{"id":15114,"date":"2019-08-05T00:00:00","date_gmt":"2019-08-04T23:00:00","guid":{"rendered":"https:\/\/identifi-global.eu.applyflow.com\/key-cybersecurity-threats-in-the-saas-industry\/"},"modified":"2022-12-09T06:15:33","modified_gmt":"2022-12-09T06:15:33","slug":"key-cybersecurity-threats-in-the-saas-industry","status":"publish","type":"post","link":"https:\/\/www.identifiglobal.com\/news\/key-cybersecurity-threats-in-the-saas-industry\/","title":{"rendered":"Key cybersecurity threats in the SaaS industry"},"content":{"rendered":"<p style=\"text-align: center\">\n\t<img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-01.cms-eu-v2i.applyflow.com\/identifi-global\/wp-content\/uploads\/2022\/03\/CybersecuritySaaS.jpg\" style=\"width: 600px; height: 400px\"><\/p>\n<p>\n\tGoogle, Adobe, Slack, Mailchimp. Many of today\u2019s most successful businesses &#8211; on the web, and, actually, overall &#8211; are Software as a Service (Saas). It\u2019s the default software distribution model for the cloud computing age &#8211; applications hosted on remote servers and delivered via the internet to users.<\/p>\n<p>\n\tThey have the advantage of being accessible anywhere with a web connection, usable across multiple devices and being easy to update. They also require less local storage space and customers can quickly scale their licences up or down according to their needs.<\/p>\n<div>\n\tBecause of this flexibility, scalability and cost-efficiency, IT teams are shifting their applications to the cloud wherever possible. In fact, the 2019 SaaS Trends Report found that spending on SaaS licenses increased by 87% last year, and that companies now spend more on SaaS products than they do on laptops.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tBut SaaS and cloud computing have one major issue &#8211; security. Concerns around security are the number one barrier to cloud adoption. And 92% of C-suite respondents to one survey said they felt customer data stored in the cloud was vulnerable to attack.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tWhy are SaaS companies at risk?<\/h2>\n<div>\n\tSaaS is and has been growing rapidly and, in the grand scheme of things, is a relatively new market. In some ways, this is an advantage. SaaS companies are able to iterate and improve products faster than traditional competitors. On the one hand, this is because they are smaller and more nimble. On the other, because newly-deployed features can be distributed to users in an instant via the cloud.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tHowever, this immaturity can become a disadvantage when it comes to cybersecurity, in two ways. First, for SaaS businesses themselves. Second, for their customers.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThe SaaS growth model often mirrors the startup growth model &#8211; disrupt an existing industry, scale up as quickly as possible then go public or be acquired. This focus on rapid growth means that SaaS businesses are often more interested in growing their user base than securing their users\u2019 data. In fact, information security is often seen as an impediment to growth and innovation. This is particularly true in a SaaS and startup context, where timeliness and innovation are critical success factors. If you\u2019ve created a product you think will change the world, the last thing you want to do is keep it under wraps for six months while you check the code is secure.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThe SaaS model relies on scale. Plus, SaaS businesses collect and store customer data to improve their product, strengthen customer relationships and receive payment. Which means that SaaS companies store a lot of customer data, including Personally Identifiable Information and payment credentials, both of which are the holy grail for hackers.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<h4 style=\"text-align: center\">\n\t<strong>&#8220;Hackers weigh up targets on a risk vs. reward basis.&#8221;<\/strong><\/h4>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tHackers weigh up targets on a risk vs. reward basis. The lower the risk and the greater the reward, the more likely they are to probe an organisation\u2019s defences. As discussed, SaaS companies are often relatively new to the market, can be built on insecure code and house a lot of customer data &#8211; all of which make them an attractive proposition to threat actors.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tAnd as if this wasn\u2019t enough, SaaS companies have another risk factor to contend with. Users.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tFundamental security issues such as identity and access management are yet to be ironed out in a SaaS context. End-users who rely on multiple cloud applications to do their job may end up with multiple sets of login credentials for different platforms. Or worse still, they may use the same login details for every platform. Both of these increase the risk of a breach occurring.