By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
Computing

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

News Room
Last updated: 2026/01/14 at 6:11 AM
News Room Published 14 January 2026
Share
New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
SHARE
  • Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024.
  • Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise.
  • Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%).

Download the complete 43-page analysis →

TL;DR

A critical disconnect emerges in the 2026 research: While 81% of security leaders call web attacks a top priority, only 39% have deployed solutions to stop the bleeding.

Last year’s research found 51% unjustified access. This year it’s 64% — and accelerating into public infrastructure.

What is Web Exposure?

Gartner coined ‘Web Exposure Management’ to describe security risks from third-party applications: analytics, marketing pixels, CDNs, and payment tools. Each connection expands your attack surface; a single vendor compromise can trigger a massive data breach by injecting code to harvest credentials or skim payments.

This risk is fueled by a governance gap, where marketing or digital teams deploy apps without IT oversight. The result is chronic misconfiguration, where over-permissioned applications are granted access to sensitive data fields they don’t functionally need.

This research analyzes exactly what data these third-party apps touch and whether they have a legitimate business justification.

Methodology

Over 12 months (ending Nov. 2025), Reflectiz analyzed 4,700 leading websites using its proprietary Exposure Rating system. It analyzes the huge number of data points it gathers from scanning millions of websites by considering each risk factor in context, adds them together to create an overall level of risk, and expresses this as a simple grade, from A to F. Findings were supplemented by a survey of 120+ security leaders in the healthcare, finance, and retail sectors.

The Unjustified Access Crisis

The report highlights a growing governance gap termed “unjustified access”: instances where third-party tools are granted access to sensitive data without a demonstrable business need.

Access is flagged when a third-party script meets any of these criteria:

  • Irrelevant Function: Reading data unnecessary for its task (e.g., a chatbot accessing payment fields).
  • Zero-ROI Presence: Remaining active on high-risk pages despite 90+ days of zero data transmission.
  • Shadow Deployment: Injection via Tag Managers without security oversight or “least privilege” scoping.
  • Over-Permissioning: Utilizing “Full DOM Access” to scrape entire pages rather than restricted elements.

“Organizations are granting sensitive data access by default rather than exception.” This trend is most acute in Entertainment and Online Retail, where marketing pressures often override security reviews.

The study identifies specific tools driving this exposure:

  • Google Tag Manager: Accounts for 8% of all unjustified sensitive data access.
  • Shopify: 5% of unjustified access.
  • Facebook Pixel: In 4% of analyzed deployments, the pixel was found to be over-permissioned, capturing sensitive input fields it did not require for functional tracking.

This governance gap isn’t theoretical. A recent survey of 120+ security decision-makers from healthcare, finance, and retail found that 24% of organizations rely solely on general security tools like WAF, leaving them vulnerable to the specific third-party risks this research identified. Another 34% are still evaluating dedicated solutions, meaning 58% of organizations lack proper defenses despite recognizing the threat.

Critical Infrastructure Under Siege

While the stats show massive spikes in Government and Education breaches, the cause is financial rather than technical.

  • Government Sector: Malicious activity exploded from 2% to 12.9% .
  • Education Sector: Signs of compromised sites quadrupled to 14.3% (1 in 7 sites)
  • Insurance Sector: By contrast, this sector reduced malicious activity by 60%, dropping to just 1.3%.

Budget-constrained institutions are losing the supply chain battle. Private sectors with better governance budgets are stabilizing their environments.

Survey respondents confirmed this: 34% cited budget constraints as their primary obstacle, while 31% pointed to lack of manpower – a combination that hits public institutions particularly hard.

The Awareness-Action Gap

Security leader survey findings expose organizational dysfunction:

  • 81% call web attacks a priority → Only 39% deployed solutions
  • 61% still evaluating or using inadequate tools → Despite 51% → 64% unjustified access surge
  • Top obstacles: Budget (34%), regulation (32%), staffing (31%)

Result: Awareness without action creates vulnerability at scale. The 42-point gap explains why unjustified access grows 25% year-over-year.

The Marketing Department Factor

A key driver of this risk is the “Marketing Footprint.” The research found that Marketing and Digital departments now drive 43% of all third-party risk exposure, compared to just 19% created by IT.

The report found that 47% of apps running in payment frames lack business justification. Marketing teams frequently deploy conversion tools into these sensitive environments without realizing the implications.

Security teams recognize this threat: in the practitioner survey, 20% of respondents ranked supply chain attacks and third-party script vulnerabilities among their top three concerns. Yet the organizational structure that would prevent these risks – unified oversight of third-party deployments – remains absent at most organizations.

