Misconfigured Zendesk is a perfect recipe for a customer impacting breach


A popular platform to manage customer relationships for over 100,000 businesses, it is common to find customers’ PII and financial data in Zendesk accounts. This coupled with the fact that Zendesk is often managed by customer support teams with a high staff turnover makes it a perfect recipe for a data breach.

Continue Reading

Preventing Zoombombing and unauthorized data sharing on Zoom


After Zoom’s recent negative publicities, you would have known by now anyone could bomb a Zoom call, share sensitive screens and files in a call, if you don’t have the right security settings enabled.

Continue Reading

What are teams using Slack for?


Team chat is just the mean. Business teams use Slack as a repository of confidential data and files which can be shared easily, often without security considerations. As Slack owners and admins can enable users to perform many data sharing functions, misconfiguration of permission and security controls can lead to data breaches.

Continue Reading

Securing cloud data while employees work from home


With the spread of COVID-19, today WHO declared it a pandemic. This has caused most businesses to reevaluate their business continuity plans and often add “Work from home” as a contingency option, which has caused IT and security teams to hastily deploy this capability for their organisation.

Continue Reading

Eliminate SaaS risk blindspots

710 Collins Street
Melbourne VIC 3008
9848 Mercy Rd #2
San Diego 92129

Get the latest information about SaaS security misconfigurations

Copyright Detexian 2020 All Rights ReservedTerms & ConditionsPrivacy Policy