Insecure contents

Overview

Requesting resources using the insecure HTTP protocol weakens the security of the entire page, as these requests are vulnerable to man-in-the-middle attacks, where an attacker eavesdrops on a network connection and views or modifies the communication between two parties.

Business Impact

Increased risk of data breaches, financial loss, and reputational harm. Eroding customer trust and confidence.

Resources

Frequent

Incidence

How common is this issue?
18%7%
arrow down10%
lower

Exposure

How long do organizations remain exposed before fixing the problem?
3 years9 months
arrow down76%
shorter
BenchmarkWith Clayton

Frameworks

TrustediconSecureiconData SecurityiconUse of EncryptioniconA08:2021 – Software and Data Integrity Failuresicon