.
Actively researching and monitoring threats from vendors or third-party companies that can affect organizational security.
Monitoring for threats to elections, VIPs, and more on social media to proactively prevent or mitigate digital risk.
Focusing on the threats and risks that matter to your security processes and providing intelligence and insights to prevent or mitigate digital risk.
Taking the next step in security services, by proactively taking down phishing sites or anonymously interacting with threat actors to provide better intelligence.
Active monitoring of your brand's digital assets to protect its reputation and stop further brand abuse from targeting unsuspecting victims.

Sign Up for Updates

Combining your cyber and fraud programs to effectively fight threat actors continually scamming or threatening assets within an organization.
Executives are prime targets for fraudulent activities, but with a proactive approach, any attacks or threats can be neutralized before causing any damage.
Governments, political parties and candidates must all act now to activate cyber threat intelligence services to harden their information security and get ahead of inevitable cyber threats to the election process.


Protecting Elections Begins Long Before Voters Cast Their Ballots


Ensuring the security and integrity of elections has become a vital concern for democracies worldwide.

Elections shape leadership, policy and governance, affecting the safety and  prosperity of billions of citizens. There are countless illicitly-motivated forces that desire to influence elections. The power of the internet enables their interference and magnifies their influence.

Cyber Attacks

Attacks on election bodies, voting infrastructure, parties and candidates.



Disinformation campaigns that propagate
false or misleading information to disrupt
voting and influence public opinion.


Violence Coordination

Coordination of physical and kinetic threats to polling places and candidates.

Governments, political parties and candidates must all act now to activate cyber threat intelligence services to harden their information security and get ahead of inevitable cyber threats to the election process.

GroupSense Employs a Four-Stage Model for Monitoring Elections

  • 18 Months Before Election Day

    • Assess the digital threat profile of the organization and the election 
    • Identify threats, adversaries, vulnerabilities and high risk issues
    • Advise client on security improvements
    • Commence threat monitoring
  • 30 Days Before Election Day

    • Increase tracking of identified threat actors 
    • Identify and monitor disinformation and disruption attempts
    • Assess impact and response to adverse events
    • Advise on any last minute security changes
  • Day of Election

    • Continuous monitoring before, during and after polls close 
    • Real-time monitoring to detect active threats
    • Constant communication with the client security team
  • Post-Election

    • Monitoring for post-election communications 
    • Documenting behavior of threat actors
    • Debrief with client on findings and results

What does it take to secure an election?

You need a cyber threat intelligence service provider with the skills and technology necessary to assess the risks and monitor for threats before and during elections.

GroupSense has a proven track record of providing cyber threat intelligence on elections for large municipalities and state governments. We work alongside you to understand your organization’s profile, structure, assets, vulnerabilities and requirements. We advise you on how to reduce your risk profile and monitor for threats throughout the election cycle.



GroupSense will assess and analyze your cyber threat posture and vulnerabilities, providing guidance on technical and operational improvements.


All alerts, advisories, questions and support are conducted via a secure intelligence portal.


GroupSense intelligence analysts are available to support you throughout your engagement.

Intelligence Advisories

You will receive high-fidelity, finished intelligence advisories specific to your organization, which include analysis and recommended actions.


Using its TraceLight cyber reconnaissance platform, GroupSense will monitor the surface, social, deep and dark web for threats and risks directed at your organization and election.

Disinformation Campaigns in Elections

A disinformation campaign could change the outcome of an election in favor of the party or parties responsible. Russian election interference in 2016 is one of the more recognizable disinformation campaigns. It successfully manipulated contrasting ideologies, took advantage of current events to synergize discourse, and caused residual side effects that can be targeted in future operations.

How Does Disinformation Work?

In 2016, threat actors using huge bot networks spread disinformation on a national level through social media. They set up fake social media accounts to disrupt the elections on a mass scale and may even have had the full support of a foreign government.

Disinformation posts can be shared by thousands of other fake accounts or bots to reach a massive audience. If the posts influence just a handful of voters, the mission of affecting the elections negatively is accomplished. Disinformation posts aren’t limited to spreading lies on Election Day, they happen before, during and after the elections, too. Just as political campaigns attempt to sway you to vote for their candidate, threat actors do the same.

Shark20385 Cover



Additional Election Related Services Include:

  • Operational Security education and training for leadership, managers and staff.
  • Full time managed threat monitoring.
  • Integration and coordination between Threat Intelligence and Security Operations.
2 min read

Election Security in the Midterms

During the midterm elections, national news was seemingly quiet about election interference from foreign powers,...

1 min read

Foreign actors seeking to sow divisions by targeting Native American populations, cyber intelligence firms says

MADISON - Foreign actors are using social media to target Native American populations in an effort to create...

5 min read

Stopping Disinformation: A 'How To' Guide

We all have a role in its prevention

Each member of our community has the ability and responsibility to limit the...



Let us maintain a safe and secure election together.