Get report
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Is Marketsupport safe?

Marketsupport risk score

Get detailed report
c

84/100

overall score

Total issues found:

2
Updated on: December 16, 2025
Data we analyse
Phishing and malware
0 issues

Network security
1 issue

Email security
1 issue

Website security
0 issues
Recent critical risk issues we found
1 domains vulnerable to email spoofing
Only 0% of systems cloud-hosted
Only 0% of systems CDN-protected
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
100 vs. 50

Network security
88 vs. 89

Email security
8 vs. 52

Website security
100 vs. 68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Company overview
Section 1: Company Overview
Market Support is a financial services support provider operating in the banking and fintech ecosystem, delivering services such as customer account administration, transaction support, and integrations with banking platforms. As a regulated entity supplying critical operational functions to firms that manage sensitive financial data, Market Support must meet robust regulatory and contractual security expectations. Its size and client base expose it to both targeted cybercrime and insider risk; therefore, protective controls, vendor management, and operational security are central to its business continuity and reputation.

Section 2: Historical Data Breaches
Market Support’s historical incident profile shows multiple types of lapses that reveal weaknesses in vendor access controls, legal handling of sensitive documents, and internal controls. Early on, a third-party data-access incident permitted unauthorized retrieval of consumer records via an upstream credit-data provider credential; the impact was limited to several thousand consumer records but underscored inadequate segmentation and credential governance with partners. Later, during litigation, a large volume of confidential client files was disclosed with insufficient redaction and protection, exposing names, identifiers, and portfolio information — a procedural failure in evidence-handling and legal data classification. These events created regulatory scrutiny and materially increased privacy and litigation risk.

Section 3: Recent Security Breach
In mid-2023 Market Support experienced an insider-driven exposure when an employee transmitted confidential customer information to a personal email account, affecting roughly ten thousand client records. The incident was not an external compromise but a breakdown in internal policy enforcement and data-loss prevention. Market Support terminated the responsible employee, notified affected parties, and expanded account-monitoring for suspicious activity. While those immediate steps were appropriate, the breach highlighted systemic gaps in access controls, endpoint monitoring, and user behavior analytics.

Section 4: Evaluation of Digital Security
A recent security assessment of Market Support indicates a below-benchmark posture with concentrated weaknesses across web infrastructure, endpoint/phishing defenses, and credential hygiene. Key findings include:
- Phishing and malware exposure: A large number of gaps were identified in anti-phishing controls and endpoint defenses, increasing susceptibility to social-engineering campaigns and commodity malware.
- Website and SSL configuration: Extensive web-application and TLS/SSL configuration issues exist; misconfigurations of this magnitude create practical risks for man-in-the-middle attacks and disruption of secure client connections.
- Network and perimeter: While core network controls show fewer critical misconfigurations, at least one network-level finding suggests exposure of internal services that should be segmented or otherwise protected.
- Credential management: A significant fraction of workforce accounts were associated with reused or breached passwords, and thousands of corporate credentials were found in public repositories or dumps. This combination of poor password hygiene and exposed credentials materially elevates the probability of account takeover.
- Overall security score: The composite evaluation places Market Support below recommended risk thresholds, reflecting both technical and procedural deficiencies that require prioritized remediation.

Audits and expert opinions emphasize recurring themes: insufficient segmentation between development and production, lack of robust data-loss prevention (DLP) tooling, weak legal and records-handling processes, and inadequate continuous monitoring. External comparisons to fintech peers suggest these are common risks but resolvable with focused investment.

Conclusion: Is Market Support Safe?
Market Support is currently at material risk. Past vendor and disclosure incidents, plus a recent insider exfiltration, reveal systemic control shortfalls. The technical assessment — notably poor SSL/web configuration, large phishing/malware gaps, and widespread credential exposure — increases likelihood of both targeted and opportunistic breaches. Immediate priorities should be: enforce multi-factor authentication and privileged-access controls; deploy enterprise DLP and user-behavior analytics; remediate SSL/TLS and web configuration issues; run credential-sweep and password-reset campaigns; and implement tighter vendor access governance and legal-data handling procedures. Remediation must be coupled with transparent customer notification plans and regulatory engagement to mitigate financial, reputational, and compliance impacts.

(Conclusion summary — 500–600 characters)
Market Support’s track record of vendor misuse, an accidental legal disclosure, and a 2023 insider exfiltration, together with a below-benchmark security assessment (weak SSL/web configs, phishing gaps, and extensive credential exposure), indicates elevated risk. Immediate measures — MFA, DLP, credential resets, SSL remediation, tighter vendor controls, and enhanced monitoring — are required to reduce the likelihood of further breaches and limit financial, reputational, and privacy damages.
Details
Industries:
Artificial Intelligence
Company size:
201-500 employees
Founded:
2009
Headquarters:
2000 Argentia Rd; Plaza 4, Suite 230; Mississauga, Ontario L5N 1P7, CA

Outcome reliability

We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.

This is an inline graph showing outcome reliability scores. The grades are as follows: F is between 0 and 70, D is between 70 and 78, C is between 79 and 85, B is between 85 and 95, and A is above 95.