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThe ability of cloud services to be accessed on any device leaves SaaS users open to increased device risks. Being able to log in to a business-critical application on your home laptop is helpful if you need to check something over the weekend but disastrous if that laptop is full of malware. Similarly, cloud applications that can be accessed over any network can give users greater flexibility, but the cost of convenience is, almost always, reduced security.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tUser-related risk is problematic for SaaS companies. Platforms may choose to provide robust security measures such as two-factor authentication. But it\u2019s up to users whether they use it. A SaaS platform can do their utmost to secure users\u2019 data, but lax security on the part of their customers can result in a breach via the platform. And while the SaaS company may have done everything they could to prevent this, they may still suffer reputational damage as a result.<\/div>\n<div>\n\t&nbsp;<\/div>\n<h2>\n\tWhat should SaaS companies do?<\/h2>\n<div>\n\tAs a minimum, SaaS businesses should operate according to established information security frameworks such as ISO 270001. The Open Web Application Security Project (OWASP) has also published a list of The Ten Most Critical Web Application Security Risks that all development teams who are building applications for SaaS delivery should mitigate against. These steps won\u2019t ensure total security but they will establish acceptable standards of internal and customer-facing cybersecurity.&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n<h4 style=\"text-align: center\">\n\t<strong>&#8221;&nbsp;If no one is singularly accountable for cybersecurity, it will become an after-thought.&#8221;<\/strong><\/h4>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tThe steps above will require businesses to hire staff that are capable of defining and implementing robust information security policies. If no one is singularly accountable for cybersecurity, it will become an after-thought. This, for reasons already discussed, would leave the business open to risk, particularly as it grows. A poorly secured business with 250 users is hardly worth a hacker\u2019s time. A poorly secured business with 25,000 users will be.<\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tIn-house security teams should work with customer-facing teams to produce and share information security guidelines. This will help users avoid causing a breach via the platform, but will also limit the platform\u2019s liability if one occurs. SaaS companies should provide details of their own cybersecurity processes for current and potential users. This will reassure users that their data is safe in your cloud environment. The kinds of questions customers might ask are:<\/div>\n<div>\n\t&nbsp;<\/div>\n<ul>\n<li>\n\t\tWhere is my data stored?<\/li>\n<li>\n\t\tWhat firewalls do you use?<\/li>\n<li>\n\t\tWhat is your data loss prevention strategy?<\/li>\n<li>\n\t\tHow often do you scan for vulnerabilities?<\/li>\n<li>\n\t\tWhat\u2019s your policy for detecting and preventing network intrusion?<\/li>\n<\/ul>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t<strong><a href=\"https:\/\/www.computerworld.com\/article\/3268778\/saas-security-beyond-the-app.html\">You can find more advice on common questions SaaS customers ask here.&nbsp;<\/a><\/strong><\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\tIf you\u2019re a cybersecurity professional looking to move into the SaaS world, click <a href=\"https:\/\/www.identifiglobal.com\/advancedsearch.aspx?search=1\">here to browse our current vacancies.<\/a> And if you\u2019re a SaaS business who wants to hire top information security talent, feel free to <a href=\"https:\/\/www.identifiglobal.com\/contact-us\">get in touch.<\/a><\/div>\n<div>\n\t&nbsp;<\/div>\n<div>\n\t&nbsp;<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Google, Adobe, Slack, Mailchimp. Many of today\u2019s most successful businesses &#8211; on the web, and, actually, overall &#8211; are Software as a Service (Saas). It\u2019s the default software distribution model for the cloud computing age &#8211; applications hosted on remote servers and delivered via the internet to users. They have the advantage of being accessible&hellip;&nbsp;<a href=\"https:\/\/www.identifiglobal.com\/news\/key-cybersecurity-threats-in-the-saas-industry\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Key cybersecurity threats in the SaaS industry<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":14248,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-15114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/comments?post=15114"}],"version-history":[{"count":0,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media\/14248"}],"wp:attachment":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media?parent=15114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/categories?post=15114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/tags?post=15114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}