dashboard.meetpaladin.com
Open in
urlscan Pro
2606:4700:20::ac43:47ec
Public Scan
Submitted URL: https://customer.meetpaladin.com/e/c/eyJlbWFpbF9pZCI6IlJQWG9CZ0VBQVlFdEhIZ2JrQXZMbnFnQkhMSHkyZz09IiwiaHJlZiI6Imh0dHBzOi8vZGFzaGJv...
Effective URL: https://dashboard.meetpaladin.com/admin/reports/scan?lock=02bba34c-f071-4287-9d35-82519fe276bf
Submission: On June 05 via manual from US — Scanned from DE
Effective URL: https://dashboard.meetpaladin.com/admin/reports/scan?lock=02bba34c-f071-4287-9d35-82519fe276bf
Submission: On June 05 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
You need to enable JavaScript to run this app. OverviewImprovement OpportunitiesRemote AccessOutbound Email ProtectionWeb SecurityExposed DataHost VulnerabilityDNS Results ALREADY HAVE A POLICY? Activate Shield CYBER RISK REPORT REPORT CRAFTED FOR OVERVIEW Share -------------------------------------------------------------------------------- Download Copy Link Domain name: Scanned: Remote Access 0 Vulnerabilities Detected Outbound Email Protection 0 Vulnerabilities Detected Website Security 0 Vulnerabilities Detected Exposed Data 0 Data Breaches Host Vulnerability 0 Vulnerabilities Detected IMPROVEMENT OPPORTUNITIES BASED ON YOUR ASSESSMENT RESULTS AND RECENT CYBERCRIMINAL ATTACK PATTERNS, THESE ARE THE KEY STEPS YOUR ORGANIZATION SHOULD PRIORITIZE TO MITIGATE INCIDENT RISK. VERIFIED VIA SCAN TO DO Review DNS Records Cybercriminals utilize DNS records to understand domains, systems, and IP addresses associated with your company. Review DNS records to verify all listed assets. See details GENERAL BEST PRACTICES TO DO Implement & Verify MFA Setup Attackers often attack using compromised credentials. Multi-factor Authentication can stop attackers even if credentials are compromised. Ensure MFA is implemented and utilized on all systems and services. Reduce Phishing Susceptibility Phishing is the most common cybercriminal attack as tricking humans is often the easiest way in. Ready your team with security training and simulated attacks. Add a layer of protection with helpful warnings on emails. These tools are free with the Hiscox cyber policy. Validate Backups & Data Recovery Cybercriminals often hold systems and data hostage. If backups are incomplete or unable to be restored, your operation may need to shut down for an extended period. Test backups regularly and ensure all data required to operate is accurately preserved. LET’S PROTECT YOUR ORGANIZATION TOGETHER. Paladin Cyber’s protection suite includes thousands of dollars worth of free easy-to-use tools and access to experts to help keep you safe from cybercrime. Learn more REMOTE ACCESS PROTECTION AGAINST RANSOMWARE Cybercriminals are actively exploiting these vulnerabilities to deliver ransomware and hold companies hostage. Secure vulnerable connections to reduce the chances of compromise. 0Vulnerabilities Detected 0 Vulnerabilities Found EMAIL SECURITY Passed Failed No Records Found OUTBOUND EMAIL PROTECTION PROTECTION AGAINST EMAIL FRAUD Improperly configured email servers make it easier for cybercriminals to commit fraud using your organization's emails. 0Vulnerabilities Detected Results for All email servers All email servers TEST PERFORMED DMARC DMARC Utilized DMARC Restrictiveness What does this mean? DMARC allows systems to verify if an email actually comes from the domain that it claims to come from. When configured incorrectly, cybercriminals can send attacks that look like they originate from your email addresses. SPF SPF Utilized SPF Restrictiveness What does this mean? Sender Policy Framework (SPF) is a protocol that allows you to specify which mail servers your domain uses to send mail. This helps the reciepient's email servers assess if the incoming email is fraudulent. NETWORK & SECURITY Emails encrypted in transit What does this mean? Your email server uses multiple protocols in order to ensure the deliverability and security of messages. Improperly configuring these may cause emails to be returned as not deliverable or be read by unauthorized parties. WEBSITE SECURITY Proper website security configurations reduce the chances of cybercriminals using your website to deliver malicious content or steal data. 0Vulnerabilities Detected Results for All websites All websites CONFIGURATIONS TESTED DOMAINS AFFECTED Content Security Policy What does this mean? A Content Security Policy (CSP) lists the approved sources of content that any browser should be allowed to run on your website. It is used to prevent hackers from sneaking