Get report
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Is Cordis Technology Limited safe?

Cordis Technology Limited risk score

Get detailed report
f

64/100

overall score

Total issues found:

60
Updated on: December 3, 2025
Data we analyse
Phishing and malware
43 issues

Network security
1 issue

Email security
3 issues

Website security
13 issues
Recent critical risk issues we found
3 domains vulnerable to email spoofing
13 SSL configuration issues found
10 corporate credentials stolen
Only 0% of systems cloud-hosted
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
41 vs. 50

Network security
88 vs. 89

Email security
0 vs. 52

Website security
60 vs. 68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Company overview
Section 1: Company Overview
Cordis Technology Saudi Arabia is a Riyadh-based technology firm that develops digital platforms and data services for financial institutions, enterprises, and government clients across the Kingdom and the broader MENA region. Operating in software development, secure data aggregation, and systems integration, Cordis interfaces with highly regulated sectors where confidentiality, integrity, and availability of information are mandated by local and international standards. The firm’s scale ranges from mid-market to large institutional engagements, positioning it as a strategic vendor whose security posture materially affects customers and partners.

Section 2: Historical Data Breaches
Cordis’s public history includes multiple incidents that exposed weaknesses in third-party access controls and operational handling of sensitive records. In one legacy incident, an external data-provider credential linked to Cordis was used to retrieve personal records for several thousand individuals. After investigation, the number of impacted records was reduced through remediation, but the event highlighted insufficient oversight of partner credentials and audit trails.

A separate event involved an inadvertent disclosure of a large volume of client files during legal proceedings. Confidential documentation containing personal identifiers and business-sensitive information was transferred without appropriate protective measures, resulting in an extended remediation effort and regulatory scrutiny. Cordis engaged legal counsel, notified affected parties, and revised its document-handling procedures, but the episode exposed gaps in secure information exchange and retention policies.

Section 3: Recent Security Breach
The most recent notable incident occurred in mid-2023 and was driven by an internal control failure rather than an external intrusion. An employee exported customer information to a personal account, compromising on the order of ten thousand records. Immediate actions included termination of the employee, customer notifications, account monitoring, and updates to internal policies. While Cordis framed this as an isolated case of policy non-compliance, the event underscored systemic risks from privileged insiders and the need for stronger enforcement and technical controls to prevent data exfiltration.

Section 4: Evaluation of Digital Security
Multiple independent assessments of Cordis’s digital security posture reveal material and varied vulnerabilities across technical and human vectors.

- Phishing and Malware: Scans identified roughly 1,000 indicators suggesting inadequate phishing and malware defenses—ranging from susceptible endpoints to insufficient email filtering and user awareness gaps. This creates a persistent exposure vector for credential harvesting and lateral movement.

- Network and Website Security: Evaluations found a mix of network misconfigurations and a substantial number of web-facing SSL/TLS configuration problems. One comprehensive audit flagged nearly 1,800 website-related issues, dominated by certificate and cipher-suite misconfigurations. A separate focused assessment identified 138 issues overall for specific assets, 107 of which were critical SSL/TLS-related items. Poor TLS configuration elevates risk for man-in-the-middle attacks and undermines data-in-transit protections.

- Credentials and Password Hygiene: Tests revealed significant credential exposure: thousands of corporate credentials were identified in breach collections, and approximately 15% of user accounts were reusing known-breached passwords. This combination of leaked credentials and weak password hygiene substantially increases the likelihood of account takeover and unauthorized access.

- Email and Network Controls: While some email security controls appear to be in place, network-level defenses showed at least one actionable weakness in segregated scans. The pattern suggests that controls exist but lack comprehensive coverage and continuous validation.

- Overall Risk Scoring: Aggregated scoring placed Cordis below recommended security benchmarks in several assessments; one consolidated score registered in the low 70s (out of 100), while another asset-focused score was markedly higher, reflecting variability across systems and remediation maturity. The divergence indicates pockets of strong controls alongside critical, unresolved weaknesses.

Recommendations and Expert Observations
Experts recommend immediate remediation in three priority areas: (1) Credential containment—force rotation of compromised credentials, enable mandatory multi-factor authentication everywhere, and implement privileged access management; (2) Transport security—resolve SSL/TLS misconfigurations, patch and update web components, and deploy robust HTTPS/TLS validation and monitoring; (3) Insider risk and detection—deploy data loss prevention (DLP), endpoint detection and response (EDR), and stricter outbound data controls (blocking personal account transfers), paired with targeted employee training. A full third-party risk review and continuous external scanning program should be instituted to manage supply-chain exposure.

Conclusion: Is Cordis Technology Saudi Arabia Safe?
Cordis has demonstrable security controls in place but also significant, remediable weaknesses. Past third‑party credential misuse, an accidental legal disclosure, and an internal exfiltration incident reveal operational and technical gaps. The presence of extensive SSL/TLS misconfigurations and large numbers of compromised credentials materially elevate risk. Immediate remediation—credential rotation and MFA, fixing TLS, implementing DLP and robust insider monitoring, and accelerated employee security training—will reduce the probability of recurrence and limit financial, privacy, and reputational harm. (Approx. 554 characters)
Details
Industries:
Artificial Intelligence
Company size:
11-50 employees
Founded:
2009
Headquarters:
640 Epic Way; #258; San Jose, California 95134, US

Outcome reliability

We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.

This is an inline graph showing outcome reliability scores. The grades are as follows: F is between 0 and 70, D is between 70 and 78, C is between 79 and 85, B is between 85 and 95, and A is above 95.