Requesting resources using the insecure HTTP protocol weakens the security of the entire page, as these requests are vulnerable to man-in-the-middle attacks, where an attacker eavesdrops on a network connection and views or modifies the communication between two parties.
Business Impact
Increased risk of data breaches, financial loss, and reputational harm. Eroding customer trust and confidence.
Is your Salesforce solution affected by Insecure contents?
Clayton detects anti-patterns and offers automated fix advice to kickstart your Well-Architected journey.