in malicious components or code, which is also referred to as code injection. We scanned to see if your website has a well-implemented CSP that is appropriately restrictive. Subresource Integrity What does this mean? Subresource Integrity (SRI) is a feature that verifies that content is delivered without unexpected manipulation using a digital fingerprint. We scanned to see if your website has a well-implemented SRI that is appropriately restrictive. X-Content-Type-Options What does this mean? X-Content-Type-Options prevents your user’s browser from inadvertently running malicious code when trying to examine the content of the file being served. We checked to make sure this setting is configured correctly to prevent unwanted scripts from being run. X-XSS-Protection What does this mean? X-XSS Protection is a feature that stops the browser from loading the page when it detects that an attacker has injected code that’s unexpected to be there (Reflected XSS). It is used to protect older browsers. We scanned to see if this feature was enabled. Web Application Firewall What does this mean? Web application firewalls defend against hackers attacking a company’s website. They defend against hackers retrieving privileged information from the company’s website and also injecting malicious code into a company’s webpage that can harm legitimate users. HTTP Public Key Pinning What does this mean? HTTP Public Key Pinning (HPKP) is a feature that registers with a user’s browser the certificate that should be trusted for your website. This allows your website to resist impersonation by hackers who use fraudulent digital certificates. We checked to see if this feature was enabled for your website. Referrer Policy What does this mean? A Referrer Policy allows your site to control when and what information is transmitted to the next page the user visits. We checked to see if your site’s referrer-policy is appropriately restrictive in order to protect user privacy. Cookies What does this mean? Cookies are small pieces of data that allow a website to track each user’s actions and history. While they are intended to be used to improve the user experience, it’s possible that hackers can steal and use the personal information found within them. We checked how your site uses cookies to see if they are configured correctly and access is appropriately limited. Cross-Origin Resource Sharing What does this mean? Cross-origin Resource Sharing (CORS) is a feature that defines which foreign origins can access the content on your site. If implemented incorrectly, it could lead to unauthorized access to private user information. We checked to see if your site’s CORS settings were implemented correctly. HTTP Strict Transport Security What does this mean? HTTP Strict Transport Security (HSTS) is a feature that forces your user’s browser to connect in a secure way (HTTPS). We checked to see if HSTS was configured correctly and set to enforce secure communication for at least 6 months. Redirection What does this mean? HTTP Redirections allow your site to redirect the user’s connection in a secure way (HTTPS) when they initially connected via the less secure way (HTTP). We checked to see if your site is configured to redirect HTTP traffic to the same site and URL on HTTPS. X-Frame-Options What does this mean? X-Frame-Options is a feature that allows your site to specify whether or not specific pages of the site can be embedded within other sites. We checked to make sure your website was appropriately blocking other sites. EXPOSED DATA WHY IS IT DANGEROUS It's easy for cybercriminals to find your employee's passwords and sensitive information exposed in prior breaches. Ensure your team practices good password hygiene and updates them regularly. 0Data Breaches Does 0 data breaches mean we’re safe? Cybercriminals may still have access to your employees' accounts and sensitive information as many breaches are not reported. HOST VULNERABILITY Host systems use network ports to communicate with others on the Internet. Malicious actors can exploit systems with vulnerabilities in order to get unauthorized access and steal data. 0Vulnerabilities Detected 0 Vulnerabilities Found DNS RESULTS Below are DNS records we have found of your company which let the internet know how to reach your email inbox, website, and other key functions. 0 Records Found Ready for a solution? Your first step is simple: choose a cyber partner with expertise and a focus on service. Paladin Shield will set you on the right course. Loading