62/100
overall score
Total issues found:
276Updated on: December 3, 2025
Data we analyse
Phishing and malware
42
issues
Network security
77
issues
Email security
0
issues
Website security
157
issues
Recent critical risk issues we found
16 critical vulnerabilities found
37 high-risk vulnerabilities detected
143 SSL configuration issues found
3 corporate credentials stolen
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
80
vs.
50
Network security
67
vs.
89
Email security
100
vs.
52
Website security
69
vs.
68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Company overview
Section 1: Company OverviewShift is a financial-services technology firm providing retail banking support, payments integration, and account aggregation services to consumers and businesses. Operating in a highly regulated environment, Shift maintains digital channels for onboarding, KYC, lending decisions, and customer account management. Its scale—serving hundreds of thousands to millions of retail clients—means any security lapse can have rapid, material effects on customers and the firm’s regulatory standing. Given the sensitivity of financial and identity data handled, information security is a core operational requirement.
Section 2: Historical Data Breaches
Shift’s incident history demonstrates a pattern of data exposure rooted in both third-party dependencies and internal process failures. Early in its timeline, Shift experienced unauthorized access resulting from a partner credential misuse that exposed roughly 5,000 customer records, aligning with classic supply-chain access control failures. In a separate legal-procurement-related event, a large disclosure occurred when unprotected legal materials containing high-net-worth customer data—including personally identifiable information and account-level details—were shared without sufficient redaction or encryption, creating substantial privacy and compliance risk. These incidents prompted regulatory notifications and internal investigations but also revealed gaps in partner governance and secure handling of sensitive documents.
Section 3: Recent Security Breach
Most recently, in mid-2023, Shift suffered an internal-control breach when an employee forwarded confidential customer data to a personal account. Approximately 10,000 customer records were impacted. This was not an external cyber intrusion but an insider-driven exposure, highlighting weaknesses in access governance, data loss prevention (DLP) controls, and employee training. Shift terminated the responsible employee, notified affected customers, and expanded account monitoring. While the immediate containment actions were appropriate, the incident underlined reliance on manual controls and insufficient technological enforcement to prevent exfiltration.
Section 4: Evaluation of Digital Security
Independent evaluation data paints a concerning picture of Shift’s technical posture. The firm’s overall security score sits at 71/100—below typical benchmarks for large financial-services providers—indicating significant remediation is required.
Key technical findings:
- Phishing and Malware: Approximately 1,000 vulnerabilities were identified in defenses against phishing and malware. This suggests inadequate email filtering, threat hunting, or endpoint protection coverage and a high likelihood of successful social-engineering campaigns.
- Network Security: A discrete network security weakness was flagged. While singular, it could indicate misconfigurations or outdated segmentation practices that increase lateral-movement risk.
- Website and SSL Configuration: Audit results show 1,866 website-related issues, of which 1,865 are SSL configuration problems. Such systemic TLS/SSL weaknesses threaten data-in-transit confidentiality and can undermine customer trust and regulatory compliance.
- Credential Hygiene: Assessments revealed that about 15% of employees reuse breached passwords and that 16,390 corporate credentials are present in compromised datasets. This magnitude of credential exposure dramatically elevates account takeover (ATO) risk.
- Aggregate Risk Posture: The combination of web/TLS misconfigurations, credential compromise, and phishing susceptibility places Shift in a materially exposed position relative to peers.
Operational observations and expert commentary:
- Controls appear uneven: while some communication channels (such as email) may have had protections, web-facing components and cryptographic hygiene are deficient.
- Insider risk controls and DLP tooling are insufficiently enforced, illustrated by the recent employee exfiltration event.
- Remediation prioritization should address both systemic cryptographic issues (SSL/TLS) and human factors (password reuse, phishing resilience).
Recommendations (short-term technical priorities)
- Immediately revoke and rotate compromised credentials and enforce mandatory password changes with continuous credential-monitoring integrations.
- Patch and remediate SSL/TLS misconfigurations across all web assets, prioritize certificate management, and adopt modern TLS best practices.
- Deploy phishing-resistant multi-factor authentication (hardware or FIDO2/webauthn) for privileged and customer-facing accounts.
- Implement robust DLP controls, endpoint detection and response (EDR), and stricter egress filtering to limit unauthorized data transfer.
- Commission an external penetration test and compliance audit focused on web and network security within 30–60 days.
Conclusion: Is Shift Safe?
Shift’s documented incidents—ranging from partner credential misuse and accidental legal disclosures to an insider-driven leak—combined with an overall security score of 71/100 and thousands of identified vulnerabilities, indicate material deficiencies in both technical controls and governance. Immediate remediation should focus on credential hygiene, SSL/TLS hardening, phishing defenses, DLP implementation, and an external security audit to reduce financial, reputational, and privacy risks. With prioritized, funded action and strengthened insider-threat controls, Shift can restore a defensible security posture.
500–600 character summary:
Shift’s mix of past third-party and disclosure incidents, a recent insider-driven leak, and a sub-benchmark security score (71/100) reveal elevated risk to customer data and reputation. Immediate actions: rotate compromised credentials, remediate critical SSL/TLS and web misconfigurations, enforce phishing-resistant MFA, deploy DLP/EDR, and commission an external audit. Prioritizing these measures, along with enhanced employee training and vendor governance, is essential to reduce regulatory, financial, and privacy exposure.
Details
Website:
Industries:
Artificial Intelligence
Company size:
501-1000 employees
Founded:
2017
Headquarters:
40 Islington High St; London, UK N1 8XB, GB
Outcome reliability
We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.