Data encryption: A beginner’s guide
Beginner’s guide to data encryption, methods, algorithms, devices, and best practices.
Get fresh insights, pro tips, and thought starters–only the best of posts for you.
The McGraw Hill incident highlights a growing SaaS data breach risk in 2026, as attackers increasingly target exposed cloud configurations and public-facing SaaS components. Security teams are no longer defending only the traditional perimeter. They are also defending the SaaS layer, where users, identities, and business data now intersect.
For years, enterprises have moved core workflows to cloud platforms like Salesforce, often assuming that vendor-managed security controls are enough to reduce ongoing configuration risk. In practice, cloud misconfigurations and exposed SaaS components have become a major path to large-scale data exposure.
When an overly permissive guest user configuration or exposed web resource can reveal millions of records, SaaS platforms become a critical attack surface for modern enterprises.
This incident shows how a SaaS misconfiguration can expose sensitive data at scale. In this case, the reported entry point was a Salesforce-hosted webpage.
The McGraw Hill incident was reportedly linked to a misconfiguration within the Salesforce environment that exposed data through a limited Salesforce-hosted webpage.
Salesforce has also warned that threat actors are targeting overly permissive Experience Cloud guest user configurations and exposed unauthenticated API access on public-facing sites to retrieve data that was not meant to be public.
Even without passwords, a data set containing names, email addresses, and phone numbers can support targeted phishing, vishing, and other social engineering campaigns aimed at stealing valid credentials.
In practice, threat actors can use this exposed contact data to build convincing phishing messages and impersonation attempts that pressure users into revealing credentials or other sensitive information.
Exposure in one SaaS platform is often not the end of the story. Once exposed data enters the open, attackers can combine it with other stolen credentials, phishing kits, or identity-based attacks to widen the impact across connected business systems.
This kind of lateral cloud movement can turn a single configuration gap into a broader identity and data exposure problem across the organization.
To reduce the risk of a SaaS data breach, organizations need to apply the same discipline to cloud configuration, access control, and identity protection that they already apply to on-premises systems.
Start with a strict least privilege review of Salesforce guest user configurations and any public-facing SaaS components. Restrict guest access to the minimum required objects and fields, set external access to Private, and disable public API access where it is not required.
Because exposed contact data can fuel phishing and impersonation campaigns, organizations should strengthen identity controls for accounts tied to sensitive SaaS workflows. Prioritize phishing-resistant authentication, review suspicious login activity, and limit access pathways that rely on exposed user information alone.
Review connected applications, integrations, and delegated access settings that could expand the blast radius of a misconfiguration. Over-permissioned integrations and exposed access paths can turn a limited SaaS exposure into a broader data security problem.
Learn kiosk management strategies, challenges, and best practices to securely deploy, manage, and scale devices across industries.
DOWNLOADData no longer lives only on the endpoint. It also lives across cloud apps, identities, and access flows. Hexnode brings together UEM, XDR, and device-aware identity controls to help organizations secure that access layer with a more converged security architecture.
A large share of SaaS risk still starts on the endpoint, where unmanaged browsers, weak device hygiene, and uncontrolled access paths create openings for phishing and session abuse. Hexnode UEM helps IT teams enforce device policies, secure browsing environments, and gain tighter control over managed endpoints that connect to business apps.
When suspicious activity begins on a managed endpoint, defenders need visibility beyond static policy enforcement. Hexnode XDR helps security teams detect, investigate, and hunt threats with unified visibility across supported endpoints.
Identity controls matter even more after a large contact-data exposure. Hexnode IdP adds a Zero Trust layer by tying user access to device trust, so organizations can enforce access decisions based on whether the endpoint is known, compliant, and managed. This supports the kind of UEM-XDR-IdP integration enterprises need when protecting cloud applications such as Salesforce and Microsoft 365.
The practical goal is not to claim that any platform can eliminate SaaS exposure. It is to reduce preventable access risk. Hexnode combines endpoint management, threat visibility, and device-aware identity controls into a unified approach. This helps organizations control who can access business apps, from which devices, and under what security conditions. That is the core value of a more converged security architecture for modern SaaS environments.
The McGraw Hill incident is a clear warning for organizations navigating SaaS risk in 2026. Security no longer stops at the operating system. It now extends across endpoints, identities, cloud applications, and the policies that connect them.
Hexnode helps organizations close the gap between endpoint security and cloud access. It combines UEM, XDR, and device trust-based identity controls into a unified security architecture. That reduces the chance that a single SaaS misconfiguration turns into a broader data exposure event.
Start your free trial and strengthen endpoint-to-cloud security
SIGN UP NOW