Resources
EzProtect Issues Critical Security Advisory Following Salesforce Third-Party App Incident; Provides Immediate Guidance to Protect Customer Environments
EzProtect addresses Salesforce security breaches with customer update and continues providing protection services to ensure customer safety.
EzProtect Partners with Supermums to Combat Rising Salesforce Data Breaches Through Education and Community Support
As part of Security for Good initiative, EzProtect partners with Supermums to provide cybersecurity training for Salesforce administrators.
How Salesforce Administrators Can Contain Data Breaches with the Threat Response Lifecycle
Uncover how Salesforce administrators can use the threat response lifecycle to contain Salesforce data breaches in hours instead of days.
From Prevention to Recovery: Your Complete Salesforce Data Breach Response Plan
Uncover the essential Salesforce breach prevention and ransomware recovery strategies needed to secure your org.
Are Your AppExchange Packages Putting Your Salesforce Data at Risk?
Uncover why AppExchange packages create hidden Salesforce security vulnerabilities and the specific questions security teams must ask to prevent data breaches.
Are Your AppExchange Packages Putting Your Org’s Salesforce Data at Risk?
Learn how to identify hidden security vulnerabilities in Salesforce AppExchange packages and how to protect your org from data breaches.
2.8 Million Records Exposed: What Every Salesforce Customer Must Learn from the Allianz Life Breach
How hackers stole 2.8 million Allianz customer records through one OAuth trick
How Poor Salesforce Permission Management Exposes Your Org to Cyber Attacks
Learn how poor Salesforce permission management exposes orgs to cyber attacks and what you can do to better secure your org.
The Salesforce Security Gap: Why 99% of Projects Lack Dedicated Security Roles
Discover why 99% of Salesforce projects lack dedicated security roles. Learn how Salesforce admins, developers & architects can protect their orgs from data breaches with expert strategies from security leaders.