article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Do you understand the potential risks connected with each provider’s integration points?

Risk 105
article thumbnail

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

The Last Watchdog

SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks. The hacked certificate was designed to verify and authenticate connections made to Mimecast’s Sync and Recover service, which automatically creates backups for email, calendar items and contacts.

Hacking 228
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

47% of these apps contained valid AWS tokens that granted complete access to all private files, including backups, and Amazon S3 buckets in the cloud. The experts also found several popular iOS banking apps using the same third-party AI Digital Identity SDK that embedded the same cloud credentials, posing the entire infrastructures at risk.

B2B 90
article thumbnail

Kaseya Breach Underscores Vulnerability of IT Management Tools

eSecurity Planet

Like SolarWinds, both companies serve large B2B audiences, where Kaseya’s products produce hundreds of end products and services. Backup data regularly. A reliance on built-in trust between systems and excessive user privileges is a risk that a list of ingredients can’t fix. Managing supply chain risk.

article thumbnail

Spinbackup GDPR Compliance

Spinone

Data is associated with a significance of risk if it’s stolen or abused. At Spinbackup we welcome the General Data Protection Regulation (GDPR) enforcement for B2B markets as it is individuals who handle business relationships. What is GDPR? It must be as easy to withdraw consent as it is to give it. Breach Notification.

B2B 40
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yet here they were with 66 million South African identities, all sitting there in a database backup facing the world possibly for as long as 2 and a half years. I wouldn't go so far as to propose that we should no longer have them, but clearly the risk they've now exposed 145.5 And this is where more regulation is required.