How a Pixel Breach Could Eclipse Polyfill.io

With 53.2% ubiquity, the Facebook Pixel is a systemic single point of failure. The risk is not the tool, but unmanaged permissions: “Full DOM Access” and “Automatic Advanced Matching” transform marketing pixels into unintentional data scrapers.

The Precedent: A compromise would be 5x larger than the 2024 Polyfill.io attack, exposing data across half the major web simultaneously. Polyfill affected 100K sites over weeks; Facebook Pixel’s 53.2% ubiquity means 2.5M+ sites are compromised instantly.

The Fix: Context-Aware Deployment. Restrict pixels to landing pages for ROI, but strictly block them from payment and credential frames where they lack business justification.

What about TikTok pixel and other trackers? Download the full report for more insights >>

Technical Indicators of Compromise

For the first time, this research pinpoints technical signals that predict compromised sites.

Compromised sites don’t always use malicious apps – they’re characterized by “noisier” configurations.

Automated Detection Criteria:

  • Recently Registered Domains: Domains registered within the last 6 months appear 3.8x more often on compromised sites.
  • External Connections: Compromised sites connect to 2.7x more external domains (100 vs. 36).
  • Mixed Content: 63% of compromised sites mix HTTPS/HTTP protocols.

Benchmarks for Security Leaders

Among the 4,700 analyzed sites, 429 demonstrated strong security outcomes. These organizations prove that functionality and security can coexist:

  • ticketweb.uk: Only site meeting all 8 benchmarks (Grade A+)
  • GitHub, PayPal, Yale University: Meeting 7 benchmarks (Grade A)

The 8 Security Benchmarks: Leaders vs Average

The benchmarks below represent achievable targets based on real-world performance, not theoretical ideals. Leaders maintain ≤8 third-party apps, while average organizations struggle with 15-25. The difference isn’t resources – it’s governance. Here’s how they compare across all eight metrics:

Three Quick Wins To Prioritize

1. Audit Trackers

Inventory every pixel/tracker:

  • Identify the owner and business justification
  • Remove tools that can’t justify data access

Priority fixes:

  • Facebook Pixel: Disable ‘Automatic Advanced Matching’ on PII pages
  • Google Tag Manager: Verify no payment page access
  • Shopify: Review app permissions

2. Implement Automated Monitoring

Deploy runtime monitoring for:

  • Sensitive field access detection (cards, SSNs, credentials)
  • Real-time alerts for unauthorized collection
  • CSP violation tracking

3. Address the Marketing-IT Divide

Joint CISO + CMO review:

  • Marketing tools in payment frames
  • Facebook Pixel scoping (use Allow/Exclusion Lists)
  • Tracker ROI vs. security risk

Download the Full Report

Get the complete 43-page analysis, including:

✅ Sector-by-sector risk breakdowns

✅ Complete list of high-risk third-party apps

✅ Year-over-year trend analysis

✅ Security leaders best practices

DOWNLOAD THE FULL REPORT HERE

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Pick up the 256GB Samsung Galaxy S25 Ultra with a 0 saving in the January sales Pick up the 256GB Samsung Galaxy S25 Ultra with a $280 saving in the January sales
Next Article iPhone 18 Series And iPhone Air 2 Display Details Leak Ahead Of Launch This Year iPhone 18 Series And iPhone Air 2 Display Details Leak Ahead Of Launch This Year
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Intel Panther Lake GSC Firmware Published Ahead Of Laptop Availability
Intel Panther Lake GSC Firmware Published Ahead Of Laptop Availability
Computing
Is your Galaxy phone slow? One UI 8.5 could make it feel more responsive
Is your Galaxy phone slow? One UI 8.5 could make it feel more responsive
News
Malik Afegbua: The man building digital ancestors
Malik Afegbua: The man building digital ancestors
Computing
JP Morgan took a profit hit to set aside money to run Apple Card
JP Morgan took a profit hit to set aside money to run Apple Card
News

You Might also Like

Intel Panther Lake GSC Firmware Published Ahead Of Laptop Availability
Computing

Intel Panther Lake GSC Firmware Published Ahead Of Laptop Availability

2 Min Read
Malik Afegbua: The man building digital ancestors
Computing

Malik Afegbua: The man building digital ancestors

12 Min Read
Symfony Search That Doesn’t Go Down: Zero-Downtime Elasticsearch + Async Indexing | HackerNoon
Computing

Symfony Search That Doesn’t Go Down: Zero-Downtime Elasticsearch + Async Indexing | HackerNoon

9 Min Read
How to Build a Production-Ready Go Diagnostic Rule | HackerNoon
Computing

How to Build a Production-Ready Go Diagnostic Rule | HackerNoon

20 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?