A Security Brief from Your Trusted Salesforce Partner.
At Cirrius Solutions Inc., we take pride in being trusted stewards of your Salesforce environment. Recent industry news has highlighted sophisticated social engineering attacks targeting company data, and we are proactively sharing this information to underscore our commitment to your security. While these events have been isolated, they are a timely reminder of the importance of reviewing and refining security practices.
We want to assure you that your security is always a top priority. Our approach combines robust technical safeguards with ongoing team training, ensuring we stay current with evolving best practices.
“At Cirrius Solutions, we win when you win. Our Managed Services and Fractional Pods pairtop Salesforce talent with modern AI tools to deliver outcomes that matter.”
–Tim Harting, COO
What’s Been Observed in the Industry
Recent reports have detailed social engineering tactics where threat actors use phishing and voice-phishing(vishing) to trick users. Their goal is to have users install unapproved connected apps disguised as trusted tools, like Data Loader.
A Recent Example:
In June 2025, a Salesforce environment at Google used for small-business customer data was accessed using these methods. While the data involved was limited, this case illustrates the importance of being attentive to app approvals and login practices.
Salesforce’s Perspective:
The core Salesforce platform remains secure. Salesforce emphasizes that customers play a critical role in safeguarding their own environments by utilizing available tools like multi-factor authentication (MFA), app authorization controls, and login restrictions.
How We Help Safeguard Your Salesforce Org
As part of our standard engagement, we incorporate many of the industry’s best security practices to create layered protections for your organization.
Multi-Factor Authentication (MFA)
Adding an extra layer of login security for all users.
Access Controls & IP Restrictions
Limiting access to trusted networks and approved devices.
Principle of Least Privilege
Assigning only the permissions necessary for each user’s role.
Careful App Vetting
Reviewing and approving connected apps from reputable sources only.
Ongoing Team Training
Equipping users to recognize and respond to unusual requests or login prompts.
Monitoring & Alerts
Tracking user activity and connected app changes for quick follow-up.
Our Commitment to You
While the recent news is not a cause for alarm, it highlights why all organizations must maintain thoughtful, layered protections. We remain committed to working with you to ensure your Salesforce org stays secure, resilient, and ready for whatever comes next.
Ready to Review Your Security?
If you would like to review your current security settings or explore additional protections, our team is here to help. Please don’t hesitate to reach out.