dashboard.meetpaladin.com Open in urlscan Pro
2606:4700:20::ac43:47ec  Public Scan

Submitted URL: https://customer.meetpaladin.com/e/c/eyJlbWFpbF9pZCI6IlJQWG9CZ0VBQVlFdEhIZ2JrQXZMbnFnQkhMSHkyZz09IiwiaHJlZiI6Imh0dHBzOi8vZGFzaGJv...
Effective URL: https://dashboard.meetpaladin.com/admin/reports/scan?lock=02bba34c-f071-4287-9d35-82519fe276bf
Submission: On June 05 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

You need to enable JavaScript to run this app.
OverviewImprovement OpportunitiesRemote AccessOutbound Email ProtectionWeb
SecurityExposed DataHost VulnerabilityDNS Results

ALREADY HAVE A POLICY?

Activate Shield


CYBER RISK REPORT

REPORT CRAFTED FOR




OVERVIEW

Share

--------------------------------------------------------------------------------

Download

Copy Link

Domain name:

Scanned:


Remote Access

0

Vulnerabilities Detected

Outbound Email Protection

0

Vulnerabilities Detected

Website Security

0

Vulnerabilities Detected

Exposed Data

0

Data Breaches

Host Vulnerability

0

Vulnerabilities Detected


IMPROVEMENT OPPORTUNITIES

BASED ON YOUR ASSESSMENT RESULTS AND RECENT CYBERCRIMINAL ATTACK PATTERNS,
THESE ARE THE KEY STEPS YOUR ORGANIZATION SHOULD PRIORITIZE TO MITIGATE INCIDENT
RISK.


VERIFIED VIA SCAN

TO DO

Review DNS Records

Cybercriminals utilize DNS records to understand domains, systems, and IP
addresses associated with your company.

Review DNS records to verify all listed assets. See details


GENERAL BEST PRACTICES

TO DO

Implement & Verify MFA Setup

Attackers often attack using compromised credentials. Multi-factor
Authentication can stop attackers even if credentials are compromised.

Ensure MFA is implemented and utilized on all systems and services.

Reduce Phishing Susceptibility

Phishing is the most common cybercriminal attack as tricking humans is often the
easiest way in.

Ready your team with security training and simulated attacks. Add a layer of
protection with helpful warnings on emails. These tools are free with the Hiscox
cyber policy.

Validate Backups & Data Recovery

Cybercriminals often hold systems and data hostage. If backups are incomplete or
unable to be restored, your operation may need to shut down for an extended
period.

Test backups regularly and ensure all data required to operate is accurately
preserved.

LET’S PROTECT YOUR ORGANIZATION TOGETHER.

Paladin Cyber’s protection suite includes thousands of dollars worth of free
easy-to-use
tools and access to experts to help keep you safe from cybercrime. Learn more


REMOTE ACCESS


PROTECTION AGAINST RANSOMWARE

Cybercriminals are actively exploiting these vulnerabilities to deliver
ransomware and hold companies hostage. Secure vulnerable connections to reduce
the chances of compromise.

0Vulnerabilities Detected

0 Vulnerabilities Found


EMAIL SECURITY

Passed
Failed
No Records Found


OUTBOUND EMAIL PROTECTION


PROTECTION AGAINST EMAIL FRAUD

Improperly configured email servers make it easier for cybercriminals to commit
fraud using your organization's emails.

0Vulnerabilities Detected

Results for

All email servers

All email servers

TEST PERFORMED

DMARC

DMARC Utilized
DMARC Restrictiveness

What does this mean? DMARC allows systems to verify if an email actually comes
from the domain that it claims to come from. When configured incorrectly,
cybercriminals can send attacks that look like they originate from your email
addresses.

SPF

SPF Utilized
SPF Restrictiveness

What does this mean? Sender Policy Framework (SPF) is a protocol that allows you
to specify which mail servers your domain uses to send mail. This helps the
reciepient's email servers assess if the incoming email is fraudulent.

NETWORK & SECURITY

Emails encrypted in transit

What does this mean? Your email server uses multiple protocols in order to
ensure the deliverability and security of messages. Improperly configuring these
may cause emails to be returned as not deliverable or be read by unauthorized
parties.


