Contact Us


<< back

Security Overview understands that the confidentiality, integrity, and availability of our customers' information are vital to their business operations and our own success. We use a multi-layered approach to protect that key information, constantly monitoring and improving our application, systems, and processes to meet the growing demands and challenges of security.

System description


Users of online services are potential targets for attempts to steal login credentials and other sensitive information. These threats include scam emails (phishing and malware) and phone calls attempting to gather information that can be used to gain unauthorized access or privileged knowledge.

About Wireless Connection Sniffing and Hijacking

Salesforce provides TLSv1.0, TLSv1.1, and TLSv1.2 encryption (https) for login and communications between the Salesforce application and the end user's web browser. This means that even when you login to Salesforce over an unsecured wireless network, your login credentials and business data are protected from hijacking by such tools as Firesheep. Along with encrypted connections, Salesforce offers a suite of security features that our customers can configure to their needs, see: Salesforce Best Practices -

Phishing and Malware

Don't become a victim of "phishing," in which Internet criminals set up a Web site that mimics a legitimate site, such as the login page. By following the tips below, you can avoid becoming a victim of such a scam:

  • Always look for the "lock" icon in the bottom-right corner of your browser (see images below).

ddc login lock ie ff

Recent phishing scams

Spot suspicious emails

Phishing emails try to trick you into revealing information, often by asking you to "verify" or "update" information. Such emails may use the logos of the companies or government agencies they are impersonating to look legitimate. One clue is that such messages often contain poor spelling and grammar. However, as scam artists become more sophisticated, their approaches are becoming more varied and their messages are they claim to come from. The example below shows some common phishing tactics, but expect anything - as users catch on to one approach, Internet criminals come up with new ones.

Security-ProtectYourself_02 trust_a "Dear Salesforce user ..." Be suspicious of any emails that don't address you by name and contain no other specific information. Such messages are often sent out in bulk, without any unique identifying information.
trust_b "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please confirm your identity ..." Some emails claim you need to respond because your account's security has been compromised.
trust_c "Verify your account ..." Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail.
trust_d "If you don't respond within 48 hours, your account will be closed ..." or "Get your refund now..." One tactic is to convey a sense of urgency, to make people respond quickly without thinking.

Remember, legitimate businesses will not ask you for sensitive information via email. If you receive such emails, do not respond or click any links the email contains. Forward the mail to and then delete it.

Look out for suspicious links and attachments

Malicious software attacks also come via email, using many of the same tactics as phishing. These emails include links or attachments that install malicious code—such as programs that capture keystrokes—on your computer. As users have become wary of attachments with .exe or unknown extensions, Internet criminals are now using attachments with seemingly innocuous .doc or .pdf extensions. And most users still readily click on links.

trust_a Beware of unusual links.
trust_b Watch out for links that contain URLs that look similar to real ones; for example "" or "".
trust_c Even if a link looks OK, make sure by entering the company's URL in the address bar yourself. Phishers can make links look like they go to one place while taking you to another site.


Report Suspicious Email

If you receive a suspicious email that involves the brand, submit a report:

Suspicious phone calls

Several customers have reported receiving phone calls from persons who misrepresent themselves as employees or agents of Some of these callers are attempting to steal your credentials - an illegal practice known as "social engineering". Here's how it typically works:

  • A caller identifies companies that use by searching public job postings, etc.
  • The caller contacts the customer's main switchboard and asks for the person responsible for or the administrator. The caller may claim to offer a "new version of"
  • The caller asks for login credentials to "install improvements" or perform other activities in the customer's org.

What you need to do:

  • Remind your users that employees will not ask for usernames or passwords.
  • If you suspect that your login credentials (username and password) have been compromised, please change your password immediately and notify
  • If a caller identifies him or herself as a employee and you do not recognize his or her name, ask for a call-back number and email address. Then call our 1-800-NO-SOFTWARE (1-800-667-6389) number to verify whether the caller is a employee.

Most Recent Release Notes

Most recent Release Notes