56/100
overall score
Total issues found:
30Updated on: December 29, 2025
Data we analyse
Phishing and malware
2
issues
Network security
0
issues
Email security
7
issues
Website security
21
issues
Recent critical risk issues we found
7 domains vulnerable to email spoofing
21 SSL configuration issues found
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
0
vs.
50
Network security
100
vs.
89
Email security
0
vs.
52
Website security
64
vs.
68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Company overview
Section 1: Company OverviewJounce is a financial-services technology firm operating in retail and wholesale channels, offering banking-related products and data-driven financial services. As a regulated participant in the payments and credit ecosystem, Jounce handles sensitive customer information at scale and integrates with third-party data providers and legal processes. Its size and market position place it squarely under strict compliance expectations; protecting client data is therefore both an operational necessity and a regulatory requirement.
Section 2: Historical Data Breaches
The record provided shows Jounce has experienced multiple categories of data exposure over recent years. One early incident involved unauthorized access through a vendor-supplied credential, which allowed limited retrieval of consumer records—initial estimates were several thousand affected accounts before the scope was refined. A separate event arose from an inadequately protected legal disclosure: bulk sensitive files containing personally identifying data and portfolio details were transmitted without sufficient safeguards during litigation, creating significant privacy risk. These incidents illustrate recurring weaknesses in third-party controls and in document-handling procedures.
Section 3: Recent Security Breach
The most recent documented event was an internal control failure in mid-2023 when an employee forwarded confidential customer data to a personal account. Roughly ten thousand customer records were implicated. Jounce responded by terminating the employee, notifying impacted customers, and instituting enhanced monitoring on affected accounts. The incident was not the result of an external intrusion but highlights persistent insider- and process-related risk.
Section 4: Evaluation of Digital Security
Multiple assessments paint a mixed but concerning picture of Jounce’s technical posture. One comprehensive external audit produced a middling security rating and flagged numerous high-priority weaknesses: extensive phishing and malware exposure vectors, widespread website configuration issues—predominantly TLS/SSL misconfigurations—and evidence of large-scale credential compromise across corporate accounts. Specifically, the audit identified on the order of one thousand phishing/malware-related vulnerabilities, nearly two thousand web-layer configuration failures largely tied to SSL, and thousands of corporate credentials appearing in breach databases. Employee password reuse was notable, with roughly a sixth of staff reusing previously breached credentials.
A separate vendor evaluation returned a comparatively high overall score but nevertheless highlighted concentrated risk areas: over a hundred critical TLS configuration problems and more than a hundred site-security issues, in addition to a smaller set of phishing and network concerns. The discrepancy between assessments suggests that while baseline controls may be in place, pockets of misconfiguration and legacy components persist and may be missed by governance-only reviews.
From a governance and regulatory perspective, Jounce’s prior handling of sensitive customer documents—particularly for anti-money-laundering compliance—was judged inadequate in at least one oversight action, which cited failures in secure collection channels and incomplete inclusion of processes within privacy impact assessments. That finding underscores lapses in data protection-by-design and security-of-processing obligations and signals elevated enforcement risk.
Collectively, these findings indicate a cybersecurity program that has operationalized some controls but remains vulnerable in key technical and human vectors: SSL/TLS hygiene, credential lifecycle management, employee training on data handling, third-party access controls, and secure legal/document workflows.
Conclusion: Is Jounce Safe?
Jounce’s history of vendor credential misuse, accidental legal disclosures, and a recent employee-driven data leak, combined with audits showing numerous TLS, web, phishing, and credential issues, indicate material security gaps. Immediate actions should include rotating compromised credentials, enforcing multifactor authentication and enterprise password hygiene, remediating TLS/SSL configurations, and applying targeted patches to web-facing components. Strengthen third-party access controls, revamp secure-document intake for AML/legal processes, and run focused insider-threat monitoring and training. Financially and reputationally, prompt remediation and clear customer notification will mitigate regulatory exposure and rebuild trust.
(Conclusion summary — 556 characters)
Jounce currently presents moderate-to-high risk: repeated incidents (vendor misuse, accidental disclosures, and an insider-driven leak) and audits flagging extensive TLS, web, phishing, and credential problems show it is not yet secure. Urgent steps—credential rotation and MFA, TLS remediation, secure document channels, third-party access restrictions, and refreshed staff training—are required to reduce exposure, limit regulatory liability, and protect customer privacy.
Details
Website:
Industries:
Artificial Intelligence
Company size:
1-10 employees
Founded:
-
Headquarters:
Oakland, California, United States
Outcome reliability
We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.