WEBSITE SECURITY




Proper website security configurations reduce the chances of cybercriminals
using your website to deliver malicious content or steal data.

0Vulnerabilities Detected

Results for

All websites

All websites

CONFIGURATIONS TESTED

DOMAINS AFFECTED

Content Security Policy

What does this mean? A Content Security Policy (CSP) lists the approved sources
of content that any browser should be allowed to run on your website. It is used
to prevent hackers from sneaking in malicious components or code, which is also
referred to as code injection. We scanned to see if your website has a
well-implemented CSP that is appropriately restrictive.

Subresource Integrity

What does this mean? Subresource Integrity (SRI) is a feature that verifies that
content is delivered without unexpected manipulation using a digital
fingerprint. We scanned to see if your website has a well-implemented SRI that
is appropriately restrictive.

X-Content-Type-Options

What does this mean? X-Content-Type-Options prevents your user’s browser from
inadvertently running malicious code when trying to examine the content of the
file being served. We checked to make sure this setting is configured correctly
to prevent unwanted scripts from being run.

X-XSS-Protection

What does this mean? X-XSS Protection is a feature that stops the browser from
loading the page when it detects that an attacker has injected code that’s
unexpected to be there (Reflected XSS). It is used to protect older browsers. We
scanned to see if this feature was enabled.

Web Application Firewall

What does this mean? Web application firewalls defend against hackers attacking
a company’s website. They defend against hackers retrieving privileged
information from the company’s website and also injecting malicious code into a
company’s webpage that can harm legitimate users.

HTTP Public Key Pinning

What does this mean? HTTP Public Key Pinning (HPKP) is a feature that registers
with a user’s browser the certificate that should be trusted for your website.
This allows your website to resist impersonation by hackers who use fraudulent
digital certificates. We checked to see if this feature was enabled for your
website.

Referrer Policy

What does this mean? A Referrer Policy allows your site to control when and what
information is transmitted to the next page the user visits. We checked to see
if your site’s referrer-policy is appropriately restrictive in order to protect
user privacy.

Cookies

What does this mean? Cookies are small pieces of data that allow a website to
track each user’s actions and history. While they are intended to be used to
improve the user experience, it’s possible that hackers can steal and use the
personal information found within them. We checked how your site uses cookies to
see if they are configured correctly and access is appropriately limited.

Cross-Origin Resource Sharing

What does this mean? Cross-origin Resource Sharing (CORS) is a feature that
defines which foreign origins can access the content on your site. If
implemented incorrectly, it could lead to unauthorized access to private user
information. We checked to see if your site’s CORS settings were implemented
correctly.

HTTP Strict Transport Security

What does this mean? HTTP Strict Transport Security (HSTS) is a feature that
forces your user’s browser to connect in a secure way (HTTPS). We checked to see
if HSTS was configured correctly and set to enforce secure communication for at
least 6 months.

Redirection

What does this mean? HTTP Redirections allow your site to redirect the user’s
connection in a secure way (HTTPS) when they initially connected via the less
secure way (HTTP). We checked to see if your site is configured to redirect HTTP
traffic to the same site and URL on HTTPS.

X-Frame-Options

What does this mean? X-Frame-Options is a feature that allows your site to
specify whether or not specific pages of the site can be embedded within other
sites. We checked to make sure your website was appropriately blocking other
sites.


EXPOSED DATA


WHY IS IT DANGEROUS

It's easy for cybercriminals to find your employee's passwords and sensitive
information exposed in prior breaches. Ensure your team practices good password
hygiene and updates them regularly.

0Data Breaches

Does 0 data breaches mean we’re safe?

Cybercriminals may still have access to your employees' accounts and sensitive
information as many breaches are not reported.


HOST VULNERABILITY




Host systems use network ports to communicate with others on the Internet.
Malicious actors can exploit systems with vulnerabilities in order to get
unauthorized access and steal data.

0Vulnerabilities Detected
0 Vulnerabilities Found


DNS RESULTS




Below are DNS records we have found of your company which let the internet know
how to reach your email inbox, website, and other key functions.


0 Records Found
Ready for a solution?

Your first step is simple: choose a cyber partner with expertise and a focus on
service.
Paladin Shield will set you on the right course.




Loading