Unprotected APIs
Most businesses regularly deal with multiple application programming interfaces (APIs) within the course of their data lifecycle. Unprotected API endpoints leave an opening for malicious attacks utilizing an authentication/authorization token or key to manipulate personal information and data, especially in enterprise mobility management and BYOD transmissions over unsecure connections. API keys should be handled just like encryption and code-signing keys, and administrators should always verify third-parties before releasing API keys.
Most businesses regularly deal with multiple application programming interfaces (APIs) within the course of their data lifecycle. Unprotected API endpoints leave an opening for malicious attacks utilizing an authentication/authorization token or key to manipulate personal information and data, especially in enterprise mobility management and BYOD transmissions over unsecure connections. API keys should be handled just like encryption and code-signing keys, and administrators should always verify third-parties before releasing API keys.